Skip to content

Commit 6727786

Browse files
authored
Revert "Add support for reference_type (#1502)" (#1517)
This reverts commit 474301d.
1 parent 474301d commit 6727786

File tree

97 files changed

+1457
-5116
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

97 files changed

+1457
-5116
lines changed

vulnerabilities/api.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ class VulnerabilityReferenceSerializer(serializers.ModelSerializer):
4747

4848
class Meta:
4949
model = VulnerabilityReference
50-
fields = ["reference_url", "reference_id", "reference_type", "scores", "url"]
50+
fields = ["reference_url", "reference_id", "scores", "url"]
5151

5252

5353
class BaseResourceSerializer(serializers.HyperlinkedModelSerializer):

vulnerabilities/importer.py

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,6 @@ def from_dict(cls, severity: dict):
7676
@dataclasses.dataclass(order=True)
7777
class Reference:
7878
reference_id: str = ""
79-
reference_type: str = ""
8079
url: str = ""
8180
severities: List[VulnerabilitySeverity] = dataclasses.field(default_factory=list)
8281

@@ -86,17 +85,11 @@ def __post_init__(self):
8685

8786
def normalized(self):
8887
severities = sorted(self.severities)
89-
return Reference(
90-
reference_id=self.reference_id,
91-
url=self.url,
92-
severities=severities,
93-
reference_type=self.reference_type,
94-
)
88+
return Reference(reference_id=self.reference_id, url=self.url, severities=severities)
9589

9690
def to_dict(self):
9791
return {
9892
"reference_id": self.reference_id,
99-
"reference_type": self.reference_type,
10093
"url": self.url,
10194
"severities": [severity.to_dict() for severity in self.severities],
10295
}
@@ -105,7 +98,6 @@ def to_dict(self):
10598
def from_dict(cls, ref: dict):
10699
return cls(
107100
reference_id=ref["reference_id"],
108-
reference_type=ref["reference_type"],
109101
url=ref["url"],
110102
severities=[
111103
VulnerabilitySeverity.from_dict(severity) for severity in ref["severities"]

vulnerabilities/importers/fireeye.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -89,9 +89,9 @@ def get_references(references):
8989
"""
9090
Return a list of Reference from a list of URL reference in md format
9191
>>> get_references(["- http://1-4a.com/cgi-bin/alienform/af.cgi"])
92-
[Reference(reference_id='', reference_type='', url='http://1-4a.com/cgi-bin/alienform/af.cgi', severities=[])]
92+
[Reference(reference_id='', url='http://1-4a.com/cgi-bin/alienform/af.cgi', severities=[])]
9393
>>> get_references(["- [Mitre CVE-2021-42712](https://www.cve.org/CVERecord?id=CVE-2021-42712)"])
94-
[Reference(reference_id='', reference_type='', url='https://www.cve.org/CVERecord?id=CVE-2021-42712', severities=[])]
94+
[Reference(reference_id='', url='https://www.cve.org/CVERecord?id=CVE-2021-42712', severities=[])]
9595
"""
9696
urls = []
9797
for ref in references:

vulnerabilities/improve_runner.py

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -98,14 +98,12 @@ def process_inferences(
9898

9999
reference = VulnerabilityReference.objects.get_or_none(
100100
reference_id=ref.reference_id,
101-
reference_type=ref.reference_type,
102101
url=ref.url,
103102
)
104103

105104
if not reference:
106105
reference = create_valid_vulnerability_reference(
107106
reference_id=ref.reference_id,
108-
reference_type=ref.reference_type,
109107
url=ref.url,
110108
)
111109
if not reference:
@@ -169,15 +167,14 @@ def process_inferences(
169167
return inferences_processed_count
170168

171169

172-
def create_valid_vulnerability_reference(url, reference_type="", reference_id=None):
170+
def create_valid_vulnerability_reference(url, reference_id=None):
173171
"""
174172
Create and return a new validated VulnerabilityReference from a
175173
``url`` and ``reference_id``.
176174
Return None and log a warning if this is not a valid reference.
177175
"""
178176
reference = VulnerabilityReference(
179177
reference_id=reference_id,
180-
reference_type=reference_type,
181178
url=url,
182179
)
183180

vulnerabilities/migrations/0058_vulnerabilityreference_reference_type.py

Lines changed: 0 additions & 28 deletions
This file was deleted.

vulnerabilities/models.py

Lines changed: 0 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -359,22 +359,6 @@ class VulnerabilityReference(models.Model):
359359
unique=True,
360360
)
361361

362-
ADVISORY = "advisory"
363-
EXPLOIT = "exploit"
364-
MAILING_LIST = "mailing_list"
365-
BUG = "bug"
366-
OTHER = "other"
367-
368-
REFERENCE_TYPES = [
369-
(ADVISORY, "Advisory"),
370-
(EXPLOIT, "Exploit"),
371-
(MAILING_LIST, "Mailing List"),
372-
(BUG, "Bug"),
373-
(OTHER, "Other"),
374-
]
375-
376-
reference_type = models.CharField(max_length=20, choices=REFERENCE_TYPES, blank=True)
377-
378362
reference_id = models.CharField(
379363
max_length=200,
380364
help_text="An optional reference ID, such as DSA-4465-1 when available",

vulnerabilities/templates/vulnerability_details.html

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -244,7 +244,6 @@
244244
<thead>
245245
<tr>
246246
<th style="width: 250px;"> Reference id </th>
247-
<th style="width: 250px;"> Reference type </th>
248247
<th> URL </th>
249248
</tr>
250249
</thead>
@@ -255,13 +254,6 @@
255254
{% else %}
256255
<td></td>
257256
{% endif %}
258-
259-
{% if ref.reference_type %}
260-
<td class="wrap-strings">{{ ref.get_reference_type_display }}</td>
261-
{% else %}
262-
<td></td>
263-
{% endif %}
264-
265257
<td class="wrap-strings"><a href="{{ ref.url }}" target="_blank">{{ ref.url }}<i
266258
class="fa fa-external-link fa_link_custom"></i></a></td>
267259
</tr>

vulnerabilities/tests/test_api.py

Lines changed: 0 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,6 @@
2121

2222
from vulnerabilities.api import MinimalPackageSerializer
2323
from vulnerabilities.api import PackageSerializer
24-
from vulnerabilities.api import VulnerabilityReferenceSerializer
2524
from vulnerabilities.models import Alias
2625
from vulnerabilities.models import ApiUser
2726
from vulnerabilities.models import Package
@@ -162,9 +161,6 @@ def setUp(self):
162161
namespace="ubuntu",
163162
qualifiers={"distro": "jessie"},
164163
)
165-
self.ref = VulnerabilityReference.objects.create(
166-
reference_type="advisory", reference_id="CVE-xxx-xxx", url="https://example.com"
167-
)
168164
self.user = ApiUser.objects.create_api_user(username="[email protected]")
169165
self.auth = f"Token {self.user.auth_token.key}"
170166
self.client = APIClient(enforce_csrf_checks=True)
@@ -185,16 +181,6 @@ def test_package_serializer(self):
185181
purls = {r["purl"] for r in response}
186182
self.assertIn("pkg:deb/ubuntu/[email protected]?distro=jessie", purls)
187183

188-
def test_vulnerability_reference_serializer(self):
189-
response = VulnerabilityReferenceSerializer(instance=self.ref).data
190-
assert response == {
191-
"reference_url": "https://example.com",
192-
"reference_id": "CVE-xxx-xxx",
193-
"reference_type": "advisory",
194-
"scores": [],
195-
"url": "https://example.com",
196-
}
197-
198184

199185
class APITestCaseVulnerability(TransactionTestCase):
200186
def setUp(self):

vulnerabilities/tests/test_data/apache_httpd/CVE-1999-1199-apache-httpd-expected.json

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,6 @@
2020
"references": [
2121
{
2222
"reference_id": "CVE-1999-1199",
23-
"reference_type": "",
2423
"url": "https://httpd.apache.org/security/json/CVE-1999-1199.json",
2524
"severities": [
2625
{

vulnerabilities/tests/test_data/apache_httpd/CVE-2017-9798-apache-httpd-expected.json

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,6 @@
2020
"references": [
2121
{
2222
"reference_id": "CVE-2017-9798",
23-
"reference_type": "",
2423
"url": "https://httpd.apache.org/security/json/CVE-2017-9798.json",
2524
"severities": [
2625
{

vulnerabilities/tests/test_data/apache_httpd/CVE-2021-44224-apache-httpd-expected.json

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,6 @@
2020
"references": [
2121
{
2222
"reference_id": "CVE-2021-44224",
23-
"reference_type": "",
2423
"url": "https://httpd.apache.org/security/json/CVE-2021-44224.json",
2524
"severities": [
2625
{

vulnerabilities/tests/test_data/apache_httpd/CVE-2022-28614-apache-httpd-expected.json

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,6 @@
2020
"references": [
2121
{
2222
"reference_id": "CVE-2022-28614",
23-
"reference_type": "",
2423
"url": "https://httpd.apache.org/security/json/CVE-2022-28614.json",
2524
"severities": [
2625
{

vulnerabilities/tests/test_data/apache_httpd/apache-httpd-improver-expected.json

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,6 @@
4343
"references": [
4444
{
4545
"reference_id": "CVE-2021-44224",
46-
"reference_type": "",
4746
"url": "https://httpd.apache.org/security/json/CVE-2021-44224.json",
4847
"severities": [
4948
{
@@ -92,7 +91,6 @@
9291
"references": [
9392
{
9493
"reference_id": "CVE-2021-44224",
95-
"reference_type": "",
9694
"url": "https://httpd.apache.org/security/json/CVE-2021-44224.json",
9795
"severities": [
9896
{

0 commit comments

Comments
 (0)