Giter VIP home page Giter VIP logo

robotframework-dblibrary's Introduction

Torilla Tavataan! Let's meet at the Market Square!

Torilla Tavataan

Let's meet at the Market Square!

Welcome to MarketSquare, a community run collection of repositories for Robot Framework.

See https://marketsquare.github.io/ on how to request access/join the MarketSquare.

For more information about the MarketSquare organization see our FAQ.

[1]Torilla Tavataan emoji is licensed by the Finnish Ministry for Foreign Affairs, Department for Communications

robotframework-dblibrary's People

Contributors

avanderberg avatar dependabot[bot] avatar hi-fi avatar hleskien avatar mend-bolt-for-github[bot] avatar thomasjaspers avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar

robotframework-dblibrary's Issues

Query result does not contain columns in expected order

Hi,

if I do a SQL query with columns in a certain order, the database delivers them correctly, but the order is lost (random) in the result. The reason is using HashMap instead of LinkedHashMap which would keep the insertion order. I don't know yet whether this works together with Robot Framework.

Example:

SELECT COLUMNA, COLUMNB, COLUMNC FROM TABLEABC
->
@{result} = [ { COLUMNB: 2, COLUMNA: 1, COLUMNC: 3 }, { COLUMNB: 5, COLUMNA: 4, COLUMNC: 6 }, { COLUMNB: 8, COLUMNA: 7, COLUMNC: 9 } ]

Kind regards,

Holger

Missing instructions on how to Install DBLibrary

I am trying to install with pip with the command (Python 3.9):
pip install robotframework-dblibrary

It reports:

ERROR: Could not find a version that satisfies the requirement robotframework-dblibrary (from versions: none)
ERROR: No matching distribution found for robotframework-dblibrary

CVE-2015-4852 (High) detected in commons-collections-3.2.jar

CVE-2015-4852 - High Severity Vulnerability

Vulnerable Library - commons-collections-3.2.jar

Types that extend and augment the Java Collections Framework.

Library home page: http://jakarta.apache.org/commons/collections/

Path to dependency file: /tmp/ws-scm/robotframework-dblibrary/pom.xml

Path to vulnerable library: /root/.m2/repository/commons-collections/commons-collections/3.2/commons-collections-3.2.jar

Dependency Hierarchy:

  • javalib-core-1.2.1.jar (Root Library)
    • commons-collections-3.2.jar (Vulnerable Library)

Found in HEAD commit: 0eb30851d2bcf248aa33bfea25f36d2df56c1b9a

Vulnerability Details

The WLS Security component in Oracle WebLogic Server 10.3.6.0, 12.1.2.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to execute arbitrary commands via a crafted serialized Java object in T3 protocol traffic to TCP port 7001, related to oracle_common/modules/com.bea.core.apache.commons.collections.jar. NOTE: the scope of this CVE is limited to the WebLogic Server product.

Publish Date: 2015-11-18

URL: CVE-2015-4852

CVSS 2 Score Details (7.5)

Base Score Metrics not available

Suggested Fix

Type: Upgrade version

Origin: https://www.openwall.com/lists/oss-security/2015/11/17/19

Release Date: 2015-11-18

Fix Resolution: commons-collections:commons-collections:3.2.2


Step up your Open Source Security Game with WhiteSource here

CVE-2017-15708 (High) detected in commons-collections-3.2.jar

CVE-2017-15708 - High Severity Vulnerability

Vulnerable Library - commons-collections-3.2.jar

Types that extend and augment the Java Collections Framework.

Library home page: http://jakarta.apache.org/commons/collections/

Path to dependency file: /tmp/ws-scm/robotframework-dblibrary/pom.xml

Path to vulnerable library: /root/.m2/repository/commons-collections/commons-collections/3.2/commons-collections-3.2.jar

Dependency Hierarchy:

  • javalib-core-1.2.1.jar (Root Library)
    • commons-collections-3.2.jar (Vulnerable Library)

Found in HEAD commit: 0eb30851d2bcf248aa33bfea25f36d2df56c1b9a

Vulnerability Details

In Apache Synapse, by default no authentication is required for Java Remote Method Invocation (RMI). So Apache Synapse 3.0.1 or all previous releases (3.0.0, 2.1.0, 2.0.0, 1.2, 1.1.2, 1.1.1) allows remote code execution attacks that can be performed by injecting specially crafted serialized objects. And the presence of Apache Commons Collections 3.2.1 (commons-collections-3.2.1.jar) or previous versions in Synapse distribution makes this exploitable. To mitigate the issue, we need to limit RMI access to trusted users only. Further upgrading to 3.0.1 version will eliminate the risk of having said Commons Collection version. In Synapse 3.0.1, Commons Collection has been updated to 3.2.2 version.

Publish Date: 2017-12-11

URL: CVE-2017-15708

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15708

Release Date: 2017-12-11

Fix Resolution: org.apache.synapse:Apache-Synapse:3.0.1;commons-collections:commons-collections:3.2.2


Step up your Open Source Security Game with WhiteSource here

Export/Import Tables to/from Files

From @ThomasJaspers on January 27, 2012 12:50

Following methods have been postponed to a later release of this library
to get a first version out soon and to get thus hopefully some feedback on
it.

/**
 * Exports the data from the given table into a file that is stored at the
     \* given location. The where-clause can (and should) be used to narrow the
     \* amount of rows that is exported this way. The file is stored in some
     \* simple XML-format and can be imported again to the database using the
     \* "Import Data From File" keyword. This way it is possible to store a set
     \* of testdata permanently retrieving it for example from some Live- or
     \* Demosystem. This keyword will probably have some issues if millions of
     \* rows are exported/imported using it.
     \* 
     \* The keyword returns the amount of rows written to the XML-file.
     \* 
     \* Example: | ${ROWSEXPORTED}= | MySampleTable | /tmp/mysampletable.xml |
     \* Timestamp > sysdate-50 |
     \* 
     */
    public int exportDataFromTable(String tableName, String filePath,
            String whereClause) {
        return 0;
    }
/**
 * This keyword reads data from a XML-file and stores the corresponding data
     \* to the database. The file must have been created using the
     \* "Export Data From Table" keyword or it must be created manually in the
     \* exact format. The XML-file contains not only the data as such, but also
     \* the name of the schema and table from which the data was exported. The
     \* same information is used for the import.
     \* 
     \* The keyword returns the amount of rows that have been successfully stored
     \* to the database table.
     \* 
     \* Example: | ${ROWSIMPORTED}= | /tmp/mysampletable.xml |
     \* 
     */
    public int importDataFromFile(String filePath) {
        return 0;
    }

Copied from original issue: ThomasJaspers/robotframework-dblibrary#1

Update to JDK11

Push major version and publish new version with tested JDK11 support.

Optionally update dependencies for Jdk8 version and publish it as deprecated.

CVE-2015-7501 (High) detected in commons-collections-3.2.jar

CVE-2015-7501 - High Severity Vulnerability

Vulnerable Library - commons-collections-3.2.jar

Types that extend and augment the Java Collections Framework.

Library home page: http://jakarta.apache.org/commons/collections/

Path to dependency file: /tmp/ws-scm/robotframework-dblibrary/pom.xml

Path to vulnerable library: /root/.m2/repository/commons-collections/commons-collections/3.2/commons-collections-3.2.jar

Dependency Hierarchy:

  • javalib-core-1.2.1.jar (Root Library)
    • commons-collections-3.2.jar (Vulnerable Library)

Found in HEAD commit: 0eb30851d2bcf248aa33bfea25f36d2df56c1b9a

Vulnerability Details

Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.

Publish Date: 2017-11-09

URL: CVE-2015-7501

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://bugzilla.redhat.com/show_bug.cgi?id=1279330

Release Date: 2017-11-09

Fix Resolution: commons-collections:commons-collections:3.2.2;org.apache.commons:commons-collections4:4.1


Step up your Open Source Security Game with WhiteSource here

Please update dependency on javalib-core to version 2.0.x

Hi,

I maintain a project which depends indirectly on Javalib-Core in both versions 1.2.1 and 2.0.3. If I make robotframework-dblibrary use version 2.0.3 I get a NullPointerException. I will add an example soon.

Kind regards

Holger

CVE-2015-6420 (High) detected in commons-collections-3.2.jar

CVE-2015-6420 - High Severity Vulnerability

Vulnerable Library - commons-collections-3.2.jar

Types that extend and augment the Java Collections Framework.

Library home page: http://jakarta.apache.org/commons/collections/

Path to dependency file: /tmp/ws-scm/robotframework-dblibrary/pom.xml

Path to vulnerable library: /root/.m2/repository/commons-collections/commons-collections/3.2/commons-collections-3.2.jar

Dependency Hierarchy:

  • javalib-core-1.2.1.jar (Root Library)
    • commons-collections-3.2.jar (Vulnerable Library)

Found in HEAD commit: 0eb30851d2bcf248aa33bfea25f36d2df56c1b9a

Vulnerability Details

Serialized-object interfaces in certain Cisco Collaboration and Social Media; Endpoint Clients and Client Software; Network Application, Service, and Acceleration; Network and Content Security Devices; Network Management and Provisioning; Routing and Switching - Enterprise and Service Provider; Unified Computing; Voice and Unified Communications Devices; Video, Streaming, TelePresence, and Transcoding Devices; Wireless; and Cisco Hosted Services products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.

Publish Date: 2015-12-15

URL: CVE-2015-6420

CVSS 2 Score Details (7.5)

Base Score Metrics not available

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6420

Release Date: 2015-12-15

Fix Resolution: org.apache.commons:commons-collections4:4.1


Step up your Open Source Security Game with WhiteSource here

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.