Created
April 28, 2022 06:16
-
-
Save zztalker/ef6a7d08898bf2b5b0a58949f2ec78da to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<testsuites><testsuite name="pytest" errors="0" failures="1" skipped="28" tests="153" time="3212.329" timestamp="2022-04-27T17:14:08.246020" hostname="vm-id-3946681"><testcase classname="Ubuntu20_plesk_500_users_1.test_app_specific_ruleset" name="test_conflict_raised_when_server_not_supported" file="test_app_specific_ruleset.py" line="206" time="1.389"><skipped type="pytest.skip" message="Server supported">/vagrant/test_app_specific_ruleset.py:207: Server supported</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_app_specific_ruleset" name="test_not_setup_wordpress_fails" file="test_app_specific_ruleset.py" line="237" time="32.570" /><testcase classname="Ubuntu20_plesk_500_users_1.test_app_specific_ruleset" name="test_wordpress_up_and_running" file="test_app_specific_ruleset.py" line="251" time="17.228" /><testcase classname="Ubuntu20_plesk_500_users_1.test_blocked_ports" name="TestBlockedPorts.test_input_outgoing[udp]" file="test_blocked_ports.py" line="327" time="19.973" /><testcase classname="Ubuntu20_plesk_500_users_1.test_blocked_ports" name="TestBlockedPorts.test_output_incoming[tcp]" file="test_blocked_ports.py" line="339" time="5.017" /><testcase classname="Ubuntu20_plesk_500_users_1.test_blocked_ports" name="TestBlockedPorts.test_output_outgoing[tcp]" file="test_blocked_ports.py" line="351" time="3.483" /><testcase classname="Ubuntu20_plesk_500_users_1.test_blocked_ports" name="TestBlockedPorts.test_deny_mode_switcher[tcp]" file="test_blocked_ports.py" line="367" time="10.303" /><testcase classname="Ubuntu20_plesk_500_users_1.test_blocked_ports" name="TestBlockedPorts.test_deny_mode_switcher[udp]" file="test_blocked_ports.py" line="367" time="10.322" /><testcase classname="Ubuntu20_plesk_500_users_1.test_blocked_ports" name="TestBlockedPorts.test_full_access_should_override_output_blocking[tcp]" file="test_blocked_ports.py" line="419" time="1.339" /><testcase classname="Ubuntu20_plesk_500_users_1.test_blocked_ports" name="TestBlockedPorts.test_range[tcp]" file="test_blocked_ports.py" line="493" time="3.448" /><testcase classname="Ubuntu20_plesk_500_users_1.test_blocked_ports" name="TestBlockedPorts.test_webshield" file="test_blocked_ports.py" line="503" time="43.043" /><testcase classname="Ubuntu20_plesk_500_users_1.test_blocked_ports" name="TestBlockedPorts.test_smtp_blocking" file="test_blocked_ports.py" line="519" time="6.707" /><testcase classname="Ubuntu20_plesk_500_users_1.test_blocked_ports" name="TestBlockedPorts.test_disable_on_csf_enable" file="test_blocked_ports.py" line="582" time="0.000"><skipped type="pytest.skip" message="Test is csf specific">/vagrant/test_blocked_ports.py:583: Test is csf specific</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_blocked_ports" name="TestBlockedPorts.test_whitelisted_ip_accessing_blocked_ports[False-35423]" file="test_blocked_ports.py" line="605" time="11.619" /><testcase classname="Ubuntu20_plesk_500_users_1.test_blocked_ports" name="TestBlockedPorts.test_whitelisted_ip_accessing_blocked_ports[False-8443]" file="test_blocked_ports.py" line="605" time="11.691" /><testcase classname="Ubuntu20_plesk_500_users_1.test_blocked_ports" name="TestBlockedPorts.test_block_specific_panel_port[False-remote_proxy_static]" file="test_blocked_ports.py" line="730" time="12.787" /><testcase classname="Ubuntu20_plesk_500_users_1.test_blocked_ports" name="TestBlockedPorts.test_block_specific_panel_port[True-gray_list]" file="test_blocked_ports.py" line="730" time="23.021" /><testcase classname="Ubuntu20_plesk_500_users_1.test_blocked_ports" name="TestBlockedPorts.test_block_specific_panel_port_deny_mode_white_list_ip[False-remote_proxy]" file="test_blocked_ports.py" line="819" time="6.867" /><testcase classname="Ubuntu20_plesk_500_users_1.test_blocked_ports" name="TestBlockedPorts.test_block_specific_panel_port_deny_mode_white_list_ip[True-remote_proxy]" file="test_blocked_ports.py" line="819" time="7.764" /><testcase classname="Ubuntu20_plesk_500_users_1.test_blocked_ports" name="TestBlockedPorts.test_block_specific_panel_port_deny_mode_white_list_ip[True-remote_proxy_static]" file="test_blocked_ports.py" line="819" time="18.691" /><testcase