Report generated on 15-Nov-2021 at 16:40:55 by pytest-html v2.0.1
Packages | {'pytest': '6.2.2', 'py': '1.10.0', 'pluggy': '0.13.1'} |
Platform | Linux-4.18.0-305.25.1.el8_4.x86_64-x86_64-with-centos-8.4.2105 |
Plugins | {'metadata': '1.11.0', 'testinfra': '5.0.0', 'html': '2.0.1'} |
Python | 3.6.8 |
41 tests ran in 908.55 seconds.
(Un)check the boxes to filter the results.
40 passed, 2529 skipped, 1 failed, 0 errors, 0 expected failures, 0 unexpected passesTests | Failed | Success | XFail | Error |
---|---|---|---|---|
test_vulnerability_detector/test_feeds/test_download_feeds.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/test_validate_feed_content.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/msu/test_missing_fields_msu_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_general_settings/test_general_settings_enabled.py | 0 | 2 | 0 | 0 |
test_vulnerability_detector/test_general_settings/test_general_settings_interval.py | 0 | 12 | 0 | 0 |
test_vulnerability_detector/test_general_settings/test_general_settings_min_full_scan_interval.py | 0 | 4 | 0 | 0 |
test_vulnerability_detector/test_general_settings/test_general_settings_retry_interval.py | 0 | 3 | 0 | 0 |
test_vulnerability_detector/test_general_settings/test_general_settings_run_on_start.py | 0 | 2 | 0 | 0 |
test_vulnerability_detector/test_providers/test_providers_enabled.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_providers/test_providers_multiple_providers.py | 0 | 14 | 0 | 0 |
test_vulnerability_detector/test_providers/test_providers_no_os.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_providers/test_providers_os.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_providers/test_providers_update_from_year.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_providers/test_providers_update_interval.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_alas_inventory_alas_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_alert_vulnerability_removal.py | 1 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_archlinux_inventory_archlinux_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_debian_inventory_debian_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_macos_inventory.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_msu_inventory_msu_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_redhat_duplicate_vulns.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_redhat_inventory_redhat_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_scan_different_cves.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_results/test_ubuntu_inventory_canonical_feed.py | 0 | 0 | 0 | 0 |
test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py | 0 | 1 | 0 | 0 |
test_vulnerability_detector/test_scan_types/test_full_scan_type.py | 0 | 1 | 0 | 0 |
test_vulnerability_detector/test_scan_types/test_partial_scan_type.py | 0 | 1 | 0 | 0 |
test_vulnerability_detector/test_windows/test_cpe_indexing.py | 0 | 0 | 0 | 0 |
Result | Time | Test | Description | Duration | Markers | Links | Tier |
---|---|---|---|---|---|---|---|
No results found. Try to check the filters | |||||||
Failed | 2021-11-15 16:37:16.245675 | test_vulnerability_detector/test_scan_results/test_alert_vulnerability_removal.py::test_alert_vulnerability_removal[get_configuration0] | Check if the Vulnerability Detector module generates an alert when a vulnerability is removed from the inventory. | 18.54 | server | Test arguments ossec.log ossec.conf local_internal_options.conf | 0 |
Test function detailsExtended SummaryFor this purpose, the manager is configured to use custom feeds that include vulnerabilities associated with two test packages. Those packages are added to the database of the simulated agent and, after enrollment of the agent, the vulnerability detector must launch the first scan on it, which is of BASELINE type. When the BASELINE scan is done, it will check that the vulnerabilities are added to the vuln_cves table. This will be verified by checking the log file. After this, one of the test packages will be removed and the other will be upgraded to a non-vulnerable version. These situations should generate alerts. Finally, it waits for the next scan, which should be of PARTIAL_SCAN type and, after it is finished, the alerts that should have been generated after the removal of the vulnerabilities are searched for. Args: get_configuration (fixture): Get configurations from the module. configure_environment (fixture): Configure a custom environment for testing. restart_modulesd (fixture): Reset wazuh_modulesd daemon, truncates ossec.log file and starts a new monitor. mock_system (fixture): Add a simulated agent to the manager for testing. Parametersget_configuration = {'apply_to_modules': ['test_alert_vulnerability_removal'], 'metadata': {'NVD_JSON_FEED_PATH': '/home/vagrant/wazuh-qa/...syscheck'}, {'elements': [{'disabled': {'value': 'no'}}], 'section': 'auth'}], 'tags': ['alert_vulnerability_removal']} configure_environment = None, restart_modulesd = None, mock_system = '002' def test_alert_vulnerability_removal(get_configuration, configure_environment, restart_modulesd, mock_system): """Check if the Vulnerability Detector module generates an alert when a vulnerability is removed from the inventory. For this purpose, the manager is configured to use custom feeds that include vulnerabilities associated with two test packages. Those packages are added to the database of the simulated agent and, after enrollment of the agent, the vulnerability detector must launch the first scan on it, which is of BASELINE type. When the BASELINE scan is done, it will check that the vulnerabilities are added to the vuln_cves table. This will be verified by checking the log file. After this, one of the test packages will be removed and the other will be upgraded to a non-vulnerable version. These situations should generate alerts. Finally, it waits for the next scan, which should be of PARTIAL_SCAN type and, after it is finished, the alerts that should have been generated after the removal of the vulnerabilities are searched for. Args: get_configuration (fixture): Get configurations from the module. configure_environment (fixture): Configure a custom environment for testing. restart_modulesd (fixture): Reset wazuh_modulesd daemon, truncates ossec.log file and starts a new monitor. mock_system (fixture): Add a simulated agent to the manager for testing. """ check_apply_test({'alert_vulnerability_removal'}, get_configuration['tags']) agent_id = mock_system # Set TIMESTAMP to the current time on METADATA of CVEs DB to simulate the feeds update. vd.modify_metadata_vuldet_feed('RHEL8', int(time.time())) # Callbacks callback_detect_baseline_scan_start = vd.make_vuln_callback(f"A baseline scan will be run on agent '{agent_id}'") callback_detect_partial_scan_start = vd.make_vuln_callback(f"A partial scan will be run on agent '{agent_id}'") callback_detect_scan_end = vd.make_vuln_callback(f"Finished vulnerability assessment for agent '{agent_id}'") callback_detect_test_package_0_alert = vd.make_vuln_callback( pattern=f"{test_packet_0_cve} affecting {test_packet_0_name} was eliminated", prefix='.*') callback_detect_test_package_1_alert = vd.make_vuln_callback( pattern=f"{test_packet_1_cve} affecting {test_packet_1_name} was eliminated", prefix='.*') # Detect the baseline scan. wazuh_log_monitor.start(timeout=vd.VULN_DETECTOR_SCAN_TIMEOUT, callback=callback_detect_baseline_scan_start, error_message='No baseline scan start has been detected in the log.') # Check if the NVD vulnerabilities are detected. vd.check_detected_vulnerabilities_number(agent=agent_id, wazuh_log_monitor=wazuh_log_monitor, expected_vulnerabilities_number=2, feed_source='NVD', timeout=vd.VULN_DETECTOR_SCAN_TIMEOUT) # Check the vulnerabilities in the inventory severity, cvss2_score, cvss3_score = vd.find_rhel_cve_severity_score(cve_nvd_array=nvd_vulnerabilities['CVE_Items'], cve_rhel_array=rhel_vulnerabilities, cve_id=test_packet_0_cve) vd.check_vulnerability_scan_inventory(agent=agent_id, package=test_packet_0_name, version=test_packet_version, arch='x86_64', cve=test_packet_0_cve, condition='inserted', severity=severity, cvss2=cvss2_score, cvss3=cvss3_score) severity, cvss2_score, cvss3_score = vd.find_rhel_cve_severity_score(cve_nvd_array=nvd_vulnerabilities['CVE_Items'], cve_rhel_array=rhel_vulnerabilities, cve_id=test_packet_1_cve) vd.check_vulnerability_scan_inventory(agent=agent_id, package=test_packet_1_name, version=test_packet_version, arch='x86_64', cve=test_packet_1_cve, condition='inserted', severity=severity, > cvss2=cvss2_score, cvss3=cvss3_score) tests/integration/test_vulnerability_detector/test_scan_results/test_alert_vulnerability_removal.py:142: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ agent = '002', package = 'wazuhintegrationpackage-1', version = '1.0.0', arch = 'x86_64' cve = 'CVE-001', condition = 'inserted', severity = 'High', cvss2 = 10, cvss3 = 7.2 def check_vulnerability_scan_inventory(agent, package, version, arch, cve, condition, severity='-', cvss2=0, cvss3=0): """Checks the existence or lack of a vulnerability in the agent's DB Args: agent (str) = Id of the agent. package (str) = Vulnerable package to look for. version (str) = Version of the vulnerable package to look for. arch (str) = Architecture of the vulnerable package to look for. cve (str) = Vulnerability ID associated to the vulnerable package to look for. condition (str) = This parameter is used to check if the vulnerability exists ('inserted') or not ('removed') in the inventory severity (str,optional) = Severity of the vulnerable package to look for. cvss2 (str,optional) = CVSS2 score of the vulnerable package to look for. cvss3 (str,optional) = CVSS3 score of the vulnerable package to look for. """ if condition == 'inserted': query = f"""agent {agent} sql SELECT CASE WHEN EXISTS (select 1 FROM vuln_cves WHERE cve = '{cve}' AND name = '{package}' AND version = '{version}' AND architecture = '{arch}' AND severity = '{severity}' AND cvss2_score = {cvss2} AND cvss3_score = {cvss3}) THEN 'true' ELSE 'false' END as 'result'""" elif condition == 'removed': query = f"""agent {agent} sql SELECT CASE WHEN NOT EXISTS (select 1 FROM vuln_cves WHERE cve = '{cve}' AND name = '{package}' AND version = '{version}' AND architecture = '{arch}') THEN 'true' ELSE 'false' END as 'result'""" else: raise Exception(f'The "condition" parameter has an unexpected value: {condition}') wdb_result = query_wdb(query) if wdb_result[0]['result'] == 'false': > raise Exception(f'The vulnerability {cve} has not been {condition} as expected') E Exception: The vulnerability CVE-001 has not been inserted as expected /usr/local/lib/python3.6/site-packages/wazuh_testing-4.3.0-py3.6.egg/wazuh_testing/vulnerability_detector.py:1131: Exception -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:36:53 wazuh-modulesd[183541] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:36:53 wazuh-modulesd[183541] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:36:53 wazuh-modulesd[183541] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:36:53 wazuh-modulesd[183541] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:36:53 wazuh-modulesd[183541] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/15 16:36:53 wazuh-modulesd[183541] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/15 16:36:53 wazuh-modulesd[183541] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s | |||||||
Skipped | 2021-11-15 16:25:47.644805 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[redhat_5]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.645597 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[redhat_6]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.646211 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[redhat_7]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.646867 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[redhat_8]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.647433 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[json_redhat]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.648009 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[canonical_trusty]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.648579 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[canonical_xenial]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.649127 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[canonical_bionic]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.649767 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[canonical_focal]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.650668 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[debian_stretch]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.651353 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[debian_buster]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.651927 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[nvd]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.652498 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[msu]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.653070 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[arch]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.653698 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[alas_amazon-linux]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.654252 | test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[alas_amazon-linux-2]::setup | Check if modulesd downloads successfully the feeds from different providers and os.. Additionaly, check that the updates are applied only when required. Ex: Outdated local database. | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_download_feeds.py', 116, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.654945 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/tmp/dummy]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.655536 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/tmp/dummy.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.656091 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/tmp/dummy.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.656647 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/tmp/dummy.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.657284 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/tmp/dummy.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.657892 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/tmp/dummy.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.658446 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/tmp/dummy.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.658990 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/tmp/dummy.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.659554 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/tmp/dummy.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.660114 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_oval_feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.660779 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_oval_feed.xml.gz]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.661334 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[RedHat_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_oval_feed.xml.bz2]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.661879 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/tmp/dummy]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.662417 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/tmp/dummy.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.662968 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/tmp/dummy.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.663658 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/tmp/dummy.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.664214 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/tmp/dummy.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.664795 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/tmp/dummy.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.665375 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/tmp/dummy.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.665934 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/tmp/dummy.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.666795 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/tmp/dummy.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.667450 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_json_feed.json$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.668019 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_json_feed.json.gz$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.668593 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_RedHat_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_json_feed.json.bz2$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.669170 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/tmp/dummy]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.669723 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/tmp/dummy.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.670266 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/tmp/dummy.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.670892 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/tmp/dummy.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.671482 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/tmp/dummy.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.672071 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/tmp/dummy.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.672667 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/tmp/dummy.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.673220 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/tmp/dummy.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.673772 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/tmp/dummy.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.674585 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_canonical_oval_feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.675197 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_canonical_oval_feed.xml.gz]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.675778 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Canonical_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_canonical_oval_feed.xml.bz2]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.676353 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/tmp/dummy]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.676947 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/tmp/dummy.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.677497 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/tmp/dummy.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.678138 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/tmp/dummy.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.678738 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/tmp/dummy.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.679310 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/tmp/dummy.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.679899 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/tmp/dummy.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.680494 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/tmp/dummy.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.681048 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/tmp/dummy.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.681685 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_debian_oval_feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.682583 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_debian_oval_feed.xml.gz]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.683153 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[Debian_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_debian_oval_feed.xml.bz2]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.683704 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_Debian_/tmp/dummy]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.684276 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_Debian_/tmp/dummy.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.684861 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_Debian_/tmp/dummy.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.685510 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_Debian_/tmp/dummy.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.686103 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_Debian_/tmp/dummy.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.686668 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_Debian_/tmp/dummy.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.687217 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_Debian_/tmp/dummy.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.687768 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_Debian_/tmp/dummy.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.688350 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_Debian_/tmp/dummy.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.689032 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[JSON_Debian_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_debian_json_feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.689619 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/tmp/dummy]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.690196 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/tmp/dummy.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.690753 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/tmp/dummy.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.691307 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/tmp/dummy.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.691945 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/tmp/dummy.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.692631 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/tmp/dummy.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.693217 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/tmp/dummy.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.693795 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/tmp/dummy.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.694354 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/tmp/dummy.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.694900 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_msu.json$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.695471 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_msu.json.gz$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.696194 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[MSU_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_msu.json.bz2$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.696773 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/tmp/dummy]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.697321 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/tmp/dummy.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.698135 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/tmp/dummy.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.698728 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/tmp/dummy.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.699297 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/tmp/dummy.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.699955 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/tmp/dummy.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.700589 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/tmp/dummy.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.701175 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/tmp/dummy.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.701759 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/tmp/dummy.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.702331 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_nvd_feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.702898 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_nvd_feed.json.gz]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.703593 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[NVD_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_nvd_feed.json.bz2]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.704215 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/tmp/dummy]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.704818 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/tmp/dummy.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.705405 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/tmp/dummy.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.706015 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/tmp/dummy.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.706592 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/tmp/dummy.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.707258 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/tmp/dummy.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.707849 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/tmp/dummy.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.708458 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/tmp/dummy.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.709055 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/tmp/dummy.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.709640 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_archlinux_feed.json$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.710218 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_archlinux_feed.json.gz$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.710960 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ArchLinux_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_archlinux_feed.json.bz2$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.711543 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/tmp/dummy]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.712109 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/tmp/dummy.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.712688 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/tmp/dummy.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.713271 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/tmp/dummy.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.714155 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/tmp/dummy.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.714783 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/tmp/dummy.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.715361 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/tmp/dummy.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.715938 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/tmp/dummy.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.716520 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/tmp/dummy.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.717092 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas_feed.json$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.717973 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas_feed.json.gz$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.718582 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas_feed.json.bz2$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.719163 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/tmp/dummy]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.719730 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/tmp/dummy.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.720351 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/tmp/dummy.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.720939 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/tmp/dummy.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.721582 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/tmp/dummy.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.722197 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/tmp/dummy.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.722795 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/tmp/dummy.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.723360 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/tmp/dummy.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.723916 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/tmp/dummy.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.724482 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas2_feed.json$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.725120 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas2_feed.json.gz$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.725715 | test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py::test_invalid_type_custom_feeds[ALAS2_/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas2_feed.json.bz2$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_custom_feeds.py', 208, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.726439 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_https://www.customfeed.com/feed]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.727075 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_https://www.customfeed.com/feed.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.727661 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_https://www.customfeed.com/feed.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.728238 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_https://www.customfeed.com/feed.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.728918 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_https://www.customfeed.com/feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.729507 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_https://www.customfeed.com/feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.730346 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_https://www.customfeed.com/feed.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.730985 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_https://www.customfeed.com/feed.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.731590 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_https://www.customfeed.com/feed.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.732163 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_oval_feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.732818 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_oval_feed.xml.gz]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.733405 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[RedHat_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_oval_feed.xml.bz2]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.733970 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_https://www.customfeed.com/feed]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.734530 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_https://www.customfeed.com/feed.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.735086 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_https://www.customfeed.com/feed.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.735673 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_https://www.customfeed.com/feed.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.736317 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_https://www.customfeed.com/feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.736928 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_https://www.customfeed.com/feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.737488 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_https://www.customfeed.com/feed.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.738111 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_https://www.customfeed.com/feed.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.738704 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_https://www.customfeed.com/feed.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.739267 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_json_feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.739904 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_json_feed.json.gz]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.740505 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_RedHat_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_redhat_json_feed.json.bz2]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.741073 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_https://www.customfeed.com/feed]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.741633 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_https://www.customfeed.com/feed.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.742292 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_https://www.customfeed.com/feed.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.742884 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_https://www.customfeed.com/feed.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.743537 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_https://www.customfeed.com/feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.744122 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_https://www.customfeed.com/feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.744703 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_https://www.customfeed.com/feed.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.745280 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_https://www.customfeed.com/feed.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.746099 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_https://www.customfeed.com/feed.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.746689 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_canonical_oval_feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.747346 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_canonical_oval_feed.xml.gz]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.748034 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Canonical_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_canonical_oval_feed.xml.bz2]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.748671 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_https://www.customfeed.com/feed]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.749247 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_https://www.customfeed.com/feed.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.749824 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_https://www.customfeed.com/feed.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.750397 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_https://www.customfeed.com/feed.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.751040 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_https://www.customfeed.com/feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.751619 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_https://www.customfeed.com/feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.752184 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_https://www.customfeed.com/feed.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.752788 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_https://www.customfeed.com/feed.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.753372 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_https://www.customfeed.com/feed.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.753935 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_debian_oval_feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.754609 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_debian_oval_feed.xml.gz]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.755193 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[Debian_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_debian_oval_feed.xml.bz2]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.755763 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_Debian_https://www.customfeed.com/feed]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.756330 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_Debian_https://www.customfeed.com/feed.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.756947 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_Debian_https://www.customfeed.com/feed.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.757588 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_Debian_https://www.customfeed.com/feed.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.758149 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_Debian_https://www.customfeed.com/feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.758736 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_Debian_https://www.customfeed.com/feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.759296 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_Debian_https://www.customfeed.com/feed.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.759843 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_Debian_https://www.customfeed.com/feed.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.760415 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_Debian_https://www.customfeed.com/feed.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.761452 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[JSON_Debian_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_debian_json_feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.762094 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_https://www.customfeed.com/feed]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.762688 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_https://www.customfeed.com/feed.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.763248 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_https://www.customfeed.com/feed.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.763827 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_https://www.customfeed.com/feed.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.764408 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_https://www.customfeed.com/feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.765063 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_https://www.customfeed.com/feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.765671 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_https://www.customfeed.com/feed.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.766242 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_https://www.customfeed.com/feed.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.766805 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_https://www.customfeed.com/feed.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.767624 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_msu.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.768182 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_msu.json.gz]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.768833 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[MSU_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_msu.json.bz2]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.769449 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_https://www.customfeed.com/feed]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.770047 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_https://www.customfeed.com/feed.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.770633 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_https://www.customfeed.com/feed.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.771212 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_https://www.customfeed.com/feed.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.771770 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_https://www.customfeed.com/feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.772468 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_https://www.customfeed.com/feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.773083 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_https://www.customfeed.com/feed.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.773705 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_https://www.customfeed.com/feed.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.774270 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_https://www.customfeed.com/feed.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.774846 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_nvd_feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.775428 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_nvd_feed.json.gz]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.776078 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[NVD_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_nvd_feed.json.bz2]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.776705 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_https://www.customfeed.com/feed]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.777476 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_https://www.customfeed.com/feed.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.778062 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_https://www.customfeed.com/feed.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.778632 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_https://www.customfeed.com/feed.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.779196 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_https://www.customfeed.com/feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.779847 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_https://www.customfeed.com/feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.780452 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_https://www.customfeed.com/feed.