Skip to content

Commit 5429369

Browse files
committed
Apply final code style fixes (isort + black)
Signed-off-by: Parth Bhatt <paarthbhatt37@gmail.com>
1 parent 7dd3b63 commit 5429369

2 files changed

Lines changed: 15 additions & 19 deletions

File tree

vulnerabilities/pipelines/v2_importers/liferay_importer.py

Lines changed: 12 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ def process_release_page(self, release_url):
7777
return
7878

7979
soup = BeautifulSoup(page.content, "lxml")
80-
80+
8181
# 3. Find Vulnerability Links
8282
vuln_links = set()
8383
for a in soup.find_all("a", href=True):
@@ -97,16 +97,16 @@ def process_vulnerability_page(self, vuln_url):
9797
return
9898

9999
soup = BeautifulSoup(page.content, "lxml")
100-
100+
101101
# Extract Details
102102
title = soup.find("h1")
103103
title_text = title.get_text(strip=True) if title else ""
104-
104+
105105
# CVE ID
106106
cve_match = re.search(r"(CVE-\d{4}-\d{4,})", title_text)
107107
if not cve_match:
108108
cve_match = re.search(r"(CVE-\d{4}-\d{4,})", soup.get_text())
109-
109+
110110
cve_id = cve_match.group(1) if cve_match else ""
111111
if not cve_id:
112112
return
@@ -135,12 +135,10 @@ def process_vulnerability_page(self, vuln_url):
135135
vector = cvss_match.group(1)
136136
score_match = re.match(r"([\d\.]+)", sev_text)
137137
score = score_match.group(1) if score_match else None
138-
138+
139139
severities.append(
140140
VulnerabilitySeverity(
141-
system=CVSSV31,
142-
value=score,
143-
scoring_elements=f"CVSS:3.1/{vector}"
141+
system=CVSSV31, value=score, scoring_elements=f"CVSS:3.1/{vector}"
144142
)
145143
)
146144

@@ -177,33 +175,30 @@ def process_vulnerability_page(self, vuln_url):
177175
affected_packages=affected_packages,
178176
references_v2=[ReferenceV2(url=vuln_url)],
179177
url=vuln_url,
180-
severities=severities
178+
severities=severities,
181179
)
182180

183181
def parse_version_text(self, text):
184182
if not text:
185183
return None
186-
184+
187185
if "DXP" in text:
188186
name = "liferay-dxp"
189187
elif "Portal" in text:
190188
name = "liferay-portal"
191189
else:
192190
name = "liferay-portal"
193-
191+
194192
purl = PackageURL(type="generic", name=name)
195-
193+
196194
version_match = re.search(r"(\d+\.\d+(\.\d+)?)", text)
197195
if version_match:
198196
version = version_match.group(1)
199197
try:
200198
affected_range = MavenVersionRange.from_versions([version])
201-
return AffectedPackageV2(
202-
package=purl,
203-
affected_version_range=affected_range
204-
)
199+
return AffectedPackageV2(package=purl, affected_version_range=affected_range)
205200
except Exception as e:
206201
logger.error(f"Failed to parse version {version}: {e}")
207202
return None
208-
203+
209204
return None

vulnerabilities/tests/test_liferay.py

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,11 @@
99

1010
import os
1111
from unittest import TestCase
12-
from unittest.mock import patch, MagicMock
12+
from unittest.mock import MagicMock
13+
from unittest.mock import patch
1314

14-
from vulnerabilities.pipelines.v2_importers.liferay_importer import LiferayImporterPipeline
1515
from vulnerabilities.importer import AdvisoryData
16+
from vulnerabilities.pipelines.v2_importers.liferay_importer import LiferayImporterPipeline
1617

1718
BASE_DIR = os.path.dirname(os.path.abspath(__file__))
1819
TEST_DATA = os.path.join(BASE_DIR, "test_data")

0 commit comments

Comments
 (0)