@@ -364,9 +364,10 @@ def test_set_bad_service_credentials(self, mock_kb):
364
364
p .scan_id = '456-789'
365
365
p .kbdb .add_scan_preferences = MagicMock ()
366
366
r = p .prepare_credentials_for_openvas ()
367
+ e = p .get_error_messages ()
367
368
368
369
self .assertFalse (r )
369
- self .assertIn ("Unknown service type for credential: shh" , p . errors )
370
+ self .assertIn ("Unknown service type for credential: shh" , e )
370
371
371
372
@patch ('ospd_openvas.db.KbDB' )
372
373
def test_set_bad_ssh_port_credentials (self , mock_kb ):
@@ -387,9 +388,10 @@ def test_set_bad_ssh_port_credentials(self, mock_kb):
387
388
p .scan_id = '456-789'
388
389
p .kbdb .add_scan_preferences = MagicMock ()
389
390
r = p .prepare_credentials_for_openvas ()
391
+ e = p .get_error_messages ()
390
392
391
393
self .assertFalse (r )
392
- self .assertIn ("Port for SSH 'ab' is not a valid number." , p . errors )
394
+ self .assertIn ("Port for SSH 'ab' is not a valid number." , e )
393
395
394
396
@patch ('ospd_openvas.db.KbDB' )
395
397
def test_missing_ssh_port_credentials (self , mock_kb ):
@@ -410,8 +412,7 @@ def test_missing_ssh_port_credentials(self, mock_kb):
410
412
p .kbdb .add_scan_preferences = MagicMock ()
411
413
r = p .prepare_credentials_for_openvas ()
412
414
413
- self .assertFalse (r )
414
- self .assertIn ("Port for SSH is missing." , p .errors )
415
+ self .assertTrue (r )
415
416
416
417
@patch ('ospd_openvas.db.KbDB' )
417
418
def test_ssh_port_out_of_range_credentials (self , mock_kb ):
@@ -432,9 +433,10 @@ def test_ssh_port_out_of_range_credentials(self, mock_kb):
432
433
p .scan_id = '456-789'
433
434
p .kbdb .add_scan_preferences = MagicMock ()
434
435
r = p .prepare_credentials_for_openvas ()
436
+ e = p .get_error_messages ()
435
437
436
438
self .assertFalse (r )
437
- self .assertIn ("Port for SSH is out of range (0 -65535): 65536" , p . errors )
439
+ self .assertIn ("Port for SSH is out of range (1 -65535): 65536" , e )
438
440
439
441
@patch ('ospd_openvas.db.KbDB' )
440
442
def test_bad_type_for_ssh_credentials (self , mock_kb ):
@@ -455,14 +457,15 @@ def test_bad_type_for_ssh_credentials(self, mock_kb):
455
457
p .scan_id = '456-789'
456
458
p .kbdb .add_scan_preferences = MagicMock ()
457
459
r = p .prepare_credentials_for_openvas ()
460
+ e = p .get_error_messages ()
458
461
459
462
self .assertFalse (r )
460
463
self .assertIn (
461
464
"Unknown Credential Type for SSH: "
462
465
+ "ups"
463
466
+ ". Use 'up' for Username + Password"
464
467
+ " or 'usk' for Username + SSH Key." ,
465
- p . errors ,
468
+ e ,
466
469
)
467
470
468
471
@patch ('ospd_openvas.db.KbDB' )
@@ -483,13 +486,14 @@ def test_missing_type_for_ssh_credentials(self, mock_kb):
483
486
p .scan_id = '456-789'
484
487
p .kbdb .add_scan_preferences = MagicMock ()
485
488
r = p .prepare_credentials_for_openvas ()
489
+ e = p .get_error_messages ()
486
490
487
491
self .assertFalse (r )
488
492
self .assertIn (
489
493
"Missing Credential Type for SSH."
490
494
+ " Use 'up' for Username + Password"
491
495
+ " or 'usk' for Username + SSH Key." ,
492
- p . errors ,
496
+ e ,
493
497
)
494
498
495
499
@patch ('ospd_openvas.db.KbDB' )
@@ -513,12 +517,13 @@ def test_snmp_no_priv_alg_but_pw_credentials(self, mock_kb):
513
517
p .scan_id = '456-789'
514
518
p .kbdb .add_scan_preferences = MagicMock ()
515
519
r = p .prepare_credentials_for_openvas ()
520
+ e = p .get_error_messages ()
516
521
517
522
self .assertFalse (r )
518
523
self .assertIn (
519
524
"When no privacy algorithm is used, the privacy"
520
525
+ " password also has to be empty." ,
521
- p . errors ,
526
+ e ,
522
527
)
523
528
524
529
@patch ('ospd_openvas.db.KbDB' )
@@ -543,13 +548,14 @@ def test_snmp_unknown_priv_alg_credentials(self, mock_kb):
543
548
p .scan_id = '456-789'
544
549
p .kbdb .add_scan_preferences = MagicMock ()
545
550
r = p .prepare_credentials_for_openvas ()
551
+ e = p .get_error_messages ()
546
552
547
553
self .assertFalse (r )
548
554
self .assertIn (
549
555
"Unknows privacy algorithm used: "
550
556
+ "das"
551
557
+ ". Use 'aes', 'des' or '' (none)." ,
552
- p . errors ,
558
+ e ,
553
559
)
554
560
555
561
@patch ('ospd_openvas.db.KbDB' )
@@ -571,12 +577,13 @@ def test_snmp_missing_auth_alg_credentials(self, mock_kb):
571
577
p .scan_id = '456-789'
572
578
p .kbdb .add_scan_preferences = MagicMock ()
573
579
r = p .prepare_credentials_for_openvas ()
580
+ e = p .get_error_messages ()
574
581
575
582
self .assertFalse (r )
576
583
self .assertIn (
577
584
"Missing authentification algorithm for SNMP."
578
585
+ " Use 'md5' or 'sha1'." ,
579
- p . errors ,
586
+ e ,
580
587
)
581
588
582
589
@patch ('ospd_openvas.db.KbDB' )
@@ -599,13 +606,14 @@ def test_snmp_unknown_auth_alg_credentials(self, mock_kb):
599
606
p .scan_id = '456-789'
600
607
p .kbdb .add_scan_preferences = MagicMock ()
601
608
r = p .prepare_credentials_for_openvas ()
609
+ e = p .get_error_messages ()
602
610
603
611
self .assertFalse (r )
604
612
self .assertIn (
605
613
"Unknown authentification algorithm: "
606
614
+ "sha2"
607
615
+ ". Use 'md5' or 'sha1'." ,
608
- p . errors ,
616
+ e ,
609
617
)
610
618
611
619
@patch ('ospd_openvas.db.KbDB' )
0 commit comments