classname="Ubuntu20_plesk_500_users_1.test_config" name="test_main_config_has_symlink" file="test_config.py" line="21" time="0.001" /><testcase classname="Ubuntu20_plesk_500_users_1.test_config" name="test_first_install_overrides" file="test_config.py" line="29" time="0.009" /><testcase classname="Ubuntu20_plesk_500_users_1.test_configuration_management" name="test_managing_modsec_directives[SecRuleEngine-Off]" file="test_configuration_management.py" line="27" time="0.003"><skipped type="pytest.xfail" message="only cpanel is supported" /></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_cron" name="test_remove_tmp_files[/var/imunify360/tmp_modsec-300]" file="test_cron.py" line="102" time="103.298" /><testcase classname="Ubuntu20_plesk_500_users_1.test_csf_integration" name="test_disable_csf_integration" file="test_csf_integration.py" line="76" time="0.000"><skipped type="pytest.skip" message="Test is csf specific">/vagrant/test_csf_integration.py:77: Test is csf specific</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_csf_integration" name="test_whitelisted_ip_not_blocked_by_csf" file="test_csf_integration.py" line="97" time="0.000"><skipped type="pytest.skip" message="Test is csf specific">/vagrant/test_csf_integration.py:98: Test is csf specific</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_cxs_conflicts" name="test_csf_coop_mode_is_on" file="test_cxs_conflicts.py" line="5" time="0.000"><skipped type="pytest.skip" message="Skipping as cxs is not installed">/vagrant/test_cxs_conflicts.py:6: Skipping as cxs is not installed</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_doctor" name="test_doctor" file="test_doctor.py" line="8" time="36.731" /><testcase classname="Ubuntu20_plesk_500_users_1.test_feature_management" name="test_feature_management_search[username]" file="test_feature_management.py" line="42" time="0.303" /><testcase classname="Ubuntu20_plesk_500_users_1.test_feature_management" name="test_feature_management_get_without_user_arg" file="test_feature_management.py" line="60" time="0.096" /><testcase classname="Ubuntu20_plesk_500_users_1.test_feature_management" name="test_permissions_auto_update" file="test_feature_management.py" line="66" time="0.171" /><testcase classname="Ubuntu20_plesk_500_users_1.test_feature_management" name="test_feature_management_update" file="test_feature_management.py" line="74" time="1.236" /><testcase classname="Ubuntu20_plesk_500_users_1.test_files" name="TestAtomicDownload.test_files_atomic_all_zip" file="test_files.py" line="211" time="0.913" /><testcase classname="Ubuntu20_plesk_500_users_1.test_hooks" name="test_malware_scanning_finished[non-native-malware-scanning-finished]" file="test_hooks.py" line="342" time="11.186" /><testcase classname="Ubuntu20_plesk_500_users_1.test_hooks" name="test_malware_scanning_finished[native-malware-scanning-finished]" file="test_hooks.py" line="342" time="4.736" /><testcase classname="Ubuntu20_plesk_500_users_1.test_hooks" name="test_malware_scanning_cancelled[non-native-malware-scanning-finished]" file="test_hooks.py" line="374" time="6.720" /><testcase classname="Ubuntu20_plesk_500_users_1.test_hooks" name="test_notifier_realtime_malware_found_beginning[notifier_script_log0]" file="test_hooks.py" line="447" time="12.867" /><testcase classname="Ubuntu20_plesk_500_users_1.test_icontact" name="test_icontact_scan_not_scheduled_beginning" file="test_icontact.py" line="104" time="0.000"><skipped type="pytest.skip" message="ImAV for cPanel only">/vagrant/test_icontact.py:105: ImAV for cPanel only</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_kcarectl_endpoint" name="test_non_existing_endpoint" file="test_kcarectl_endpoint.py" line="92" time="54.775" /><testcase classname="Ubuntu20_plesk_500_users_1.test_list_docroot" name="test_list_docroot" file="test_list_docroot.py" line="9" time="41.478" /><testcase classname="Ubuntu20_plesk_500_users_1.test_modsec_cache_dir" name="test_create_modsec_cache_dir" file="test_modsec_cache_dir.py" line="52" time="30.649" /><testcase classname="Ubuntu20_plesk_500_users_1.test_modsec_vendor_install" name="test_plesk_waf_engine_enabled_on_vendor_install[off]" file="test_modsec_vendor_install.py" line="78" time="48.251" /><testcase classname="Ubuntu20_plesk_500_users_1.test_modsec_vendor_install" name="test_plesk_waf_engine_enabled_on_vendor_reinstall[detection-only]" file="test_modsec_vendor_install.py" line="102" time="84.858" /><testcase classname="Ubuntu20_plesk_500_users_1.test_modsec_vendor_install" name="test_plesk_waf_engine_keeps_mode_on_vendor_update[detection-only]" file="test_modsec_vendor_install.py" line="154" time="84.775"><failure message="assert False + where False = finally_happened(<function check_waf_rule_engine_mode.<locals>.<lambda> at 0x7f294a6859d0>)">waf_rule_engine_mode = 'detection-only' | |
@pytest.mark.skipif( | |
current_panel.NAME != "plesk", reason="Skipping for non-plesk panel" | |
) | |
@pytest.mark.slow | |
def test_plesk_waf_engine_keeps_mode_on_vendor_update(waf_rule_engine_mode): | |
"""Regression test for DEF-15857. | |
Force update by corrupting modsec files. | |
Check that the waf-rule-engine keeps its mode the update. | |
""" | |
check_waf_rule_engine_mode(waf_rule_engine_mode) | |
# file has a non zero size before truncating | |
path = Path("/var/imunify360/files/modsec/v2/description.json") | |
assert path.stat().st_size | |
# truncate file to force update | |
os.truncate(path, 0) | |
assert not path.stat().st_size | |
# request update | |
update_files("modsec-rules") | |
# file has non zero size after the update | |
assert path.stat().st_size | |
# waf-engine kept its mode after the update | |
> check_waf_rule_engine_mode(waf_rule_engine_mode) | |
test_modsec_vendor_install.py:182: | |
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ | |
mode = 'detection-only' | |
def check_waf_rule_engine_mode(mode: Mode): | |
"""Assert current waf mode is *mode*.""" | |
> assert finally_happened( | |
lambda: current_panel.waf_rule_engine_mode() == mode, | |
) | |
E assert False | |
E + where False = finally_happened(<function check_waf_rule_engine_mode.<locals>.<lambda> at 0x7f294a6859d0>) | |
test_modsec_vendor_install.py:46: AssertionError</failure></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_modsec_vendor_install" name="test_second_vendor_install[True-False]" file="test_modsec_vendor_install.py" line="230" time="0.001"><skipped type="pytest.skip" message="Skipping for non-cpanel panel">/vagrant/test_modsec_vendor_install.py:231: Skipping for non-cpanel panel</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_ossec" name="TestActiveResponse.test_disabled[DENY-FTP-True-no_active_response]" file="test_ossec.py" line="226" time="10.204"><skipped type="pytest.skip" message="FTP service is disabled">/vagrant/test_ossec.py:92: FTP service is disabled</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_ossec" name="TestActiveResponse.test_disabled[DENY-SSH-True-no_active_response]" file="test_ossec.py" line="226" time="101.698" /><testcase classname="Ubuntu20_plesk_500_users_1.test_ossec" name="TestActiveResponse.test_enabled[ALLOW-SSH-True-with_active_response]" file="test_ossec.py" line="175" time="94.806" /><testcase classname="Ubuntu20_plesk_500_users_1.test_ossec" name="TestActiveResponse.test_disabled[ALLOW-SSH-False-no_active_response]" file="test_ossec.py" line="226" time="102.230" /><testcase classname="Ubuntu20_plesk_500_users_1.test_ossec_with_selinux" name="test_ossec_logrotate" file="test_ossec_with_selinux.py" line="9" time="0.000"><skipped type="pytest.skip" message="condition: selinux.status() != selinux.ENFORCING">/vagrant/test_ossec_with_selinux.py:10: condition: selinux.status() != selinux.ENFORCING</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_package_version" name="TestPackageVersionClassic.test_match" file="test_package_version.py" line="61" time="0.003" /><testcase classname="Ubuntu20_plesk_500_users_1.test_package_version" name="TestPackageVersionModern.test_eq_skip" file="test_package_version.py" line="108" time="0.000"><skipped type="pytest.skip" message="'bash==1.0.99' is required but 'bash==5.0-6ubuntu1.1' is installed">/vagrant/test_package_version.py:109: 'bash==1.0.99' is required but 'bash==5.0-6ubuntu1.1' is installed</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_package_version" name="TestPackageVersionModern.test_multiple_packages" file="test_package_version.py" line="125" time="0.021" /><testcase classname="Ubuntu20_plesk_500_users_1.test_package_version" name="TestPackageVersionModern.test_not_installed_skip" file="test_package_version.py" line="116" time="0.000"><skipped type="pytest.skip" message="'package-that-never-exists==5.0' is required but 'package-that-never-exists' is not installed">/vagrant/test_package_version.py:117: 'package-that-never-exists==5.0' is required but 'package-that-never-exists' is not installed</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_package_version" name="TestPackageVersionModern.test_package_version_query" file="test_package_version.py" line="86" time="0.002" /><testcase classname="Ubuntu20_plesk_500_users_1.test_plesk_users" name="test_plesk_get_users" file="test_plesk_users.py" line="28" time="0.745" /><testcase classname="Ubuntu20_plesk_500_users_1.test_proactive" name="test_proactive_ignore_by_rule_id" file="test_proactive.py" line="362" time="2.149" /><testcase classname="Ubuntu20_plesk_500_users_1.test_proactive" name="test_proactive_ignore_by_path" file="test_proactive.py" line="380" time="0.722" /><testcase classname="Ubuntu20_plesk_500_users_1.test_proactive" name="test_proactive_ignore_file_deletion" file="test_proactive.py" line="427" time="0.789" /><testcase classname="Ubuntu20_plesk_500_users_1.test_proactive" name="test_blamer_api[77]" file="test_proactive.py" line="514" time="132.610" /><testcase classname="Ubuntu20_plesk_500_users_1.test_rbl_whitelist" name="test_modsec_vendor_update" file="test_rbl_whitelist.py" line="56" time="0.002"><skipped type="pytest.skip" message="cPanel specific test">/vagrant/test_rbl_whitelist.py:23: cPanel specific test</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_reputation" name="test_infected_domain_reported" file="test_reputation.py" line="17" time="42.521" /><testcase classname="Ubuntu20_plesk_500_users_1.test_rules_restored" name="test_existing_chain_on_startup[INPUT_imunify360]" file="test_rules_restored.py" line="28" time="24.713" /><testcase classname="Ubuntu20_plesk_500_users_1.test_rules_restored" name="test_restore_rules_and_ipsets" file="test_rules_restored.py" line="71" time="30.317" /><testcase classname="Ubuntu20_plesk_500_users_1.test_rules_restored" name="test_destroy_rules_at_shutdown" file="test_rules_restored.py" line="122" time="12.374" /><testcase classname="Ubuntu20_plesk_500_users_1.test_service_start_on_ossec_fail" name="test_ossec_good_stop_start_im360" file="test_service_start_on_ossec_fail.py" line="51" time="15.331" /><testcase classname="Ubuntu20_plesk_500_users_1.test_service_start_on_ossec_fail" name="test_ossec_bad_stop_start_im360" file="test_service_start_on_ossec_fail.py" line="60" time="22.952" /><testcase classname="Ubuntu20_plesk_500_users_1.test_smtp_blocking" name="test_no_duplicate_rules[filter-ipv4]" file="test_smtp_blocking.py" line="237" time="7.556" /><testcase classname="Ubuntu20_plesk_500_users_1.test_smtp_blocking" name="test_no_duplicate_rules[filter-ipv6]" file="test_smtp_blocking.py" line="237" time="2.229" /><testcase classname="Ubuntu20_plesk_500_users_1.test_socket_activation" name="test_check_detached_failed_scans" file="test_socket_activation.py" line="197" time="0.000"><skipped type="pytest.skip" message="AV specific tests">/vagrant/test_socket_activation.py:198: AV specific tests</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_thirdparty_ids" name="test_fail2ban_disabled[cphulkd]" file="test_thirdparty_ids.py" line="10" time="0.014" /><testcase classname="Ubuntu20_plesk_500_users_1.test_ui_cagefs" name="test_ui_accesible_for_caged_user" file="test_ui_cagefs.py" line="60" time="0.000"><skipped type="pytest.skip" message="test applicable only for cloudlinux-cagefs-generic panels">/vagrant/test_ui_cagefs.py:61: test applicable only for cloudlinux-cagefs-generic panels</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_unified_access_logger" name="test_block_method_logged_for_list[custom-whitelist]" file="test_unified_access_logger.py" line="52" time="9.745"><skipped type="pytest.xfail" message="" /></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_watchdog" name="test_stopped_agent" file="test_watchdog.py" line="48" time="14.201" /><testcase classname="Ubuntu20_plesk_500_users_1.test_watchdog" name="test_rpc_timeout" file="test_watchdog.py" line="70" time="77.981" /><testcase classname="Ubuntu20_plesk_500_users_1.test_watchdog" name="test_health_good" file="test_watchdog.py" line="85" time="0.343" /><testcase classname="Ubuntu20_plesk_500_users_1.test_whitelisted_panels_login" name="test_whitelisted_ip_after_login[10.244.79.251-root-True-i360.ipv4.whitelist.full_access]" file="test_whitelisted_panels_login.py" line="22" time="0.801" /><testcase classname="Ubuntu20_plesk_500_users_1.test_whitelisted_panels_login" name="test_whitelisted_panels_login" file="test_whitelisted_panels_login.py" line="59" time="2.988"><skipped type="pytest.skip" message="unsupported configuration">/vagrant/test_whitelisted_panels_login.py:84: unsupported configuration</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_graylist" name="test_captcha.test_direct_access_to_webshield_ports[i360.ipv4.graysplashlist-False-True]" file="test_graylist/test_captcha.py" line="85" time="0.776" /><testcase classname="Ubuntu20_plesk_500_users_1.test_graylist" name="test_captcha.test_direct_access_to_webshield_ports[i360.ipv4.graylist-False-True]" file="test_graylist/test_captcha.py" line="85" time="0.166" /><testcase classname="Ubuntu20_plesk_500_users_1.test_graylist" name="test_captcha.test_direct_access_to_webshield_ports[i360.ipv4.whitelist-False-False]" file="test_graylist/test_captcha.py" line="85" time="2.170" /><testcase classname="Ubuntu20_plesk_500_users_1.test_graylist" name="test_captcha.test_direct_access_to_webshield_ports[None-False-False]" file="test_graylist/test_captcha.py" line="85" time="2.226" /><testcase classname="Ubuntu20_plesk_500_users_1.test_graylist" name="test_captcha.test_direct_access_to_webshield_ports[None-True-True]" file="test_graylist/test_captcha.py" line="85" time="0.087" /><testcase classname="Ubuntu20_plesk_500_users_1.test_graylist" name="test_dos_detector.test_dos_detector" file="test_graylist/test_dos_detector.py" line="130" time="30.699" /><testcase classname="Ubuntu20_plesk_500_users_1.test_graylist" name="test_ignore_whitelisted.test_ignore_whitelisted[country]" file="test_graylist/test_ignore_whitelisted.py" line="18" time="0.770" /><testcase classname="Ubuntu20_plesk_500_users_1.test_graylist" name="test_incidents.test_incidents" file="test_graylist/test_incidents.py" line="26" time="93.476" /><testcase classname="Ubuntu20_plesk_500_users_1.test_graylist" name="test_remote_proxy.test_remote_proxy[103.228.104.0/22-True-remoteip_headers1-192.0.2.2]" file="test_graylist/test_remote_proxy.py" line="136" time="99.163" /><testcase classname="Ubuntu20_plesk_500_users_1.test_graylist" name="test_unified_access_logger.test_webshield_blacklist_logged_beginning[103.21.244.0/22-headers0-192.0.2.5]" file="test_graylist/test_unified_access_logger.py" line="269" time="49.666" /><testcase classname="Ubuntu20_plesk_500_users_1.test_graylist" name="test_unified_access_logger.test_webshield_blacklisted_country_logged_beginning[10.0.0.0/8-headers0-1.33.214.241-JP]" file="test_graylist/test_unified_access_logger.py" line="354" time="60.432" /><testcase classname="Ubuntu20_plesk_500_users_1.test_graylist" name="test_unified_access_logger.test_webshield_slashscreen_logged_beginning" file="test_graylist/test_unified_access_logger.py" line="547" time="104.529" /><testcase classname="Ubuntu20_plesk_500_users_1.test_graylist" name="test_webshield.test_webshield_block_blacklisted_country[154.118.230.171-TZ-103.21.244.0/22]" file="test_graylist/test_webshield.py" line="86" time="21.920" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_cleanup.test_cleanup" file="test_malware/test_cleanup.py" line="131" time="30.080" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_cleanup.test_cleanup_already_cleaned" file="test_malware/test_cleanup.py" line="180" time="28.995" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_cloud_assist.test_cloud_assisted_scan_with_cleanup[cloud_assist=True]" file="test_malware/test_cloud_assist.py" line="42" time="63.659" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_detect_clean_external_sigs.test_sigs_accessible_from_user[/var/imunify360/files/sigs/v1/aibolit/ai-bolit-hoster.db]" file="test_malware/test_detect_clean_external_sigs.py" line="18" time="0.813" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_finder.test_finder_aibolit" file="test_malware/test_finder.py" line="58" time="4.436" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_finder.test_recursion_depth[Using aibolit finder]" file="test_malware/test_finder.py" line="65" time="167.138" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_malware_read.test_malware_read[fvtre3mtfy-fvtre3mtfy-True]" file="test_malware/test_malware_read.py" line="74" time="3.466" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_malware_read.test_malware_read[root-fvtre3mtfy-True]" file="test_malware/test_malware_read.py" line="74" time="1.943" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_malware_read.test_malware_read[r9h690l6-fvtre3mtfy-False]" file="test_malware/test_malware_read.py" line="74" time="2.177" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_malware_scan_task.test_malware_scan_task[Using im360 finder]" file="test_malware/test_malware_scan_task.py" line="39" time="13.854" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_malware_scanner.test_web_scanner[scan-enabled]" file="test_malware/test_malware_scanner.py" line="123" time="6.902" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_mds.test_mds_scan_wildcards[wp0j_options.sql.gz-{wordpress_dir}/-db_names0]" file="test_malware/test_mds.py" line="106" time="14.285" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_mds.test_mds_scan_wildcards[wp0j_options.sql.gz-{wordpress_dir}/*-db_names0]" file="test_malware/test_mds.py" line="106" time="16.671" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_mds.test_mds_scan_wildcards[wp0j_options.sql.gz-{home_dir}/-db_names0]" file="test_malware/test_mds.py" line="106" time="16.857" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_mds.test_mds_scan_no_duplicates[wp0j_options.sql.gz-2 infected databases]" file="test_malware/test_mds.py" line="174" time="35.684" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_mds.test_mds_cleanup[wp0j_options.sql.gz-2 databases]" file="test_malware/test_mds.py" line="306" time="56.507" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_mds.test_mds_restore_queue_is_persistent[wp0j_options.sql.gz-db_names0]" file="test_malware/test_mds.py" line="350" time="75.530" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_mds.test_mds_handle_aborted_operation[wp0j_options.sql.gz-cleanup-found-db_names0]" file="test_malware/test_mds.py" line="456" time="69.008" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_mds.test_mds_handle_aborted_operation[wp0j_options.sql.gz-restore-cleanup_done-db_names0]" file="test_malware/test_mds.py" line="456" time="66.381" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_mds.test_mds_handle_finished_operation[wp0j_options.sql.gz-cleanup-cleanup_done-db_names0]" file="test_malware/test_mds.py" line="495" time="56.551" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_mds.test_mds_default_action_cleanup[wp0j_options.sql.gz-2 databases]" file="test_malware/test_mds.py" line="679" time="33.516" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_mds_clickhouse.test_mds_clickhouse_beginning[wp0j_options.sql.gz-db_names0]" file="test_malware/test_mds_clickhouse.py" line="76" time="22.648" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_ondemand_queue.TestQueuePut.test_put_consecutive[put0]" file="test_malware/test_ondemand_queue.py" line="59" time="0.747" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_ondemand_queue.TestQueuePut.test_put_consecutive[put1]" file="test_malware/test_ondemand_queue.py" line="59" time="3.830" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_ondemand_queue.TestQueuePut.test_put_single_command[put0]" file="test_malware/test_ondemand_queue.py" line="75" time="0.342" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_ondemand_queue.TestQueuePut.test_put_single_command[put2]" file="test_malware/test_ondemand_queue.py" line="75" time="2.326" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_ondemand_queue.TestQueuePut.test_put_prioritize" file="test_malware/test_ondemand_queue.py" line="103" time="2.448" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_ondemand_queue.TestQueueRemove.test_remove_any[remove1-expected1]" file="test_malware/test_ondemand_queue.py" line="167" time="0.594" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_ondemand_queue.TestQueueRemove.test_remove_any[remove2-expected2]" file="test_malware/test_ondemand_queue.py" line="167" time="0.488" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_ondemand_queue.TestQueueRemove.test_remove_current" file="test_malware/test_ondemand_queue.py" line="179" time="0.453" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_ondemand_scan.test_on_demand_scan_changed_scan_modified_disable" file="test_malware/test_ondemand_scan.py" line="134" time="35.291" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_ondemand_scan.test_on_demand_rescan_unchanged_symlink_malware" file="test_malware/test_ondemand_scan.py" line="175" time="34.143" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_ondemand_scan.test_total_resources_files" file="test_malware/test_ondemand_scan.py" line="204" time="13.022" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_ondemand_scan.test_skip_cleanup_storage" file="test_malware/test_ondemand_scan.py" line="225" time="8.101" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_realtime_scanner.test_realtime_scanner[True]" file="test_malware/test_realtime_scanner.py" line="108" time="34.931" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_realtime_scanner.test_realtime_scanner[False]" file="test_malware/test_realtime_scanner.py" line="108" time="32.247" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_realtime_scanner.test_realtime_scanner_root_files" file="test_malware/test_realtime_scanner.py" line="238" time="10.488" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_realtime_scanner.test_realtime_scanner_optimize_disabled_fchange_installed" file="test_malware/test_realtime_scanner.py" line="360" time="0.000"><skipped type="pytest.skip" message="CL7 and LVE kernel only test">/vagrant/test_malware/test_realtime_scanner.py:361: CL7 and LVE kernel only test</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_realtime_scanner.test_realtime_scanner_optimize_enabled_fchange_unsupported" file="test_malware/test_realtime_scanner.py" line="376" time="5.308" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_realtime_scanner.test_realtime_scanner_optimize_enabled_fchange_installed_stopped" file="test_malware/test_realtime_scanner.py" line="411" time="7.039"><skipped type="pytest.skip" message="CL7 and LVE kernel only test">/vagrant/test_malware/test_realtime_scanner.py:412: CL7 and LVE kernel only test</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_resident_mode.test_aibolit_restarted_after_sigs_update[True]" file="test_malware/test_resident_mode.py" line="164" time="0.830" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_store.test_delete_outdated_entries_using_mask[Ignore mask matches-eicar.com]" file="test_malware/test_store.py" line="47" time="13.559" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_store.test_delete_outdated_entries_using_mask[Ignore mask doesn't match-eicar.com]" file="test_malware/test_store.py" line="47" time="13.096" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_user_list.test_scan_status" file="test_malware/test_user_list.py" line="60" time="12.546" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_user_list.test_pagination" file="test_malware/test_user_list.py" line="86" time="2.050" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="detached.test_pid_file.test_pid_file_delayed" file="test_malware/detached/test_pid_file.py" line="58" time="3.430" /><testcase classname="Ubuntu20_plesk_500_users_1.test_cpanel_events" name="test_modify_account_with_unrelated_imunify360_settings" file="test_cpanel_events.py" line="305" time="0.006"><skipped type="pytest.skip" message="the test requires the native feature management support">/vagrant/test_cpanel_events.py:196: the test requires the native feature management