-
Notifications
You must be signed in to change notification settings - Fork 58
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add port-common bit and KAT-OPEN-COMMON-PORT FindingType #734
Conversation
Minimum allowed coverage is Generated by 🐒 cobertura-action against b6f483b |
"model": "tools.ooiinformation", | ||
"pk": "KATFindingType|KAT-OPEN-COMMON-PORT", | ||
"fields": { | ||
"last_updated": "2021-08-09T14:50:09.835Z", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why do we have a timestamp here if it doesn't actually reflect when the record was updated?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The last_updated field isn't used anywhere just like the consult_api field, I think we should just delete the fields. We should probably just delete those fields...
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
isn't consult api used to check for updates when dealing with cve's etc? Those do need periodic updates.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
correct, consult_api can be used to fetch new data about cves
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
But it isn't used. The value is False by default, the value is False for everything in rocky/OOI_database_seed.json and there is no code that ever sets it to True as far as I can see.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes true :). The idea was that when cve data was updated, people could use this to consult the cve database again (and other ooi information sources for that matter)
* main: Update `pre-commit` dependencies and enable Ruff autofix (#739) Cleanup Rocky requirements (#729) Add (I) to ruff and fix imports (#723) Add port-common bit and KAT-OPEN-COMMON-PORT FindingType (#734) Use setuptools-scm to write correct version to version.py (#737) Enable and disable bits (#732) Scan level inheritance chain (#722) Octopoes origin param endpoint (#731) Do not propagate scan level from DNSSPFMechanismHostname (#721) Fix: Unnecessary white space within links (#728) chore/refactor katalogus settings setup (#542)
* main: Update `pre-commit` dependencies and enable Ruff autofix (#739) Cleanup Rocky requirements (#729) Add (I) to ruff and fix imports (#723) Add port-common bit and KAT-OPEN-COMMON-PORT FindingType (#734) Use setuptools-scm to write correct version to version.py (#737) Enable and disable bits (#732) Scan level inheritance chain (#722) Octopoes origin param endpoint (#731)
Changes
Please describe the essence of this PR in a few sentences. Mention any breaking changes or required configuration steps.
Issue link
Fixes #543
Proof
Please add some proof of your working change here, unless this is not required (e.g. this PR is trivial).
Checklists for authors:
Code Checklist
Communication
.env
changes files if required and changed the.env-dist
accordingly.Checklist for code reviewers:
Checklist for QA:
make kat
.feature
orhotfix
works as intended.What works:
What doesn't work:
Bug or feature?: