lint + flakes

parent ec52b623
......@@ -9,10 +9,10 @@ from failmap_admin.map.determineratings import (OrganizationRating, UrlRating, r
from failmap_admin.scanners.models import Endpoint
from failmap_admin.scanners.scanner_dns import brute_known_subdomains, certificate_transparency
from failmap_admin.scanners.scanner_http import scan_urls_on_standard_ports
from failmap_admin.scanners.scanner_tls_qualys import ScannerTlsQualys
from failmap_admin.scanners.scanner_screenshot import screenshot_urls
from failmap_admin.scanners.scanner_plain_http import scan_urls as plain_http_scan_urls
from failmap_admin.scanners.scanner_screenshot import screenshot_urls
from failmap_admin.scanners.scanner_security_headers import scan_urls as security_headers_scan_urls
from failmap_admin.scanners.scanner_tls_qualys import ScannerTlsQualys
from .models import Coordinate, Organization, OrganizationType, Url
......
......@@ -9,7 +9,7 @@ import logging
from failmap_admin.organizations.models import Url
from failmap_admin.scanners.endpoint_scan_manager import EndpointScanManager
from failmap_admin.scanners.scanner_http import scan_urls
from failmap_admin.scanners.scanner_http import scanner_http_scan_urls
from .models import Endpoint
......@@ -114,7 +114,7 @@ def scan_url(url):
def verify_is_secure(url):
# i've seen qualys saying there is no TLS, while there is!
# This _might_ revive an endpoint.
scan_urls([url], [443], ['https'])
scanner_http_scan_urls([url], [443], ['https'])
endpoints = Endpoint.objects.all().filter(url=url, is_dead=False,
protocol="https", port=443)
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment