diff --git a/cve-vulner-manager/cve-py/tabletask/supplement_cve.py b/cve-vulner-manager/cve-py/tabletask/supplement_cve.py index 911a00fc72cb5cc93c14dc0c475dfe949b87268f..17203cec9e431868fbbe7830d438232b871e49f7 100644 --- a/cve-vulner-manager/cve-py/tabletask/supplement_cve.py +++ b/cve-vulner-manager/cve-py/tabletask/supplement_cve.py @@ -283,7 +283,7 @@ def long_supplement_cve(): return None """ mysql = Mysql() - cve_list = query_cve_all_data(mysql, 15) + cve_list = query_cve_all_data(mysql, 1500) if cve_list is not None and len(cve_list) > 0: for cve in cve_list: print(cve) diff --git a/cve-vulner-manager/taskhandler/yaml.go b/cve-vulner-manager/taskhandler/yaml.go index a7d34cf64ddea4ec5b2463920e23c0fbf96885b7..cd797e7094c2ee540fc244cc68c546cf4aa2b916 100644 --- a/cve-vulner-manager/taskhandler/yaml.go +++ b/cve-vulner-manager/taskhandler/yaml.go @@ -424,7 +424,7 @@ func GetEulerYamlInfo(url string) (string, error) { return "", fmt.Errorf("Data is empty, url: %s", compUrl) } if respBody["code"].(float64) == 200 && respBody["total"].(float64) > 0 { - models.TruncateOpenEulerRepoOrigin() + //models.TruncateOpenEulerRepoOrigin() for _, values := range respBody["data"].([]interface{}) { valuesX := values.(map[string]interface{}) ProcYamlInfo(valuesX)