support</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_cpanel_events" name="test_account_is_removed" file="test_cpanel_events.py" line="368" time="0.006"><skipped type="pytest.skip" message="the test requires the native feature management support">/vagrant/test_cpanel_events.py:196: the test requires the native feature management support</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_cpanel_events" name="test_account_is_renamed" file="test_cpanel_events.py" line="391" time="0.005"><skipped type="pytest.skip" message="the test requires the native feature management support">/vagrant/test_cpanel_events.py:196: the test requires the native feature management support</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_cpanel_service_manager" name="test_restart_imunify360_by_chkserv" file="test_cpanel_service_manager.py" line="98" time="0.000"><skipped type="pytest.skip" message="This test is cPanel specific">/vagrant/test_cpanel_service_manager.py:99: This test is cPanel specific</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_migrations" name="test_noop_migration[migration_path0]" file="test_migrations.py" line="38" time="0.008"><skipped type="pytest.skip" message="Skip to unblock 5.8 alpha. Should be fixed in DEF-16703.">/vagrant/fixtures/__init__.py:60: Skip to unblock 5.8 alpha. Should be fixed in DEF-16703.</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_modsec_vendor_install" name="test_atomic_install_vendors" file="test_modsec_vendor_install.py" line="199" time="59.924" /><testcase classname="Ubuntu20_plesk_500_users_1.test_overhead" name="test_overhead_beginning" file="test_overhead.py" line="184" time="0.000"><skipped type="pytest.skip" message="Skipping performance tests due to blank $I360_HTTPPERF_API_URL">/vagrant/test_overhead.py:185: Skipping performance tests due to blank $I360_HTTPPERF_API_URL</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_overhead" name="test_overhead_proactive_defence[DISABLED]" file="test_overhead.py" line="250" time="0.000"><skipped type="pytest.skip" message="Skipping performance tests due to blank $I360_HTTPPERF_API_URL">/vagrant/test_overhead.py:251: Skipping performance tests due to blank $I360_HTTPPERF_API_URL</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_plesk_repair_check" name="test_plesk_repair_check" file="test_plesk_repair_check.py" line="14" time="12.431" /><testcase classname="Ubuntu20_plesk_500_users_1.test_hooks" name="test_notifier_realtime_malware_found_end[notifier_script_log0]" file="test_hooks.py" line="511" time="0.380" /><testcase classname="Ubuntu20_plesk_500_users_1.test_icontact" name="test_icontact_scan_not_scheduled_end" file="test_icontact.py" line="149" time="0.179"><skipped type="pytest.skip" message="The previous part of the test failed or did not start">/vagrant/utils/postponed_test.py:29: The previous part of the test failed or did not start</skipped></testcase><testcase classname="Ubuntu20_plesk_500_users_1.test_graylist" name="test_unified_access_logger.test_webshield_blacklist_logged_end[103.21.244.0/22-headers0-192.0.2.5]" file="test_graylist/test_unified_access_logger.py" line="334" time="7.829" /><testcase classname="Ubuntu20_plesk_500_users_1.test_graylist" name="test_unified_access_logger.test_webshield_blacklisted_country_logged_end[10.0.0.0/8-headers0-1.33.214.241-JP]" file="test_graylist/test_unified_access_logger.py" line="442" time="0.116" /><testcase classname="Ubuntu20_plesk_500_users_1.test_graylist" name="test_unified_access_logger.test_webshield_slashscreen_logged_end" file="test_graylist/test_unified_access_logger.py" line="629" time="7.165" /><testcase classname="Ubuntu20_plesk_500_users_1.test_malware" name="test_mds_clickhouse.test_mds_clickhouse_end[wp0j_options.sql.gz-db_names0]" file="test_malware/test_mds_clickhouse.py" line="151" time="0.508" /><testcase classname="Ubuntu20_plesk_500_users_1.test_overhead" name="test_overhead_end" file="test_overhead.py" line="317" time="149.425"><skipped type="pytest.skip" message="Skipping performance tests due to blank $I360_HTTPPERF_API_URL">/vagrant/test_overhead.py:318: Skipping performance tests due to blank $I360_HTTPPERF_API_URL</skipped></testcase></testsuite></testsuites> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment