forked from aboutcode-org/vulnerablecode
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathviews.py
More file actions
52 lines (43 loc) · 2.08 KB
/
views.py
File metadata and controls
52 lines (43 loc) · 2.08 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
#
# Copyright (c) 2017 nexB Inc. and others. All rights reserved.
# http://nexb.com and https://github.com/nexB/vulnerablecode/
# The VulnerableCode software is licensed under the Apache License version 2.0.
# Data generated with VulnerableCode require an acknowledgment.
#
# You may not use this software except in compliance with the License.
# You may obtain a copy of the License at: http://apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software distributed
# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
# CONDITIONS OF ANY KIND, either express or implied. See the License for the
# specific language governing permissions and limitations under the License.
#
# When you publish or redistribute any data created with VulnerableCode or any VulnerableCode
# derivative work, you must accompany this data with the following acknowledgment:
#
# Generated with VulnerableCode and provided on an "AS IS" BASIS, WITHOUT WARRANTIES
# OR CONDITIONS OF ANY KIND, either express or implied. No content created from
# VulnerableCode should be considered or used as legal advice. Consult an Attorney
# for any legal advice.
# VulnerableCode is a free software code scanning tool from nexB Inc. and others.
# Visit https://github.com/nexB/vulnerablecode/ for support and download.
import json
from django.http import HttpResponse
from vulnerabilities import api_data
def package(request, name):
"""
Queries the cve-search api with just
a package name.
"""
raw_data = api_data.data_cve_circl(name=name)
fields_names = ['id', 'summary', 'cvss']
extracted_data = api_data.extract_fields(raw_data, fields_names)
return HttpResponse(json.dumps(extracted_data))
def package_version(request, name, version):
"""
Queries the cve-search api with a package
name and version.
"""
raw_data = api_data.data_cve_circl(name=name, version=version)
fields_names = ['id', 'summary', 'cvss']
extracted_data = api_data.extract_fields(raw_data, fields_names)
return HttpResponse(json.dumps(extracted_data))