mirror of
https://github.com/cve-search/PyVulnerabilityLookup.git
synced 2024-11-25 16:27:23 +00:00
new: test for create sighting
Some checks failed
Python application - Test Public Interface / Python 3.13 sample (push) Has been cancelled
Python application - Test Public Interface / Python 3.12 sample (push) Has been cancelled
Python application - MyPy / Python 3.10 sample (push) Has been cancelled
Python application - MyPy / Python 3.11 sample (push) Has been cancelled
Python application - MyPy / Python 3.12 sample (push) Has been cancelled
Python application - MyPy / Python 3.13 sample (push) Has been cancelled
Python application - Test Public Interface / Python 3.10 sample (push) Has been cancelled
Python application - Test Public Interface / Python 3.11 sample (push) Has been cancelled
Some checks failed
Python application - Test Public Interface / Python 3.13 sample (push) Has been cancelled
Python application - Test Public Interface / Python 3.12 sample (push) Has been cancelled
Python application - MyPy / Python 3.10 sample (push) Has been cancelled
Python application - MyPy / Python 3.11 sample (push) Has been cancelled
Python application - MyPy / Python 3.12 sample (push) Has been cancelled
Python application - MyPy / Python 3.13 sample (push) Has been cancelled
Python application - Test Public Interface / Python 3.10 sample (push) Has been cancelled
Python application - Test Public Interface / Python 3.11 sample (push) Has been cancelled
This commit is contained in:
parent
390629aa49
commit
bd1684e2c3
3 changed files with 40 additions and 4 deletions
|
@ -1,6 +1,6 @@
|
||||||
[tool.poetry]
|
[tool.poetry]
|
||||||
name = "pyvulnerabilitylookup"
|
name = "pyvulnerabilitylookup"
|
||||||
version = "2.1.0"
|
version = "2.1.1"
|
||||||
description = "Python CLI and module for Vulnerability Lookup"
|
description = "Python CLI and module for Vulnerability Lookup"
|
||||||
authors = ["Raphaël Vinot <raphael.vinot@circl.lu>"]
|
authors = ["Raphaël Vinot <raphael.vinot@circl.lu>"]
|
||||||
license = "BSD-3-Clause"
|
license = "BSD-3-Clause"
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
from __future__ import annotations
|
from __future__ import annotations
|
||||||
|
|
||||||
import logging
|
import logging
|
||||||
|
import functools
|
||||||
|
|
||||||
from datetime import date, datetime
|
from datetime import date, datetime
|
||||||
from importlib.metadata import version
|
from importlib.metadata import version
|
||||||
|
@ -46,6 +47,7 @@ class PyVulnerabilityLookup():
|
||||||
self.session.headers['Content-Type'] = 'application/json'
|
self.session.headers['Content-Type'] = 'application/json'
|
||||||
if proxies:
|
if proxies:
|
||||||
self.session.proxies.update(proxies)
|
self.session.proxies.update(proxies)
|
||||||
|
self.session.request = functools.partial(self.session.request, timeout=10)
|
||||||
|
|
||||||
def set_apikey(self, apikey: str) -> None:
|
def set_apikey(self, apikey: str) -> None:
|
||||||
'''Set the API key to use for the requests'''
|
'''Set the API key to use for the requests'''
|
||||||
|
@ -186,8 +188,15 @@ class PyVulnerabilityLookup():
|
||||||
:param vuln_id: The vulnerability ID to get comments of
|
:param vuln_id: The vulnerability ID to get comments of
|
||||||
:param author: The author of the comment(s)
|
:param author: The author of the comment(s)
|
||||||
'''
|
'''
|
||||||
|
params = {}
|
||||||
|
if uuid:
|
||||||
|
params['uuid'] = uuid
|
||||||
|
if vuln_id:
|
||||||
|
params['vuln_id'] = vuln_id
|
||||||
|
if author:
|
||||||
|
params['author'] = author
|
||||||
r = self.session.get(urljoin(self.root_url, str(PurePosixPath('api', 'comment'))),
|
r = self.session.get(urljoin(self.root_url, str(PurePosixPath('api', 'comment'))),
|
||||||
params={'uuid': uuid, 'vuln_id': vuln_id, 'author': author})
|
params=params)
|
||||||
return r.json()
|
return r.json()
|
||||||
|
|
||||||
def get_comment(self, comment_uuid: str) -> dict[str, Any]:
|
def get_comment(self, comment_uuid: str) -> dict[str, Any]:
|
||||||
|
@ -327,8 +336,7 @@ class PyVulnerabilityLookup():
|
||||||
|
|
||||||
:param user_id: The user ID
|
:param user_id: The user ID
|
||||||
'''
|
'''
|
||||||
r = self.session.delete(urljoin(self.root_url, str(PurePosixPath('api', 'user', user_id)))
|
r = self.session.delete(urljoin(self.root_url, str(PurePosixPath('api', 'user', user_id))))
|
||||||
)
|
|
||||||
return r.status_code
|
return r.status_code
|
||||||
|
|
||||||
# #### Sightings ####
|
# #### Sightings ####
|
||||||
|
|
|
@ -1,6 +1,7 @@
|
||||||
#!/usr/bin/env python3
|
#!/usr/bin/env python3
|
||||||
|
|
||||||
import unittest
|
import unittest
|
||||||
|
import uuid
|
||||||
import time
|
import time
|
||||||
import os
|
import os
|
||||||
|
|
||||||
|
@ -355,3 +356,30 @@ class TestPublic(unittest.TestCase):
|
||||||
self.assertTrue(sighting_cve_list)
|
self.assertTrue(sighting_cve_list)
|
||||||
self.assertTrue('data' in sighting_cve_list)
|
self.assertTrue('data' in sighting_cve_list)
|
||||||
self.assertTrue(len(sighting_cve_list['data']) > 0)
|
self.assertTrue(len(sighting_cve_list['data']) > 0)
|
||||||
|
|
||||||
|
def test_sightings_local(self) -> None:
|
||||||
|
if not self.admin_token:
|
||||||
|
# this test is only working if the admin token is set
|
||||||
|
return None
|
||||||
|
|
||||||
|
u1 = str(uuid.uuid4())
|
||||||
|
sighting = self.client.create_sighting(
|
||||||
|
sighting={
|
||||||
|
"vulnerability": "CVE-2024-20401",
|
||||||
|
"source": u1,
|
||||||
|
"type": "seen"
|
||||||
|
}
|
||||||
|
)
|
||||||
|
self.assertTrue(sighting)
|
||||||
|
print(sighting)
|
||||||
|
s = self.client.get_sighting(sighting['data'][0]['uuid'])
|
||||||
|
self.assertTrue('uuid' in s)
|
||||||
|
self.assertTrue('vulnerability' in s)
|
||||||
|
self.assertTrue('source' in s)
|
||||||
|
self.assertTrue('type' in s)
|
||||||
|
self.assertEqual(s['source'], u1)
|
||||||
|
|
||||||
|
u2 = str(uuid.uuid4())
|
||||||
|
sighting = self.client.create_sighting(source=u2, sighting_type='seen', vulnerability='CVE-2024-20401')
|
||||||
|
s = self.client.get_sighting(sighting['data'][0]['uuid'])
|
||||||
|
self.assertEqual(s['source'], u2)
|
||||||
|
|
Loading…
Reference in a new issue