-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVEs alerts inventory for Vulnerability Detector - Vulnerability Detector Integration Tests #1261
Comments
Tasks
Working branch: 1261-cve-alerts-inventory |
Progress5/18/21
5/19/21
How to make queries to sys_programs tablesThis would not work, why?
Example of valid query:
Reference to #1243 for more info about valid queries. UPDATE: it seems that the problem is not with the query itself but with the answer length. The answer in some queries is too long to be sent in a single socket message and it is split. We need to modify our query method to handle this. Testing query: UPDATE: Wed May 19 11:08:02 UTC 2021 We need a way to paginate the queries to the DB but it doesn't make any sense to write such code because this problem has already been handled by the framework team for the Wazuh python framework. We've been discussing this and we've decided to find a way to install the Wazuh's framework package into our testing environments so we could use all the developed functions from there. 5/21/21
When trying to run this kind of queries there is a problem (described in #1357) with the answer length. We've decided that this is a good moment to start integrating the Wazuh Python framework into our QA tests for some task that has already been coded by our framework team such as retrieval of this kind of information from wazuh_db. We/'re reviewing the status of those test that doesn't require big changes to keep working, such as general setting tests on the #1360 issue. We've added some improvements to the wdb query method on this commit 701cddd to avoid errors due to the above-mentioned issue with long answer or responses that are not in JSON format. TODO
VD module changes
|
Closing the issue as the pull #1496 was merged. |
Description
As part of the epic wazuh/wazuh#7749, we implemented a mechanism to have an inventory of the CVEs that affect each agent in which the Wazuh agents are installed. This epic changed the way in which the Vulnerability Detector generates alerts as well. Here some key points of the epic:
BASELINE
,PARTIAL_SCAN
, andFULL_SCAN
.VALID
,PENDING
,OBSOLETE
, andREMOVED
.min_full_scan_interval
, and the settingignore_time
was removed.For details of all these key points to be taken into account in the test design and implementation, check the description section of the epic.
Update 10/28/2021
After discussing with the QA team, and taking into account the new guidelines, we decided to implement the next set of improvements in this set of tests:
mock_agent
#2148It is being evaluated also the possibility of unifying some of the scan results tests that seem to be repeated.
The text was updated successfully, but these errors were encountered: