jekyll-secinfo 0.1.1 → 0.3.2

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 40e46c1179460d5e0dd2a5be48fc399a2a1a536ccd8532249298823c68353626
4
- data.tar.gz: '079b18a5a5ef5970c12effe60545aad3c25a7d495d42b4cffa2da423c226eae8'
3
+ metadata.gz: 00760bb3e57e86281242eaa873a1b3951214d6a4a846ef8070c636a75def407d
4
+ data.tar.gz: d23874cd8f9b97fb43c445a5e441db42a827bb0aaf2dfc77c790b6239bf6f445
5
5
  SHA512:
6
- metadata.gz: 788656524aa4f0c7222d9a79b407875d5bab77f5ec217b2a843abfff7489e5099b45439d6d6fe2905c39b0ee1d6cd7f1202510d3cb1fa12a8724b3d9e66c7390
7
- data.tar.gz: 03c2cb2160d6e3b61827f446173aba84733bb8a4b0709817a0c53aa4cf6f7435e1453cca89988a949eebbc5660e46bd200e09ab10d3933e3f59f882998186498
6
+ metadata.gz: f6c9062e2dee6288c7f311ec0c49344c18561ed2763eb7650f430b216a3e0716c76aebc77a4a820c2bc161e8bfb973a2ca8b0c63db5d950432fec6a9079aea1b
7
+ data.tar.gz: 6aae313ff7251536886c117901402ef3adac29ad508816142fd0d9663daec265d4be5ead74aa7af35c95b6ab6ab7b5f61a7f75203cd1817563bc493b46cdeb27
data/.gitignore CHANGED
@@ -10,3 +10,4 @@
10
10
  .DS_Store
11
11
  /spec/fixtures/.jekyll-cache
12
12
  *.gem
13
+ *.bak
data/.rspec CHANGED
@@ -1,3 +1,3 @@
1
1
  --color
2
2
  --require spec_helper
3
- #--order random
3
+ --order random
data/README.md CHANGED
@@ -1,6 +1,13 @@
1
1
  # Jekyll Secinfo
2
2
 
3
- This Jekyll pluging provides a tag and filter that turns references to security related info (currently only CVEs) into clickable links.
3
+ This Jekyll pluging provides a tag and filter that turns references to security related info (CVEs, CWEs and DIVD case numbers) into clickable links.
4
+
5
+
6
+ [![Build Status](https://img.shields.io/circleci/build/github/MrSeccubus/jekyll-secinfo/main)](https://circleci.com/gh/MrSeccubus/jekyll-secinfo)
7
+ [![Maintainability](https://api.codeclimate.com/v1/badges/a99a88d28ad37a79dbf6/maintainability)](https://codeclimate.com/github/codeclimate/codeclimate/maintainability)
8
+ [![Test Coverage](https://api.codeclimate.com/v1/badges/a99a88d28ad37a79dbf6/test_coverage)](https://codeclimate.com/github/codeclimate/codeclimate/test_coverage)
9
+ [![MIT License](https://img.shields.io/badge/License-MIT-brightgreen.svg)](https://github.com/MrSeccubus/jekyll-secinfo/blob/main/LICENSE.txt)
10
+ [![Gem downloads](https://img.shields.io/gem/dt/jekyll-secinfo)](https://rubygems.org/gems/jekyll-secinfo)
4
11
 
5
12
  ## Installation
6
13
 
@@ -30,18 +37,29 @@ plugins:
30
37
 
31
38
  ## Usage
32
39
 
33
- As a tag `{% cve CVE-2019-19781 %}` or as a filter `{{ "cve-2019-19781" | cve }}`
40
+ As a tag `{% cve CVE-2019-19781 %}` / `{% cwe CWE-78 %}` / `{% divd DIVD-2020-00001 %}` or as a filter `{{ "cve-2019-19781" | cve }}` / `{{ "cwe-787" | cwe }}` / `{{ "divd-2020-0001" | divd }}`
34
41
 
35
- For CVE multiple formats are accepted:
36
- * Full CVE in lower or upper case e.g. `CVE-2019-19781` or `cve-2019-19781`
37
- * Just the number e.g. `2019-19781`
42
+ For CVEs, CWEs and DIVD cas number filters an tags multiple formats are accepted:
43
+ * Full CVE in lower or upper case e.g. `CVE-2019-19781`, `CVE-787`, `DIVD-2020-00001`, `cve-2019-19781`, `cve-787` or `divd-2020-00001`
44
+ * Just the number e.g. `2019-19781`, `787` or `2020-00001`
38
45
 
