Mercurial > farol > farol
diff farol/vulnerability.py @ 62:ce49bd1512dd
Make pyflafes a happier
author | Benoît Allard <benoit.allard@greenbone.net> |
---|---|
date | Wed, 08 Oct 2014 12:55:40 +0200 |
parents | 55b72057b066 |
children | aad7db3f93b6 |
line wrap: on
line diff
--- a/farol/vulnerability.py Wed Oct 08 12:06:50 2014 +0200 +++ b/farol/vulnerability.py Wed Oct 08 12:55:40 2014 +0200 @@ -27,8 +27,8 @@ from farolluz.parsers.cvrf import parseDate from farolluz.cvrf import (CVRFVulnerability, CVRFVulnerabilityID, CVRFNote, - CVRFReference, CVRFAcknowledgment, CVRFCWE, CVRFInvolvement, CVRFThreat, - CVRFProductStatus, CVRFCVSSSet, CVRFRemediation) + CVRFReference, CVRFCWE, CVRFInvolvement, CVRFThreat, CVRFProductStatus, + CVRFCVSSSet, CVRFRemediation) from farolluz.renderer import utcnow from .controller import (update_note_from_request, create_note_from_request, @@ -252,7 +252,6 @@ @vulnerability.route('/<int:ordinal>/threat/add', methods=['GET', 'POST']) @document_required def add_threat(ordinal): - cvrf = get_current() if request.method != 'POST': return render_template('vulnerability/edit_threat.j2', ordinal=ordinal, @@ -276,7 +275,6 @@ threat = get_vuln(ordinal)._threats[index] except IndexError: abort(404) - cvrf = get_current() if request.method != 'POST': return render_template('vulnerability/edit_threat.j2', ordinal=ordinal, index=index,