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.781044 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_https://www.customfeed.com/feed.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.781610 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_https://www.customfeed.com/feed.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.782203 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_archlinux_feed.json$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.782773 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_archlinux_feed.json.gz$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.783421 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ARCH_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_archlinux_feed.json.bz2$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.784011 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_https://www.customfeed.com/feed]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.784615 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_https://www.customfeed.com/feed.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.785185 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_https://www.customfeed.com/feed.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.785776 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_https://www.customfeed.com/feed.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.786458 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_https://www.customfeed.com/feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.787110 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_https://www.customfeed.com/feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.787712 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_https://www.customfeed.com/feed.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.788343 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_https://www.customfeed.com/feed.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.788950 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_https://www.customfeed.com/feed.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.789533 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas_feed.json$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.790136 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas_feed.json.gz$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.790763 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas_feed.json.bz2$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.791329 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_https://www.customfeed.com/feed]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.791911 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_https://www.customfeed.com/feed.avi]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.792480 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_https://www.customfeed.com/feed.doc]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.793261 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_https://www.customfeed.com/feed.jpg]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.793844 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_https://www.customfeed.com/feed.json]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.794512 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_https://www.customfeed.com/feed.xml]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.795097 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_https://www.customfeed.com/feed.mp3]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.795661 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_https://www.customfeed.com/feed.pdf]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.796225 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_https://www.customfeed.com/feed.zip]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.796847 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas2_feed.json$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.797415 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas2_feed.json.gz$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.798052 | test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py::test_invalid_type_url_feeds[ALAS2_file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/custom_alas2_feed.json.bz2$]::setup | Check that when importing bad feed files, vulnerability report a log parse error otherwise they are imported. correctly | 0.00 | skip | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/test_invalid_type_url_feeds.py', 180, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:47.808600 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[redhat_generic]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:47.817902 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[redhat_5]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:47.826786 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[redhat_6]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:47.835789 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[redhat_7]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:47.845043 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[redhat_8]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:47.853785 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[canonical_focal]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:47.862712 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[canonical_bionic]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:47.871620 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[canonical_xenial]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:47.880550 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[canonical_trusty]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:47.889297 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[debian_buster]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:47.898916 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[debian_stretch]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:47.907886 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[debian_jessie]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:47.917210 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[debian_wheezy]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:47.926404 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[debian_generic]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:47.935183 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[msu_generic]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:47.944383 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[arch_]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:47.987965 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[alas_Amazon Linux 1]::setup | Check if the downloaded feeds have the expected format | 0.04 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:47.997999 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[alas_Amazon Linux 2]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.007199 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2002]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.016309 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2003]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.025947 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2004]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.035285 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2005]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.044937 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2006]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.053821 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2007]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.062727 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2008]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.071689 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2009]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.080326 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2010]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.089358 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2011]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.098520 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2012]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.107367 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2013]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.116371 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2014]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.125537 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2015]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.134595 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2016]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.143242 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2017]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.152188 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2018]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.161100 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2019]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.170251 | test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_feed_content[nvd_2020]::setup | Check if the downloaded feeds have the expected format | 0.01 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.179456 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_no_feed_changes[ALAS_configuration]::setup | Check if the feed is imported successfully by default. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.188655 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.197541 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.206505 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.215637 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.224862 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.233878 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.243136 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.252332 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.261516 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.270542 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.280056 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: [1, 2, 3], value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.289098 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.298110 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.307288 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.316336 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.325321 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.334683 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.343697 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.352630 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.361508 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.370468 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.379669 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.388519 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.397655 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.406542 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.415442 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.424190 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.433561 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.442624 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.451607 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.460768 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.469762 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.478700 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: extra_tag, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.487865 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.497127 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.506000 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.514830 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.523857 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.532853 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.541732 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.550664 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.559762 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.568689 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.577697 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: 12345, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.586623 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.596378 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.605332 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.614114 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.623058 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.631896 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.640845 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.649952 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.659032 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.667989 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.676879 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \xf1, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.685611 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.694513 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.703354 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.712513 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.721642 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.730262 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.738869 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.747625 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.756466 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.765002 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.773899 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.782794 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.791548 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.800153 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.809113 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.817805 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.826483 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.835177 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.843793 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.852538 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.861324 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.870278 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.879086 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.887813 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.896622 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.905480 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.914403 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.923233 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.931981 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.940666 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.949230 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.958034 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.966841 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.975470 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.984013 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:48.992762 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.001910 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.010549 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.019393 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.028250 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.037230 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.045915 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.054829 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.063616 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.072480 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.081400 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.090235 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.099048 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.107741 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.116553 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.125515 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.134065 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.143371 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.152295 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.160907 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.169612 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.180181 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.189847 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.198754 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.207771 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.216921 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.225915 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.235431 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.245095 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.253764 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.262651 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.271980 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_no_feed_changes[ALAS2_configuration]::setup | Check if the feed is imported successfully by default. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.281026 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.290145 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.300001 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.309236 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.318180 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.327380 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.336411 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.345364 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.354181 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.363435 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.372729 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: [1, 2, 3], value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.381492 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.390853 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.399883 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.408752 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.417595 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.426615 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.436207 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.445644 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.455427 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.464325 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.473318 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.482845 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.492662 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.502830 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.512549 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.522096 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.531455 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.540670 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.549923 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.559321 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.569105 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.579915 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: extra_tag, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.590357 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.600566 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.610671 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.621217 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.630986 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.640990 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.651334 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.661410 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.671999 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.681826 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.691121 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: 12345, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.699988 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.709838 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.718962 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.727801 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.737063 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.746211 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.755086 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.763763 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.772631 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.781330 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.789944 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \xf1, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.798853 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.807905 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.817579 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.826845 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.835609 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.844166 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.852759 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.861436 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.869960 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.878436 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.886918 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.895613 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.904849 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.913749 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.922509 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.931189 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.939908 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.948783 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.957832 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.966365 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.975435 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.984133 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:49.993215 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.001789 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.011204 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.020358 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.029165 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.037727 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.046343 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.054987 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.063648 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.072089 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.080749 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.089384 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.098006 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.106790 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.116092 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.124921 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.133380 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.141943 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.150510 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.159154 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.167782 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.176576 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.185042 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.193578 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.202181 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.210796 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.219406 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.227846 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.236508 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.245257 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.253798 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.262799 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.271601 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.280109 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.288528 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.297247 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.305884 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.314366 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.323143 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.332052 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.340679 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.349183 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.357816 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.366458 | test_vulnerability_detector/test_feeds/alas/test_extra_tags_alas_feed.py::test_extra_tags_alas_linux_feed[ALAS2_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux JSON feed with extra tags. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.375369 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_no_feed_changes[ALAS_configuration]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.383902 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Delete '{']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.392886 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Delete '}']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.401475 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Add '{{']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.410059 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Add '}}']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.418638 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Add '{' in the middle of feed]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.427358 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Add '}' in the middle of feed]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.435758 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Add '{}' in the middle of feed]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.444648 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Delete key:value comma ',']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.453196 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Add a comma before value key: ,value,]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.461768 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Add double comma after key:value,,]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.470286 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Add double comma after list value,,]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.479015 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Close a key with double quotation marks]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.487476 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Close value with double quotation marks]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.496050 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace a comma with semicolon]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.504627 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace a colon with semicolon]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.513542 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Missing open bracket]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.522564 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Missing close bracket]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.532504 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Delete some information]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.541511 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '.']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.550363 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with ':']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.559044 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '@']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.567564 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '#']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.576319 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '*']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.585320 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '-']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.593905 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '_']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.602459 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with ''']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.611350 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '"']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.619950 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '/']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.628538 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '=']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.637386 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '\xf1']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.646152 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '\xe7']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.654875 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '+']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.663489 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '^']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.672181 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '!'0]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.680805 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '?'0]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.689457 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '%']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.698070 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '&']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.706755 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '`']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.715364 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '\xbf']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.723816 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '?'1]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.732352 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '(']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.741195 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with ')']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.749909 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '|']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.758453 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '\xba']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.767381 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '$']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.776278 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '\xbd']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.785022 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '\xac']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.794084 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '!'1]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.803471 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '~']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.812407 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '\xa1']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.821566 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '[']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.830625 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with ']']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.839371 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '{']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.848243 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS_configuration-Replace ',' with '}']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.857043 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_no_feed_changes[ALAS2_configuration]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.865910 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Delete '{']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.874942 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Delete '}']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.884083 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Add '{{']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.893180 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Add '}}']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.902430 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Add '{' in the middle of feed]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.911590 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Add '}' in the middle of feed]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.920984 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Add '{}' in the middle of feed]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.930251 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Delete key:value comma ',']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.939304 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Add a comma before value key: ,value,]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.948736 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Add double comma after key:value,,]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.958227 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Add double comma after list value,,]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.967315 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Close a key with double quotation marks]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.976389 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Close value with double quotation marks]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.985689 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace a comma with semicolon]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:50.994611 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace a colon with semicolon]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.003440 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Missing open bracket]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.013167 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Missing close bracket]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.022414 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Delete some information]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.031351 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '.']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.040190 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with ':']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.049390 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '@']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.058203 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '#']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.067191 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '*']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.076450 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '-']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.085541 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '_']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.094565 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with ''']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.103778 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '"']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.112694 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '/']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.121697 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '=']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.130425 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '\xf1']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.139345 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '\xe7']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.148441 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '+']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.157319 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '^']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.166326 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '!'0]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.176118 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '?'0]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.184902 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '%']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.193949 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '&']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.202939 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '`']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.212223 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '\xbf']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.220944 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '?'1]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.229991 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '(']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.238932 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with ')']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.247796 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '|']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.256737 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '\xba']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.265546 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '$']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.274216 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '\xbd']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.282971 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '\xac']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.291774 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '!'1]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.300379 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '~']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.308947 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '\xa1']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.317648 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '[']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.326505 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with ']']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.335144 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '{']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.344259 | test_vulnerability_detector/test_feeds/alas/test_invalid_syntax_alas_feed.py::test_invalid_syntax_alas_feed[ALAS2_configuration-Replace ',' with '}']::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.353623 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_no_feed_changes[ALAS_configuration]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.362779 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: severity, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.372383 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: severity, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.381707 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: severity, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.391011 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: severity, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.400105 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: severity, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.409067 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: severity, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.418153 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: severity, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.427042 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: severity, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.435664 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: severity, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.444668 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: severity, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.453437 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: publishedDate, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.462076 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: publishedDate, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.470555 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: publishedDate, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.479386 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: publishedDate, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.487859 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: publishedDate, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.496612 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: publishedDate, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.505350 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: publishedDate, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.514060 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: publishedDate, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.522717 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: publishedDate, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.531248 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: publishedDate, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.539944 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: lastModifiedDate, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.548967 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: lastModifiedDate, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.557813 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: lastModifiedDate, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.566615 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: lastModifiedDate, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.575741 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: lastModifiedDate, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.584645 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: lastModifiedDate, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.593242 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: lastModifiedDate, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.602277 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: lastModifiedDate, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.611398 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: lastModifiedDate, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.620250 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: lastModifiedDate, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.629225 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: references, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.638016 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: references, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.646849 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: references, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.655830 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: references, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.664801 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: references, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.673543 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: references, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.682256 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: references, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.691146 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: references, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.700078 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: references, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.709109 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: references, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.718316 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: vulnerabilities, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.727454 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: vulnerabilities, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.736241 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: vulnerabilities, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.744969 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: vulnerabilities, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.753829 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: vulnerabilities, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.763213 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: vulnerabilities, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.772293 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: vulnerabilities, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.781272 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: vulnerabilities, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.790335 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: vulnerabilities, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.799115 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: vulnerabilities, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.807929 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: fixed_packages, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.817897 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: fixed_packages, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.826824 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: fixed_packages, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.835611 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: fixed_packages, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.844529 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: fixed_packages, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.853926 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: fixed_packages, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.862594 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: fixed_packages, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.871525 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: fixed_packages, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.880459 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: fixed_packages, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.889110 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS_configuration-field: fixed_packages, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.897701 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_no_feed_changes[ALAS2_configuration]::setup | Check if the feed is imported successfully by default | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.906602 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: severity, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.915757 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: severity, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.925213 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: severity, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.934245 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: severity, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.943338 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: severity, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.952198 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: severity, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.960990 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: severity, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.969864 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: severity, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.979008 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: severity, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.988410 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: severity, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:51.997673 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: publishedDate, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.006752 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: publishedDate, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.015937 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: publishedDate, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.025226 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: publishedDate, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.034643 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: publishedDate, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.043536 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: publishedDate, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.052187 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: publishedDate, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.061537 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: publishedDate, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.070200 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: publishedDate, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.078837 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: publishedDate, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.087586 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: lastModifiedDate, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.096700 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: lastModifiedDate, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.105698 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: lastModifiedDate, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.114978 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: lastModifiedDate, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.125434 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: lastModifiedDate, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.135233 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: lastModifiedDate, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.145017 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: lastModifiedDate, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.154597 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: lastModifiedDate, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.164317 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: lastModifiedDate, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.174090 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: lastModifiedDate, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.185022 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: references, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.195459 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: references, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.206024 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: references, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.216418 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: references, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.227087 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: references, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.238554 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: references, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.251072 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: references, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.262964 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: references, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.275249 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: references, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.287272 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: references, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.299485 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: vulnerabilities, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.312396 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: vulnerabilities, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.325588 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: vulnerabilities, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.338779 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: vulnerabilities, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.352384 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: vulnerabilities, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.366178 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: vulnerabilities, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.381144 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: vulnerabilities, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.396918 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: vulnerabilities, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.412600 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: vulnerabilities, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.428670 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: vulnerabilities, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.444971 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: fixed_packages, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.462559 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: fixed_packages, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.478548 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: fixed_packages, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.494730 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: fixed_packages, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.511402 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: fixed_packages, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.528470 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: fixed_packages, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.546074 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: fixed_packages, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.564122 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: fixed_packages, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.581772 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: fixed_packages, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.598786 | test_vulnerability_detector/test_feeds/alas/test_invalid_values_alas_feed.py::test_invalid_values_alas_feed[ALAS2_configuration-field: fixed_packages, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Amazon Linux feed with syntax errors. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.616083 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_no_feed_changes[ALAS_configuration]::setup | Check if the feed is imported successfully by default. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.633386 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS_configuration-missing: severity]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.652236 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS_configuration-missing: publishedDate]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.669467 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS_configuration-missing: lastModifiedDate]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.686386 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS_configuration-missing: references]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.01 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.703799 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS_configuration-missing: vulnerabilities]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.722225 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS_configuration-missing: fixed_packages]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.740799 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_no_feed_changes[ALAS2_configuration]::setup | Check if the feed is imported successfully by default. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.758914 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS2_configuration-missing: severity]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.777273 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS2_configuration-missing: publishedDate]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.795363 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS2_configuration-missing: lastModifiedDate]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.813768 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS2_configuration-missing: references]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.831591 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS2_configuration-missing: vulnerabilities]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.849898 | test_vulnerability_detector/test_feeds/alas/test_missing_tags_alas_feed.py::test_missing_tags_alas_feed[ALAS2_configuration-missing: fixed_packages]::setup | Check if the feed is imported successfully when certain fields are removed from it. | 0.02 | server | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.869498 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_no_feed_changes[ARCHLINUX_configuration]::setup | Check if the feed is imported successfully by default. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.888178 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.906883 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.925732 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.944284 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.963046 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:52.981709 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.000656 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.019597 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.039510 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.058214 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.078212 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: [1, 2, 3], value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.096509 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.115154 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.133649 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.152291 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.171150 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.190571 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.209796 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.228899 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.247647 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.267233 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.287799 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.308014 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.326761 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.346449 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.365809 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.385296 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.404904 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.424020 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.442992 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.462495 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.481987 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.501206 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: extra_tag, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.519909 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.539385 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.558588 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.577908 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.596855 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.616136 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.635368 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.655169 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.674528 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.694301 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.713417 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: 12345, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.732534 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.751765 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.770444 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.789583 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.808776 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.827902 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.850393 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.874929 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.894561 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.913675 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.932303 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \xf1, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.951448 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.970040 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:53.991375 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.012654 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.034437 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.055671 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.075635 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.096252 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.115512 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.135096 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.156085 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.175363 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.194816 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.214982 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.234700 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.254663 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.274979 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.295152 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.314888 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.334694 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.354098 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.374149 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.393602 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.414285 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.434199 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.454471 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.474863 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.494721 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.513712 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.533169 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.552716 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.572877 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.592191 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.611523 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.631486 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.651096 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.670662 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.690589 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.710990 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.730416 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.749931 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.769758 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.790396 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.810646 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.831133 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.850513 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.870208 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.889640 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.909447 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.928938 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.948196 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.967503 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:54.986869 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.005964 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.026044 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.045710 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: [1, 2, 3]]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.066004 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.085687 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: extra_tag]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.104653 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: 12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.124537 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: \xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.144652 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.163724 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.182803 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.201967 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.222392 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.242112 | test_vulnerability_detector/test_feeds/archlinux/test_extra_tags_archlinux_feed.py::test_extra_tags_arch_linux_feed[ARCHLINUX_configuration-tag: , value: ]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux JSON feed with extra tags. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.261494 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_no_feed_changes[ARCHLINUX_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.280230 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Delete '{']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.299305 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Delete '}']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.318090 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Add '{{']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.337935 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Add '}}']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.359147 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Add '{' in the middle of feed]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.378456 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Add '}' in the middle of feed]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.397262 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Add '{}' in the middle of feed]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.416346 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Delete key:value comma ',']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.435206 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Add a comma before value key: ,value,]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.454826 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Add double comma after key:value,,]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.473808 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Add double comma after list value,,]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.493184 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Close a key with double quotation marks]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.511806 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Close value with double quotation marks]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.531336 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace a comma with semicolon]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.552011 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace a colon with semicolon]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.571535 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Missing open bracket]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.591040 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Missing close bracket]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.610601 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Delete some information]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.630317 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '.']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.649774 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with ':']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.668717 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '@']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.687684 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '#']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.707223 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '*']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.726607 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '-']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.746149 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '_']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.765780 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with ''']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.785066 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '"']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.804767 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '/']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.823874 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '=']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.843340 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '\xf1']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.863035 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '\xe7']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.882402 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '+']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.901469 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '^']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.921269 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '!'0]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.940422 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '?'0]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.959932 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '%']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.979083 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '&']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:55.999059 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '`']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.018743 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '\xbf']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.038686 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '?'1]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.058185 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '(']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.078501 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with ')']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.097429 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '|']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.116987 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '\xba']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.137098 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '$']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.157025 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '\xbd']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.175846 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '\xac']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.195278 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '!'1]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.215110 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '~']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.234356 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '\xa1']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.253719 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '[']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.273372 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with ']']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.292920 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '{']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.312349 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_syntax_archlinux_feed.py::test_invalid_syntax_arch_linux_feed[ARCHLINUX_configuration-Replace ',' with '}']::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.331860 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_no_feed_changes[ARCHLINUX_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.351137 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: name, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.371118 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: name, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.389992 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: name, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.409315 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: name, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.430254 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: name, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.449500 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: name, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.468671 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: name, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.488026 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: name, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.507051 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: name, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.526637 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: name, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.545471 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: packages, value:None]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.564386 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: packages, value:]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.583323 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: packages, value:dummy value]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.602948 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: packages, value:12345]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.622588 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: packages, value:['1', '2', '3', '4', '5']]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.641837 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: packages, value:\xf1]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.661034 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: packages, value:\u30c6\u30b9\u30c8]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.679963 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: packages, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.698679 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: packages, value:\u6d4b\u8bd5]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.719548 | test_vulnerability_detector/test_feeds/archlinux/test_invalid_values_archlinux_feed.py::test_invalid_values_arch_linux_feed[ARCHLINUX_configuration-field: packages, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if Vulnerability Detector behaves as expected while importing Arch Linux feed with syntax errors. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.739676 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_no_feed_changes[ARCHLINUX_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.758250 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_invalid_archlinux_feed[ARCHLINUX_configuration-missing: name]::setup | Check if the feed is imported successfully by default. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.777772 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_invalid_archlinux_feed[ARCHLINUX_configuration-missing: packages]::setup | Check if the feed is imported successfully by default. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.796539 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_invalid_archlinux_feed[ARCHLINUX_configuration-missing: status]::setup | Check if the feed is imported successfully by default. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.817006 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_invalid_archlinux_feed[ARCHLINUX_configuration-missing: severity]::setup | Check if the feed is imported successfully by default. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.836965 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_invalid_archlinux_feed[ARCHLINUX_configuration-missing: type]::setup | Check if the feed is imported successfully by default. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.856716 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_invalid_archlinux_feed[ARCHLINUX_configuration-missing: affected]::setup | Check if the feed is imported successfully by default. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.876920 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_invalid_archlinux_feed[ARCHLINUX_configuration-missing: fixed]::setup | Check if the feed is imported successfully by default. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.896435 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_invalid_archlinux_feed[ARCHLINUX_configuration-missing: ticket]::setup | Check if the feed is imported successfully by default. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.915115 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_invalid_archlinux_feed[ARCHLINUX_configuration-missing: issues]::setup | Check if the feed is imported successfully by default. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.935311 | test_vulnerability_detector/test_feeds/archlinux/test_missing_tags_archlinux_feed.py::test_invalid_archlinux_feed[ARCHLINUX_configuration-missing: advisories]::setup | Check if the feed is imported successfully by default. | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.954508 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_no_feed_changes[CANONICAL_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:56.956756 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.958136 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.959479 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.960847 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.962520 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.963944 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.965982 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.967288 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.968506 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.970063 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.971655 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: [1, 2, 3], value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.972902 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.974207 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.975502 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.976686 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.977879 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.979307 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.980583 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.981828 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.983060 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.984348 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.986314 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.987813 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.989106 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.990446 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.991709 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.992945 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.994153 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.995782 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.997203 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.998501 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:56.999793 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.001158 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: extra_tag, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.003186 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.004529 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.005751 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.007014 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.008268 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.009535 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.010972 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.012247 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.013561 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.014843 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.016092 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: 12345, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.017344 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.019280 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.020597 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.021885 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.023161 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.024405 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.025654 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.027168 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.028813 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.030100 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.031363 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \xf1, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.032698 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.035430 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.036877 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.038204 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.039494 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.040901 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.042252 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.043505 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.117954 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.119397 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.120836 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.122264 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.123917 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.125211 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.126478 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.127830 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.129846 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.131310 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.132693 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.133984 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.135226 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.136557 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.137870 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.139321 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.140606 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.141878 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.143120 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.144677 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.145997 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.147512 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.148873 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.150114 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.151342 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.152745 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.154170 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.155449 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.156695 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.157957 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.159229 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.160892 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.162388 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.163760 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.165088 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.166363 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.167827 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.169185 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.170721 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.172071 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.173273 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.174496 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.175705 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.177505 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.178834 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.180114 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.181438 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.182712 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.183927 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.185424 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.186794 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.188127 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.189287 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.190561 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.192129 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.193707 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.195118 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.196399 | test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py::test_extra_tags_canonical_feed[CANONICAL_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with extra tags | 0.00 | skip | 2 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/canonical/test_extra_tags_canonical_feed.py', 76, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:25:57.217545 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_no_feed_changes[CANONICAL_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.237132 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Delete '<']::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.256904 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Delete '>']::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.276974 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Delete '<>']::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.296295 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Close initial tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.315592 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Delete opening tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.334937 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Delete closing tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.354489 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Empty opening tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.375996 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Empty closing tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.395668 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Random text before tag]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.414955 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Delete info]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.434548 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add . character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.453853 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '.' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.474188 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add : character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.494176 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with ':' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.513553 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add @ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.533050 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '@' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.552270 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add # character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.572054 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '#' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.591445 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add * character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.611045 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '*' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.630198 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add - character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.649297 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '-' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.667973 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add _ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.687500 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '_' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.707465 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ' character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.726586 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with ''' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.745781 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add " character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.764529 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '"' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.784095 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add / character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.802768 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '/' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.822526 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add = character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.841277 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '=' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.860244 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add \xf1 character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.879483 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '\xf1' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.898337 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add \xe7 character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.917245 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '\xe7' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.937091 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add + character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.956280 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '+' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.975227 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ^ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:57.994626 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '^' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.014253 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ! character before <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.034196 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '!' in <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.053570 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ? character before <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.072229 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '?' in <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.092382 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add % character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.111033 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '%' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.130988 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add & character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.150363 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '&' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.169293 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ` character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.188951 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '`' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.208249 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add \xbf character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.227029 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '\xbf' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.246102 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ? character before <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.265303 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '?' in <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.284368 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ( character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.303587 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '(' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.322195 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ) character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.342276 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with ')' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.360904 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add | character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.380901 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '|' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.400025 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add \xba character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.419371 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '\xba' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.438510 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add $ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.456819 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '$' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.475777 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add \xbd character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.495158 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '\xbd' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.514357 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add \xac character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.534091 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '\xac' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.553181 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ! character before <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.572125 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '!' in <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.591528 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ~ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.611080 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '~' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.630313 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add \xa1 character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.649456 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '\xa1' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.669282 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add [ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.687546 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '[' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.708196 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add ] character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.727684 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with ']' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.747137 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add { character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.765721 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '{' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.784805 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Add } character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.803339 | test_vulnerability_detector/test_feeds/canonical/test_invalid_syntax_canonical_feed.py::test_invalid_syntax_canonical_feed[CANONICAL_configuration-Replace '<' with '}' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feeds with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.823657 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_no_feed_changes[CANONICAL_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.843264 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definitions, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.861849 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definitions, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.881900 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definitions, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.900971 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definitions, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.919685 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definitions, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.939628 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definitions, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.958630 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definitions, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.977320 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definitions, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:58.996526 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definitions, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.016015 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definitions, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.036267 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definition, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.056044 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definition, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.075018 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definition, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.095166 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definition, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.114074 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definition, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.132830 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definition, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.152991 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definition, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.172617 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definition, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.193278 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definition, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.213189 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: definition, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.232502 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: metadata, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.251329 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: metadata, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.271348 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: metadata, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.290131 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: metadata, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.309487 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: metadata, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.328576 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: metadata, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.347299 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: metadata, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.366001 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: metadata, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.385490 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: metadata, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.404902 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: metadata, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.423946 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criteria, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.442924 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criteria, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.461975 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criteria, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.482361 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criteria, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.501800 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criteria, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.520410 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criteria, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.539629 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criteria, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.558866 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criteria, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.577699 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criteria, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.597492 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criteria, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.616936 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criterion, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.635669 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criterion, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.655514 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criterion, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.674714 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criterion, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.694237 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criterion, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.714217 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criterion, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.734176 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criterion, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.753393 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criterion, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.772275 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criterion, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.791420 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: criterion, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.810745 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: tests, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.830227 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: tests, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.849194 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: tests, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.868273 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: tests, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.887095 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: tests, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.906329 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: tests, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.925491 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: tests, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.945812 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: tests, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.965056 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: tests, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:25:59.984097 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: tests, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.002811 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_test, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.022222 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_test, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.041494 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_test, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.062473 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_test, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.081380 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_test, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.101564 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_test, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.121027 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_test, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.140196 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_test, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.159549 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_test, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.178377 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_test, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.197216 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: test_object, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.215968 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: test_object, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.235835 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: test_object, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.255102 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: test_object, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.274651 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: test_object, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.293786 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: test_object, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.312524 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: test_object, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.331741 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: test_object, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.350960 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: test_object, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.370352 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: test_object, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.389868 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_object, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.409284 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_object, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.428058 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_object, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.447686 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_object, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.466746 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_object, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.486092 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_object, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.505719 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_object, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.524703 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_object, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.544090 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_object, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.563214 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_object, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.582390 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: object_element, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.601693 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: object_element, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.621025 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: object_element, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.639700 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: object_element, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.659382 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: object_element, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.678389 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: object_element, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.698161 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: object_element, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.717277 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: object_element, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.737858 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: object_element, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.757343 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: object_element, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.776616 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_state, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.795522 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_state, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.814958 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_state, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.835207 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_state, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.854653 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_state, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.874266 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_state, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.894165 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_state, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.913153 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_state, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.932025 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_state, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.952222 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: dpkginfo_state, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.972046 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: state_object, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:00.991525 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: state_object, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.011342 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: state_object, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.031234 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: state_object, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.050575 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: state_object, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.069691 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: state_object, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.089231 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: state_object, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.109418 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: state_object, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.128725 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: state_object, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.147703 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: state_object, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.166706 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: constant_variable, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.186473 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: constant_variable, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.205465 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: constant_variable, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.225126 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: constant_variable, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.244213 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: constant_variable, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.263829 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: constant_variable, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.284183 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: constant_variable, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.303561 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: constant_variable, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.322443 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: constant_variable, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.342455 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: constant_variable, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.362025 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: variable_value, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.381979 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: variable_value, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.402949 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: variable_value, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.422251 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: variable_value, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.441250 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: variable_value, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.460579 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: variable_value, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.479913 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: variable_value, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.499125 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: variable_value, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.519055 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: variable_value, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.538544 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: variable_value, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.558014 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: product_name, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.577241 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: product_name, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.595986 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: product_name, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.615276 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: product_name, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.634413 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: product_name, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.653719 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: product_name, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.672536 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: product_name, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.691733 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: product_name, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.710639 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: product_name, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.730348 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: product_name, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.749842 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: affected, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.768467 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: affected, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.787691 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: affected, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.806953 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: affected, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.826361 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: affected, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.846781 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: affected, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.865812 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: affected, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.885135 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: affected, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.904006 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: affected, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.923952 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: affected, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.943612 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: platform, value: None]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.963434 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: platform, value: ]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:01.982422 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: platform, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.001445 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: platform, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.020459 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: platform, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.040060 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: platform, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.059425 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: platform, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.079312 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: platform, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.098696 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: platform, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.119234 | test_vulnerability_detector/test_feeds/canonical/test_invalid_values_canonical_feed.py::test_invalid_values_canonical_feed[CANONICAL_configuration-tag: platform, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Canonical OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.139177 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_no_feed_changes[CANONICAL_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.159356 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: generator]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.178350 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: product_name]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.198140 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: product_version]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.217204 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: schema_version]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.236983 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: timestamp]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.256614 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: definitions]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.276607 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: definition]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.296807 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: metadata]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.316739 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: title]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.335693 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: description]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.354945 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: affected]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.375034 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: platform]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.394780 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: reference]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.414704 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: advisory]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.433506 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: severity]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.452737 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: public_date]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.471791 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: bug]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.491811 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: criteria]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.511386 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: extend_definition]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.531593 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: criterion]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.550385 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: tests]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.569972 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: dpkginfo_test]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.589076 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: test_object]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.608229 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: objects]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.627147 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: dpkginfo_object]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.646503 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: object_element]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.665568 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: states]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.684780 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: dpkginfo_state]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.703325 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: state_object]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.722791 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: variables]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.743528 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: constant_variable]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.762804 | test_vulnerability_detector/test_feeds/canonical/test_missing_tags_canonical_feed.py::test_missing_canonical_feed[CANONICAL_configuration-missing: variable_value]::setup | Test to check vulnerability detector behavior when importing canonical feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.782035 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_no_feed_changes[DEBIAN_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.800935 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.820182 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.839401 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.858858 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.878354 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.897229 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.916834 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.936058 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.955060 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.974664 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:02.993491 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: [1, 2, 3], value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.013529 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.033153 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.052262 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.071504 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.091064 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.110421 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.130648 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.149887 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.169393 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.187840 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.207442 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.226326 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.245042 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.263930 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.283167 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.302852 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.321501 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.340608 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.359707 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.379100 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.397990 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.417614 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: extra_tag, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.436934 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.456250 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.475218 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.494304 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.513839 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.533924 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.552613 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.572066 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.591127 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.610207 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.629076 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: 12345, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.648508 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.667769 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.686795 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.705475 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.725282 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.744902 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.764026 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.782778 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.801527 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.820581 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.839384 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \xf1, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.859065 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.878869 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.897816 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.916768 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.935490 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.954906 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.973951 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:03.993174 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.012465 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.031732 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.050734 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.070447 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.090218 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.109594 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.129079 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.149592 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.169557 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.188755 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.207594 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.227073 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.245730 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.264912 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.284179 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.304153 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.323667 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.343130 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.361915 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.381478 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.400126 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.420083 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.439296 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.458404 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.479004 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.498534 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.518208 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.538421 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.557367 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.576674 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.596003 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.615337 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.634743 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.654126 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.673672 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.693474 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.712520 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.732001 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.751207 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.770235 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.789496 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.808474 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.827735 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.846806 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.866308 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.885484 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.904505 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.923408 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.942736 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.961767 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:04.981594 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.000139 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.019323 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.039050 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.058176 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.077296 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.096736 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.115736 | test_vulnerability_detector/test_feeds/debian/test_extra_tags_debian_feed.py::test_extra_tags_debian_feed[DEBIAN_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with extra tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.134854 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_no_feed_changes[DEBIAN_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.154876 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Delete '<']::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.174039 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Delete '>']::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.193068 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Delete '<>']::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.212453 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Close initial tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.231628 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Delete opening tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.250199 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Delete closing tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.269529 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Empty opening tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.288775 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Empty closing tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.308289 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Random text before tag]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.326903 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Delete info]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.345908 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add . character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.364715 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '.' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.383500 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add : character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.402312 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with ':' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.423195 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add @ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.442003 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '@' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.461043 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add # character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.480153 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '#' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.499071 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add * character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.518477 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '*' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.538354 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add - character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.557493 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '-' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.576610 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add _ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.595914 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '_' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.615030 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ' character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.634256 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with ''' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.654224 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add " character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.673541 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '"' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.692771 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add / character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.711571 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '/' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.731385 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add = character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.750035 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '=' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.769725 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add \xf1 character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.788875 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '\xf1' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.807815 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add \xe7 character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.826606 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '\xe7' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.845934 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add + character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.865481 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '+' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.884449 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ^ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.903311 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '^' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.922699 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ! character before <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.941734 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '!' in <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.961073 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ? character before <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.980878 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '?' in <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:05.999758 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add % character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.019187 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '%' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.038639 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add & character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.057910 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '&' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.077506 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ` character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.096955 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '`' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.116306 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add \xbf character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.135768 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '\xbf' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.155349 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ? character before <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.174618 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '?' in <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.193768 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ( character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.212842 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '(' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.231858 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ) character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.250788 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with ')' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.270337 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add | character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.289729 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '|' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.308880 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add \xba character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.328450 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '\xba' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.347664 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add $ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.367360 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '$' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.386445 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add \xbd character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.405311 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '\xbd' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.424937 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add \xac character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.444178 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '\xac' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.463527 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ! character before <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.482689 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '!' in <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.501968 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ~ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.521026 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '~' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.540792 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add \xa1 character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.559469 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '\xa1' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.579004 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add [ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.598066 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '[' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.617490 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add ] character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.636256 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with ']' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.655863 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add { character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.674896 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '{' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.693774 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Add } character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.713333 | test_vulnerability_detector/test_feeds/debian/test_invalid_syntax_debian_feed.py::test_invalid_syntax_canonical_feed[DEBIAN_configuration-Replace '<' with '}' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.733390 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_no_feed_changes[DEBIAN_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.752482 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definitions, value:None]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.773275 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definitions, value:]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.792996 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definitions, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.812144 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definitions, value:12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.831362 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definitions, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.850755 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definitions, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.870906 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definitions, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.890598 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definitions, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.909311 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definitions, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.928608 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definitions, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.947451 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definition, value:None]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.966659 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definition, value:]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:06.985953 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definition, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.005010 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definition, value:12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.023937 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definition, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.043492 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definition, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.062772 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definition, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.081860 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definition, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.101224 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definition, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.120275 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: definition, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.139451 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: metadata, value:None]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.159309 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: metadata, value:]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.178573 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: metadata, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.197880 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: metadata, value:12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.217042 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: metadata, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.236098 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: metadata, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.255008 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: metadata, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.273840 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: metadata, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.292967 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: metadata, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.311929 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: metadata, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.331462 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: reference, value:None]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.350548 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: reference, value:]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.369051 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: reference, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.388016 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: reference, value:12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.407140 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: reference, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.426683 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: reference, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.446000 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: reference, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.465446 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: reference, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.484528 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: reference, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.504724 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: reference, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.523932 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: criteria, value:None]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.543791 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: criteria, value:]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.562402 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: criteria, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.581900 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: criteria, value:12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.600492 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: criteria, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.620183 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: criteria, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.640224 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: criteria, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.659297 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: criteria, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.678754 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: criteria, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.698028 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: criteria, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.716724 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: product_name, value:None]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.736652 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: product_name, value:]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.755238 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: product_name, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.774741 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: product_name, value:12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.793780 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: product_name, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.813016 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: product_name, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.832911 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: product_name, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.852284 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: product_name, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.871234 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: product_name, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.890838 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: product_name, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.909733 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: affected, value:None]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.929283 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: affected, value:]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.948672 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: affected, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.967343 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: affected, value:12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:07.987014 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: affected, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.006462 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: affected, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.025710 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: affected, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.045357 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: affected, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.064794 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: affected, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.083943 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: affected, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.104596 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: platform, value:None]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.123900 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: platform, value:]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.142886 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: platform, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.162543 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: platform, value:12345]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.182714 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: platform, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.202060 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: platform, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.221249 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: platform, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.240723 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: platform, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.259398 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: platform, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.278982 | test_vulnerability_detector/test_feeds/debian/test_invalid_values_debian_feed.py::test_invalid_values_debian_feed[DEBIAN_configuration-tag: platform, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Debian OVAL feed with wrong tag values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.298299 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_no_feed_changes[DEBIAN_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.316967 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: no_changes]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.336674 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: generator]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.355959 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: product_name]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.375194 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: schema_version]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.394629 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: timestamp]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.414471 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: definitions]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.434220 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: definition]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.453004 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: metadata]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.472431 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: title]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.491153 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: description]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.510076 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: affected]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.529429 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: platform]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.548844 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: product]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.567868 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: reference]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.587232 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: debian]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.606409 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: date]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.625523 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: criteria]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.644198 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: criterion]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.663867 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: tests]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.683103 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: textfilecontent54_test]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.702723 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: test_object_ref]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.721802 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: test_state_ref]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.741428 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: uname_test]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.760502 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: test_uname_object_ref]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.779966 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: dpkginfo_test]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.799173 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: objects]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.818269 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: textfilecontent54_object]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.837840 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: path]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.857400 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: filename]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.876691 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: instance]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.897113 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: uname_object]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.916266 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: dpkginfo_object]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.935486 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: states]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.954687 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: textfilecontent54_state]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.974118 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: subexpression]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:08.993741 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: dpkginfo_state]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.013255 | test_vulnerability_detector/test_feeds/debian/test_missing_tags_debian_feed.py::test_missing_canonical_feed[DEBIAN_configuration-missing: evr]::setup | Test to check vulnerability detector behavior when importing Debian feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.032285 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_no_feed_changes[MSU_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.052116 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.070625 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.089963 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.109307 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.128462 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.147728 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.166537 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.187254 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.206400 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.226000 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.245098 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: [1, 2, 3], value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.264130 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.284052 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.303242 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.321993 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.342033 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.361018 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.380083 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.398750 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.417818 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.438002 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.457124 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.476499 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.496407 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.516402 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.535789 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.555389 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.574497 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.593722 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.613223 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.632444 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.651694 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.671004 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: extra_tag, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.690842 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.710595 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.730451 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.750460 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.770331 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.789789 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.809264 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.828242 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.847673 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.866921 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.886259 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: 12345, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.905920 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.925336 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.944926 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.964373 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:09.983492 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.003241 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.022840 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.042656 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.062420 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.081537 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.100722 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \xf1, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.120911 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.140345 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.159767 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.178796 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.199145 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.217921 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.237577 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.256364 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.275780 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.295279 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.314574 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.333579 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.353032 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.372221 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.391603 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.411320 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.430724 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.450269 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.470747 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.491916 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.513467 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.535298 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.556446 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.576441 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.595591 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.615198 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.634738 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.654038 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.674409 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.694404 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.714275 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.734123 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.753676 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.772894 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.792589 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.813589 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.833460 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.853927 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.875224 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.896084 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.917135 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.937848 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.958594 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:10.979869 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.000293 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.020954 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.042542 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.063103 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.083754 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.104930 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.125965 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.147383 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.168103 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.188720 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.210341 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.231039 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.252383 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.273390 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.294884 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: 12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.315766 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.336692 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.357217 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.377637 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.398246 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.419195 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.440239 | test_vulnerability_detector/test_feeds/msu/test_extra_fields_msu_feed.py::test_extra_fields_msu_feed[MSU_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.461687 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_no_feed_changes[MSU_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.482963 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Delete '{']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.503805 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Delete '}']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.524126 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Add '{{']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.545366 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Add '}}']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.565778 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Add '{' in the middle of feed]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.586464 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Add '}' in the middle of feed]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.607037 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Add '{}' in the middle of feed]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.628098 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Delete key:value comma ',']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.648749 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Add a comma before value key: ,value,]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.669446 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Add comma before any key value ', key:value']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.688827 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Add a comma at the end of vulnerability ',}']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.708565 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Add double comma after key:value,,]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.728324 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Add double comma after list value,,]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.748902 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Close a key with double quotation marks]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.769117 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Close value with double quotation marks]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.789030 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace a comma with semicolon]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.808752 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace a colon with semicolon]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.828756 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Missing open bracket]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.849283 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Missing close bracket]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.870556 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Delete some information]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.892194 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '.']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.913850 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with ':']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.935410 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '@']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.956312 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '#']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.976087 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '*']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:11.995796 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '-']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.015794 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '_']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.035919 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with ''']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.056967 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '"']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.077143 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '/']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.097132 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '=']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.117865 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '\xf1']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.137655 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '\xe7']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.156595 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '+']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.175717 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '^']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.195622 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '!'0]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.215978 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '?'0]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.237445 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '%']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.256895 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '&']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.276957 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '`']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.296906 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '\xbf']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.316757 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '?'1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.335583 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '(']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.355653 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with ')']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.374838 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '|']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.394563 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '\xba']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.414426 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '$']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.433735 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '\xbd']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.452519 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '\xac']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.472819 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '!'1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.492553 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '~']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.514105 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '\xa1']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.534360 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '[']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.555961 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with ']']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.576900 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '{']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.596889 | test_vulnerability_detector/test_feeds/msu/test_invalid_syntax_msu_feed.py::test_invalid_syntax_msu_feed[MSU_configuration-Replace ',' with '}']::setup | Check if vulnerability detector behaves as expected when importing MSU feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.616921 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_no_feed_changes[MSU_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.636933 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: patch, value:None]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.656752 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: patch, value:]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.676539 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: patch, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.696151 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: patch, value:12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.715208 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: patch, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.734589 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: patch, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.753872 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: patch, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.773852 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: patch, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.793232 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: patch, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.812849 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: patch, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.832036 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: product, value:None]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.851256 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: product, value:]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.870334 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: product, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.890162 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: product, value:12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.909219 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: product, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.929218 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: product, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.949607 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: product, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.969614 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: product, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:12.989025 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: product, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.009248 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: product, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.029668 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: restart_required, value:None]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.050489 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: restart_required, value:]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.070024 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: restart_required, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.089910 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: restart_required, value:12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.109764 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: restart_required, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.128809 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: restart_required, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.148768 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: restart_required, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.167976 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: restart_required, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.187082 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: restart_required, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.206232 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: restart_required, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.225898 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: subtype, value:None]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.245925 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: subtype, value:]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.265173 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: subtype, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.284702 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: subtype, value:12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.304203 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: subtype, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.324040 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: subtype, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.342679 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: subtype, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.362415 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: subtype, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.382258 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: subtype, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.401273 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: subtype, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.420536 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: title, value:None]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.439743 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: title, value:]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.459200 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: title, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.478760 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: title, value:12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.498386 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: title, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.517451 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: title, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.536339 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: title, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.555627 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: title, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.575023 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: title, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.595291 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: title, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.614690 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: url, value:None]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.633827 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: url, value:]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.652967 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: url, value:dummy value]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.672201 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: url, value:12345]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.691240 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: url, value:['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.796110 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: url, value:\xf1]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.817850 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: url, value:\u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.837508 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: url, value:\u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.857180 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: url, value:\u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.876785 | test_vulnerability_detector/test_feeds/msu/test_invalid_values_msu_feed.py::test_invalid_values_msu_feed[MSU_configuration-field: url, value:\u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.896812 | test_vulnerability_detector/test_feeds/msu/test_missing_fields_msu_feed.py::test_no_feed_changes[MSU_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.916668 | test_vulnerability_detector/test_feeds/msu/test_missing_fields_msu_feed.py::test_invalid_msu_feed[MSU_configuration-missing: patch]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with missing fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.939732 | test_vulnerability_detector/test_feeds/msu/test_missing_fields_msu_feed.py::test_invalid_msu_feed[MSU_configuration-missing: product]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with missing fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.964326 | test_vulnerability_detector/test_feeds/msu/test_missing_fields_msu_feed.py::test_invalid_msu_feed[MSU_configuration-missing: restart_required]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with missing fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:13.984936 | test_vulnerability_detector/test_feeds/msu/test_missing_fields_msu_feed.py::test_invalid_msu_feed[MSU_configuration-missing: subtype]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with missing fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.004549 | test_vulnerability_detector/test_feeds/msu/test_missing_fields_msu_feed.py::test_invalid_msu_feed[MSU_configuration-missing: title]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with missing fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.023345 | test_vulnerability_detector/test_feeds/msu/test_missing_fields_msu_feed.py::test_invalid_msu_feed[MSU_configuration-missing: url]::setup | Check if vulnerability detector behaves as expected when importing MSU feed with missing fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.043223 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_no_feed_changes[REDHAT_configuration]::setup | Check if the feed is imported successfully by default | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.062414 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.081640 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.101583 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.120581 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.141418 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.161008 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.180144 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.201362 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.222590 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.242942 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.262494 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: [1, 2, 3], value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.281739 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.302004 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.322041 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.341808 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.361642 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.381472 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.400651 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.420916 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.441059 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.460662 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.480014 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: {'a': 1, 'b': 2}, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.499268 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.520309 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.540840 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.561486 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.581324 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.600687 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.619741 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.639336 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.658831 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.678728 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.697933 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: extra_tag, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.717219 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.737065 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.756919 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.777001 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.796764 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.815589 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.834926 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.854099 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.873805 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.893578 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.913249 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: 12345, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.933145 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.952984 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.972295 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:14.992018 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.011873 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.030677 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.050055 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.068796 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.088220 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.108411 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.127696 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \xf1, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.149644 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.168419 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.187514 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.206214 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.226669 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.246487 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.266019 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.285092 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.304450 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.323590 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.344295 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u30c6\u30b9\u30c8, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.363696 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.383816 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.403547 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.422851 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.442524 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.461693 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.480880 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.500051 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.518765 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.538246 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.557338 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.576697 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.595330 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.614902 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.634827 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.655069 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.675194 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.694853 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.714029 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.735417 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.756241 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.777443 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u6d4b\u8bd5, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.798987 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.820176 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.840833 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.862688 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.883572 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.904555 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.926249 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.947801 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.968383 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:15.988999 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.009829 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: \u0627\u062e\u062a\u0628\u0627\u0631, value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.031394 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.052232 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.073426 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.093935 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.115210 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.136224 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.157232 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.178124 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.199399 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.220082 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.241038 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.262815 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: [1, 2, 3]]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.284066 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: {'a': 1, 'b': 2}]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.304917 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: extra_tag]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.325860 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: 12345]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.347213 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.367796 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.388567 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.409683 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.430651 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.451744 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.472581 | test_vulnerability_detector/test_feeds/redhat/test_extra_fields_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-tag: , value: ]::setup | Check if vulnerability detector behaves as expected when importing Red Hat OVAL feed with extra fields | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.493510 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Delete '<']::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.516408 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Delete '>']::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.537312 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Delete '<>']::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.558254 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Close initial tag]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.578632 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Delete opening tag]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.598170 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Delete closing tag]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.618052 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Empty opening tag]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.638071 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Empty closing tag]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.657302 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Random text before tag]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.676915 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Delete info]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.696294 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add . character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.715405 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '.' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.735205 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add : character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.754655 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with ':' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.773575 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add @ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.792674 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '@' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.812293 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add # character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.832936 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '#' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.853685 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add * character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.875269 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '*' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.895643 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add - character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.915715 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '-' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.934671 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add _ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.953980 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '_' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.972899 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ' character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:16.992342 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with ''' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.012949 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add " character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.031865 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '"' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.051415 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add / character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.070382 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '/' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.090382 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add = character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.109489 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '=' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.128727 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add \xf1 character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.147902 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '\xf1' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.167555 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add \xe7 character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.188082 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '\xe7' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.209711 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add + character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.229235 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '+' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.248695 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ^ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.268359 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '^' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.287935 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ! character before <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.306914 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '!' in <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.326646 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ? character before <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.345763 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '?' in <metadata>0]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.364974 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add % character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.384912 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '%' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.405608 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add & character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.426239 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '&' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.446051 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ` character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.465103 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '`' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.484582 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add \xbf character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.503680 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '\xbf' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.524086 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ? character before <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.544025 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '?' in <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.563093 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ( character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.582956 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '(' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.603549 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ) character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.624081 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with ')' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.644768 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add | character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.664585 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '|' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.683789 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add \xba character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.702701 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '\xba' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.722337 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add $ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.742863 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '$' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.762958 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add \xbd character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.783113 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '\xbd' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.803209 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add \xac character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.824338 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '\xac' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.845231 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ! character before <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.866003 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '!' in <metadata>1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.887295 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ~ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.909745 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '~' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.931497 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add \xa1 character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.952083 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '\xa1' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.972671 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add [ character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:17.992090 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '[' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.012028 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add ] character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.031228 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with ']' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.050971 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add { character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.069990 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '{' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.089623 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Add } character before <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.109117 | test_vulnerability_detector/test_feeds/redhat/test_invalid_syntax_redhat_feed.py::test_extra_fields_redhat_feed[REDHAT_configuration-Replace '<' with '}' in <metadata>]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with syntax errors | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.129135 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definitions, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.149666 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definitions, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.168949 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definitions, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.188415 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definitions, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.208000 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definitions, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.227597 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definitions, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.247374 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definitions, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.267459 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definitions, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.287016 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definitions, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.306753 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definitions, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.326443 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definition, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.346198 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definition, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.366810 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definition, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.386178 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definition, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.405803 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definition, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.425210 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definition, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.444525 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definition, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.463887 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definition, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.483231 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definition, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.502404 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: definition, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.521562 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: metadata, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.540587 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: metadata, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.559328 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: metadata, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.579153 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: metadata, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.598397 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: metadata, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.618242 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: metadata, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.636917 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: metadata, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.656484 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: metadata, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.675929 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: metadata, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.695750 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: metadata, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.714898 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criteria, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.734597 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criteria, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.753897 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criteria, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.772866 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criteria, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.792027 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criteria, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.811365 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criteria, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.830608 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criteria, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.849740 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criteria, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.869019 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criteria, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.888084 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criteria, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.907125 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criterion, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.926811 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criterion, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.947426 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criterion, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.967998 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criterion, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:18.987286 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criterion, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.006700 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criterion, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.026733 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criterion, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.046424 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criterion, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.065887 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criterion, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.085059 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: criterion, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.103895 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: tests, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.123220 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: tests, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.142764 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: tests, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.161815 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: tests, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.181173 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: tests, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.203814 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: tests, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.223375 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: tests, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.242646 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: tests, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.263924 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: tests, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.283170 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: tests, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.303153 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_test, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.323650 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_test, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.344865 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_test, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.365185 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_test, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.384815 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_test, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.404018 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_test, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.423715 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_test, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.443166 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_test, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.462266 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_test, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.481771 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_test, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.501090 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: test_object, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.521963 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: test_object, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.542776 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: test_object, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.563024 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: test_object, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.584287 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: test_object, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.605838 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: test_object, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.626865 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: test_object, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.648013 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: test_object, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.667561 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: test_object, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.687428 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: test_object, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.706798 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_object, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.726416 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_object, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.746291 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_object, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.765414 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_object, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.784514 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_object, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.803605 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_object, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.822878 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_object, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.842128 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_object, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.861629 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_object, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.880903 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_object, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.900425 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: object_element, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.918815 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: object_element, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.938286 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: object_element, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.957838 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: object_element, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.976925 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: object_element, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:19.996322 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: object_element, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.015643 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: object_element, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.034837 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: object_element, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.054997 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: object_element, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.074252 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: object_element, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.093128 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_state, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.113044 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_state, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.133864 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_state, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.155161 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_state, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.176154 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_state, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.197094 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_state, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.217754 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_state, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.238505 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_state, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.258345 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_state, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.279713 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: rpminfo_state, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.301455 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: state_object, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.322939 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: state_object, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.343011 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: state_object, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.363364 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: state_object, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.383567 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: state_object, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.403040 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: state_object, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.422483 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: state_object, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.442017 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: state_object, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.461329 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: state_object, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.480421 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: state_object, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.499671 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: local_variable, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.518505 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: local_variable, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.537937 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: local_variable, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.556697 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: local_variable, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.576093 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: local_variable, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.594779 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: local_variable, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.614128 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: local_variable, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.634394 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: local_variable, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.653845 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: local_variable, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.672368 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: local_variable, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.691632 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: product_name, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.711439 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: product_name, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.731012 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: product_name, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.751176 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: product_name, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.769883 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: product_name, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.788685 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: product_name, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.807774 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: product_name, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.826697 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: product_name, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.845664 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: product_name, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.865290 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: product_name, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.884273 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: affected, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.903366 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: affected, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.922277 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: affected, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.940932 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: affected, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.960759 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: affected, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.980206 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: affected, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:20.999539 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: affected, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.018214 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: affected, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.037274 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: affected, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.056382 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: affected, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.075709 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: platform, value: None]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.094739 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: platform, value: ]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.114087 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: platform, value: dummy value]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.133286 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: platform, value: 12345]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.152457 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: platform, value: ['1', '2', '3', '4', '5']]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.171125 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: platform, value: \xf1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.190927 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: platform, value: \u30c6\u30b9\u30c8]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.209907 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: platform, value: \u0418\u0421\u041f\u042b\u0422\u0410\u041d\u0418\u0415]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.229033 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: platform, value: \u6d4b\u8bd5]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.248039 | test_vulnerability_detector/test_feeds/redhat/test_invalid_values_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-tag: platform, value: \u0627\u062e\u062a\u0628\u0627\u0631]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with wrong field values | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.266976 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: generator]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.286877 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: product_name]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.306205 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: product_version]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.325628 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: schema_version0]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.346506 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: schema_version1]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.365857 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: definitions]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.385147 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: definition]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.404217 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: metadata]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.423013 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: title]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.442449 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: description]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.461378 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: affected]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.480575 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: platform]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.499565 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: reference]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.518770 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: advisory]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.537797 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: severity]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.557419 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: criteria]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.576134 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: criterion]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.595510 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: tests]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.614575 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: rpminfo_test]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.634745 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: test_object]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.654126 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: objects]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.673091 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: rpminfo_object]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.691802 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: object_element]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.710935 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: states]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.730474 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: rpminfo_state]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.750652 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: state_object]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:21.769290 | test_vulnerability_detector/test_feeds/redhat/test_missing_fields_redhat_feed.py::test_invalid_redhat_feed[REDHAT_configuration-missing: variables]::setup | Check if vulnerability detector behaves as expected when importing redhat OVAL feed with missing tags | 0.02 | 2 | ||
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 2') | |||||||
Skipped | 2021-11-15 16:26:22.869215 | test_vulnerability_detector/test_general_settings/test_general_settings_enabled.py::test_enabled[config_enabled-expecting_vuldet_disabled] | description: Checks if the `enabled ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that the. Vulnerability Detector is enabled or disabled. | 0.00 | server | 0 | |
('/usr/local/lib/python3.6/site-packages/wazuh_testing-4.3.0-py3.6.egg/wazuh_testing/tools/configuration.py', 515, 'Skipped: Does not apply to this config file') | |||||||
Skipped | 2021-11-15 16:26:23.537640 | test_vulnerability_detector/test_general_settings/test_general_settings_enabled.py::test_enabled[config_disabled-expecting_vuldet_enabled] | description: Checks if the `enabled ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that the. Vulnerability Detector is enabled or disabled. | 0.00 | server | 0 | |
('/usr/local/lib/python3.6/site-packages/wazuh_testing-4.3.0-py3.6.egg/wazuh_testing/tools/configuration.py', 515, 'Skipped: Does not apply to this config file') -----------------------------Captured stdout setup------------------------------ 2021-11-15T16:26:22.1636993582 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:26:23 wazuh-modulesd[181858] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:26:23 wazuh-modulesd[181858] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:26:23 wazuh-modulesd[181858] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:26:23 wazuh-modulesd[181858] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf | |||||||
Skipped | 2021-11-15 16:34:08.504262 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[yes-alas0]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:34:08.505052 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[yes-alas1]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:34:08.505732 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[yes-canonical]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:34:08.506365 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[yes-debian]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:34:08.507125 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[yes-redhat]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:34:08.507819 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[yes-nvd]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:34:08.508483 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[yes-msu]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:34:08.509122 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[yes-arch]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:34:08.509747 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[no-alas0]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:34:08.510377 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[no-alas1]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:34:08.511076 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[no-canonical]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:34:08.511724 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[no-debian]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:34:08.512332 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[no-redhat]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:34:08.512929 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[no-nvd]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:34:08.513546 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[no-msu]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:34:08.514163 | test_vulnerability_detector/test_providers/test_providers_enabled.py::test_enabled[no-arch]::setup | Check if modulesd downloads the feeds from different providers when enabled is set to yes. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_enabled.py', 73, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.529801 | test_vulnerability_detector/test_providers/test_providers_no_os.py::test_providers_no_os[alas]::setup | Check if modulesd downloads the feeds without specifing the os version. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_no_os.py', 57, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.530680 | test_vulnerability_detector/test_providers/test_providers_no_os.py::test_providers_no_os[canonical]::setup | Check if modulesd downloads the feeds without specifing the os version. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_no_os.py', 57, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.531352 | test_vulnerability_detector/test_providers/test_providers_no_os.py::test_providers_no_os[debian]::setup | Check if modulesd downloads the feeds without specifing the os version. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_no_os.py', 57, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.532000 | test_vulnerability_detector/test_providers/test_providers_no_os.py::test_providers_no_os[redhat]::setup | Check if modulesd downloads the feeds without specifing the os version. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_no_os.py', 57, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.532633 | test_vulnerability_detector/test_providers/test_providers_no_os.py::test_providers_no_os[nvd]::setup | Check if modulesd downloads the feeds without specifing the os version. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_no_os.py', 57, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.533383 | test_vulnerability_detector/test_providers/test_providers_no_os.py::test_providers_no_os[msu]::setup | Check if modulesd downloads the feeds without specifing the os version. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_no_os.py', 57, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.534026 | test_vulnerability_detector/test_providers/test_providers_no_os.py::test_providers_no_os[arch]::setup | Check if modulesd downloads the feeds without specifing the os version. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_no_os.py', 57, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.534779 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[alas-amazon-linux]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.535388 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[alas-amazon-linux-2]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.535996 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[canonical-trusty]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.536617 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[canonical-xenial]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.537325 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[canonical-bionic]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.537993 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[debian-stretch]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.538633 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[debian-buster]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.539272 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[redhat-5]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.539900 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[redhat-6]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.540511 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[redhat-7]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.541211 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[redhat-8]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.541925 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[nvd-]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.542551 | test_vulnerability_detector/test_providers/test_providers_os.py::test_providers[msu-]::setup | Check if modulesd downloads the feeds for each os. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_os.py', 68, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.543293 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[redhat_1998]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.543900 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[redhat_2001]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.544453 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[redhat_2002]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.545117 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[redhat_2005]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.545702 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[redhat_2010]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.546648 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[redhat_2015]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.547228 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[redhat_2020]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.547788 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[nvd_1998]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.548428 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[nvd_2001]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.549044 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[nvd_2002]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.549624 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[nvd_2005]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.550179 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[nvd_2010]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.550754 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[nvd_2015]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.551317 | test_vulnerability_detector/test_providers/test_providers_update_from_year.py::test_update_from_year[nvd_2020]::setup | Check if vulnerability detector download feeds from the correct year based on `update_from_year` option | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/test_providers_update_from_year.py', 54, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:36:53.561469 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Amazon_60s]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.570441 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Redhat_{item}0]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.579159 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Canonical_60s]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.587837 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Debian_60s]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.596511 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[NVD_60s]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.605098 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[MSU_60s]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.613923 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Arch_60s]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.622766 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Amazon_60m]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.631514 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Redhat_{item}1]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.640160 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Canonical_60m]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.648913 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Debian_60m]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.658347 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[NVD_60m]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.667107 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[MSU_60m]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.675851 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Arch_60m]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.684762 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Amazon_1h]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.693544 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Redhat_{item}2]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.702330 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Canonical_1h]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.711296 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Debian_1h]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.720066 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[NVD_1h]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.728781 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[MSU_1h]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.737513 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Arch_1h]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.746250 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Amazon_1d]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.755152 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Redhat_{item}3]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.764095 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Canonical_1d]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.772949 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Debian_1d]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.781874 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[NVD_1d]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.790609 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[MSU_1d]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.799302 | test_vulnerability_detector/test_providers/test_providers_update_interval.py::test_update_interval[Arch_1d]::setup | Check if the provider database update is triggered after the set interval time has passed. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.808651 | test_vulnerability_detector/test_scan_results/test_alas_inventory_alas_feed.py::test_amazon_linux_vulnerabilities_report[alas_feed-amazonlinux]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:36:53.817561 | test_vulnerability_detector/test_scan_results/test_alas_inventory_alas_feed.py::test_amazon_linux_vulnerabilities_report[alas_feed-amazonlinux2]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:37:28.513287 | test_vulnerability_detector/test_scan_results/test_archlinux_inventory_archlinux_feed.py::test_arch_linux_vulnerabilities_report[arch_feed-AVG-1794]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:37:28.522984 | test_vulnerability_detector/test_scan_results/test_archlinux_inventory_archlinux_feed.py::test_arch_linux_vulnerabilities_report[arch_feed-AVG-1643]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.01 | server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/conftest.py', 70, 'Skipped: test requires tier level 1') | |||||||
Skipped | 2021-11-15 16:37:28.524209 | test_vulnerability_detector/test_scan_results/test_debian_inventory_debian_feed.py::test_debian_vulnerabilities_report[debian_scan_configuration-BUSTER]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_debian_inventory_debian_feed.py', 78, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.524923 | test_vulnerability_detector/test_scan_results/test_debian_inventory_debian_feed.py::test_debian_vulnerabilities_report[debian_scan_configuration-STRETCH]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_debian_inventory_debian_feed.py', 78, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.525821 | test_vulnerability_detector/test_scan_results/test_macos_inventory.py::test_macos_vulnerabilities_report[macos_scan_configuration-MAC0]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_macos_inventory.py', 80, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.526484 | test_vulnerability_detector/test_scan_results/test_macos_inventory.py::test_macos_vulnerabilities_report[macos_scan_configuration-MAC1]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_macos_inventory.py', 80, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.527229 | test_vulnerability_detector/test_scan_results/test_msu_inventory_msu_feed.py::test_vulnerabilities_report[msu_scan_configuration-WINDOWS10]::setup | Check if a missing patch triggers a vulnerability(only windows). | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_msu_inventory_msu_feed.py', 126, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.527855 | test_vulnerability_detector/test_scan_results/test_msu_inventory_msu_feed.py::test_vulnerabilities_report[msu_scan_configuration-WINDOWS_SERVER_2016]::setup | Check if a missing patch triggers a vulnerability(only windows). | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_msu_inventory_msu_feed.py', 126, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.528459 | test_vulnerability_detector/test_scan_results/test_msu_inventory_msu_feed.py::test_vulnerabilities_report[msu_scan_configuration-WINDOWS_SERVER_2019]::setup | Check if a missing patch triggers a vulnerability(only windows). | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_msu_inventory_msu_feed.py', 126, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.529151 | test_vulnerability_detector/test_scan_results/test_redhat_duplicate_vulns.py::test_redhat_duplicate_vulns[RedHat_6_feed]::setup | RedHat provider was duplicating vulnerabilities when it downloaded a feed to update the database.. This test check the vulnerabilities are not repeated in the database when it is update. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_redhat_duplicate_vulns.py', 48, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.529872 | test_vulnerability_detector/test_scan_results/test_redhat_duplicate_vulns.py::test_redhat_duplicate_vulns[RedHat_7_feed]::setup | RedHat provider was duplicating vulnerabilities when it downloaded a feed to update the database.. This test check the vulnerabilities are not repeated in the database when it is update. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_redhat_duplicate_vulns.py', 48, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.530473 | test_vulnerability_detector/test_scan_results/test_redhat_duplicate_vulns.py::test_redhat_duplicate_vulns[RedHat_8_feed]::setup | RedHat provider was duplicating vulnerabilities when it downloaded a feed to update the database.. This test check the vulnerabilities are not repeated in the database when it is update. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_redhat_duplicate_vulns.py', 48, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.531214 | test_vulnerability_detector/test_scan_results/test_redhat_inventory_redhat_feed.py::test_redhat_vulnerabilities_report[redhat_scan_configuration-RHEL8]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_redhat_inventory_redhat_feed.py', 78, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.531898 | test_vulnerability_detector/test_scan_results/test_redhat_inventory_redhat_feed.py::test_redhat_vulnerabilities_report[redhat_scan_configuration-RHEL7]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_redhat_inventory_redhat_feed.py', 78, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.532848 | test_vulnerability_detector/test_scan_results/test_redhat_inventory_redhat_feed.py::test_redhat_vulnerabilities_report[redhat_scan_configuration-RHEL6]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_redhat_inventory_redhat_feed.py', 78, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.533593 | test_vulnerability_detector/test_scan_results/test_redhat_inventory_redhat_feed.py::test_redhat_vulnerabilities_report[redhat_scan_configuration-RHEL5]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_redhat_inventory_redhat_feed.py', 78, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.534367 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-Amazon-Linux]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.535067 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-Amazon-Linux-2]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.536086 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-RHEL8]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.536990 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-RHEL7]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.537672 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-RHEL6]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.538401 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-RHEL5]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.539039 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-BIONIC]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.539683 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-XENIAL]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.540329 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-TRUSTY]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.540955 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-BUSTER]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.541610 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-STRETCH]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.542478 | test_vulnerability_detector/test_scan_results/test_scan_different_cves.py::test_vulnerabilities_report[test_different_cves-ARCH]::setup | This test checks what happens if a vulnerability is being reported by NVD. and not by the OS provider or vice-versa. | 0.00 | skip, server | 1 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_different_cves.py', 98, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.543269 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-WINDOWS10]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.543894 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-MAC0]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.544538 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-MAC1]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.545140 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-MAC2]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.545729 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-ARCH]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.546410 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-Amazon-Linux]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.547024 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-Amazon-Linux-2]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.547626 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-RHEL8]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.548226 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-RHEL7]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.548842 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-RHEL6]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.549461 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-RHEL5]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.550142 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-BIONIC]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.550773 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-XENIAL]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.551376 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-TRUSTY]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.551965 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-BUSTER]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.552845 | test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-STRETCH]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_nvd_feed.py', 106, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.553578 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-Amazon-Linux]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.554297 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-Amazon-Linux-2]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.554918 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-RHEL8]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.555516 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-RHEL7]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.556139 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-RHEL6]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.556731 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-RHEL5]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.557318 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-BIONIC]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.558014 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-XENIAL]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.558615 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-TRUSTY]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.559189 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-BUSTER]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.559766 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-STRETCH]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.560376 | test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py::test_vulnerabilities_report[scan_nvd_configuration-ARCH]::setup | Check if inserted vulnerable packages are reported by vulnerability detector | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_providers_and_nvd_feed.py', 92, 'Skipped: It will be blocked by #1602, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.561155 | test_vulnerability_detector/test_scan_results/test_ubuntu_inventory_canonical_feed.py::test_ubuntu_vulnerabilities_report[ubuntu_scan_configuration-FOCAL]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_ubuntu_inventory_canonical_feed.py', 77, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.561795 | test_vulnerability_detector/test_scan_results/test_ubuntu_inventory_canonical_feed.py::test_ubuntu_vulnerabilities_report[ubuntu_scan_configuration-BIONIC]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_ubuntu_inventory_canonical_feed.py', 77, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.562394 | test_vulnerability_detector/test_scan_results/test_ubuntu_inventory_canonical_feed.py::test_ubuntu_vulnerabilities_report[ubuntu_scan_configuration-XENIAL]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_ubuntu_inventory_canonical_feed.py', 77, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:37:28.562973 | test_vulnerability_detector/test_scan_results/test_ubuntu_inventory_canonical_feed.py::test_ubuntu_vulnerabilities_report[ubuntu_scan_configuration-TRUSTY]::setup | Check if inserted vulnerable packages are reported by vulnerability detector. | 0.00 | skip, server | 0 | |
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_ubuntu_inventory_canonical_feed.py', 77, 'Skipped: It will be blocked by wazuh#9309, when it was solve we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.504150 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2013]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.504979 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2013_R2]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.505590 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_XP]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.506349 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_VISTA]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.506929 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_7]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.507490 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_8]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.508040 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_8.1]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.508624 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_10]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.509306 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2008]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.509861 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2008_R2]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.510418 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2012]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.510975 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2012_R2]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.511531 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2016]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.512084 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2019]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.512750 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2013_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.513320 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2013_R2_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.514190 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_XP_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.514800 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_VISTA_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.515424 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_7_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.515971 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_8_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.516627 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_8.1_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.517212 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_10_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.517765 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2008_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.518330 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2008_R2_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.518890 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2012_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.519509 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2012_R2_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.520093 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2016_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Skipped | 2021-11-15 16:40:55.520659 | test_vulnerability_detector/test_windows/test_cpe_indexing.py::test_window_version_indexing[cpe_index_configuration-WINDOWS_SERVER_2019_I386]::setup | 0.00 | skip | 1 | ||
('/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_windows/test_cpe_indexing.py', 113, 'Skipped: It will be blocked by wazuh/wazuh#9309, when it is solved we can enable again this test') | |||||||
Passed | 2021-11-15 16:26:22.830581 | test_vulnerability_detector/test_general_settings/test_general_settings_enabled.py::test_enabled[config_enabled-expecting_vuldet_enabled] | description: Checks if the `enabled ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that the. Vulnerability Detector is enabled or disabled. | 1.01 | server | 0 | |
-----------------------------Captured stderr setup------------------------------ 2021/11/15 16:26:21 wazuh-modulesd[181812] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:26:21 wazuh-modulesd[181812] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:26:21 wazuh-modulesd[181812] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:26:21 wazuh-modulesd[181812] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf | |||||||
Passed | 2021-11-15 16:26:24.071149 | test_vulnerability_detector/test_general_settings/test_general_settings_enabled.py::test_enabled[config_disabled-expecting_vuldet_disabled] | description: Checks if the `enabled ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that the. Vulnerability Detector is enabled or disabled. | 0.50 | server | 0 | |
No log output captured. | |||||||
Passed | 2021-11-15 16:26:25.563537 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[1s] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 1.00 | server | 0 | |
-----------------------------Captured stderr setup------------------------------ 2021/11/15 16:26:24 wazuh-modulesd[181900] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:26:24 wazuh-modulesd[181900] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:26:24 wazuh-modulesd[181900] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:26:24 wazuh-modulesd[181900] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:26:24 wazuh-modulesd[181900] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-15 16:26:27.542900 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[1m] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 1.01 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:26:25.1636993585 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:26:26 wazuh-modulesd[181931] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:26:26 wazuh-modulesd[181931] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:26:26 wazuh-modulesd[181931] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:26:26 wazuh-modulesd[181931] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:26:26 wazuh-modulesd[181931] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-15 16:26:29.542317 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[1h] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 1.01 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:26:27.1636993587 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:26:28 wazuh-modulesd[181962] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:26:28 wazuh-modulesd[181962] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:26:28 wazuh-modulesd[181962] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:26:28 wazuh-modulesd[181962] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:26:28 wazuh-modulesd[181962] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-15 16:26:31.037155 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[1d] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 0.51 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:26:29.1636993589 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:26:30 wazuh-modulesd[181993] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:26:30 wazuh-modulesd[181993] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:26:30 wazuh-modulesd[181993] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:26:30 wazuh-modulesd[181993] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:26:30 wazuh-modulesd[181993] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-15 16:26:32.527608 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[2s] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 1.00 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:26:31.1636993591 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:26:31 wazuh-modulesd[182024] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:26:31 wazuh-modulesd[182024] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:26:31 wazuh-modulesd[182024] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:26:31 wazuh-modulesd[182024] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:26:31 wazuh-modulesd[182024] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-15 16:26:34.529636 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[2m] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 1.00 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:26:32.1636993592 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:26:33 wazuh-modulesd[182055] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:26:33 wazuh-modulesd[182055] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:26:33 wazuh-modulesd[182055] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:26:33 wazuh-modulesd[182055] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:26:33 wazuh-modulesd[182055] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-15 16:26:36.531073 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[2h] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 1.00 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:26:34.1636993594 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:26:35 wazuh-modulesd[182086] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:26:35 wazuh-modulesd[182086] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:26:35 wazuh-modulesd[182086] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:26:35 wazuh-modulesd[182086] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:26:35 wazuh-modulesd[182086] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-15 16:26:38.529517 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[2d] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 1.00 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:26:36.1636993596 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:26:37 wazuh-modulesd[182117] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:26:37 wazuh-modulesd[182117] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:26:37 wazuh-modulesd[182117] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:26:37 wazuh-modulesd[182117] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:26:37 wazuh-modulesd[182117] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-15 16:26:40.560856 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[5s] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 1.03 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:26:38.1636993598 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:26:39 wazuh-modulesd[182148] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:26:39 wazuh-modulesd[182148] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:26:39 wazuh-modulesd[182148] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:26:39 wazuh-modulesd[182148] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:26:39 wazuh-modulesd[182148] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-15 16:26:42.535571 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[5m] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 1.01 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:26:40.1636993600 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:26:41 wazuh-modulesd[182187] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:26:41 wazuh-modulesd[182187] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:26:41 wazuh-modulesd[182187] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:26:41 wazuh-modulesd[182187] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:26:41 wazuh-modulesd[182187] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-15 16:26:44.540185 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[5h] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 1.01 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:26:42.1636993602 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:26:43 wazuh-modulesd[182218] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:26:43 wazuh-modulesd[182218] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:26:43 wazuh-modulesd[182218] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:26:43 wazuh-modulesd[182218] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:26:43 wazuh-modulesd[182218] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-15 16:26:46.544522 | test_vulnerability_detector/test_general_settings/test_general_settings_interval.py::test_interval[5d] | description: Checks if the `interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that. Vulnerability Detector will sleep N seconds until the next scan. | 1.01 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:26:44.1636993604 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:26:45 wazuh-modulesd[182249] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:26:45 wazuh-modulesd[182249] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:26:45 wazuh-modulesd[182249] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:26:45 wazuh-modulesd[182249] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:26:45 wazuh-modulesd[182249] wmodules-vuln-detector.c:458 at Read_Vuln(): WARNING: The <ignore_time> tag at module 'vulnerability-detector' is deprecated for version newer than 4.3. | |||||||
Passed | 2021-11-15 16:29:52.510389 | test_vulnerability_detector/test_general_settings/test_general_settings_min_full_scan_interval.py::test_min_full_scan_interval[120s] | description: Checks if the `min_full_scan_interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that a baseline scan occurred. After this, it. time travels to the future and waits for the a full scan start log to occur in the expected time. | 61.60 | server | 0 | |
-----------------------------Captured stderr setup------------------------------ 2021/11/15 16:26:47 wazuh-modulesd[182280] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:26:47 wazuh-modulesd[182280] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:26:47 wazuh-modulesd[182280] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:26:47 wazuh-modulesd[182280] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:26:47 wazuh-modulesd[182280] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/15 16:26:47 wazuh-modulesd[182280] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/15 16:26:47 wazuh-modulesd[182280] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s ------------------------------Captured stdout call------------------------------ 2021-11-15T16:28:10.1636993690 2021-11-15T16:29:51.1636993791 ------------------------------Captured stderr call------------------------------ 2021-11-15 16:28:10,500 - wazuh_testing - DEBUG - Changing the system clock from 2021-11-15 16:27:10.046124 to 2021-11-15 16:28:10.500805 2021-11-15 16:28:50,561 - wazuh_testing - ERROR - No full scan start detected in log. 2021-11-15 16:28:50,561 - wazuh_testing - ERROR - Results accumulated: 0 2021-11-15 16:28:50,561 - wazuh_testing - ERROR - Results expected: 1 2021-11-15 16:29:51,500 - wazuh_testing - DEBUG - Changing the system clock from 2021-11-15 16:28:51.062816 to 2021-11-15 16:29:51.500779 -------------------------------Captured log call-------------------------------- [35mDEBUG [0m wazuh_testing:test_general_settings_min_full_scan_interval.py:185 Changing the system clock from 2021-11-15 16:27:10.046124 to 2021-11-15 16:28:10.500805 [1m[31mERROR [0m wazuh_testing:monitoring.py:461 No full scan start detected in log. [1m[31mERROR [0m wazuh_testing:monitoring.py:462 Results accumulated: 0 [1m[31mERROR [0m wazuh_testing:monitoring.py:464 Results expected: 1 [35mDEBUG [0m wazuh_testing:test_general_settings_min_full_scan_interval.py:200 Changing the system clock from 2021-11-15 16:28:51.062816 to 2021-11-15 16:29:51.500779 | |||||||
Passed | 2021-11-15 18:28:48.509728 | test_vulnerability_detector/test_general_settings/test_general_settings_min_full_scan_interval.py::test_min_full_scan_interval[120m] | description: Checks if the `min_full_scan_interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that a baseline scan occurred. After this, it. time travels to the future and waits for the a full scan start log to occur in the expected time. | 44.07 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:28:04.1636993684 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:28:04 wazuh-modulesd[182343] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:28:04 wazuh-modulesd[182343] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:28:04 wazuh-modulesd[182343] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:28:04 wazuh-modulesd[182343] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:28:04 wazuh-modulesd[182343] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/15 16:28:04 wazuh-modulesd[182343] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/15 16:28:04 wazuh-modulesd[182343] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s ------------------------------Captured stdout call------------------------------ 2021-11-15T17:28:06.1636997286 2021-11-15T18:28:47.1637000927 ------------------------------Captured stderr call------------------------------ 2021-11-15 17:28:06,500 - wazuh_testing - DEBUG - Changing the system clock from 2021-11-15 16:28:06.037489 to 2021-11-15 17:28:06.500597 2021-11-15 17:28:46,574 - wazuh_testing - ERROR - No full scan start detected in log. 2021-11-15 17:28:46,574 - wazuh_testing - ERROR - Results accumulated: 0 2021-11-15 17:28:46,574 - wazuh_testing - ERROR - Results expected: 1 2021-11-15 18:28:47,501 - wazuh_testing - DEBUG - Changing the system clock from 2021-11-15 17:28:47.075108 to 2021-11-15 18:28:47.501094 -------------------------------Captured log call-------------------------------- [35mDEBUG [0m wazuh_testing:test_general_settings_min_full_scan_interval.py:185 Changing the system clock from 2021-11-15 16:28:06.037489 to 2021-11-15 17:28:06.500597 [1m[31mERROR [0m wazuh_testing:monitoring.py:461 No full scan start detected in log. [1m[31mERROR [0m wazuh_testing:monitoring.py:462 Results accumulated: 0 [1m[31mERROR [0m wazuh_testing:monitoring.py:464 Results expected: 1 [35mDEBUG [0m wazuh_testing:test_general_settings_min_full_scan_interval.py:200 Changing the system clock from 2021-11-15 17:28:47.075108 to 2021-11-15 18:28:47.501094 | |||||||
Passed | 2021-11-20 16:29:44.516941 | test_vulnerability_detector/test_general_settings/test_general_settings_min_full_scan_interval.py::test_min_full_scan_interval[120h] | description: Checks if the `min_full_scan_interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that a baseline scan occurred. After this, it. time travels to the future and waits for the a full scan start log to occur in the expected time. | 44.07 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:28:59.1636993739 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:29:00 wazuh-modulesd[182398] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:29:00 wazuh-modulesd[182398] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:29:00 wazuh-modulesd[182398] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:29:00 wazuh-modulesd[182398] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:29:00 wazuh-modulesd[182398] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/15 16:29:00 wazuh-modulesd[182398] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/15 16:29:00 wazuh-modulesd[182398] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s ------------------------------Captured stdout call------------------------------ 2021-11-18T04:29:02.1637209742 2021-11-20T16:29:43.1637425783 ------------------------------Captured stderr call------------------------------ 2021-11-18 04:29:02,503 - wazuh_testing - DEBUG - Changing the system clock from 2021-11-15 16:29:02.060448 to 2021-11-18 04:29:02.503366 2021-11-18 04:29:42,570 - wazuh_testing - ERROR - No full scan start detected in log. 2021-11-18 04:29:42,570 - wazuh_testing - ERROR - Results accumulated: 0 2021-11-18 04:29:42,570 - wazuh_testing - ERROR - Results expected: 1 2021-11-20 16:29:43,500 - wazuh_testing - DEBUG - Changing the system clock from 2021-11-18 04:29:43.071403 to 2021-11-20 16:29:43.500531 -------------------------------Captured log call-------------------------------- [35mDEBUG [0m wazuh_testing:test_general_settings_min_full_scan_interval.py:185 Changing the system clock from 2021-11-15 16:29:02.060448 to 2021-11-18 04:29:02.503366 [1m[31mERROR [0m wazuh_testing:monitoring.py:461 No full scan start detected in log. [1m[31mERROR [0m wazuh_testing:monitoring.py:462 Results accumulated: 0 [1m[31mERROR [0m wazuh_testing:monitoring.py:464 Results expected: 1 [35mDEBUG [0m wazuh_testing:test_general_settings_min_full_scan_interval.py:200 Changing the system clock from 2021-11-18 04:29:43.071403 to 2021-11-20 16:29:43.500531 | |||||||
Passed | 2022-03-15 16:30:40.017089 | test_vulnerability_detector/test_general_settings/test_general_settings_min_full_scan_interval.py::test_min_full_scan_interval[120d] | description: Checks if the `min_full_scan_interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that a baseline scan occurred. After this, it. time travels to the future and waits for the a full scan start log to occur in the expected time. | 43.57 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:29:55.1636993795 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:29:56 wazuh-modulesd[182451] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:29:56 wazuh-modulesd[182451] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:29:56 wazuh-modulesd[182451] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:29:56 wazuh-modulesd[182451] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:29:56 wazuh-modulesd[182451] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/15 16:29:56 wazuh-modulesd[182451] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/15 16:29:56 wazuh-modulesd[182451] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s ------------------------------Captured stdout call------------------------------ 2022-01-14T16:29:58.1642177798 2022-03-15T16:30:38.1647361838 ------------------------------Captured stderr call------------------------------ 2022-01-14 16:29:58,500 - wazuh_testing - DEBUG - Changing the system clock from 2021-11-15 16:29:58.034706 to 2022-01-14 16:29:58.500819 2022-01-14 16:30:38,553 - wazuh_testing - ERROR - No full scan start detected in log. 2022-01-14 16:30:38,553 - wazuh_testing - ERROR - Results accumulated: 0 2022-01-14 16:30:38,553 - wazuh_testing - ERROR - Results expected: 1 2022-03-15 16:30:39,505 - wazuh_testing - DEBUG - Changing the system clock from 2022-01-14 16:30:38.557690 to 2022-03-15 16:30:39.505652 -------------------------------Captured log call-------------------------------- [35mDEBUG [0m wazuh_testing:test_general_settings_min_full_scan_interval.py:185 Changing the system clock from 2021-11-15 16:29:58.034706 to 2022-01-14 16:29:58.500819 [1m[31mERROR [0m wazuh_testing:monitoring.py:461 No full scan start detected in log. [1m[31mERROR [0m wazuh_testing:monitoring.py:462 Results accumulated: 0 [1m[31mERROR [0m wazuh_testing:monitoring.py:464 Results expected: 1 [35mDEBUG [0m wazuh_testing:test_general_settings_min_full_scan_interval.py:200 Changing the system clock from 2022-01-14 16:30:38.557690 to 2022-03-15 16:30:39.505652 | |||||||
Passed | 2021-11-15 16:31:22.280042 | test_vulnerability_detector/test_general_settings/test_general_settings_retry_interval.py::test_retry_interval[25s] | description: Checks if the `retry_interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that Vulnerability Detector will sleep before. attempting to scan the pending agents. After that, waits for the log saying that the agent will be. scanned again. And the time between both events is compared.. wazuh_min_version: 4.3 | 25.56 | server | 0 | |
-----------------------------Captured stderr setup------------------------------ 2021/11/15 16:30:56 wazuh-modulesd[182529] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:30:56 wazuh-modulesd[182529] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:30:56 wazuh-modulesd[182529] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:30:56 wazuh-modulesd[182529] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:30:56 wazuh-modulesd[182529] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/15 16:30:56 wazuh-modulesd[182529] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/15 16:30:56 wazuh-modulesd[182529] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s | |||||||
Passed | 2021-11-15 16:32:05.099858 | test_vulnerability_detector/test_general_settings/test_general_settings_retry_interval.py::test_retry_interval[30s] | description: Checks if the `retry_interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that Vulnerability Detector will sleep before. attempting to scan the pending agents. After that, waits for the log saying that the agent will be. scanned again. And the time between both events is compared.. wazuh_min_version: 4.3 | 30.57 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:31:33.1636993893 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:31:34 wazuh-modulesd[182570] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:31:34 wazuh-modulesd[182570] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:31:34 wazuh-modulesd[182570] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:31:34 wazuh-modulesd[182570] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:31:34 wazuh-modulesd[182570] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/15 16:31:34 wazuh-modulesd[182570] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/15 16:31:34 wazuh-modulesd[182570] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s | |||||||
Passed | 2021-11-15 16:32:53.094789 | test_vulnerability_detector/test_general_settings/test_general_settings_retry_interval.py::test_retry_interval[35s] | description: Checks if the `retry_interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that Vulnerability Detector will sleep before. attempting to scan the pending agents. After that, waits for the log saying that the agent will be. scanned again. And the time between both events is compared.. wazuh_min_version: 4.3 | 35.57 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:32:16.1636993936 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:32:17 wazuh-modulesd[182610] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:32:17 wazuh-modulesd[182610] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:32:17 wazuh-modulesd[182610] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:32:17 wazuh-modulesd[182610] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:32:17 wazuh-modulesd[182610] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/15 16:32:17 wazuh-modulesd[182610] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/15 16:32:17 wazuh-modulesd[182610] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s | |||||||
Passed | 2021-11-15 16:33:07.033915 | test_vulnerability_detector/test_general_settings/test_general_settings_run_on_start.py::test_run_on_start[run_on_start_yes] | description: Checks if the `run_on_start ` option is working correctly. To do this, when the option is enabled. it restarts Vulnerability Detector and checks the `ossec.log` file for the message indicating that. a scan starts; and, when the option is disabled, it restarts Vulnerability Detector and checks in the. 'ossec.log' that the scan doesn't start. | 1.51 | server | 0 | |
-----------------------------Captured stderr setup------------------------------ 2021/11/15 16:33:05 wazuh-modulesd[182650] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:33:05 wazuh-modulesd[182650] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:33:05 wazuh-modulesd[182650] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:33:05 wazuh-modulesd[182650] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:33:05 wazuh-modulesd[182650] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s | |||||||
Passed | 2021-11-15 16:34:07.614737 | test_vulnerability_detector/test_general_settings/test_general_settings_run_on_start.py::test_run_on_start[run_on_start_no] | description: Checks if the `run_on_start ` option is working correctly. To do this, when the option is enabled. it restarts Vulnerability Detector and checks the `ossec.log` file for the message indicating that. a scan starts; and, when the option is disabled, it restarts Vulnerability Detector and checks in the. 'ossec.log' that the scan doesn't start. | 60.10 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:33:07.1636993987 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:33:07 wazuh-modulesd[182682] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:33:07 wazuh-modulesd[182682] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:33:07 wazuh-modulesd[182682] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:33:07 wazuh-modulesd[182682] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:33:07 wazuh-modulesd[182682] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s | |||||||
Passed | 2021-11-15 16:34:15.510243 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_redhat_default] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 6.95 | server | 0 | |
-----------------------------Captured stderr setup------------------------------ 2021/11/15 16:34:08 wazuh-modulesd[182722] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:34:08 wazuh-modulesd[182722] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:34:08 wazuh-modulesd[182722] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:34:08 wazuh-modulesd[182722] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:34:08 wazuh-modulesd[182722] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s | |||||||
Passed | 2021-11-15 16:34:18.085083 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_redhat_path] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 1.56 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:34:15.1636994055 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:34:16 wazuh-modulesd[182757] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:34:16 wazuh-modulesd[182757] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:34:16 wazuh-modulesd[182757] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:34:16 wazuh-modulesd[182757] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:34:16 wazuh-modulesd[182757] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/15 16:34:16 wazuh-modulesd[182757] wmodules-vuln-detector.c:503 at wm_vuldet_enable_rhel_json_feed(): WARNING: (5587): Feed conflict. Only 'redhat' will be updated offline. | |||||||
Passed | 2021-11-15 16:34:30.456860 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_redhat_multipath] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 11.94 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:34:18.1636994058 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:34:18 wazuh-modulesd[182791] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:34:18 wazuh-modulesd[182791] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:34:18 wazuh-modulesd[182791] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:34:18 wazuh-modulesd[182791] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:34:18 wazuh-modulesd[182791] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s 2021/11/15 16:34:18 wazuh-modulesd[182791] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/15 16:34:18 wazuh-modulesd[182791] wmodules-vuln-detector.c:499 at wm_vuldet_enable_rhel_json_feed(): WARNING: (5587): Feed conflict. Only 'jredhat' will be updated offline. | |||||||
Passed | 2021-11-15 16:34:32.572029 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_redhat_path_multipath] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 2.05 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:34:30.1636994070 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:34:30 wazuh-modulesd[182826] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:34:30 wazuh-modulesd[182826] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:34:30 wazuh-modulesd[182826] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:34:30 wazuh-modulesd[182826] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:34:30 wazuh-modulesd[182826] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/15 16:34:30 wazuh-modulesd[182826] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s | |||||||
Passed | 2021-11-15 16:34:35.072627 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_redhat_url] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 1.55 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:34:32.1636994072 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:34:33 wazuh-modulesd[182860] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:34:33 wazuh-modulesd[182860] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:34:33 wazuh-modulesd[182860] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:34:33 wazuh-modulesd[182860] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:34:33 wazuh-modulesd[182860] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_redhat_oval_feed.xml' | Timeout: 300s 2021/11/15 16:34:33 wazuh-modulesd[182860] wmodules-vuln-detector.c:503 at wm_vuldet_enable_rhel_json_feed(): WARNING: (5587): Feed conflict. Only 'redhat' will be updated offline. | |||||||
Passed | 2021-11-15 16:34:44.477447 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_redhat_multiurl] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 8.96 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:34:35.1636994075 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:34:35 wazuh-modulesd[182894] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:34:35 wazuh-modulesd[182894] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:34:35 wazuh-modulesd[182894] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:34:35 wazuh-modulesd[182894] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:34:35 wazuh-modulesd[182894] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s 2021/11/15 16:34:35 wazuh-modulesd[182894] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: 'none' | Multi url: 'file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_redhat_json_feed.json' | Update since: 1999 | Timeout: 300s 2021/11/15 16:34:35 wazuh-modulesd[182894] wmodules-vuln-detector.c:499 at wm_vuldet_enable_rhel_json_feed(): WARNING: (5587): Feed conflict. Only 'jredhat' will be updated offline. | |||||||
Passed | 2021-11-15 16:34:46.576668 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_redhat_url_multiurl] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 2.06 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:34:44.1636994084 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:34:44 wazuh-modulesd[182929] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:34:44 wazuh-modulesd[182929] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:34:44 wazuh-modulesd[182929] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:34:44 wazuh-modulesd[182929] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:34:44 wazuh-modulesd[182929] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_redhat_oval_feed.xml' | Timeout: 300s 2021/11/15 16:34:44 wazuh-modulesd[182929] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: 'none' | Multi url: 'file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_redhat_json_feed.json' | Update since: 1999 | Timeout: 300s | |||||||
Passed | 2021-11-15 16:35:53.346942 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_debian_default] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 65.83 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:34:46.1636994086 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:34:47 wazuh-modulesd[182964] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:34:47 wazuh-modulesd[182964] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:34:47 wazuh-modulesd[182964] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:34:47 wazuh-modulesd[182964] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:34:47 wazuh-modulesd[182964] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s | |||||||
Passed | 2021-11-15 16:36:02.870221 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_debian_path] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 9.35 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:35:53.1636994153 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:35:53 wazuh-modulesd[183007] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:35:53 wazuh-modulesd[183007] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:35:53 wazuh-modulesd[183007] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:35:53 wazuh-modulesd[183007] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:35:53 wazuh-modulesd[183007] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s | |||||||
Passed | 2021-11-15 16:36:16.970821 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_debian_multipath] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 13.45 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:36:02.1636994162 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:36:03 wazuh-modulesd[183042] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:36:03 wazuh-modulesd[183042] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:36:03 wazuh-modulesd[183042] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:36:03 wazuh-modulesd[183042] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:36:03 wazuh-modulesd[183042] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s | |||||||
Passed | 2021-11-15 16:36:19.081396 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_debian_path_multipath] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 1.56 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:36:16.1636994176 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:36:17 wazuh-modulesd[183077] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:36:17 wazuh-modulesd[183077] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:36:17 wazuh-modulesd[183077] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:36:17 wazuh-modulesd[183077] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:36:17 wazuh-modulesd[183077] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s | |||||||
Passed | 2021-11-15 16:36:33.035750 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_debian_url] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 13.52 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:36:19.1636994179 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:36:19 wazuh-modulesd[183110] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:36:19 wazuh-modulesd[183110] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:36:19 wazuh-modulesd[183110] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:36:19 wazuh-modulesd[183110] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:36:19 wazuh-modulesd[183110] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_debian_oval_feed.xml' | Timeout: 300s | |||||||
Passed | 2021-11-15 16:36:51.426656 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_debian_multiurl] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 17.91 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:36:33.1636994193 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:36:33 wazuh-modulesd[183144] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:36:33 wazuh-modulesd[183144] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:36:33 wazuh-modulesd[183144] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:36:33 wazuh-modulesd[183144] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:36:33 wazuh-modulesd[183144] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s | |||||||
Passed | 2021-11-15 16:36:53.075439 | test_vulnerability_detector/test_providers/test_providers_multiple_providers.py::test_multiple_providers[test_debian_url_multiurl] | This test verifies the path/url and multipath/url options work properly according to the configuration. and check there are no conflicts when downloading or reading the feeds. | 1.56 | server | 0 | |
-----------------------------Captured stdout setup------------------------------ 2021-11-15T16:36:51.1636994211 -----------------------------Captured stderr setup------------------------------ 2021/11/15 16:36:51 wazuh-modulesd[183178] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:36:51 wazuh-modulesd[183178] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:36:51 wazuh-modulesd[183178] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:36:51 wazuh-modulesd[183178] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:36:51 wazuh-modulesd[183178] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'file:///home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/custom_debian_oval_feed.xml' | Timeout: 300s | |||||||
Passed | 2021-11-15 16:38:16.669323 | test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py::test_baseline_scan_type[baseline_scan_config] | description: Checks if the baseline scan is performed as expected. To do this,. a fresh agent (without a previous scan) is inserted and a feed update is simulated. After this,. it checks the `ossec.log` file for the message indicating that a baseline scan is being performed. | 44.10 | server | 0 | |
-----------------------------Captured stderr setup------------------------------ 2021/11/15 16:37:28 wazuh-modulesd[183617] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:37:28 wazuh-modulesd[183617] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:37:28 wazuh-modulesd[183617] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:37:28 wazuh-modulesd[183617] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:37:28 wazuh-modulesd[183617] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/15 16:37:28 wazuh-modulesd[183617] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/15 16:37:28 wazuh-modulesd[183617] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s ------------------------------Captured stderr call------------------------------ 2021-11-15 16:38:16,624 - wazuh_testing - ERROR - No alert detected in log. 2021-11-15 16:38:16,627 - wazuh_testing - ERROR - Results accumulated: 0 2021-11-15 16:38:16,627 - wazuh_testing - ERROR - Results expected: 1 -------------------------------Captured log call-------------------------------- [1m[31mERROR [0m wazuh_testing:monitoring.py:461 No alert detected in log. [1m[31mERROR [0m wazuh_testing:monitoring.py:462 Results accumulated: 0 [1m[31mERROR [0m wazuh_testing:monitoring.py:464 Results expected: 1 | |||||||
Passed | 2021-11-15 16:38:50.602664 | test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_type[full_scan_config] | description: Checks if the full scan is performed as expected. To do this,. a fresh agent (without a previous scan) is inserted and a feed update is simulated. After this,. it checks the `ossec.log` file for the message indicating that a baseline scan is being performed and. the vulnerabilities detected are checked. Then, the vulnerable packages are modified and. a full scan is forced by modifying the LAST_FULL_SCAN value in the agent database. Once the scan. finished, the vulnerabilities are controlled again to identify that new vulnerabilities are reported,. but old ones don´t. | 11.03 | server | 0 | |
-----------------------------Captured stderr setup------------------------------ 2021/11/15 16:38:36 wazuh-modulesd[183673] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:38:36 wazuh-modulesd[183673] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:38:36 wazuh-modulesd[183673] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:38:36 wazuh-modulesd[183673] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:38:36 wazuh-modulesd[183673] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/15 16:38:36 wazuh-modulesd[183673] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/15 16:38:36 wazuh-modulesd[183673] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s | |||||||
Passed | 2021-11-15 16:40:39.744676 | test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_type[partial_scan_config] | description: Checks if the partial scan is performed as expected. To do this,. a fresh agent (without a previous scan) is inserted and a feed update is simulated. After this,. it checks the `ossec.log` file for the message indicating that a baseline scan is being performed and. the vulnerabilities detected are checked. After this, the vulnerable packages are modified and. a partial scan is waited. Once the scan finished, the vulnerabilities are controlled again to identify. that new vulnerabilities are reported, but old ones don´t. | 90.18 | server | 0 | |
-----------------------------Captured stderr setup------------------------------ 2021/11/15 16:39:06 wazuh-modulesd[183728] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2021/11/15 16:39:06 wazuh-modulesd[183728] main.c:76 at main(): DEBUG: Wazuh home directory: /var/ossec 2021/11/15 16:39:06 wazuh-modulesd[183728] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2021/11/15 16:39:06 wazuh-modulesd[183728] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2021/11/15 16:39:06 wazuh-modulesd[183728] wmodules-vuln-detector.c:596 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 2592000s | Path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2021/11/15 16:39:06 wazuh-modulesd[183728] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2021/11/15 16:39:06 wazuh-modulesd[183728] wmodules-vuln-detector.c:654 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 2592000s | Multi path: '/home/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s ------------------------------Captured stderr call------------------------------ 2021-11-15 16:39:57,669 - wazuh_testing - ERROR - No vulnerability for test package 0 was detected in the log. 2021-11-15 16:39:57,669 - wazuh_testing - ERROR - Results accumulated: 0 2021-11-15 16:39:57,669 - wazuh_testing - ERROR - Results expected: 1 2021-11-15 16:40:39,219 - wazuh_testing - ERROR - No alert for test package 0 has been detected in the log. 2021-11-15 16:40:39,220 - wazuh_testing - ERROR - Results accumulated: 0 2021-11-15 16:40:39,220 - wazuh_testing - ERROR - Results expected: 1 -------------------------------Captured log call-------------------------------- [1m[31mERROR [0m wazuh_testing:monitoring.py:461 No vulnerability for test package 0 was detected in the log. [1m[31mERROR [0m wazuh_testing:monitoring.py:462 Results accumulated: 0 [1m[31mERROR [0m wazuh_testing:monitoring.py:464 Results expected: 1 [1m[31mERROR [0m wazuh_testing:monitoring.py:461 No alert for test package 0 has been detected in the log. [1m[31mERROR [0m wazuh_testing:monitoring.py:462 Results accumulated: 0 [1m[31mERROR [0m wazuh_testing:monitoring.py:464 Results expected: 1 |