39
46
  ## Result
40
47
 
41
48
  By default the plugin will output the following code
42
49
 
50
+ CVEs
51
+ ```markup
52
+ <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19781" class="cve secinfo">CVE-2019-19781</a>
53
+ ```
54
+
55
+ CWEs
56
+ ```markup
57
+ <a href="https://cwe.mitre.org/data/definitions/787.html" class="cwe secinfo">
58
+ ```
59
+
60
+ DIVD case
43
61
  ```markup
44
- <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19781" class="cve">CVE-2019-19781</a>
62
+ <a href="https://csirt.divd.nl/DIVD-2020-00001" class="divd secinfo">DIVD-2020-00001</a>
45
63
  ```
46
64
 
47
65
  ## Configuration
@@ -51,30 +69,53 @@ The behaviour of this plugin can be configured in `_config.yml`
51
69
  ```yml
52
70
  jekyll-secinfo:
53
71
  cve:
54
- style: mitre # Supported styles are mitre, nvd and cvedetails
55
- url: # Style is ignored if a custom URL is defined.
72
+ style: mitre # Supported styles are mitre, nvd and cvedetails
73
+ url: # Style is ignored if a custom URL is defined.
74
+ cwe
75
+ style: mitre # Supported styles are mitre and cvedetails
76
+ url: # Style is ignored if a custom URL is defined.
77
+ divd:
78
+ url: # Custom URL for DIVD cases.
56
79
  ```
57
80
 
58
81
  You can also put these values in the front matter of a page to override the values in `_config.yml` for a specific page.
59
82
 
60
83
  ### Styles
61
84
 
62
- For CVE's the style influences the way a tag or filter is rendered. This is how this input `{% cve CVE-2019-19781 %}` or as a filter `{{ "CVE-2019-19781" | cve }}` will be rendered in different styles:
85
+ For CVEs and CWEs the style influences the way a tag or filter is rendered. This is how the following input will be rendered in different styles
63
86
 
64
- mitre
87
+ input as tags
65
88
  ```markup
66
- <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19781" class="cve">CVE-2019-19781</a>
89
+ CVE: {% cve CVE-2019-19781 %}
90
+ CWE: {% cwe CWE-79 %}
67
91
  ```
68
92
 
69
- mitre
93
+ input with filters:
94
+ ```markup
95
+ CVE: {{ "CVE-2019-19781" | cve }}
96
+ CWE: {{ "cwe-79" | cwe }}
97
+ ```
98
+
99
+
100
+ Mitre
101
+ ```markup
102
+ CVE: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19781" class="cve secinfo">CVE-2019-19781</a>
103
+ CWE: <a href="https://cwe.mitre.org/data/definitions/79.html" class="cwe secinfo">CWE-79</a>
104
+ ```
105
+
106
+
107
+ CVE details
70
108
  ```markup
71
- <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19781" class="cve">CVE-2019-19781</a>
109
+ CVE: <a href="https://www.cvedetails.com/cve/CVE-2019-19781/" class="cve secinfo">CVE-2019-19781</a>
110
+ CWE: <a href="https://www.cvedetails.com/cwe-details/79" class="cwe secinfo">CWE-79</a>
72
111
  ```
73
112
 
74
- mitre
113
+ NVD
75
114
  ```markup
76
- <a href="https://www.cvedetails.com/cve/CVE-2019-19781/" class="cve">CVE-2019-19781</a>
115
+ CVE: <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19781" class="cve secinfo">CVE-2019-19781</a>
116
+ CWE: <a href="https://cwe.mitre.org/data/definitions/79.html" class="cwe secinfo">CWE-79</a>
77
117
  ```
118
+ (Since CWE doesn;t support the style `nvd` it falls back tot he default `mitre` style)
78
119
 
79
120
  ### Using your own URL
80
121
 
@@ -84,12 +125,20 @@ You can specify a custom URL to be used as well. If the url includes `%s` this w
84
125
  jekyll-secinfo:
85
126
  cve:
86
127
  url: http://localhost:4500/CVE-%s.html
128
+ cwe:
129
+ url: http://localhost:4500/CWE-
130
+ divd:
131
+ url: https://localhost:4000/cases/DIVD-
87
132
  ---
88
133
  {% cve 1999-9999 %}
134
+ {% cve 79 %}
135
+ {{ "2020-00001" | divd }}
89
136
  ```
90
137
 
91
- Will reneder as
138
+ Will reneder as:
92
139
  ```markup
93
- <p><a href="http://localhost:4500/CVE-1999-99999.html" class="cve">CVE-1999-99999</a></p>
140
+ <p><a href="http://localhost:4500/CVE-1999-99999.html" class="cve secinfo">CVE-1999-99999</a>
141
+ <a href="http://localhost:4500/CWE-79" class="cwe secinfo">CVE-1999-99999</a>
142
+ <a href="https://localhost:4000/cases/DIVD-2020-00001" class="divd secinfo">DIVD-2020-00001</a></p>
94
143
  ```
95
144
 
@@ -18,7 +18,6 @@ Gem::Specification.new do |spec|
18
18
  spec.require_paths = ["lib"]
19
19
 
20
20
  spec.add_dependency 'jekyll'
21
- spec.add_dependency "rainbow", "~> 3.0"
22
21
 
23
22
  spec.add_development_dependency "bundler", "~> 2.1"
24
23
  spec.add_development_dependency "rake", "~> 10.0"
@@ -4,43 +4,127 @@
4
4
  require "jekyll-secinfo/logger"
5
5
 
6
6
  CONFIG_NAME = 'jekyll-secinfo'
7
- DEFAULT_CONFIG = {
8
- CONFIG_NAME => {
9
- "cve" => {
10
- "style" => "mitre"
11
- }
12
- }
13
- }
14
-
15
7
 
16
8
  module Jekyll::Secinfo
17
9
  class Config
18
-
10
+
19
11
  def self.get(site_config, page)
20
- config = DEFAULT_CONFIG
21
- if site_config
22
- config = config.merge(site_config) if site_config.key?(CONFIG_NAME)
23
- end
24
- if page.key?(CONFIG_NAME)
25
- fromdoc = { CONFIG_NAME => page[CONFIG_NAME] }
26
- config = config.merge(fromdoc)
12
+ config = {
13
+ "cve" => {},
14
+ "cwe" => {},
15
+ "divd" => {}
16
+ }
17
+
18
+ # CVE
19
+
20
+ if site_config && site_config.key?(CONFIG_NAME)
21
+ #config["site"] = site_config[CONFIG_NAME]
22
+ if site_config[CONFIG_NAME].key?("cve") && site_config[CONFIG_NAME]["cve"]
23
+ if site_config[CONFIG_NAME]["cve"].key?("style") && site_config[CONFIG_NAME]["cve"]["style"]
24
+ config["cve"]["style"] = site_config[CONFIG_NAME]["cve"]["style"]
25
+ end
26
+ if site_config[CONFIG_NAME]["cve"].key?("url") && site_config[CONFIG_NAME]["cve"]["url"]
27
+ config["cve"]["url"] = site_config[CONFIG_NAME]["cve"]["url"]
28
+ end
29
+ end
27
30
  end
28
31
 
29
- if not config[CONFIG_NAME]["cve"].key?("url")
30
- case config[CONFIG_NAME]["cve"]["style"]
32
+ if page.key?(CONFIG_NAME) && page[CONFIG_NAME]
33
+ if page[CONFIG_NAME].key?("cve") && page[CONFIG_NAME]["cve"]
34
+ if page[CONFIG_NAME]["cve"].key?("style") && page[CONFIG_NAME]["cve"]["style"]
35
+ config["cve"]["style"]=page[CONFIG_NAME]["cve"]["style"]
36
+ config["cve"].delete("url")
37
+ end
38
+ if page[CONFIG_NAME]["cve"].key?("url") && page[CONFIG_NAME]["cve"]["url"]
39
+ config["cve"]["url"]=page[CONFIG_NAME]["cve"]["url"]
40
+ config["cve"].delete("style")
41
+ end
42
+ end
43
+ end
44
+
45
+ if not config["cve"]["url"]
46
+ case config["cve"]["style"]
31
47
  when "mitre"
32
- config[CONFIG_NAME]["cve"]["url"] = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-"
48
+ config["cve"]["url"] = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-"
33
49
  when "cvedetails"
34
- config[CONFIG_NAME]["cve"]["url"] = "https://www.cvedetails.com/cve/CVE-%s/"
50
+ config["cve"]["url"] = "https://www.cvedetails.com/cve/CVE-%s/"
35
51
  when "nvd"
36
- config[CONFIG_NAME]["cve"]["url"] = "https://nvd.nist.gov/vuln/detail/CVE-"
52
+ config["cve"]["url"] = "https://nvd.nist.gov/vuln/detail/CVE-"
53
+ else
54
+ # Unknown CVE style using 'mitre'-style instead
55
+ config["cve"]["url"] = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-"
56
+ end
57
+ end
58
+
59
+ # CWE
60
+
61
+ if site_config && site_config.key?(CONFIG_NAME)
62
+ if site_config[CONFIG_NAME].key?("cwe") && site_config[CONFIG_NAME]["cwe"]
63
+ if site_config[CONFIG_NAME]["cwe"].key?("style") && site_config[CONFIG_NAME]["cwe"]["style"]
64
+ config["cwe"]["style"] = site_config[CONFIG_NAME]["cwe"]["style"]
65
+ end
66
+ if site_config[CONFIG_NAME]["cwe"].key?("url") && site_config[CONFIG_NAME]["cwe"]["url"]
67
+ config["cwe"]["url"] = site_config[CONFIG_NAME]["cwe"]["url"]
68
+ end
69
+ end
70
+ end
71
+
72
+ if page.key?(CONFIG_NAME) && page[CONFIG_NAME]
73
+ if page[CONFIG_NAME].key?("cwe") && page[CONFIG_NAME]["cwe"]
74
+ if page[CONFIG_NAME]["cwe"].key?("style") && page[CONFIG_NAME]["cwe"]["style"]
75
+ config["cwe"]["style"]=page[CONFIG_NAME]["cwe"]["style"]
76
+ config["cwe"].delete("url")
77
+ end
78
+ if page[CONFIG_NAME]["cwe"].key?("url") && page[CONFIG_NAME]["cwe"]["url"]
79
+ config["cwe"]["url"]=page[CONFIG_NAME]["cwe"]["url"]
80
+ config["cwe"].delete("style")
81
+ end
82
+ end
83
+ end
84
+
85
+ if not config["cwe"]["url"]
86
+ case config["cwe"]["style"]
87
+ when "mitre", "nvd"
88
+ config["cwe"]["url"] = "https://cwe.mitre.org/data/definitions/%s.html"
89
+ when "cvedetails"
90
+ config["cwe"]["url"] = "https://www.cvedetails.com/cwe-details/"
37
91
  else
38
- # Unknown CVE style unsing 'mitre'-style instead
39
- config[CONFIG_NAME]["cve"]["url"] = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-"
92
+ # Unknown CWE style using 'mitre'-style instead
93
+ config["cwe"]["url"] = "https://cwe.mitre.org/data/definitions/%s.html"
40
94
  end
41
95
  end
42
96
 
43
- return config[CONFIG_NAME]
97
+ # DIVD
98
+
99
+ if site_config && site_config.key?(CONFIG_NAME)
100
+ if site_config[CONFIG_NAME].key?("divd") && site_config[CONFIG_NAME]["divd"]
101
+ if site_config[CONFIG_NAME]["divd"].key?("url") && site_config[CONFIG_NAME]["divd"]["url"]
102
+ config["divd"]["url"] = site_config[CONFIG_NAME]["divd"]["url"]
103
+ end
104
+ end
105
+ end
106
+
107
+ if page.key?(CONFIG_NAME) && page[CONFIG_NAME]
108
+ if page[CONFIG_NAME].key?("divd")
109
+ if page[CONFIG_NAME]["divd"]
110
+ if page[CONFIG_NAME]["divd"].key?("url")
111
+ if page[CONFIG_NAME]["divd"]["url"]
112
+ config["divd"]["url"]=page[CONFIG_NAME]["divd"]["url"]
113
+ else
114
+ config["divd"].delete("url")
115
+ end
116
+ end
117
+ else
118
+ config["divd"] = {}
119
+ end
120
+ end
121
+ end
122
+
123
+ if not config["divd"]["url"]
124
+ config["divd"]["url"] = "https://csirt.divd.nl/DIVD-"
125
+ end
126
+
127
+ return config
44
128
  end #get_config
45
129
 
46
130
  end #Config
@@ -9,7 +9,7 @@ require "jekyll-secinfo/config"
9
9
  module Jekyll::Secinfo
10
10
  class Cve
11
11
 
12
- def self.cve_to_link(text, site, page)
12
+ def self.to_link(text, site, page)
13
13
  #Logger.log(context)
14
14
  config = Jekyll::Secinfo::Config.get(site, page)
15
15
  m = text.match(/^(CVE-|cve-)?(\d{4}-\d{4,})/) # See https://cve.mitre.org/cve/identifiers/syntaxchange.html
@@ -19,7 +19,7 @@ module Jekyll::Secinfo
19
19
  else
20
20
  url="#{config["cve"]["url"]}#{m[2]}"
21
21
  end
22
- return "<a href='#{url}' class='cve'>CVE-#{m[2]}</a>"
22
+ return "<a href='#{url}' class='cve secinfo'>CVE-#{m[2]}</a>"
23
23
  else
24
24
  return nil
25
25
  end
@@ -35,7 +35,7 @@ module Jekyll::Secinfo
35
35
 
36
36
  def render(context)
37
37
  cve_text = @text.strip
38
- out = Cve.cve_to_link(cve_text, context["site"]["config"], context["page"])
38
+ out = Cve.to_link(cve_text, context["site"], context["page"])
39
39
  return out if out
40
40
  return @text
41
41
  end
@@ -45,7 +45,7 @@ module Jekyll::Secinfo
45
45
  module CveFilter
46
46
  def cve(cvetxt, niets = nil)
47
47
  if cvetxt
48
- link = Cve.cve_to_link(cvetxt, @context.registers[:site].config, @context.registers[:page])
48
+ link = Cve.to_link(cvetxt, @context.registers[:site].config, @context.registers[:page])
49
49
  if link
50
50
  return link
51
51
  else
@@ -0,0 +1,63 @@
1
+ # External
2
+ require "jekyll"
3
+ require "jekyll-secinfo/version"
4
+
5
+ # Support
6
+ require "jekyll-secinfo/logger"
7
+ require "jekyll-secinfo/config"
8
+
9
+ module Jekyll::Secinfo
10
+ class Cwe
11
+
12
+ def self.to_link(text, site, page)
13
+ #Logger.log(context)
14
+ config = Jekyll::Secinfo::Config.get(site, page)
15
+ m = text.match(/^(CWE-|cwe-)?(\d+)/)
16
+ if m
17
+ if config["cwe"]["url"] =~ /\%s/
18
+ url=config["cwe"]["url"] % m[2]
19
+ else
20
+ url="#{config["cwe"]["url"]}#{m[2]}"
21
+ end
22
+ return "<a href='#{url}' class='cwe secinfo'>CWE-#{m[2]}</a>"
23
+ else
24
+ return nil
25
+ end
26
+ end
27
+ end
28
+
29
+ class CweTag < Liquid::Tag
30
+
31
+ def initialize(tagName, text, tokens)
32
+ super
33
+ @text = text
34
+ end
35
+
36
+ def render(context)
37
+ cwe_text = @text.strip
38
+ out = Cwe.to_link(cwe_text, context["site"], context["page"])
39
+ return out if out
40
+ return @text
41
+ end
42
+
43
+ end
44
+
45
+ module CweFilter
46
+ def cwe(cwetxt, niets = nil)
47
+ if cwetxt
48
+ link = Cwe.to_link(cwetxt, @context.registers[:site].config, @context.registers[:page])
49
+ if link
50
+ return link
51
+ else
52
+ return cwetxt
53
+ end
54
+ else
55
+ return ""
56
+ end
57
+ end
58
+ end
59
+
60
+ Liquid::Template.register_tag("cwe", Jekyll::Secinfo::CweTag)
61
+ Liquid::Template.register_filter(CweFilter)
62
+
63
+ end
@@ -0,0 +1,64 @@
1
+ # External
2
+ require "jekyll"
3
+ require "jekyll-secinfo/version"
4
+
5
+ # Support
6
+ require "jekyll-secinfo/logger"
7
+ require "jekyll-secinfo/config"
8
+
9
+ module Jekyll::Secinfo
10
+ class Divd
11
+
12
+ def self.to_link(text, site, page)
13
+ #Logger.log(context)
14
+ config = Jekyll::Secinfo::Config.get(site, page)
15
+
16
+ m = text.match(/^(DIVD-|divd-)?(\d{4}\-\d+)/)
17
+ if m
18
+ if config["divd"]["url"] =~ /\%s/
19
+ url=config["divd"]["url"] % m[2]
20
+ else
21
+ url="#{config["divd"]["url"]}#{m[2]}"
22
+ end
23
+ return "<a href='#{url}' class='divd secinfo'>DIVD-#{m[2]}</a>"
24
+ else
25
+ return nil
26
+ end
27
+ end
28
+ end
29
+
30
+ class DivdTag < Liquid::Tag
31
+
32
+ def initialize(tagName, text, tokens)
33
+ super
34
+ @text = text
35
+ end
36
+
37
+ def render(context)
38
+ divd_text = @text.strip
39
+ out = Divd.to_link(divd_text, context["site"], context["page"])
40
+ return out if out
41
+ return @text
42
+ end
43
+
44
+ end
45
+
46
+ module DivdFilter
47
+ def divd(divdtxt, niets = nil)
48
+ if divdtxt
49
+ link = Divd.to_link(divdtxt, @context.registers[:site].config, @context.registers[:page])
50
+ if link
51
+ return link
52
+ else
53
+ return divdtxt
54
+ end
55
+ else
56
+ return ""
57
+ end
58
+ end
59
+ end
60
+
61
+ Liquid::Template.register_tag("divd", Jekyll::Secinfo::DivdTag)
62
+ Liquid::Template.register_filter(DivdFilter)
63
+
64
+ end
@@ -1,10 +1,6 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  require 'jekyll-secinfo/version'
4
- require 'rainbow/refinement'
5
-
6
- using Rainbow
7
-
8
4
 
9
5
  module Jekyll::Secinfo
10
6
  class Logger
@@ -15,14 +11,14 @@ module Jekyll::Secinfo
15
11
  def self.display_info
16
12
  self.log "Jekyll-Secinfo #{Jekyll::Secinfo::VERSION}"
17
13
  self.log 'A Jekyll plugin to provide clickability to security info like CVEs and CWEs.'
18
- self.log 'https://github.com/MrSeccubus/jekyll-secinfo'.underline
14
+ self.log 'https://github.com/MrSeccubus/jekyll-secinfo'
19
15
  end
20
16
 
21
17
  def self.log(content)
22
18
  if (content.is_a? String)
23
- self.output 'Jekyll Secinfo', content.bright
19
+ self.output 'Jekyll Secinfo', content
24
20
  else
25
- self.output 'Jekyll Secinfo', content.inspect.bright
21
+ self.output 'Jekyll Secinfo', content.inspect
26
22
  end
27
23
  end
28
24
 
@@ -1,5 +1,5 @@
1
1
  module Jekyll
2
2
  module Secinfo
3
- VERSION = "0.1.1"
3
+ VERSION = "0.3.2"
4
4
  end
5
5
  end
@@ -8,6 +8,8 @@ require "jekyll-secinfo/logger"
8
8
 
9
9
  # Core
10
10
  require "jekyll-secinfo/cve"
11
+ require "jekyll-secinfo/cwe"
12
+ require "jekyll-secinfo/divd"
11
13
 
12
14
  module Jekyll::Secinfo
13
15
  Logger.display_info
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: jekyll-secinfo
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.1
4
+ version: 0.3.2
5
5
  platform: ruby
6
6
  authors:
7
7
  - Frank Breedijk
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-01-29 00:00:00.000000000 Z
11
+ date: 2022-01-11 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: jekyll
@@ -24,20 +24,6 @@ dependencies:
24
24
  - - ">="
25
25
  - !ruby/object:Gem::Version
26
26
  version: '0'
27
- - !ruby/object:Gem::Dependency
28
- name: rainbow
29
- requirement: !ruby/object:Gem::Requirement
30
- requirements:
31
- - - "~>"
32
- - !ruby/object:Gem::Version
33
- version: '3.0'
34
- type: :runtime
35
- prerelease: false
36
- version_requirements: !ruby/object:Gem::Requirement
37
- requirements:
38
- - - "~>"
39
- - !ruby/object:Gem::Version
40
- version: '3.0'
41
27
  - !ruby/object:Gem::Dependency
42
28
  name: bundler
43
29
  requirement: !ruby/object:Gem::Requirement
@@ -114,6 +100,8 @@ files:
114
100
  - lib/jekyll-secinfo.rb
115
101
  - lib/jekyll-secinfo/config.rb
116
102
  - lib/jekyll-secinfo/cve.rb
103
+ - lib/jekyll-secinfo/cwe.rb
104
+ - lib/jekyll-secinfo/divd.rb
117
105
  - lib/jekyll-secinfo/logger.rb
118
106
  - lib/jekyll-secinfo/version.rb
119
107
  homepage: https://github.com/MrSeccubus/jekyll-secinfo
@@ -135,7 +123,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
135
123
  - !ruby/object:Gem::Version
136
124
  version: '0'
137
125
  requirements: []
138
- rubygems_version: 3.2.3
126
+ rubygems_version: 3.3.3
139
127
  signing_key:
140
128
  specification_version: 4
141
129
  summary: jekyll plugin to generate html snippets various security info