Skip to content

Commit 75cb25e

Browse files
committed
Fix tests
Signed-off-by: Tushar Goel <tushar.goel.dav@gmail.com>
1 parent 383742a commit 75cb25e

File tree

4 files changed

+37
-36
lines changed

4 files changed

+37
-36
lines changed

vulnerabilities/importers/__init__.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,11 +45,11 @@
4545
from vulnerabilities.pipelines import pysec_importer
4646
from vulnerabilities.pipelines.v2_importers import apache_httpd_importer as apache_httpd_v2
4747
from vulnerabilities.pipelines.v2_importers import github_importer as github_importer_v2
48+
from vulnerabilities.pipelines.v2_importers import gitlab_importer as gitlab_importer_v2
4849
from vulnerabilities.pipelines.v2_importers import npm_importer as npm_importer_v2
4950
from vulnerabilities.pipelines.v2_importers import nvd_importer as nvd_importer_v2
5051
from vulnerabilities.pipelines.v2_importers import pypa_importer as pypa_importer_v2
5152
from vulnerabilities.pipelines.v2_importers import pysec_importer as pysec_importer_v2
52-
from vulnerabilities.pipelines.v2_importers import gitlab_importer as gitlab_importer_v2
5353
from vulnerabilities.pipelines.v2_importers import vulnrichment_importer as vulnrichment_importer_v2
5454

5555
IMPORTERS_REGISTRY = [

vulnerabilities/pipelines/v2_importers/pysec_importer.py

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,8 @@
1515
import requests
1616

1717
from vulnerabilities.importer import AdvisoryData
18-
from vulnerabilities.pipelines import VulnerableCodeBaseImporterPipeline, VulnerableCodeBaseImporterPipelineV2
18+
from vulnerabilities.pipelines import VulnerableCodeBaseImporterPipeline
19+
from vulnerabilities.pipelines import VulnerableCodeBaseImporterPipelineV2
1920

2021

2122
class PyPIImporterPipeline(VulnerableCodeBaseImporterPipelineV2):

vulnerabilities/tests/test_data/nginx/security_advisories-importer-expected.json

Lines changed: 33 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -971,39 +971,6 @@
971971
"date_published": null,
972972
"weaknesses": []
973973
},
974-
{
975-
"unique_content_id": "8f54462a45ac49635f660b6fb755d5e05cdbc34ebaa565e38ca20c522579ce7f",
976-
"summary": "Vulnerabilities with Windows 8.3 filename pseudonyms",
977-
"affected_packages": [
978-
{
979-
"package": {
980-
"name": "nginx",
981-
"type": "nginx",
982-
"subpath": "",
983-
"version": "",
984-
"namespace": "",
985-
"qualifiers": "os=windows"
986-
},
987-
"fixed_version": "0.8.33",
988-
"affected_version_range": "vers:nginx/>=0.7.52|<=0.8.32"
989-
},
990-
{
991-
"package": {
992-
"name": "nginx",
993-
"type": "nginx",
994-
"subpath": "",
995-
"version": "",
996-
"namespace": "",
997-
"qualifiers": "os=windows"
998-
},
999-
"fixed_version": "0.7.65",
1000-
"affected_version_range": "vers:nginx/>=0.7.52|<=0.8.32"
1001-
}
1002-
],
1003-
"references": [],
1004-
"date_published": null,
1005-
"weaknesses": []
1006-
},
1007974
{
1008975
"unique_content_id": "92ce767b8cea36271d33c119cb6f706f64f5aba7335cca6791eca90a87f48de1",
1009976
"summary": "Vulnerabilities with Windows file default stream",
@@ -1536,6 +1503,39 @@
15361503
"date_published": null,
15371504
"weaknesses": []
15381505
},
1506+
{
1507+
"unique_content_id": "cd771d4c853d0a5fd6bbc62866fe638c0b41f21f600889447bbaf3b6cd4bad7b",
1508+
"summary": "Vulnerabilities with Windows 8.3 filename pseudonyms",
1509+
"affected_packages": [
1510+
{
1511+
"package": {
1512+
"name": "nginx",
1513+
"type": "nginx",
1514+
"subpath": "",
1515+
"version": "",
1516+
"namespace": "",
1517+
"qualifiers": "os=windows"
1518+
},
1519+
"fixed_version": "0.8.33",
1520+
"affected_version_range": "vers:nginx/>=0.7.52|<=0.8.32"
1521+
},
1522+
{
1523+
"package": {
1524+
"name": "nginx",
1525+
"type": "nginx",
1526+
"subpath": "",
1527+
"version": "",
1528+
"namespace": "",
1529+
"qualifiers": "os=windows"
1530+
},
1531+
"fixed_version": "0.7.65",
1532+
"affected_version_range": "vers:nginx/>=0.7.52|<=0.8.32"
1533+
}
1534+
],
1535+
"references": [],
1536+
"date_published": null,
1537+
"weaknesses": []
1538+
},
15391539
{
15401540
"unique_content_id": "de7a819f87c93c708251b734406d2b9916fce494ab3987be40ca37426b0c2044",
15411541
"summary": "Buffer underflow vulnerability",

vulnerabilities/tests/test_data/openssl/security_advisories-importer-expected.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3614,7 +3614,7 @@
36143614
"weaknesses": []
36153615
},
36163616
{
3617-
"unique_content_id": "4ee23c143c0a01cd7035e1646adaf2222725ad2c96447ffc524eb79d1ac532dd",
3617+
"unique_content_id": "c160af01903483f7380e4bbecd41bc2346069c1c931eb2be9cc45643daf51937",
36183618
"summary": "OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications to block the ability for a MITM attacker to force a protocol downgrade. Some client applications (such as browsers) will reconnect using a downgraded protocol to work around interoperability bugs in older servers. This could be exploited by an active man-in-the-middle to downgrade connections to SSL 3.0 even if both sides of the connection support higher protocols. SSL 3.0 contains a number of weaknesses including POODLE (CVE-2014-3566). See also https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 and https://www.openssl.org/~bodo/ssl-poodle.pdf",
36193619
"affected_packages": [
36203620
{

0 commit comments

Comments
 (0)