Report generated on 11-Nov-2021 at 18:09:42 by pytest-html v3.1.1
Packages | {'pytest': '6.2.2', 'py': '1.10.0', 'pluggy': '0.13.1'} |
Platform | Linux-4.18.0-305.12.1.el8_4.x86_64-x86_64-with-centos-8.4.2105 |
Plugins | {'metadata': '1.11.0', 'html': '3.1.1', 'testinfra': '5.0.0'} |
Python | 3.6.8 |
41 tests ran in 842.35 seconds.
(Un)check the boxes to filter the results.
41 passed, 2529 skipped, 0 failed, 0 errors, 0 expected failures, 0 unexpected passesTests | Failed | Success | XFail | Error |
---|---|---|---|---|
test_vulnerability_detector/test_feeds/test_download_feeds.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/test_validate_feed_content.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/msu/test_missing_fields_msu_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_general_settings/test_general_settings_enabled.py | 0 | 2 | 0 | 0 |
test_vulnerability_detector/test_general_settings/test_general_settings_interval.py | 0 | 12 | 0 | 0 |
test_vulnerability_detector/test_general_settings/test_general_settings_min_full_scan_interval.py | 0 | 4 | 0 | 0 |
test_vulnerability_detector/test_general_settings/test_general_settings_retry_interval.py | 0 | 3 | 0 | 0 |
test_vulnerability_detector/test_general_settings/test_general_settings_run_on_start.py | 0 | 2 | 0 | 0 |
test_vulnerability_detector/test_providers/test_providers_enabled.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_providers/test_providers_multiple_providers.py | 0 | 14 | 0 | 0 |
test_vulnerability_detector/test_providers/test_providers_no_os.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_providers/test_providers_os.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_providers/test_providers_update_from_year.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_providers/test_providers_update_interval.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_alas_inventory_alas_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_alert_vulnerability_removal.py | 0 | 1 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_archlinux_inventory_archlinux_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_debian_inventory_debian_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_macos_inventory.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_msu_inventory_msu_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_redhat_duplicate_vulns.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_redhat_inventory_redhat_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_scan_different_cves.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_ubuntu_inventory_canonical_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py | 0 | 1 | 0 | 0 |
test_vulnerability_detector/test_scan_types/test_full_scan_type.py | 0 | 1 | 0 | 0 |
test_vulnerability_detector/test_scan_types/test_partial_scan_type.py | 0 | 1 | 0 | 0 |
test_vulnerability_detector/test_windows/test_cpe_indexing.py | 0 | 0 | 0 | 0 |
Result | Time | Test | Description | Duration | Markers | Links | Tier |
---|---|---|---|---|---|---|---|
No results found. Try to check the filters | |||||||
Skipped | 2021-11-11 20:55:41.843195 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[redhat_5]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.845510 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[redhat_6]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.847809 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[redhat_7]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.850818 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[redhat_8]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.853341 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[json_redhat]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.855463 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[canonical_trusty]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.857527 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[canonical_xenial]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.860758 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[canonical_bionic]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.863647 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[canonical_focal]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.865901 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[debian_stretch]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.868816 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[debian_buster]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.871067 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[nvd]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.873666 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[msu]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.876303 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[arch]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.878780 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[alas_amazon-linux]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.881782 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[alas_amazon-linux-2]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.884126 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/tmp/dummy]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.886131 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/tmp/dummy.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.888257 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/tmp/dummy.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.891173 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/tmp/dummy.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.893248 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/tmp/dummy.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.896234 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/tmp/dummy.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.898483 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/tmp/dummy.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.900626 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/tmp/dummy.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.903523 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/tmp/dummy.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.905937 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_oval_feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.908479 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_oval_feed.xml.gz]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.911061 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_oval_feed.xml.bz2]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.913179 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/tmp/dummy]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.916481 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/tmp/dummy.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.919275 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/tmp/dummy.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.922674 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/tmp/dummy.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.925747 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/tmp/dummy.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.927820 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/tmp/dummy.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.931152 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/tmp/dummy.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.933497 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/tmp/dummy.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.936146 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/tmp/dummy.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.939483 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_json_feed.json$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.942088 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_json_feed.json.gz$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.946505 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_json_feed.json.bz2$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.950671 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/tmp/dummy]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.954529 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/tmp/dummy.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.957282 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/tmp/dummy.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.960906 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/tmp/dummy.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.963239 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/tmp/dummy.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.966781 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/tmp/dummy.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.969152 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/tmp/dummy.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.972413 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/tmp/dummy.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.975527 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/tmp/dummy.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.978819 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_canonical_oval_feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.981226 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_canonical_oval_feed.xml.gz]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.983684 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_canonical_oval_feed.xml.bz2]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.986998 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/tmp/dummy]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.989159 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/tmp/dummy.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.991157 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/tmp/dummy.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.994402 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/tmp/dummy.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.996698 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/tmp/dummy.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:41.999108 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/tmp/dummy.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.002232 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/tmp/dummy.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.004692 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/tmp/dummy.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.007827 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/tmp/dummy.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.010367 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_debian_oval_feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.013245 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_debian_oval_feed.xml.gz]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.015978 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_debian_oval_feed.xml.bz2]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.018544 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_Debian_/tmp/dummy]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.021472 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_Debian_/tmp/dummy.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.023839 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_Debian_/tmp/dummy.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.026878 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_Debian_/tmp/dummy.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.029598 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_Debian_/tmp/dummy.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.031829 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_Debian_/tmp/dummy.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.034150 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_Debian_/tmp/dummy.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.036883 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_Debian_/tmp/dummy.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.039322 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_Debian_/tmp/dummy.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.042828 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_Debian_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_debian_json_feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.045594 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/tmp/dummy]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.049580 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/tmp/dummy.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.052124 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/tmp/dummy.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.055959 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/tmp/dummy.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.059149 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/tmp/dummy.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.062827 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/tmp/dummy.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.065320 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/tmp/dummy.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.067406 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/tmp/dummy.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.070703 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/tmp/dummy.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.073504 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_msu.json$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.078307 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_msu.json.gz$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.081851 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_msu.json.bz2$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.085820 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/tmp/dummy]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.089088 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/tmp/dummy.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.092914 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/tmp/dummy.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.096840 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/tmp/dummy.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.100552 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/tmp/dummy.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.103608 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/tmp/dummy.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.106200 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/tmp/dummy.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.108388 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/tmp/dummy.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.111383 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/tmp/dummy.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.114111 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_nvd_feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.120089 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_nvd_feed.json.gz]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.123322 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_nvd_feed.json.bz2]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.127496 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/tmp/dummy]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.131253 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/tmp/dummy.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.134545 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/tmp/dummy.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.138227 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/tmp/dummy.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.141837 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/tmp/dummy.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.145591 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/tmp/dummy.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.148694 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/tmp/dummy.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.151448 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/tmp/dummy.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.155094 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/tmp/dummy.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.158343 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_archlinux_feed.json$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.162672 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_archlinux_feed.json.gz$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.166354 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_archlinux_feed.json.bz2$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.169455 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/tmp/dummy]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.173153 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/tmp/dummy.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.176607 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/tmp/dummy.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.179884 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/tmp/dummy.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.183048 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/tmp/dummy.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.185268 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/tmp/dummy.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.188214 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/tmp/dummy.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.190577 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/tmp/dummy.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.193219 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/tmp/dummy.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.197491 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas_feed.json$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.200849 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas_feed.json.gz$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.203513 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas_feed.json.bz2$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.206658 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/tmp/dummy]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.209931 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/tmp/dummy.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.212015 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/tmp/dummy.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.214234 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/tmp/dummy.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.217729 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/tmp/dummy.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.220175 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/tmp/dummy.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.223413 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/tmp/dummy.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.225805 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/tmp/dummy.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.228946 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/tmp/dummy.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.231950 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas2_feed.json$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.235143 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas2_feed.json.gz$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.237842 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas2_feed.json.bz2$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.240502 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_https://www.customfeed.com/feed]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.243564 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_https://www.customfeed.com/feed.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.245911 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_https://www.customfeed.com/feed.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.249094 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_https://www.customfeed.com/feed.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.251468 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_https://www.customfeed.com/feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.253899 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_https://www.customfeed.com/feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.256558 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_https://www.customfeed.com/feed.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.259649 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_https://www.customfeed.com/feed.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.262086 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_https://www.customfeed.com/feed.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.265292 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_oval_feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.267729 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_oval_feed.xml.gz]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.270883 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_oval_feed.xml.bz2]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.273216 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_https://www.customfeed.com/feed]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.275407 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_https://www.customfeed.com/feed.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.278395 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_https://www.customfeed.com/feed.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.280571 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_https://www.customfeed.com/feed.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.283157 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_https://www.customfeed.com/feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.285946 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_https://www.customfeed.com/feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.288243 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_https://www.customfeed.com/feed.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.291101 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_https://www.customfeed.com/feed.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.293506 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_https://www.customfeed.com/feed.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.295841 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_json_feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.298489 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_json_feed.json.gz]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.300775 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_json_feed.json.bz2]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.302524 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_https://www.customfeed.com/feed]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.304946 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_https://www.customfeed.com/feed.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.307332 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_https://www.customfeed.com/feed.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.309795 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_https://www.customfeed.com/feed.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.312453 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_https://www.customfeed.com/feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.314457 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_https://www.customfeed.com/feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.316430 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_https://www.customfeed.com/feed.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.319115 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_https://www.customfeed.com/feed.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.321303 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_https://www.customfeed.com/feed.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.323779 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_canonical_oval_feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.326306 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_canonical_oval_feed.xml.gz]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.328391 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_canonical_oval_feed.xml.bz2]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.330216 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_https://www.customfeed.com/feed]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.332253 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_https://www.customfeed.com/feed.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.335192 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_https://www.customfeed.com/feed.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.338345 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_https://www.customfeed.com/feed.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.341623 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_https://www.customfeed.com/feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.343793 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_https://www.customfeed.com/feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.347116 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_https://www.customfeed.com/feed.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.349748 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_https://www.customfeed.com/feed.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.352549 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_https://www.customfeed.com/feed.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.355665 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_debian_oval_feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.357980 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_debian_oval_feed.xml.gz]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.360383 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_debian_oval_feed.xml.bz2]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.364340 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_Debian_https://www.customfeed.com/feed]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.367872 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_Debian_https://www.customfeed.com/feed.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.371227 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_Debian_https://www.customfeed.com/feed.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.375061 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_Debian_https://www.customfeed.com/feed.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.377909 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_Debian_https://www.customfeed.com/feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.381797 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_Debian_https://www.customfeed.com/feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.384356 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_Debian_https://www.customfeed.com/feed.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.386656 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_Debian_https://www.customfeed.com/feed.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.389552 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_Debian_https://www.customfeed.com/feed.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.392884 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_Debian_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_debian_json_feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.395842 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_https://www.customfeed.com/feed]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.397863 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_https://www.customfeed.com/feed.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.399593 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_https://www.customfeed.com/feed.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.401632 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_https://www.customfeed.com/feed.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.404417 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_https://www.customfeed.com/feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.406605 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_https://www.customfeed.com/feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.409076 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_https://www.customfeed.com/feed.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.411758 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_https://www.customfeed.com/feed.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.413594 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_https://www.customfeed.com/feed.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.416390 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_msu.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.418596 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_msu.json.gz]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.423005 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_msu.json.bz2]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.425547 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_https://www.customfeed.com/feed]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.427646 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_https://www.customfeed.com/feed.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.430410 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_https://www.customfeed.com/feed.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.432451 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_https://www.customfeed.com/feed.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.434477 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_https://www.customfeed.com/feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.436500 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_https://www.customfeed.com/feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.439138 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_https://www.customfeed.com/feed.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.440944 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_https://www.customfeed.com/feed.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.442962 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_https://www.customfeed.com/feed.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.445838 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_nvd_feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.447956 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_nvd_feed.json.gz]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.450496 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_nvd_feed.json.bz2]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.453025 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_https://www.customfeed.com/feed]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.454924 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_https://www.customfeed.com/feed.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.457795 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_https://www.customfeed.com/feed.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.460032 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_https://www.customfeed.com/feed.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.462428 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_https://www.customfeed.com/feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.465334 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_https://www.customfeed.com/feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.467599 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_https://www.customfeed.com/feed.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.469847 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_https://www.customfeed.com/feed.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.472311 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_https://www.customfeed.com/feed.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.474796 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_archlinux_feed.json$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.476965 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_archlinux_feed.json.gz$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.479635 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_archlinux_feed.json.bz2$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.481809 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_https://www.customfeed.com/feed]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.483894 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_https://www.customfeed.com/feed.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.487081 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_https://www.customfeed.com/feed.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.489596 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_https://www.customfeed.com/feed.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.493716 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_https://www.customfeed.com/feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.496068 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_https://www.customfeed.com/feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.499469 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_https://www.customfeed.com/feed.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.502175 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_https://www.customfeed.com/feed.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.504602 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_https://www.customfeed.com/feed.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.507385 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas_feed.json$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.510268 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas_feed.json.gz$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.512768 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas_feed.json.bz2$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.515431 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_https://www.customfeed.com/feed]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.517610 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_https://www.customfeed.com/feed.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.519996 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_https://www.customfeed.com/feed.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.522664 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_https://www.customfeed.com/feed.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.525311 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_https://www.customfeed.com/feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.528047 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_https://www.customfeed.com/feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.530228 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_https://www.customfeed.com/feed.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.532788 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_https://www.customfeed.com/feed.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.535398 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_https://www.customfeed.com/feed.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.537710 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas2_feed.json$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.540226 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas2_feed.json.gz$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.542902 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas2_feed.json.bz2$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:55:42.573158 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[redhat_generic]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:42.600823 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[redhat_5]::setup | Check if the downloaded feeds have the expected format | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:42.628878 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[redhat_6]::setup | Check if the downloaded feeds have the expected format | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:42.655542 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[redhat_7]::setup | Check if the downloaded feeds have the expected format | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:42.681865 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[redhat_8]::setup | Check if the downloaded feeds have the expected format | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:42.710784 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[canonical_focal]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:42.739154 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[canonical_bionic]::setup | Check if the downloaded feeds have the expected format | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:42.782345 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[canonical_xenial]::setup | Check if the downloaded feeds have the expected format | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:42.818007 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[canonical_trusty]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:42.864843 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[debian_buster]::setup | Check if the downloaded feeds have the expected format | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:42.898070 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[debian_stretch]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:42.935514 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[debian_jessie]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:42.966352 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[debian_wheezy]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.004122 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[debian_generic]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.036637 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[msu_generic]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.140182 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[arch_]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.170519 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[alas_Amazon Linux 1]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.197512 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[alas_Amazon Linux 2]::setup | Check if the downloaded feeds have the expected format | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.225788 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2002]::setup | Check if the downloaded feeds have the expected format | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.260299 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2003]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.290291 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2004]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.320884 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2005]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.350256 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2006]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.378234 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2007]::setup | Check if the downloaded feeds have the expected format | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.406676 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2008]::setup | Check if the downloaded feeds have the expected format | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.433807 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2009]::setup | Check if the downloaded feeds have the expected format | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.462105 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2010]::setup | Check if the downloaded feeds have the expected format | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.495598 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2011]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.526149 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2012]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.556412 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2013]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.587855 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2014]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.618102 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2015]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.648423 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2016]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.676663 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2017]::setup | Check if the downloaded feeds have the expected format | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.704863 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2018]::setup | Check if the downloaded feeds have the expected format | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.734675 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2019]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.766953 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2020]::setup | Check if the downloaded feeds have the expected format | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.803377 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_no_feed_changes[ALAS_configuration]::setup | Check if the feed is imported successfully by default. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.848245 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.882207 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.910331 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.943740 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:43.977498 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.009144 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.036605 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.072461 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.100661 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.129116 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.160199 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.189902 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.218842 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.245307 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.277774 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.307911 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.335772 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.364598 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.391451 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.420993 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.447907 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.476530 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.504065 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.536196 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.564972 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.593216 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.621987 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.653634 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.692657 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.721765 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.756248 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.804647 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.841857 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.869919 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.896718 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.927137 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.959641 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:44.990085 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.019466 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.049128 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.079996 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.109179 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.138680 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.167845 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.199418 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.229220 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.256218 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.284038 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.311121 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.342436 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.374233 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.402785 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.432861 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.462721 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.495688 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.523452 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.551209 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.580920 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.612048 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.642597 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.669808 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.696758 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.729575 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.758619 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.787520 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.825481 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.863975 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.902903 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.935475 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:45.970777 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.001855 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.033121 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.062730 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.094591 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.122526 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.150637 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.179657 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.209691 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.245798 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.278363 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.310650 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.342539 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.374359 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.403337 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.435898 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.462819 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.492729 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.520773 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.547438 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.573815 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.604030 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.632929 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.660406 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.686886 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.714131 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.745524 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.775397 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.814862 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.850612 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.879431 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.909739 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.938988 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:46.972844 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.007205 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.038873 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.066779 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.095855 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.130627 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.167292 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.198147 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.227553 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.257216 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.287795 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.314896 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.342499 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.369638 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.399370 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.427475 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.455195 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.482738 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.509183 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.539352 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_no_feed_changes[ALAS2_configuration]::setup | Check if the feed is imported successfully by default. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.568618 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.595497 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.622513 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.651260 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.685784 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.712159 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.739234 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.773559 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.817011 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.856955 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.907332 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.937034 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.967837 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:47.999957 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.032657 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.060149 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.087802 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.115115 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.144163 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.175091 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.203724 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.235653 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.266815 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.301388 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.331668 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.359765 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.387037 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.415411 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.443072 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.469861 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.498062 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.525367 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.559716 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.594826 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.626637 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.658961 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.696451 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.729856 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.764041 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.810367 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.855794 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.900350 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.930682 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.961212 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:48.989351 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.019814 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.047963 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.076814 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.105234 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.147034 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.185892 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.217126 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.245975 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.276277 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.309975 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.342529 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.383993 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.426722 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.462987 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.497305 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.526739 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.556345 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.587135 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.614166 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.640311 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.667051 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.705878 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.738034 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.765038 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.798006 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.835995 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.872887 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.909617 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.947005 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:49.974951 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.004243 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.034602 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.071971 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.108289 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.134629 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.163276 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.201327 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.252414 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.05 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.291301 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.328662 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.363140 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.405412 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.438817 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.466730 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.495966 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.524642 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.554043 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.580608 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.606934 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.633374 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.665434 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.696483 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.722261 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.748252 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.776338 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.808929 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.845913 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.880176 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.911479 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.942382 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.968122 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:50.996894 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.028957 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.063193 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.092861 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.127236 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.159165 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.194661 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.226590 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.257815 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.287870 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.324280 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.358884 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.394786 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.424216 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.459149 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.488042 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_no_feed_changes[ALAS_configuration]::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.514257 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Delete '{']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.540079 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Delete '}']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.566100 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Add '{{']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.597695 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Add '}}']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.624724 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Add '{' in the middle of feed]::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.650803 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Add '}' in the middle of feed]::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.680469 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Add '{}' in the middle of feed]::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.713808 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Delete key:value comma ',']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.741417 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Add a comma before value key: ,value,]::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.767097 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Add double comma after key:value,,]::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.797661 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Add double comma after list value,,]::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.827195 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Close a key with double quotation marks]::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.861315 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Close value with double quotation marks]::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.895093 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace a comma with semicolon]::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.930775 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace a colon with semicolon]::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:51.969427 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Missing open bracket]::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.003916 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Missing close bracket]::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.032009 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Delete some information]::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.062341 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '.']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.097097 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with ':']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.127852 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '@']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.160110 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '#']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.191322 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '*']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.226634 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '-']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.252284 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '_']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.277758 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with ''']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.304814 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '"']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.336623 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '/']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.363958 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '=']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.389313 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '\xf1']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.414635 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '\xe7']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.443502 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '+']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.472008 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '^']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.498384 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '!'0]::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.523929 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '?'0]::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.549376 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '%']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.574688 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '&']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.602653 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '`']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.628348 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '\xbf']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.653082 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '?'1]::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.678211 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '(']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.704142 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with ')']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.734517 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '|']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.763057 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '\xba']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.790177 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '$']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.820521 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '\xbd']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.855907 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '\xac']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.903265 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '!'1]::setup | Check if the feed is imported successfully by default | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.936447 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '~']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.968381 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '\xa1']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:52.998045 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '[']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.033951 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with ']']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.066173 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '{']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.093154 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '}']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.121769 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_no_feed_changes[ALAS2_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.158438 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Delete '{']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.189160 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Delete '}']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.216343 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Add '{{']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.249612 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Add '}}']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.284483 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Add '{' in the middle of feed]::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.321140 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Add '}' in the middle of feed]::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.354648 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Add '{}' in the middle of feed]::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.397848 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Delete key:value comma ',']::setup | Check if the feed is imported successfully by default | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.432846 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Add a comma before value key: ,value,]::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.459673 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Add double comma after key:value,,]::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.486333 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Add double comma after list value,,]::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.512448 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Close a key with double quotation marks]::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.539527 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Close value with double quotation marks]::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.576424 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace a comma with semicolon]::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.624916 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace a colon with semicolon]::setup | Check if the feed is imported successfully by default | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.670094 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Missing open bracket]::setup | Check if the feed is imported successfully by default | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.727328 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Missing close bracket]::setup | Check if the feed is imported successfully by default | 0.05 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.776235 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Delete some information]::setup | Check if the feed is imported successfully by default | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.814855 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '.']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.842433 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with ':']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.883813 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '@']::setup | Check if the feed is imported successfully by default | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.919048 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '#']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.957717 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '*']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:53.987047 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '-']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.013120 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '_']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.038849 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with ''']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.064678 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '"']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.092113 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '/']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.119950 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '=']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.146138 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '\xf1']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.172289 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '\xe7']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.198401 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '+']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.227150 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '^']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.255878 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '!'0]::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.282263 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '?'0]::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.309725 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '%']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.340162 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '&']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.366362 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '`']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.392012 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '\xbf']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.418763 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '?'1]::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.448538 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '(']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.480962 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with ')']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.512839 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '|']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.541026 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '\xba']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.570292 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '$']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.600715 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '\xbd']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.628978 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '\xac']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.656610 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '!'1]::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.682996 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '~']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.710428 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '\xa1']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.748089 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '[']::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.776230 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with ']']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.801956 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '{']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.827476 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '}']::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.855924 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_no_feed_changes[ALAS_configuration]::setup | Check if the feed is imported successfully by default | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.890305 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: severity, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.929116 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: severity, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:54.968713 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: severity, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.034272 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: severity, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.06 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.095787 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: severity, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.05 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.135929 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: severity, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.168106 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: severity, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.194333 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: severity, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.220349 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: severity, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.251300 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: severity, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.281230 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: publishedDate, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.311663 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: publishedDate, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.337757 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: publishedDate, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.365719 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: publishedDate, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.398183 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: publishedDate, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.430501 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: publishedDate, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.459213 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: publishedDate, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.485731 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: publishedDate, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.521034 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: publishedDate, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.548637 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: publishedDate, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.574718 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: lastModifiedDate, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.600182 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: lastModifiedDate, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.627358 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: lastModifiedDate, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.653712 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: lastModifiedDate, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.680546 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: lastModifiedDate, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.708872 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: lastModifiedDate, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.735987 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: lastModifiedDate, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.770213 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: lastModifiedDate, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.797691 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: lastModifiedDate, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.824479 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: lastModifiedDate, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.860754 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: references, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.890353 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: references, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.917556 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: references, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.944225 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: references, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:55.971376 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: references, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.000725 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: references, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.028425 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: references, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.057845 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: references, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.102028 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: references, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.142597 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: references, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.180211 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: vulnerabilities, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.212844 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: vulnerabilities, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.244159 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: vulnerabilities, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.278238 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: vulnerabilities, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.313496 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: vulnerabilities, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.343296 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: vulnerabilities, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.380725 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: vulnerabilities, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.407979 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: vulnerabilities, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.433962 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: vulnerabilities, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.459787 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: vulnerabilities, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.488586 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: fixed_packages, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.520908 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: fixed_packages, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.546786 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: fixed_packages, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.572386 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: fixed_packages, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.604264 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: fixed_packages, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.631721 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: fixed_packages, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.665285 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: fixed_packages, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.700125 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: fixed_packages, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.728276 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: fixed_packages, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.754961 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: fixed_packages, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.782044 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_no_feed_changes[ALAS2_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.808716 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: severity, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.834998 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: severity, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.861277 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: severity, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.887875 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: severity, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.940669 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: severity, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:56.989195 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: severity, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.020895 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: severity, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.048234 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: severity, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.079937 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: severity, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.112852 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: severity, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.141283 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: publishedDate, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.168830 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: publishedDate, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.196844 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: publishedDate, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.225698 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: publishedDate, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.251650 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: publishedDate, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.281822 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: publishedDate, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.310372 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: publishedDate, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.341864 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: publishedDate, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.371841 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: publishedDate, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.397878 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: publishedDate, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.423341 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: lastModifiedDate, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.448934 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: lastModifiedDate, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.479020 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: lastModifiedDate, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.506418 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: lastModifiedDate, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.532461 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: lastModifiedDate, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.558520 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: lastModifiedDate, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.583859 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: lastModifiedDate, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.611980 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: lastModifiedDate, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.637626 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: lastModifiedDate, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.664889 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: lastModifiedDate, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.691237 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: references, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.723536 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: references, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.758629 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: references, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.790152 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: references, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.822068 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: references, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.851641 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: references, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.880480 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: references, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.924847 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: references, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:57.967555 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: references, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.007810 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: references, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.038627 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: vulnerabilities, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.064922 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: vulnerabilities, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.091051 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: vulnerabilities, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.119944 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: vulnerabilities, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.146780 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: vulnerabilities, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.172866 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: vulnerabilities, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.199352 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: vulnerabilities, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.225031 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: vulnerabilities, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.259763 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: vulnerabilities, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.295775 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: vulnerabilities, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.327155 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: fixed_packages, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.357309 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: fixed_packages, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.390574 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: fixed_packages, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.420422 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: fixed_packages, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.448344 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: fixed_packages, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.474572 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: fixed_packages, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.502376 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: fixed_packages, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.535462 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: fixed_packages, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.562751 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: fixed_packages, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.594476 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: fixed_packages, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.624090 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_no_feed_changes[ALAS_configuration]::setup | Check if the feed is imported successfully by default. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.660929 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS_configuration-missing: severity]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.698045 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS_configuration-missing: publishedDate]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.731241 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS_configuration-missing: lastModifiedDate]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.759794 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS_configuration-missing: references]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.787765 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS_configuration-missing: vulnerabilities]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.816461 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS_configuration-missing: fixed_packages]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.849131 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_no_feed_changes[ALAS2_configuration]::setup | Check if the feed is imported successfully by default. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.875460 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS2_configuration-missing: severity]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.902238 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS2_configuration-missing: publishedDate]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.947889 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS2_configuration-missing: lastModifiedDate]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:58.987653 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS2_configuration-missing: references]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.04 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.018354 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS2_configuration-missing: vulnerabilities]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.047482 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS2_configuration-missing: fixed_packages]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.03 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.073602 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_no_feed_changes[ARCHLINUX_configuration]::setup | Check if the feed is imported successfully by default. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.103934 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.138004 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.168669 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.199274 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.234849 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.262860 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.292246 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.320084 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.350980 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.385709 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.418909 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.451999 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.487226 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.514809 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.541005 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.571938 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.607526 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.636378 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.666137 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.694403 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.722170 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.754890 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.781936 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.807982 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.836984 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.862819 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.888413 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.916963 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.953088 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:55:59.989858 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.020748 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.046947 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.074540 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.105314 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.134824 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.164649 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.199469 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.236273 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.276486 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.312231 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.346760 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.395820 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.447429 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.05 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.500586 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.05 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.546229 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.582333 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.611062 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.641945 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.675780 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.705724 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.737448 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.763405 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.790880 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.819818 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.845523 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.870957 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.900805 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.934348 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.968170 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:00.998831 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.027997 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.055856 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.084282 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.116330 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.147556 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.178167 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.207762 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.237798 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.265292 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.299938 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.328592 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.355397 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.381354 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.412349 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.441545 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.468815 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.497692 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.533060 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.580692 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.627505 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.668907 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.694641 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.720954 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.749597 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.775385 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.801091 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.829201 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.858504 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.885275 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.913066 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.953244 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:01.998831 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.042618 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.070826 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.104239 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.143011 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.187525 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.240337 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.05 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.279901 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.310007 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.338548 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.364550 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.391339 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.417860 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.443336 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.469841 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.497958 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.528351 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.555008 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.582369 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.609607 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.640106 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.672927 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.701140 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.730726 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.761967 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.795355 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.824418 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.851966 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.884298 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.926721 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:02.968595 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_no_feed_changes[ARCHLINUX_configuration]::setup | Check if the feed is imported successfully by default | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.005740 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Delete '{']::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.038523 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Delete '}']::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.064007 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Add '{{']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.094788 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Add '}}']::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.126027 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Add '{' in the middle of feed]::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.156267 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Add '}' in the middle of feed]::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.188247 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Add '{}' in the middle of feed]::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.222131 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Delete key:value comma ',']::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.252785 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Add a comma before value key: ,value,]::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.280878 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Add double comma after key:value,,]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.307865 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Add double comma after list value,,]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.333722 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Close a key with double quotation marks]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.364746 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Close value with double quotation marks]::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.395521 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace a comma with semicolon]::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.423558 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace a colon with semicolon]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.452864 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Missing open bracket]::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.478853 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Missing close bracket]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.508057 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Delete some information]::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.537030 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '.']::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.567275 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with ':']::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.604877 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '@']::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.643308 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '#']::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.673544 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '*']::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.701928 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '-']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.730842 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '_']::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.764407 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with ''']::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.793024 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '"']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.826443 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '/']::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.856836 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '=']::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.884868 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '\xf1']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.910949 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '\xe7']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.938385 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '+']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:03.976462 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '^']::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.011145 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '!'0]::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.041362 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '?'0]::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.066835 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '%']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.092277 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '&']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.120080 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '`']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.146390 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '\xbf']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.173438 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '?'1]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.201248 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '(']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.231777 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with ')']::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.261645 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '|']::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.288442 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '\xba']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.316558 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '$']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.344858 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '\xbd']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.380118 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '\xac']::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.410059 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '!'1]::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.438381 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '~']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.468993 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '\xa1']::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.498878 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '[']::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.532904 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with ']']::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.559835 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '{']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.586298 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '}']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.613370 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_no_feed_changes[ARCHLINUX_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.643879 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: name, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.669997 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: name, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.695474 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: name, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.721286 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: name, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.752042 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: name, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.781000 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: name, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.808635 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: name, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.834474 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: name, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.860114 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: name, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.887475 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: name, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.913450 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: packages, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.939670 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: packages, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:04.966730 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: packages, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:05.005463 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: packages, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:05.050692 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: packages, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:05.079029 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: packages, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:05.106899 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: packages, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:05.135188 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: packages, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:05.171486 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: packages, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:05.204954 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: packages, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:05.240248 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_no_feed_changes[ARCHLINUX_configuration]::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:05.272790 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_invalid_archlinux_feed[ARCHLINUX_configuration-missing: name]::setup | Check if the feed is imported successfully by default. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:05.305437 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_invalid_archlinux_feed[ARCHLINUX_configuration-missing: packages]::setup | Check if the feed is imported successfully by default. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:05.340332 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_invalid_archlinux_feed[ARCHLINUX_configuration-missing: status]::setup | Check if the feed is imported successfully by default. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:05.378983 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_invalid_archlinux_feed[ARCHLINUX_configuration-missing: severity]::setup | Check if the feed is imported successfully by default. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:05.431210 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_invalid_archlinux_feed[ARCHLINUX_configuration-missing: type]::setup | Check if the feed is imported successfully by default. | 0.05 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:05.466715 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_invalid_archlinux_feed[ARCHLINUX_configuration-missing: affected]::setup | Check if the feed is imported successfully by default. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:05.495479 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_invalid_archlinux_feed[ARCHLINUX_configuration-missing: fixed]::setup | Check if the feed is imported successfully by default. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:05.523759 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_invalid_archlinux_feed[ARCHLINUX_configuration-missing: ticket]::setup | Check if the feed is imported successfully by default. | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:05.551478 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_invalid_archlinux_feed[ARCHLINUX_configuration-missing: issues]::setup | Check if the feed is imported successfully by default. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:05.579404 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_invalid_archlinux_feed[ARCHLINUX_configuration-missing: advisories]::setup | Check if the feed is imported successfully by default. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:05.608832 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_no_feed_changes[CANONICAL_configuration]::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:05.611920 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.614038 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.616130 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.618569 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.620971 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.623020 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.624991 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.626860 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.628824 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.631049 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.633036 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.634912 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.636838 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.638790 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.640638 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.642785 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.644949 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.646878 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.648738 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.650643 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.652486 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.654579 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.656522 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.658383 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.660227 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.662088 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.663929 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.665932 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.667831 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.669664 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.671437 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.673283 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.675374 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.677226 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.679059 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.680891 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.682725 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.684508 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.686684 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.688545 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.691028 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.693653 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.696733 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.699331 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.703283 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.705808 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.707842 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.710153 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.712377 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.714367 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.716517 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.718479 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.720534 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.722705 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.724723 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.727569 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.729588 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.731520 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.733428 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.735403 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.737376 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.739484 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.812257 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.814206 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.816198 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.818226 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.820286 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.822195 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.824074 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.825949 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.827890 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.830096 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.832029 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.833913 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.835853 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.837801 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.839667 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.841644 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.843433 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.845313 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.847193 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.849172 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.851102 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.853212 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.855159 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.857103 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.859132 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.861111 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.863272 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.865200 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.867182 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.869108 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.871165 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.873145 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.875333 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.877257 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.879221 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.881190 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.883105 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.885153 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.887224 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.889293 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.891181 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.893178 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.895150 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.897608 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.900001 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.902185 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.904182 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.906450 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.908639 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.911002 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.913015 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.914983 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.916964 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.918845 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.920965 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.923328 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.925475 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.927623 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.929522 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 20:56:05.956763 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_no_feed_changes[CANONICAL_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:05.990634 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Delete '<']::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.033637 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Delete '>']::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.073279 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Delete '<>']::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.111043 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Close initial tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.142989 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Delete opening tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.174425 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Delete closing tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.208265 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Empty opening tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.238307 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Empty closing tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.266941 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Random text before tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.294936 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Delete info]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.324639 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add . character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.353830 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '.' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.380072 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add : character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.405815 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with ':' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.435408 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add @ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.466913 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '@' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.497086 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add # character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.526766 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '#' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.553567 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add * character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.582365 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '*' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.609801 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add - character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.635738 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '-' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.661535 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add _ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.687617 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '_' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.718511 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ' character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.747157 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with ''' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.773469 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add " character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.798728 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '"' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.831698 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add / character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.858849 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '/' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.887222 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add = character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.915166 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '=' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.943451 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add \xf1 character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:06.981463 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '\xf1' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.023766 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add \xe7 character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.058077 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '\xe7' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.092079 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add + character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.123360 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '+' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.149478 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ^ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.176368 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '^' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.202110 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ! character before <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.231326 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '!' in <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.262876 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ? character before <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.290258 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '?' in <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.317017 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add % character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.347493 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '%' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.378068 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add & character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.407821 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '&' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.437132 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ` character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.463404 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '`' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.491331 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add \xbf character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.519060 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '\xbf' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.545164 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ? character before <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.570795 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '?' in <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.596909 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ( character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.627472 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '(' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.655041 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ) character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.682719 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with ')' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.715614 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add | character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.748518 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '|' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.777622 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add \xba character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.804343 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '\xba' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.836028 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add $ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.863744 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '$' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.892339 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add \xbd character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.919255 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '\xbd' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.948368 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add \xac character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:07.983004 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '\xac' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.018700 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ! character before <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.051848 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '!' in <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.081665 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ~ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.113511 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '~' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.139723 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add \xa1 character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.165654 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '\xa1' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.192230 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add [ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.223010 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '[' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.251348 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ] character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.279509 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with ']' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.305959 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add { character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.334893 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '{' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.366165 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add } character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.395392 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '}' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.424060 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_no_feed_changes[CANONICAL_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.455377 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definitions, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.485836 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definitions, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.514211 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definitions, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.542246 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definitions, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.570170 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definitions, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.596775 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definitions, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.628599 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definitions, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.659847 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definitions, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.686680 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definitions, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.714125 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definitions, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.748151 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definition, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.776633 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definition, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.802830 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definition, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.828426 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definition, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.854508 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definition, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.881806 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definition, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.908452 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definition, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.933950 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definition, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.959632 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definition, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:08.988888 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definition, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.033524 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: metadata, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.065876 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: metadata, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.093884 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: metadata, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.122158 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: metadata, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.151162 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: metadata, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.179249 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: metadata, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.209232 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: metadata, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.242326 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: metadata, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.278179 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: metadata, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.312231 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: metadata, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.339023 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criteria, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.367802 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criteria, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.399583 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criteria, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.434882 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criteria, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.465717 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criteria, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.495645 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criteria, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.524783 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criteria, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.551270 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criteria, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.577938 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criteria, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.604943 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criteria, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.631354 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criterion, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.661669 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criterion, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.688220 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criterion, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.713444 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criterion, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.740660 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criterion, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.766376 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criterion, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.791742 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criterion, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.819585 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criterion, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.847676 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criterion, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.875165 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criterion, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.901516 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: tests, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.928246 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: tests, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.954133 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: tests, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:09.980809 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: tests, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.008505 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: tests, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.037887 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: tests, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.076348 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: tests, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.120852 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: tests, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.156243 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: tests, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.185075 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: tests, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.212728 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_test, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.246258 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_test, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.281490 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_test, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.310254 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_test, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.336906 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_test, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.362522 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_test, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.390818 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_test, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.420488 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_test, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.446973 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_test, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.473681 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_test, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.500750 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: test_object, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.529634 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: test_object, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.555805 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: test_object, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.582740 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: test_object, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.608500 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: test_object, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.637279 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: test_object, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.662854 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: test_object, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.688509 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: test_object, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.714892 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: test_object, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.741866 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: test_object, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.771021 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_object, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.797257 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_object, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.824118 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_object, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.852766 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_object, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.881253 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_object, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.908412 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_object, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.937927 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_object, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.970758 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_object, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:10.996955 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_object, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.027947 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_object, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.061796 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: object_element, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.109666 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: object_element, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.139383 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: object_element, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.166092 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: object_element, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.194254 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: object_element, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.225922 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: object_element, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.253126 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: object_element, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.280930 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: object_element, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.311827 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: object_element, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.351646 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: object_element, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.415814 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_state, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.06 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.488819 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_state, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.07 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.591217 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_state, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.08 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.650076 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_state, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.05 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.702915 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_state, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.05 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.734961 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_state, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.766937 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_state, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.796937 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_state, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.833495 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_state, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.869038 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_state, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.900750 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: state_object, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.929084 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: state_object, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.960807 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: state_object, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:11.987877 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: state_object, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.014227 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: state_object, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.040083 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: state_object, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.067358 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: state_object, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.097746 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: state_object, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.130756 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: state_object, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.164801 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: state_object, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.196491 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: constant_variable, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.226978 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: constant_variable, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.252710 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: constant_variable, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.278290 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: constant_variable, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.303953 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: constant_variable, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.332803 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: constant_variable, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.358998 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: constant_variable, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.384332 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: constant_variable, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.410275 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: constant_variable, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.436212 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: constant_variable, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.466704 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: variable_value, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.494909 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: variable_value, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.523059 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: variable_value, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.550578 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: variable_value, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.582448 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: variable_value, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.615855 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: variable_value, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.648632 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: variable_value, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.679419 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: variable_value, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.712676 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: variable_value, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.741010 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: variable_value, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.772713 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: product_name, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.804522 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: product_name, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.833287 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: product_name, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.860995 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: product_name, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.887309 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: product_name, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.915328 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: product_name, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.942218 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: product_name, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.967827 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: product_name, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:12.993350 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: product_name, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.020311 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: product_name, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.050015 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: affected, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.078011 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: affected, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.111752 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: affected, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.148444 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: affected, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.190843 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: affected, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.230387 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: affected, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.273222 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: affected, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.327148 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: affected, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.05 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.386842 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: affected, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.05 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.449383 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: affected, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.06 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.513959 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: platform, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.06 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.544849 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: platform, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.573298 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: platform, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.604047 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: platform, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.635849 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: platform, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.678129 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: platform, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.714563 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: platform, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.742668 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: platform, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.772515 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: platform, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.806052 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: platform, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.836274 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_no_feed_changes[CANONICAL_configuration]::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.863499 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: generator]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.890880 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: product_name]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.921254 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: product_version]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.953346 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: schema_version]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:13.979844 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: timestamp]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.006555 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: definitions]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.035047 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: definition]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.060736 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: metadata]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.090175 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: title]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.117515 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: description]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.154040 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: affected]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.186637 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: platform]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.222804 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: reference]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.253665 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: advisory]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.283664 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: severity]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.311322 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: public_date]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.344976 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: bug]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.378808 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: criteria]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.408214 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: extend_definition]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.440294 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: criterion]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.477327 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: tests]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.515776 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: dpkginfo_test]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.547992 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: test_object]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.578463 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: objects]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.611454 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: dpkginfo_object]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.641706 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: object_element]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.669020 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: states]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.698295 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: dpkginfo_state]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.726255 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: state_object]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.762392 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: variables]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.789579 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: constant_variable]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.816751 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: variable_value]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.850038 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_no_feed_changes[DEBIAN_configuration]::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.879339 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.906269 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.933354 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.959861 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:14.990503 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.021610 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.054824 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.087440 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.124414 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.172053 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.213887 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.261681 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.309269 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.341798 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.373125 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.406190 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.437730 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.464219 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.491396 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.524553 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.555967 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.585102 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.612726 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.641070 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.672030 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.703877 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.729705 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.755788 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.781875 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.811951 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.839629 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.865394 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.890636 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.917761 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.946604 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:15.976025 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.003801 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.031670 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.063257 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.092156 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.121074 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.160075 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.197245 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.234465 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.266176 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.293353 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.322293 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.351954 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.381832 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.414416 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.445235 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.478976 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.509653 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.539390 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.569000 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.599774 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.629765 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.659264 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.688818 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.720873 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.748486 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.774112 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.806033 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.835022 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.862458 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.889527 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.918800 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.952477 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:16.981808 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.009935 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.039483 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.073134 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.099857 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.128207 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.160702 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.200542 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.232926 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.260101 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.288111 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.317987 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.345057 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.371456 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.397853 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.424272 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.456282 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.485809 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.513005 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.541461 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.569523 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.601969 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.632208 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.661222 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.690788 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.726253 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.757615 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.785018 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.811117 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.842326 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.875574 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.902508 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.928441 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.954685 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:17.981069 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.008081 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.033910 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.060484 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.088214 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.118597 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.144950 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.178411 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.214477 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.252711 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.287258 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.318855 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.348694 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.381234 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.417463 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.447443 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.476701 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.506144 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.535854 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.567785 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_no_feed_changes[DEBIAN_configuration]::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.609240 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Delete '<']::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.645167 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Delete '>']::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.693977 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Delete '<>']::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.727297 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Close initial tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.763431 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Delete opening tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.803432 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Delete closing tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.846775 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Empty opening tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.880346 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Empty closing tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.910931 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Random text before tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.937694 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Delete info]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.963719 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add . character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:18.989880 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '.' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.016967 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add : character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.045058 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with ':' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.071070 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add @ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.099082 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '@' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.125400 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add # character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.164632 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '#' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.197493 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add * character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.227185 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '*' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.253370 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add - character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.285024 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '-' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.317177 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add _ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.346332 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '_' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.380234 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ' character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.416553 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with ''' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.449398 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add " character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.483829 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '"' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.513957 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add / character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.546948 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '/' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.579498 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add = character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.606469 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '=' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.632173 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add \xf1 character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.661420 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '\xf1' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.693452 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add \xe7 character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.725372 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '\xe7' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.751666 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add + character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.777330 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '+' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.804050 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ^ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.831629 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '^' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.857641 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ! character before <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.883356 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '!' in <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.909651 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ? character before <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.935638 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '?' in <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.964954 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add % character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:19.991850 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '%' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.017435 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add & character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.045049 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '&' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.072303 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ` character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.101868 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '`' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.128855 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add \xbf character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.159066 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '\xbf' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.195204 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ? character before <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.236370 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '?' in <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.272513 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ( character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.303642 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '(' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.336933 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ) character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.378284 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with ')' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.410824 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add | character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.439559 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '|' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.466834 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add \xba character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.497029 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '\xba' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.523293 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add $ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.551289 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '$' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.580171 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add \xbd character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.610086 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '\xbd' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.641135 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add \xac character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.671587 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '\xac' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.702613 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ! character before <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.736032 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '!' in <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.767445 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ~ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.794778 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '~' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.822362 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add \xa1 character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.850124 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '\xa1' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.876173 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add [ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.902545 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '[' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.930098 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ] character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.962016 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with ']' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:20.992646 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add { character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.022088 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '{' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.048841 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add } character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.075093 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '}' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.107958 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_no_feed_changes[DEBIAN_configuration]::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.138510 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definitions, value:None]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.175786 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definitions, value:]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.216847 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definitions, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.247514 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definitions, value:12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.274107 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definitions, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.300741 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definitions, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.329023 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definitions, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.362157 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definitions, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.389580 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definitions, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.415699 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definitions, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.441419 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definition, value:None]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.468365 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definition, value:]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.497534 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definition, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.526732 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definition, value:12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.553193 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definition, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.578748 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definition, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.605706 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definition, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.640536 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definition, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.669345 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definition, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.696606 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definition, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.731984 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: metadata, value:None]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.764478 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: metadata, value:]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.791169 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: metadata, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.818766 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: metadata, value:12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.845830 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: metadata, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.873710 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: metadata, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.901719 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: metadata, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.929625 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: metadata, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.958840 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: metadata, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:21.985776 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: metadata, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.013208 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: reference, value:None]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.039422 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: reference, value:]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.065438 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: reference, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.091876 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: reference, value:12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.118081 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: reference, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.145512 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: reference, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.181465 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: reference, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.215609 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: reference, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.249321 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: reference, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.284171 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: reference, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.312178 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: criteria, value:None]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.340532 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: criteria, value:]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.367445 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: criteria, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.399109 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: criteria, value:12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.426886 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: criteria, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.453627 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: criteria, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.482365 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: criteria, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.511501 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: criteria, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.541745 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: criteria, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.569860 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: criteria, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.602738 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: product_name, value:None]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.637962 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: product_name, value:]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.676661 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: product_name, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.705340 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: product_name, value:12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.735146 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: product_name, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.767537 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: product_name, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.795881 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: product_name, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.821791 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: product_name, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.847853 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: product_name, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.875316 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: product_name, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.902738 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: affected, value:None]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.930740 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: affected, value:]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.956869 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: affected, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:22.982863 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: affected, value:12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.012290 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: affected, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.038506 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: affected, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.064517 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: affected, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.090581 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: affected, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.117191 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: affected, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.145552 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: affected, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.172336 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: platform, value:None]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.198853 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: platform, value:]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.225643 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: platform, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.258582 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: platform, value:12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.289723 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: platform, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.325428 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: platform, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.358214 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: platform, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.396467 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: platform, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.434756 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: platform, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.468297 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: platform, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.504324 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_no_feed_changes[DEBIAN_configuration]::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.542375 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: no_changes]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.575855 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: generator]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.608880 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: product_name]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.642448 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: schema_version]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.678241 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: timestamp]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.708418 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: definitions]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.739007 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: definition]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.773494 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: metadata]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.811244 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: title]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.841927 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: description]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.881210 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: affected]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.917718 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: platform]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.954100 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: product]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:23.989243 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: reference]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.022041 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: debian]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.064844 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: date]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.100143 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: criteria]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.137814 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: criterion]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.168558 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: tests]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.201056 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: textfilecontent54_test]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.232820 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: test_object_ref]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.264406 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: test_state_ref]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.297394 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: uname_test]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.334860 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: test_uname_object_ref]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.371533 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: dpkginfo_test]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.410837 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: objects]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.449408 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: textfilecontent54_object]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.483081 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: path]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.523667 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: filename]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.553877 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: instance]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.583162 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: uname_object]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.610295 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: dpkginfo_object]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.639278 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: states]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.671347 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: textfilecontent54_state]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.697647 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: subexpression]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.722784 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: dpkginfo_state]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.750183 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: evr]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.777603 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_no_feed_changes[MSU_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.803329 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.828994 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.858027 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.885551 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.912781 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.940780 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:24.971775 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.007250 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.039182 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.070156 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.099965 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.134274 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.164394 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.195440 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.236999 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.276947 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.309130 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.340160 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.366252 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.394235 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.421382 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.447850 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.474147 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.501235 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.530235 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.558198 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.588028 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.621295 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.657593 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.695922 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.727132 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.759923 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.787387 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.817491 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.844697 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.871388 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.897712 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.927140 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:25.966669 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.001494 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.043062 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.089652 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.131774 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.173211 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.209906 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.245040 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.276867 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.304146 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.330382 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.356489 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.382568 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.410120 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.436924 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.463307 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.494661 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.525928 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.552508 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.580350 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.609287 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.638247 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.675417 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.707022 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.739880 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.782372 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.824212 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.861923 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.896827 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.930488 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.959061 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:26.987942 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.018444 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.045830 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.074145 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.102314 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.130478 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.156233 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.182078 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.208523 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.234929 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.265074 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.291824 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.317497 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.342994 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.369474 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.402253 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.432993 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.470174 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.510677 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.548062 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.588530 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.627514 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.668340 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.706748 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.747979 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.782749 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.809965 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.835682 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.863967 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.891860 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.925051 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.961912 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:27.993617 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.020983 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.047832 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.081138 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.116059 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.146153 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.171878 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.199820 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.229556 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.259173 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.289367 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.329048 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.370555 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.413121 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.444143 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.477439 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.508297 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.537256 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.565176 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.592902 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.620530 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_no_feed_changes[MSU_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.652876 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Delete '{']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.681439 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Delete '}']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.707643 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Add '{{']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.734070 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Add '}}']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.761880 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Add '{' in the middle of feed]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.787763 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Add '}' in the middle of feed]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.813671 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Add '{}' in the middle of feed]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.840960 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Delete key:value comma ',']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.869161 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Add a comma before value key: ,value,]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.895703 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Add comma before any key value ', key:value']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.922883 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Add a comma at the end of vulnerability ',}']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.949897 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Add double comma after key:value,,]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:28.977940 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Add double comma after list value,,]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.006123 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Close a key with double quotation marks]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.032420 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Close value with double quotation marks]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.060898 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace a comma with semicolon]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.087687 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace a colon with semicolon]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.115369 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Missing open bracket]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.144868 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Missing close bracket]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.174093 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Delete some information]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.200526 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '.']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.232299 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with ':']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.265612 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '@']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.292104 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '#']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.319103 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '*']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.349211 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '-']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.383838 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '_']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.414072 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with ''']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.440476 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '"']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.466794 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '/']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.494161 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '=']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.521460 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '\xf1']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.547839 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '\xe7']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.573814 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '+']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.599913 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '^']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.627890 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '!'0]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.655358 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '?'0]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.682221 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '%']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.712249 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '&']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.751113 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '`']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.787724 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '\xbf']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.823721 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '?'1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.857965 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '(']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.885433 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with ')']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.911836 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '|']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.938405 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '\xba']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:29.965904 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '$']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.000975 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '\xbd']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.034231 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '\xac']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.066869 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '!'1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.098534 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '~']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.133705 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '\xa1']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.162940 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '[']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.190033 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with ']']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.218211 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '{']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.250734 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '}']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.283216 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_no_feed_changes[MSU_configuration]::setup | Check if the feed is imported successfully by default | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.313560 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: patch, value:None]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.351806 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: patch, value:]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.389328 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: patch, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.420060 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: patch, value:12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.447312 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: patch, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.474890 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: patch, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.502755 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: patch, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.529086 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: patch, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.555629 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: patch, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.584824 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: patch, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.618128 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: product, value:None]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.651841 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: product, value:]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.691543 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: product, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.729402 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: product, value:12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.776858 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: product, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.822008 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: product, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.865499 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: product, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.905252 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: product, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.943215 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: product, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:30.985225 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: product, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.028668 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: restart_required, value:None]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.063298 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: restart_required, value:]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.093654 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: restart_required, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.125816 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: restart_required, value:12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.153833 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: restart_required, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.181518 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: restart_required, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.207697 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: restart_required, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.233641 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: restart_required, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.261189 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: restart_required, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.287821 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: restart_required, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.314560 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: subtype, value:None]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.341300 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: subtype, value:]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.367335 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: subtype, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.397895 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: subtype, value:12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.424522 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: subtype, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.454259 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: subtype, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.487042 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: subtype, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.522716 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: subtype, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.556990 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: subtype, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.590916 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: subtype, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.621097 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: title, value:None]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.660023 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: title, value:]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.691487 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: title, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.723236 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: title, value:12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.756770 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: title, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.786225 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: title, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.813621 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: title, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.844334 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: title, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.875789 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: title, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.901906 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: title, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.928588 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: url, value:None]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.956116 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: url, value:]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:31.982405 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: url, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.009670 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: url, value:12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.115035 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: url, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.141746 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: url, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.167635 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: url, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.193837 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: url, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.220546 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: url, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.249313 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: url, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.277820 | test_vulnerability_detector/test_feeds/msu/test_missing_fields_msu_feed.py::test_no_feed_changes[MSU_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.303914 | test_vulnerability_detector/test_feeds/msu/test_missing_fields_msu_feed.py::test_invalid_msu_feed[MSU_configuration-missing: patch]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with missing fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.329413 | test_vulnerability_detector/test_feeds/msu/test_missing_fields_msu_feed.py::test_invalid_msu_feed[MSU_configuration-missing: product]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with missing fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.356068 | test_vulnerability_detector/test_feeds/msu/test_missing_fields_msu_feed.py::test_invalid_msu_feed[MSU_configuration-missing: restart_required]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with missing fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.384462 | test_vulnerability_detector/test_feeds/msu/test_missing_fields_msu_feed.py::test_invalid_msu_feed[MSU_configuration-missing: subtype]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with missing fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.411212 | test_vulnerability_detector/test_feeds/msu/test_missing_fields_msu_feed.py::test_invalid_msu_feed[MSU_configuration-missing: title]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with missing fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.438238 | test_vulnerability_detector/test_feeds/msu/test_missing_fields_msu_feed.py::test_invalid_msu_feed[MSU_configuration-missing: url]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with missing fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.465299 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_no_feed_changes[REDHAT_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.493482 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.522289 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.549015 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.576060 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.604545 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.637699 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.665742 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.692002 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.717659 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.750703 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.776278 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.802270 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.830969 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.857634 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.883802 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.911599 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.937443 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.965393 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:32.993332 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.019462 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.045932 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.072114 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.099777 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.126121 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.152938 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.183638 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.235787 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.05 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.272923 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.302704 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.332952 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.366793 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.398139 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.428053 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.458725 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.487934 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.517386 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.546153 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.574003 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.601129 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.629952 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.656971 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.684460 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.711980 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.745400 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.775574 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.803560 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.831983 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.859227 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.890007 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.917914 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.945168 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:33.972634 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.005323 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.034050 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.065053 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.098086 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.131049 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.164404 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.195213 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.224250 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.256665 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.284550 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.311366 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.338952 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.368146 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.396379 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.424173 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.451475 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.478666 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.509682 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.537159 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.566722 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.599387 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.631965 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.666949 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.697925 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.727538 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.764092 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.794949 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.827281 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.866886 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.898325 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.927824 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.956478 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:34.990793 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.024587 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.053493 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.082518 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.114012 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.143392 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.174048 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.204565 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.234914 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.263506 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.291122 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.318312 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.346943 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.377944 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.406000 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.433475 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.462148 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.499484 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.528916 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.557291 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.586274 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.616280 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.644765 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.672577 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.705016 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.739644 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.771894 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.803237 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.831446 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.858950 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.891344 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.921635 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.949500 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:35.976253 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.005814 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.033527 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.060532 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.091601 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Delete '<']::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.128555 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Delete '>']::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.167822 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Delete '<>']::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.199690 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Close initial tag]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.232654 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Delete opening tag]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.264763 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Delete closing tag]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.302623 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Empty opening tag]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.331666 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Empty closing tag]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.358530 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Random text before tag]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.385023 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Delete info]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.413759 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add . character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.442607 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '.' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.470732 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add : character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.498947 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with ':' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.530134 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add @ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.594119 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '@' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.06 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.664643 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add # character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.07 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.726077 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '#' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.05 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.763851 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add * character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.795976 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '*' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.822902 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add - character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.850667 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '-' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.879042 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add _ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.906674 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '_' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.933529 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ' character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.959382 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with ''' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:36.986191 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add " character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.015462 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '"' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.041445 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add / character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.067312 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '/' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.095617 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add = character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.138385 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '=' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.174258 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add \xf1 character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.209344 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '\xf1' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.236907 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add \xe7 character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.274300 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '\xe7' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.307939 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add + character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.338334 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '+' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.369366 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ^ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.417537 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '^' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.467505 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ! character before <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.499172 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '!' in <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.527010 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ? character before <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.558813 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '?' in <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.585641 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add % character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.612283 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '%' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.638799 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add & character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.665283 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '&' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.697985 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ` character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.724773 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '`' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.750746 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add \xbf character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.776513 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '\xbf' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.803922 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ? character before <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.834207 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '?' in <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.860448 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ( character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.886533 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '(' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.912847 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ) character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.941317 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with ')' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.967580 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add | character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:37.993274 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '|' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.019069 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add \xba character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.047476 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '\xba' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.076293 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add $ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.103010 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '$' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.129474 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add \xbd character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.157678 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '\xbd' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.183653 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add \xac character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.222844 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '\xac' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.261112 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ! character before <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.294934 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '!' in <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.328483 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ~ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.356228 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '~' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.383023 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add \xa1 character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.410260 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '\xa1' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.443116 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add [ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.477234 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '[' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.507616 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ] character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.534767 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with ']' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.561373 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add { character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.589252 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '{' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.616755 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add } character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.643071 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '}' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.670464 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definitions, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.699688 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definitions, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.732824 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definitions, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.761039 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definitions, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.788238 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definitions, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.819057 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definitions, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.846632 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definitions, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.874041 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definitions, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.903391 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definitions, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.934942 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definitions, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.969659 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definition, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:38.998812 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definition, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.039103 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definition, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.082051 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definition, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.120380 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definition, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.149188 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definition, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.178088 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definition, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.214657 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definition, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.268744 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definition, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.320366 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definition, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.362103 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: metadata, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.400255 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: metadata, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.434934 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: metadata, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.466245 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: metadata, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.497122 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: metadata, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.533050 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: metadata, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.563417 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: metadata, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.607702 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: metadata, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.647738 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: metadata, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.700760 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: metadata, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.05 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.732603 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criteria, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.762629 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criteria, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.790738 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criteria, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.817161 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criteria, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.845281 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criteria, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.871127 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criteria, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.898207 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criteria, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.925988 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criteria, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.955425 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criteria, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:39.988540 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criteria, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.018375 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criterion, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.046820 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criterion, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.075475 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criterion, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.105746 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criterion, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.134745 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criterion, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.166002 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criterion, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.203065 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criterion, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.243029 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criterion, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.279249 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criterion, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.306552 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criterion, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.333785 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: tests, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.365847 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: tests, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.396125 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: tests, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.424624 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: tests, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.454252 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: tests, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.481486 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: tests, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.514667 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: tests, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.544360 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: tests, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.573408 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: tests, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.604047 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: tests, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.633851 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_test, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.660582 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_test, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.690045 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_test, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.723081 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_test, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.759461 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_test, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.791532 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_test, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.824421 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_test, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.856928 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_test, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.885741 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_test, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.912957 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_test, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.940371 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: test_object, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.967739 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: test_object, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:40.998999 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: test_object, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.025263 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: test_object, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.052601 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: test_object, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.078822 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: test_object, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.106869 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: test_object, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.132889 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: test_object, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.162522 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: test_object, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.198360 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: test_object, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.235919 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_object, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.264935 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_object, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.293539 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_object, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.319507 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_object, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.348994 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_object, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.382967 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_object, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.413500 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_object, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.445771 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_object, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.476463 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_object, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.506146 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_object, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.536451 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: object_element, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.564210 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: object_element, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.591316 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: object_element, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.625455 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: object_element, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.652612 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: object_element, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.684762 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: object_element, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.713806 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: object_element, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.749825 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: object_element, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.779902 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: object_element, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.806719 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: object_element, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.832271 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_state, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.858603 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_state, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.886886 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_state, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.914581 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_state, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.940304 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_state, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.966332 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_state, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:41.996450 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_state, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.025512 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_state, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.051904 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_state, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.078455 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_state, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.105293 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: state_object, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.145252 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: state_object, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.182676 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: state_object, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.210349 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: state_object, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.236529 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: state_object, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.265115 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: state_object, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.297285 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: state_object, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.330403 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: state_object, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.360658 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: state_object, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.388746 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: state_object, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.420023 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: local_variable, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.452100 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: local_variable, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.482519 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: local_variable, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.512282 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: local_variable, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.546794 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: local_variable, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.576208 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: local_variable, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.604661 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: local_variable, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.634824 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: local_variable, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.667393 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: local_variable, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.696670 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: local_variable, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.722770 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: product_name, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.749999 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: product_name, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.779235 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: product_name, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.805612 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: product_name, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.831778 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: product_name, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.858082 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: product_name, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.886450 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: product_name, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.913217 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: product_name, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.940665 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: product_name, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.967030 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: product_name, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:42.993130 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: affected, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.021762 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: affected, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.048321 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: affected, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.077290 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: affected, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.117743 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: affected, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.156712 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: affected, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.190826 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: affected, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.223935 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: affected, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.256758 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: affected, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.288084 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: affected, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.317155 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: platform, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.347980 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: platform, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.380990 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: platform, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.413673 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: platform, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.439728 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: platform, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.467262 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: platform, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.496035 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: platform, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.525637 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: platform, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.554214 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: platform, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.583263 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: platform, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.610148 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: generator]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.638009 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: product_name]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.664042 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: product_version]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.689744 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: schema_version0]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.716052 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: schema_version1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.746080 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: definitions]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.777508 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: definition]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.805707 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: metadata]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.834349 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: title]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.860192 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: description]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.887887 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: affected]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.919485 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: platform]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.951122 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: reference]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:43.979714 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: advisory]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:44.010915 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: severity]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:44.038674 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: criteria]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:44.078381 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: criterion]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:44.113200 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: tests]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:44.150839 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: rpminfo_test]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:44.182241 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: test_object]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:44.212732 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: objects]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:44.245977 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: rpminfo_object]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:44.275088 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: object_element]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:44.307370 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: states]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:44.336340 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: rpminfo_state]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:44.366140 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: state_object]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:44.395502 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: variables]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.03 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-11 20:56:45.019922 | test_vulnerability_detector/test_general_settings/test_general_settings_enabled.py::test_enabled[config_enabled-expecting_vuldet_disabled] | description: Checks if the `enabled ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that the. Vulnerability Detector is enabled or disabled. | 0.00 | server | 0 | |
('/usr/local/lib/python3.6/site-packages/wazuh_testing/tools/configuration.py', 515, 'Skipped: Does not apply to this config file') | |||||||
Skipped | 2021-11-11 20:56:45.551339 | test_vulnerability_detector/test_general_settings/test_general_settings_enabled.py::test_enabled[config_disabled-expecting_vuldet_enabled] | description: Checks if the `enabled ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that the. Vulnerability Detector is enabled or disabled. | 0.00 | server | 0 | |
('/usr/local/lib/python3.6/site-packages/wazuh_testing/tools/configuration.py', 515, 'Skipped: Does not apply to this config file') -----------------------------Captured stdout setup------------------------------ 2021-11-11T17:56:45.1636664205 -----------------------------Captured stderr setup------------------------------ 2021/11/11 17:56:45 wazuh-modulesd[182788] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 17:56:45 wazuh-modulesd[182788] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 17:56:45 wazuh-modulesd[182788] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 17:56:45 wazuh-modulesd[182788] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf | |||||||
Skipped | 2021-11-11 21:04:00.507197 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[yes-alas0]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:04:00.509895 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[yes-alas1]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:04:00.513157 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[yes-canonical]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:04:00.515227 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[yes-debian]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:04:00.517925 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[yes-redhat]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:04:00.520018 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[yes-nvd]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:04:00.522258 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[yes-msu]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:04:00.524477 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[yes-arch]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:04:00.526618 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[no-alas0]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:04:00.529197 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[no-alas1]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:04:00.531301 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[no-canonical]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:04:00.533247 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[no-debian]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:04:00.535207 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[no-redhat]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:04:00.537731 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[no-nvd]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:04:00.540420 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[no-msu]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:04:00.542441 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[no-arch]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.572432 | test_vulnerability_detector/test_providers/test_providers_no_os.py::test_providers_no_os[alas]::setup | Check if modulesd downloads the feeds without specifing the os version. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_no_os.py', 57, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.574848 | test_vulnerability_detector/test_providers/test_providers_no_os.py::test_providers_no_os[canonical]::setup | Check if modulesd downloads the feeds without specifing the os version. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_no_os.py', 57, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.577495 | test_vulnerability_detector/test_providers/test_providers_no_os.py::test_providers_no_os[debian]::setup | Check if modulesd downloads the feeds without specifing the os version. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_no_os.py', 57, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.580867 | test_vulnerability_detector/test_providers/test_providers_no_os.py::test_providers_no_os[redhat]::setup | Check if modulesd downloads the feeds without specifing the os version. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_no_os.py', 57, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.583728 | test_vulnerability_detector/test_providers/test_providers_no_os.py::test_providers_no_os[nvd]::setup | Check if modulesd downloads the feeds without specifing the os version. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_no_os.py', 57, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.586668 | test_vulnerability_detector/test_providers/test_providers_no_os.py::test_providers_no_os[msu]::setup | Check if modulesd downloads the feeds without specifing the os version. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_no_os.py', 57, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.588789 | test_vulnerability_detector/test_providers/test_providers_no_os.py::test_providers_no_os[arch]::setup | Check if modulesd downloads the feeds without specifing the os version. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_no_os.py', 57, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.591138 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[alas-amazon-linux]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.593560 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[alas-amazon-linux-2]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.596014 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[canonical-trusty]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.599323 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[canonical-xenial]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.601949 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[canonical-bionic]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.605171 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[debian-stretch]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.607757 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[debian-buster]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.611489 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[redhat-5]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.615384 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[redhat-6]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.618345 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[redhat-7]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.622441 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[redhat-8]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.625717 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[nvd-]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.629681 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[msu-]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.632542 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[redhat_1998]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.635205 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[redhat_2001]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.638058 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[redhat_2002]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.640757 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[redhat_2005]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.642986 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[redhat_2010]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.645196 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[redhat_2015]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.648101 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[redhat_2020]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.651167 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[nvd_1998]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.654002 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[nvd_2001]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.656180 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[nvd_2002]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.658319 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[nvd_2005]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.660788 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[nvd_2010]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.663534 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[nvd_2015]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.666321 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[nvd_2020]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:02.698899 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Amazon_60s]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:02.731816 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Redhat_{item}0]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:02.770355 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Canonical_60s]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:02.803967 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Debian_60s]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:02.840499 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[NVD_60s]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:02.880871 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[MSU_60s]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.04 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:02.914368 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Arch_60s]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:02.949744 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Amazon_60m]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:02.986830 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Redhat_{item}1]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:03.033280 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Canonical_60m]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.04 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:03.072270 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Debian_60m]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:03.111565 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[NVD_60m]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:03.155171 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[MSU_60m]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.04 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:03.193320 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Arch_60m]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:03.234476 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Amazon_1h]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.04 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:03.297413 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Redhat_{item}2]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.05 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:03.346044 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Canonical_1h]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.04 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:03.382390 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Debian_1h]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:03.418229 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[NVD_1h]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:03.455078 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[MSU_1h]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:03.498134 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Arch_1h]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.04 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:03.536060 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Amazon_1d]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:03.570441 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Redhat_{item}3]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:03.606110 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Canonical_1d]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:03.639915 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Debian_1d]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:03.682060 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[NVD_1d]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.04 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:03.719754 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[MSU_1d]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:03.749511 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Arch_1d]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:03.780743 | test_vulnerability_detector/test_scan_results/test_alas_inventory_alas_feed.py::test_amazon_linux_vulnerabilities_report[alas_feed-amazonlinux]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:03.815821 | test_vulnerability_detector/test_scan_results/test_alas_inventory_alas_feed.py::test_amazon_linux_vulnerabilities_report[alas_feed-amazonlinux2]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:36.533767 | test_vulnerability_detector/test_scan_results/test_archlinux_inventory_archlinux_feed.py::test_arch_linux_vulnerabilities_report[arch_feed-AVG-1794]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.02 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:36.569712 | test_vulnerability_detector/test_scan_results/test_archlinux_inventory_archlinux_feed.py::test_arch_linux_vulnerabilities_report[arch_feed-AVG-1643]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.03 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-11 21:06:36.574659 | test_vulnerability_detector/test_scan_results/test_debian_inventory_debian_feed.py::test_debian_vulnerabilities_report[debian_scan_configuration-BUSTER]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_debian_inventory_debian_feed.py', 78, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.580589 | test_vulnerability_detector/test_scan_results/test_debian_inventory_debian_feed.py::test_debian_vulnerabilities_report[debian_scan_configuration-STRETCH]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_debian_inventory_debian_feed.py', 78, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.584254 | test_vulnerability_detector/test_scan_results/test_macos_inventory.py::test_macos_vulnerabilities_report[macos_scan_configuration-MAC0]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_macos_inventory.py', 80, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.588199 | test_vulnerability_detector/test_scan_results/test_macos_inventory.py::test_macos_vulnerabilities_report[macos_scan_configuration-MAC1]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_macos_inventory.py', 80, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.592289 | test_vulnerability_detector/test_scan_results/test_msu_inventory_msu_feed.py::test_vulnerabilities_report[msu_scan_configuration-WINDOWS10]::setup | Check if a missing patch triggers a vulnerability(only windows). | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_msu_inventory_msu_feed.py', 126, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.595734 | test_vulnerability_detector/test_scan_results/test_msu_inventory_msu_feed.py::test_vulnerabilities_report[msu_scan_configuration-WINDOWS_SERVER_2016]::setup | Check if a missing patch triggers a vulnerability(only windows). | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_msu_inventory_msu_feed.py', 126, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.599827 | test_vulnerability_detector/test_scan_results/test_msu_inventory_msu_feed.py::test_vulnerabilities_report[msu_scan_configuration-WINDOWS_SERVER_2019]::setup | Check if a missing patch triggers a vulnerability(only windows). | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_msu_inventory_msu_feed.py', 126, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.606487 | test_vulnerability_detector/test_scan_results/test_redhat_duplicate_vulns.py::test_redhat_duplicate_vulns[RedHat_6_feed]::setup | RedHat provider was duplicating vulnerabilities when it downloaded a feed to update the database.. This test check the vulnerabilities are not repeated in the database when it is update. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_redhat_duplicate_vulns.py', 48, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.610139 | test_vulnerability_detector/test_scan_results/test_redhat_duplicate_vulns.py::test_redhat_duplicate_vulns[RedHat_7_feed]::setup | RedHat provider was duplicating vulnerabilities when it downloaded a feed to update the database.. This test check the vulnerabilities are not repeated in the database when it is update. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_redhat_duplicate_vulns.py', 48, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.612937 | test_vulnerability_detector/test_scan_results/test_redhat_duplicate_vulns.py::test_redhat_duplicate_vulns[RedHat_8_feed]::setup | RedHat provider was duplicating vulnerabilities when it downloaded a feed to update the database.. This test check the vulnerabilities are not repeated in the database when it is update. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_redhat_duplicate_vulns.py', 48, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.615933 | test_vulnerability_detector/test_scan_results/test_redhat_inventory_redhat_feed.py::test_redhat_vulnerabilities_report[redhat_scan_configuration-RHEL8]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_redhat_inventory_redhat_feed.py', 78, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.619145 | test_vulnerability_detector/test_scan_results/test_redhat_inventory_redhat_feed.py::test_redhat_vulnerabilities_report[redhat_scan_configuration-RHEL7]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_redhat_inventory_redhat_feed.py', 78, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.621934 | test_vulnerability_detector/test_scan_results/test_redhat_inventory_redhat_feed.py::test_redhat_vulnerabilities_report[redhat_scan_configuration-RHEL6]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_redhat_inventory_redhat_feed.py', 78, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.624701 | test_vulnerability_detector/test_scan_results/test_redhat_inventory_redhat_feed.py::test_redhat_vulnerabilities_report[redhat_scan_configuration-RHEL5]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_redhat_inventory_redhat_feed.py', 78, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.627338 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-Amazon-Linux]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.629467 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-Amazon-Linux-2]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.632431 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-RHEL8]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.634875 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-RHEL7]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.638075 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-RHEL6]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.640280 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-RHEL5]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.642210 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-BIONIC]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.644405 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-XENIAL]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.646357 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-TRUSTY]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.648358 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-BUSTER]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.651158 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-STRETCH]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.653654 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-ARCH]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.656101 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-WINDOWS10]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.658019 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-MAC0]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.660193 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-MAC1]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.662440 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-MAC2]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.664669 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-ARCH]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.667167 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-Amazon-Linux]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.669585 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-Amazon-Linux-2]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.672033 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-RHEL8]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.674504 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-RHEL7]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.676854 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-RHEL6]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.679372 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-RHEL5]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.681569 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-BIONIC]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.684649 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-XENIAL]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.687916 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-TRUSTY]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.690433 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-BUSTER]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.692503 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-STRETCH]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.694877 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-Amazon-Linux]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.697210 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-Amazon-Linux-2]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.699645 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-RHEL8]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.702697 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-RHEL7]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.705425 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-RHEL6]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.708536 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-RHEL5]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.711159 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-BIONIC]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.713884 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-XENIAL]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.716434 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-TRUSTY]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.718744 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-BUSTER]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.721080 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-STRETCH]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.723461 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-ARCH]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.725910 | test_vulnerability_detector/test_scan_results/test_ubuntu_inventory_canonical_feed.py::test_ubuntu_vulnerabilities_report[ubuntu_scan_configuration-FOCAL]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_ubuntu_inventory_canonical_feed.py', 77, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.728129 | test_vulnerability_detector/test_scan_results/test_ubuntu_inventory_canonical_feed.py::test_ubuntu_vulnerabilities_report[ubuntu_scan_configuration-BIONIC]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_ubuntu_inventory_canonical_feed.py', 77, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.729962 | test_vulnerability_detector/test_scan_results/test_ubuntu_inventory_canonical_feed.py::test_ubuntu_vulnerabilities_report[ubuntu_scan_configuration-XENIAL]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_ubuntu_inventory_canonical_feed.py', 77, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:06:36.732266 | test_vulnerability_detector/test_scan_results/test_ubuntu_inventory_canonical_feed.py::test_ubuntu_vulnerabilities_report[ubuntu_scan_configuration-TRUSTY]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_ubuntu_inventory_canonical_feed.py', 77, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.508758 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2013]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.510876 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2013_R2]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.513088 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_XP]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.517173 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_VISTA]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.520173 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_7]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.523055 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_8]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.525342 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_8.1]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.527334 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_10]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.531558 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2008]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.533975 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2008_R2]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.536146 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2012]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.538219 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2012_R2]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.541106 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2016]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.543846 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2019]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.546327 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2013_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.548926 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2013_R2_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.551529 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_XP_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.554269 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_VISTA_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.557014 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_7_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.559648 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_8_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.562590 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_8.1_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.564848 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_10_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.567889 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2008_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.570731 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2008_R2_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.573680 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2012_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.576762 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2012_R2_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.580241 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2016_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-11 21:09:42.582883 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2019_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Passed | 2021-11-11 20:56:44.984384 | test_vulnerability_detector/test_general_settings/test_general_settings_enabled.py::test_enabled[config_enabled-expecting_vuldet_enabled] | description: Checks if the `enabled ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that the. Vulnerability Detector is enabled or disabled. | 0.50 | server | 0 | |
-----------------------------Captured stderr setup------------------------------ 2021/11/11 17:56:44 wazuh-modulesd[182742] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 17:56:44 wazuh-modulesd[182742] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 17:56:44 wazuh-modulesd[182742] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 17:56:44 wazuh-modulesd[182742] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf | |||||||
Passed | 2021-11-11 20:56:45.595345 | test_vulnerability_detector/test_general_settings/test_general_settings_enabled.py::test_enabled[config_disabled-expecting_vuldet_disabled] | description: Checks if the `enabled ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that the. Vulnerability Detector is enabled or disabled. | 0.01 | server | 0 | |
No log output captured. | |||||||
Passed | 2021-11-11 20:56:47.581124 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[1s] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 1.01 | server | 0 | |
-----------------------------Captured stderr setup------------------------------ 2021/11/11 17:56:46 wazuh-modulesd[182830] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 17:56:46 wazuh-modulesd[182830] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 17:56:46 wazuh-modulesd[182830] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 17:56:46 wazuh-modulesd[182830] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 17:56:46 wazuh-modulesd[182830] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-11 20:56:49.573331 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[1m] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 1.01 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T17:56:47.1636664207 -----------------------------Captured stderr setup------------------------------ 2021/11/11 17:56:48 wazuh-modulesd[182861] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 17:56:48 wazuh-modulesd[182861] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 17:56:48 wazuh-modulesd[182861] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 17:56:48 wazuh-modulesd[182861] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 17:56:48 wazuh-modulesd[182861] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-11 20:56:51.553033 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[1h] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 1.00 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T17:56:49.1636664209 -----------------------------Captured stderr setup------------------------------ 2021/11/11 17:56:50 wazuh-modulesd[182892] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 17:56:50 wazuh-modulesd[182892] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 17:56:50 wazuh-modulesd[182892] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 17:56:50 wazuh-modulesd[182892] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 17:56:50 wazuh-modulesd[182892] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-11 20:56:53.061344 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[1d] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 0.51 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T17:56:51.1636664211 -----------------------------Captured stderr setup------------------------------ 2021/11/11 17:56:52 wazuh-modulesd[182923] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 17:56:52 wazuh-modulesd[182923] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 17:56:52 wazuh-modulesd[182923] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 17:56:52 wazuh-modulesd[182923] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 17:56:52 wazuh-modulesd[182923] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-11 20:56:54.591469 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[2s] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 1.01 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T17:56:53.1636664213 -----------------------------Captured stderr setup------------------------------ 2021/11/11 17:56:53 wazuh-modulesd[182954] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 17:56:53 wazuh-modulesd[182954] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 17:56:53 wazuh-modulesd[182954] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 17:56:53 wazuh-modulesd[182954] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 17:56:53 wazuh-modulesd[182954] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-11 20:56:56.572974 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[2m] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 1.00 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T17:56:54.1636664214 -----------------------------Captured stderr setup------------------------------ 2021/11/11 17:56:55 wazuh-modulesd[182985] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 17:56:55 wazuh-modulesd[182985] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 17:56:55 wazuh-modulesd[182985] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 17:56:55 wazuh-modulesd[182985] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 17:56:55 wazuh-modulesd[182985] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-11 20:56:58.559282 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[2h] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 1.00 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T17:56:56.1636664216 -----------------------------Captured stderr setup------------------------------ 2021/11/11 17:56:57 wazuh-modulesd[183016] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 17:56:57 wazuh-modulesd[183016] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 17:56:57 wazuh-modulesd[183016] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 17:56:57 wazuh-modulesd[183016] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 17:56:57 wazuh-modulesd[183016] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-11 20:57:00.060468 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[2d] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 0.50 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T17:56:58.1636664218 -----------------------------Captured stderr setup------------------------------ 2021/11/11 17:56:59 wazuh-modulesd[183047] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 17:56:59 wazuh-modulesd[183047] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 17:56:59 wazuh-modulesd[183047] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 17:56:59 wazuh-modulesd[183047] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 17:56:59 wazuh-modulesd[183047] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-11 20:57:01.559146 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[5s] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 1.01 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T17:57:00.1636664220 -----------------------------Captured stderr setup------------------------------ 2021/11/11 17:57:00 wazuh-modulesd[183078] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 17:57:00 wazuh-modulesd[183078] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 17:57:00 wazuh-modulesd[183078] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 17:57:00 wazuh-modulesd[183078] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 17:57:00 wazuh-modulesd[183078] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-11 20:57:03.563479 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[5m] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 1.01 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T17:57:01.1636664221 -----------------------------Captured stderr setup------------------------------ 2021/11/11 17:57:02 wazuh-modulesd[183109] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 17:57:02 wazuh-modulesd[183109] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 17:57:02 wazuh-modulesd[183109] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 17:57:02 wazuh-modulesd[183109] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 17:57:02 wazuh-modulesd[183109] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-11 20:57:05.337393 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[5h] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 0.79 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T17:57:03.1636664223 -----------------------------Captured stderr setup------------------------------ 2021/11/11 17:57:04 wazuh-modulesd[183140] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 17:57:04 wazuh-modulesd[183140] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 17:57:04 wazuh-modulesd[183140] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 17:57:04 wazuh-modulesd[183140] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 17:57:04 wazuh-modulesd[183140] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-11 20:57:06.575906 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[5d] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 1.01 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T17:57:05.1636664225 -----------------------------Captured stderr setup------------------------------ 2021/11/11 17:57:05 wazuh-modulesd[183171] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 17:57:05 wazuh-modulesd[183171] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 17:57:05 wazuh-modulesd[183171] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 17:57:05 wazuh-modulesd[183171] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 17:57:05 wazuh-modulesd[183171] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-11 20:59:54.523779 | test_vulnerability_detector/test_general_settings/test_general_settings_min_full_scan_interval.py::test_min_full_scan_interval[120s] | description: Checks if the `min_full_scan_interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that a baseline scan occurred. After this, it. time travels to the future and waits for the a full scan start log to occur in the expected time. | 42.93 | server | 0 | |
-----------------------------Captured stderr setup------------------------------ 2021/11/11 17:57:11 wazuh-modulesd[183216] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 17:57:11 wazuh-modulesd[183216] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 17:57:11 wazuh-modulesd[183216] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 17:57:11 wazuh-modulesd[183216] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 17:57:11 wazuh-modulesd[183216] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/11 17:57:11 wazuh-modulesd[183216] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/11 17:57:11 wazuh-modulesd[183216] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s ------------------------------Captured stdout call------------------------------ 2021-11-11T17:58:12.1636664292 2021-11-11T17:59:53.1636664393 ------------------------------Captured stderr call------------------------------ 2021-11-11 17:58:12,501 - wazuh_testing - DEBUG - Changing the system clock from 2021-11-11 17:57:12.286617 to 2021-11-11 17:58:12.501164 2021-11-11 17:58:52,963 - wazuh_testing - ERROR - No full scan start detected in log. 2021-11-11 17:58:52,963 - wazuh_testing - ERROR - Results accumulated: 0 2021-11-11 17:58:52,963 - wazuh_testing - ERROR - Results expected: 1 2021-11-11 17:59:53,501 - wazuh_testing - DEBUG - Changing the system clock from 2021-11-11 17:58:53.468280 to 2021-11-11 17:59:53.501142 -------------------------------Captured log call-------------------------------- [35mDEBUG [0m wazuh_testing:test_general_settings_min_full_scan_interval.py:185 Changing the system clock from 2021-11-11 17:57:12.286617 to 2021-11-11 17:58:12.501164 [31m[1mERROR [0m wazuh_testing:monitoring.py:461 No full scan start detected in log. [31m[1mERROR [0m wazuh_testing:monitoring.py:462 Results accumulated: 0 [31m[1mERROR [0m wazuh_testing:monitoring.py:464 Results expected: 1 [35mDEBUG [0m wazuh_testing:test_general_settings_min_full_scan_interval.py:200 Changing the system clock from 2021-11-11 17:58:53.468280 to 2021-11-11 17:59:53.501142 | |||||||
Passed | 2021-11-11 22:58:49.017615 | test_vulnerability_detector/test_general_settings/test_general_settings_min_full_scan_interval.py::test_min_full_scan_interval[120m] | description: Checks if the `min_full_scan_interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that a baseline scan occurred. After this, it. time travels to the future and waits for the a full scan start log to occur in the expected time. | 42.53 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T17:58:05.1636664285 -----------------------------Captured stderr setup------------------------------ 2021/11/11 17:58:06 wazuh-modulesd[183265] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 17:58:06 wazuh-modulesd[183265] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 17:58:06 wazuh-modulesd[183265] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 17:58:06 wazuh-modulesd[183265] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 17:58:06 wazuh-modulesd[183265] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/11 17:58:06 wazuh-modulesd[183265] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/11 17:58:06 wazuh-modulesd[183265] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s ------------------------------Captured stdout call------------------------------ 2021-11-11T18:58:07.1636667887 2021-11-11T19:58:47.1636671527 ------------------------------Captured stderr call------------------------------ 2021-11-11 18:58:07,501 - wazuh_testing - DEBUG - Changing the system clock from 2021-11-11 17:58:07.082801 to 2021-11-11 18:58:07.501008 2021-11-11 18:58:47,805 - wazuh_testing - ERROR - No full scan start detected in log. 2021-11-11 18:58:47,805 - wazuh_testing - ERROR - Results accumulated: 0 2021-11-11 18:58:47,806 - wazuh_testing - ERROR - Results expected: 1 2021-11-11 19:58:48,501 - wazuh_testing - DEBUG - Changing the system clock from 2021-11-11 18:58:47.806491 to 2021-11-11 19:58:48.501079 -------------------------------Captured log call-------------------------------- [35mDEBUG [0m wazuh_testing:test_general_settings_min_full_scan_interval.py:185 Changing the system clock from 2021-11-11 17:58:07.082801 to 2021-11-11 18:58:07.501008 [31m[1mERROR [0m wazuh_testing:monitoring.py:461 No full scan start detected in log. [31m[1mERROR [0m wazuh_testing:monitoring.py:462 Results accumulated: 0 [31m[1mERROR [0m wazuh_testing:monitoring.py:464 Results expected: 1 [35mDEBUG [0m wazuh_testing:test_general_settings_min_full_scan_interval.py:200 Changing the system clock from 2021-11-11 18:58:47.806491 to 2021-11-11 19:58:48.501079 | |||||||
Passed | 2021-11-16 20:59:45.016254 | test_vulnerability_detector/test_general_settings/test_general_settings_min_full_scan_interval.py::test_min_full_scan_interval[120h] | description: Checks if the `min_full_scan_interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that a baseline scan occurred. After this, it. time travels to the future and waits for the a full scan start log to occur in the expected time. | 43.40 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T17:59:01.1636664341 -----------------------------Captured stderr setup------------------------------ 2021/11/11 17:59:01 wazuh-modulesd[183315] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 17:59:01 wazuh-modulesd[183315] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 17:59:01 wazuh-modulesd[183315] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 17:59:01 wazuh-modulesd[183315] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 17:59:01 wazuh-modulesd[183315] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/11 17:59:01 wazuh-modulesd[183315] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/11 17:59:01 wazuh-modulesd[183315] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s ------------------------------Captured stdout call------------------------------ 2021-11-14T05:59:02.1636880342 2021-11-16T17:59:43.1637096383 ------------------------------Captured stderr call------------------------------ 2021-11-14 05:59:03,501 - wazuh_testing - DEBUG - Changing the system clock from 2021-11-11 17:59:02.714509 to 2021-11-14 05:59:03.501414 2021-11-14 05:59:43,724 - wazuh_testing - ERROR - No full scan start detected in log. 2021-11-14 05:59:43,724 - wazuh_testing - ERROR - Results accumulated: 0 2021-11-14 05:59:43,724 - wazuh_testing - ERROR - Results expected: 1 2021-11-16 17:59:44,501 - wazuh_testing - DEBUG - Changing the system clock from 2021-11-14 05:59:43.820614 to 2021-11-16 17:59:44.500948 -------------------------------Captured log call-------------------------------- [35mDEBUG [0m wazuh_testing:test_general_settings_min_full_scan_interval.py:185 Changing the system clock from 2021-11-11 17:59:02.714509 to 2021-11-14 05:59:03.501414 [31m[1mERROR [0m wazuh_testing:monitoring.py:461 No full scan start detected in log. [31m[1mERROR [0m wazuh_testing:monitoring.py:462 Results accumulated: 0 [31m[1mERROR [0m wazuh_testing:monitoring.py:464 Results expected: 1 [35mDEBUG [0m wazuh_testing:test_general_settings_min_full_scan_interval.py:200 Changing the system clock from 2021-11-14 05:59:43.820614 to 2021-11-16 17:59:44.500948 | |||||||
Passed | 2022-03-11 21:00:40.022315 | test_vulnerability_detector/test_general_settings/test_general_settings_min_full_scan_interval.py::test_min_full_scan_interval[120d] | description: Checks if the `min_full_scan_interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that a baseline scan occurred. After this, it. time travels to the future and waits for the a full scan start log to occur in the expected time. | 43.52 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T17:59:56.1636664396 -----------------------------Captured stderr setup------------------------------ 2021/11/11 17:59:56 wazuh-modulesd[183371] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 17:59:56 wazuh-modulesd[183371] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 17:59:56 wazuh-modulesd[183371] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 17:59:56 wazuh-modulesd[183371] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 17:59:56 wazuh-modulesd[183371] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/11 17:59:56 wazuh-modulesd[183371] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/11 17:59:56 wazuh-modulesd[183371] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s ------------------------------Captured stdout call------------------------------ 2022-01-10T17:59:57.1641848397 2022-03-11T18:00:38.1647032438 ------------------------------Captured stderr call------------------------------ 2022-01-10 17:59:58,501 - wazuh_testing - DEBUG - Changing the system clock from 2021-11-11 17:59:57.646493 to 2022-01-10 17:59:58.501203 2022-01-10 18:00:38,776 - wazuh_testing - ERROR - No full scan start detected in log. 2022-01-10 18:00:38,776 - wazuh_testing - ERROR - Results accumulated: 0 2022-01-10 18:00:38,776 - wazuh_testing - ERROR - Results expected: 1 2022-03-11 18:00:39,501 - wazuh_testing - DEBUG - Changing the system clock from 2022-01-10 18:00:38.777365 to 2022-03-11 18:00:39.500941 -------------------------------Captured log call-------------------------------- [35mDEBUG [0m wazuh_testing:test_general_settings_min_full_scan_interval.py:185 Changing the system clock from 2021-11-11 17:59:57.646493 to 2022-01-10 17:59:58.501203 [31m[1mERROR [0m wazuh_testing:monitoring.py:461 No full scan start detected in log. [31m[1mERROR [0m wazuh_testing:monitoring.py:462 Results accumulated: 0 [31m[1mERROR [0m wazuh_testing:monitoring.py:464 Results expected: 1 [35mDEBUG [0m wazuh_testing:test_general_settings_min_full_scan_interval.py:200 Changing the system clock from 2022-01-10 18:00:38.777365 to 2022-03-11 18:00:39.500941 | |||||||
Passed | 2021-11-11 21:01:16.896893 | test_vulnerability_detector/test_general_settings/test_general_settings_retry_interval.py::test_retry_interval[25s] | description: Checks if the `retry_interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that Vulnerability Detector will sleep before. attempting to scan the pending agents. After that, waits for the log saying that the agent will be. scanned again. And the time between both events is compared.. wazuh_min_version: 4.3 | 25.21 | server | 0 | |
-----------------------------Captured stderr setup------------------------------ 2021/11/11 18:00:51 wazuh-modulesd[183435] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:00:51 wazuh-modulesd[183435] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:00:51 wazuh-modulesd[183435] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:00:51 wazuh-modulesd[183435] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:00:51 wazuh-modulesd[183435] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/11 18:00:51 wazuh-modulesd[183435] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/11 18:00:51 wazuh-modulesd[183435] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s | |||||||
Passed | 2021-11-11 21:01:58.356781 | test_vulnerability_detector/test_general_settings/test_general_settings_retry_interval.py::test_retry_interval[30s] | description: Checks if the `retry_interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that Vulnerability Detector will sleep before. attempting to scan the pending agents. After that, waits for the log saying that the agent will be. scanned again. And the time between both events is compared.. wazuh_min_version: 4.3 | 30.76 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T18:01:27.1636664487 -----------------------------Captured stderr setup------------------------------ 2021/11/11 18:01:27 wazuh-modulesd[183487] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:01:27 wazuh-modulesd[183487] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:01:27 wazuh-modulesd[183487] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:01:27 wazuh-modulesd[183487] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:01:27 wazuh-modulesd[183487] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/11 18:01:27 wazuh-modulesd[183487] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/11 18:01:27 wazuh-modulesd[183487] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s | |||||||
Passed | 2021-11-11 21:02:46.528003 | test_vulnerability_detector/test_general_settings/test_general_settings_retry_interval.py::test_retry_interval[35s] | description: Checks if the `retry_interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that Vulnerability Detector will sleep before. attempting to scan the pending agents. After that, waits for the log saying that the agent will be. scanned again. And the time between both events is compared.. wazuh_min_version: 4.3 | 35.93 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T18:02:09.1636664529 -----------------------------Captured stderr setup------------------------------ 2021/11/11 18:02:10 wazuh-modulesd[183527] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:02:10 wazuh-modulesd[183527] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:02:10 wazuh-modulesd[183527] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:02:10 wazuh-modulesd[183527] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:02:10 wazuh-modulesd[183527] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/11 18:02:10 wazuh-modulesd[183527] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/11 18:02:10 wazuh-modulesd[183527] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s | |||||||
Passed | 2021-11-11 21:02:58.609776 | test_vulnerability_detector/test_general_settings/test_general_settings_run_on_start.py::test_run_on_start[run_on_start_yes] | description: Checks if the `run_on_start ` option is working correctly. To do this, when the option is enabled. it restarts Vulnerability Detector and checks the `ossec.log` file for the message indicating that. a scan starts; and, when the option is disabled, it restarts Vulnerability Detector and checks in the. 'ossec.log' that the scan doesn't start. | 1.01 | server | 0 | |
-----------------------------Captured stderr setup------------------------------ 2021/11/11 18:02:57 wazuh-modulesd[183569] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:02:57 wazuh-modulesd[183569] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:02:57 wazuh-modulesd[183569] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:02:57 wazuh-modulesd[183569] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:02:57 wazuh-modulesd[183569] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s | |||||||
Passed | 2021-11-11 21:04:00.075420 | test_vulnerability_detector/test_general_settings/test_general_settings_run_on_start.py::test_run_on_start[run_on_start_no] | description: Checks if the `run_on_start ` option is working correctly. To do this, when the option is enabled. it restarts Vulnerability Detector and checks the `ossec.log` file for the message indicating that. a scan starts; and, when the option is disabled, it restarts Vulnerability Detector and checks in the. 'ossec.log' that the scan doesn't start. | 60.52 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T18:02:58.1636664578 -----------------------------Captured stderr setup------------------------------ 2021/11/11 18:02:59 wazuh-modulesd[183601] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:02:59 wazuh-modulesd[183601] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:02:59 wazuh-modulesd[183601] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:02:59 wazuh-modulesd[183601] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:02:59 wazuh-modulesd[183601] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s | |||||||
Passed | 2021-11-11 21:04:15.057743 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_redhat_default] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 14.37 | server | 0 | |
-----------------------------Captured stderr setup------------------------------ 2021/11/11 18:04:00 wazuh-modulesd[183641] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:04:00 wazuh-modulesd[183641] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:04:00 wazuh-modulesd[183641] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:04:00 wazuh-modulesd[183641] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:04:00 wazuh-modulesd[183641] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s | |||||||
Passed | 2021-11-11 21:04:16.717515 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_redhat_path] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 1.09 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T18:04:15.1636664655 -----------------------------Captured stderr setup------------------------------ 2021/11/11 18:04:15 wazuh-modulesd[183676] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:04:15 wazuh-modulesd[183676] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:04:15 wazuh-modulesd[183676] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:04:15 wazuh-modulesd[183676] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:04:15 wazuh-modulesd[183676] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/11 18:04:15 wazuh-modulesd[183676] wmodules-vuln-detector.c:503 at wm_vuldet_enable_rhel_json_feed(): WARNING: (5587): Feed conflict. Only 'redhat' will be updated offline. | |||||||
Passed | 2021-11-11 21:04:35.228044 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_redhat_multipath] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 17.67 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T18:04:16.1636664656 -----------------------------Captured stderr setup------------------------------ 2021/11/11 18:04:17 wazuh-modulesd[183710] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:04:17 wazuh-modulesd[183710] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:04:17 wazuh-modulesd[183710] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:04:17 wazuh-modulesd[183710] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:04:17 wazuh-modulesd[183710] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s 2021/11/11 18:04:17 wazuh-modulesd[183710] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/11 18:04:17 wazuh-modulesd[183710] wmodules-vuln-detector.c:499 at wm_vuldet_enable_rhel_json_feed(): WARNING: (5587): Feed conflict. Only 'jredhat' will be updated offline. | |||||||
Passed | 2021-11-11 21:04:37.731936 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_redhat_path_multipath] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 2.17 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T18:04:35.1636664675 -----------------------------Captured stderr setup------------------------------ 2021/11/11 18:04:35 wazuh-modulesd[183745] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:04:35 wazuh-modulesd[183745] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:04:35 wazuh-modulesd[183745] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:04:35 wazuh-modulesd[183745] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:04:35 wazuh-modulesd[183745] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/11 18:04:35 wazuh-modulesd[183745] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s | |||||||
Passed | 2021-11-11 21:04:40.690536 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_redhat_url] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 2.13 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T18:04:37.1636664677 -----------------------------Captured stderr setup------------------------------ 2021/11/11 18:04:38 wazuh-modulesd[183779] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:04:38 wazuh-modulesd[183779] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:04:38 wazuh-modulesd[183779] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:04:38 wazuh-modulesd[183779] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:04:38 wazuh-modulesd[183779] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_redhat_oval_feed.xml' | Timeout: 300s 2021/11/11 18:04:38 wazuh-modulesd[183779] wmodules-vuln-detector.c:503 at wm_vuldet_enable_rhel_json_feed(): WARNING: (5587): Feed conflict. Only 'redhat' will be updated offline. | |||||||
Passed | 2021-11-11 21:04:55.393520 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_redhat_multiurl] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 13.83 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T18:04:40.1636664680 -----------------------------Captured stderr setup------------------------------ 2021/11/11 18:04:41 wazuh-modulesd[183814] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:04:41 wazuh-modulesd[183814] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:04:41 wazuh-modulesd[183814] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:04:41 wazuh-modulesd[183814] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:04:41 wazuh-modulesd[183814] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s 2021/11/11 18:04:41 wazuh-modulesd[183814] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: 'none' | Multi url: 'file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_redhat_json_feed.json' | Update since: 1999 | Timeout: 300s 2021/11/11 18:04:41 wazuh-modulesd[183814] wmodules-vuln-detector.c:499 at wm_vuldet_enable_rhel_json_feed(): WARNING: (5587): Feed conflict. Only 'jredhat' will be updated offline. | |||||||
Passed | 2021-11-11 21:04:56.645525 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_redhat_url_multiurl] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 1.08 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T18:04:55.1636664695 -----------------------------Captured stderr setup------------------------------ 2021/11/11 18:04:55 wazuh-modulesd[183849] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:04:55 wazuh-modulesd[183849] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:04:55 wazuh-modulesd[183849] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:04:55 wazuh-modulesd[183849] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:04:55 wazuh-modulesd[183849] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_redhat_oval_feed.xml' | Timeout: 300s 2021/11/11 18:04:55 wazuh-modulesd[183849] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: 'none' | Multi url: 'file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_redhat_json_feed.json' | Update since: 1999 | Timeout: 300s | |||||||
Passed | 2021-11-11 21:05:19.013834 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_debian_default] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 21.43 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T18:04:56.1636664696 -----------------------------Captured stderr setup------------------------------ 2021/11/11 18:04:57 wazuh-modulesd[183883] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:04:57 wazuh-modulesd[183883] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:04:57 wazuh-modulesd[183883] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:04:57 wazuh-modulesd[183883] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:04:57 wazuh-modulesd[183883] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s | |||||||
Passed | 2021-11-11 21:05:26.065343 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_debian_path] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 6.49 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T18:05:19.1636664719 -----------------------------Captured stderr setup------------------------------ 2021/11/11 18:05:19 wazuh-modulesd[183919] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:05:19 wazuh-modulesd[183919] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:05:19 wazuh-modulesd[183919] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:05:19 wazuh-modulesd[183919] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:05:19 wazuh-modulesd[183919] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s | |||||||
Passed | 2021-11-11 21:05:38.508208 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_debian_multipath] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 11.94 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T18:05:26.1636664726 -----------------------------Captured stderr setup------------------------------ 2021/11/11 18:05:26 wazuh-modulesd[183953] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:05:26 wazuh-modulesd[183953] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:05:26 wazuh-modulesd[183953] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:05:26 wazuh-modulesd[183953] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:05:26 wazuh-modulesd[183953] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s | |||||||
Passed | 2021-11-11 21:05:40.659517 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_debian_path_multipath] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 1.08 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T18:05:38.1636664738 -----------------------------Captured stderr setup------------------------------ 2021/11/11 18:05:39 wazuh-modulesd[183987] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:05:39 wazuh-modulesd[183987] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:05:39 wazuh-modulesd[183987] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:05:39 wazuh-modulesd[183987] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:05:39 wazuh-modulesd[183987] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s | |||||||
Passed | 2021-11-11 21:05:48.003465 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_debian_url] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 6.45 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T18:05:40.1636664740 -----------------------------Captured stderr setup------------------------------ 2021/11/11 18:05:41 wazuh-modulesd[184020] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:05:41 wazuh-modulesd[184020] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:05:41 wazuh-modulesd[184020] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:05:41 wazuh-modulesd[184020] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:05:41 wazuh-modulesd[184020] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_debian_oval_feed.xml' | Timeout: 300s | |||||||
Passed | 2021-11-11 21:06:00.484929 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_debian_multiurl] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 11.89 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T18:05:48.1636664748 -----------------------------Captured stderr setup------------------------------ 2021/11/11 18:05:48 wazuh-modulesd[184054] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:05:48 wazuh-modulesd[184054] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:05:48 wazuh-modulesd[184054] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:05:48 wazuh-modulesd[184054] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:05:48 wazuh-modulesd[184054] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s | |||||||
Passed | 2021-11-11 21:06:02.142420 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_debian_url_multiurl] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 0.57 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-11T18:06:00.1636664760 -----------------------------Captured stderr setup------------------------------ 2021/11/11 18:06:01 wazuh-modulesd[184088] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:06:01 wazuh-modulesd[184088] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:06:01 wazuh-modulesd[184088] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:06:01 wazuh-modulesd[184088] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:06:01 wazuh-modulesd[184088] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_debian_oval_feed.xml' | Timeout: 300s | |||||||
Passed | 2021-11-11 21:06:25.877854 | test_vulnerability_detector/test_scan_results/test_alert_vulnerability_removal.py::test_alert_vulnerability_removal[get_configuration0] | Check if the Vulnerability Detector module generates an alert when a vulnerability is removed from the inventory. | 21.95 | server | 0 | |
-----------------------------Captured stderr setup------------------------------ 2021/11/11 18:06:03 wazuh-modulesd[184451] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:06:03 wazuh-modulesd[184451] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:06:03 wazuh-modulesd[184451] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:06:03 wazuh-modulesd[184451] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:06:03 wazuh-modulesd[184451] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/11 18:06:03 wazuh-modulesd[184451] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/11 18:06:03 wazuh-modulesd[184451] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s | |||||||
Passed | 2021-11-11 21:07:18.202619 | test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py::test_baseline_scan_type[baseline_scan_config] | description: Checks if the baseline scan is performed as expected. To do this,. a fresh agent (without a previous scan) is inserted and a feed update is simulated. After this,. it checks the `ossec.log` file for the message indicating that a baseline scan is being performed. | 41.37 | server | 0 | |
-----------------------------Captured stderr setup------------------------------ 2021/11/11 18:06:36 wazuh-modulesd[184520] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:06:36 wazuh-modulesd[184520] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:06:36 wazuh-modulesd[184520] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:06:36 wazuh-modulesd[184520] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:06:36 wazuh-modulesd[184520] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/11 18:06:36 wazuh-modulesd[184520] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/11 18:06:36 wazuh-modulesd[184520] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s ------------------------------Captured stderr call------------------------------ 2021-11-11 18:07:18,171 - wazuh_testing - ERROR - No alert detected in log. 2021-11-11 18:07:18,172 - wazuh_testing - ERROR - Results accumulated: 0 2021-11-11 18:07:18,172 - wazuh_testing - ERROR - Results expected: 1 -------------------------------Captured log call-------------------------------- [31m[1mERROR [0m wazuh_testing:monitoring.py:461 No alert detected in log. [31m[1mERROR [0m wazuh_testing:monitoring.py:462 Results accumulated: 0 [31m[1mERROR [0m wazuh_testing:monitoring.py:464 Results expected: 1 | |||||||
Passed | 2021-11-11 21:07:41.745710 | test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_type[full_scan_config] | description: Checks if the full scan is performed as expected. To do this,. a fresh agent (without a previous scan) is inserted and a feed update is simulated. After this,. it checks the `ossec.log` file for the message indicating that a baseline scan is being performed and. the vulnerabilities detected are checked. Then, the vulnerable packages are modified and. a full scan is forced by modifying the LAST_FULL_SCAN value in the agent database. Once the scan. finished, the vulnerabilities are controlled again to identify that new vulnerabilities are reported,. but old ones don´t. | 7.12 | server | 0 | |
-----------------------------Captured stderr setup------------------------------ 2021/11/11 18:07:34 wazuh-modulesd[184563] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:07:34 wazuh-modulesd[184563] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:07:34 wazuh-modulesd[184563] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:07:34 wazuh-modulesd[184563] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:07:34 wazuh-modulesd[184563] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/11 18:07:34 wazuh-modulesd[184563] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/11 18:07:34 wazuh-modulesd[184563] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s | |||||||
Passed | 2021-11-11 21:09:25.989542 | test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_type[partial_scan_config] | description: Checks if the partial scan is performed as expected. To do this,. a fresh agent (without a previous scan) is inserted and a feed update is simulated. After this,. it checks the `ossec.log` file for the message indicating that a baseline scan is being performed and. the vulnerabilities detected are checked. After this, the vulnerable packages are modified and. a partial scan is waited. Once the scan finished, the vulnerabilities are controlled again to identify. that new vulnerabilities are reported, but old ones don´t. | 87.35 | server | 0 | |
-----------------------------Captured stderr setup------------------------------ 2021/11/11 18:07:58 wazuh-modulesd[184603] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/11 18:07:58 wazuh-modulesd[184603] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/11 18:07:58 wazuh-modulesd[184603] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/11 18:07:58 wazuh-modulesd[184603] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/11 18:07:58 wazuh-modulesd[184603] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/11 18:07:58 wazuh-modulesd[184603] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/11 18:07:58 wazuh-modulesd[184603] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s ------------------------------Captured stderr call------------------------------ 2021-11-11 18:08:44,842 - wazuh_testing - ERROR - No vulnerability for test package 0 was detected in the log. 2021-11-11 18:08:44,842 - wazuh_testing - ERROR - Results accumulated: 0 2021-11-11 18:08:44,842 - wazuh_testing - ERROR - Results expected: 1 2021-11-11 18:09:24,949 - wazuh_testing - ERROR - No alert for test package 0 has been detected in the log. 2021-11-11 18:09:24,950 - wazuh_testing - ERROR - Results accumulated: 0 2021-11-11 18:09:24,950 - wazuh_testing - ERROR - Results expected: 1 -------------------------------Captured log call-------------------------------- [31m[1mERROR [0m wazuh_testing:monitoring.py:461 No vulnerability for test package 0 was detected in the log. [31m[1mERROR [0m wazuh_testing:monitoring.py:462 Results accumulated: 0 [31m[1mERROR [0m wazuh_testing:monitoring.py:464 Results expected: 1 [31m[1mERROR [0m wazuh_testing:monitoring.py:461 No alert for test package 0 has been detected in the log. [31m[1mERROR [0m wazuh_testing:monitoring.py:462 Results accumulated: 0 [31m[1mERROR [0m wazuh_testing:monitoring.py:464 Results expected: 1 |