From 8288145dee89a9394665fdd08903623e87a18677 Mon Sep 17 00:00:00 2001 From: zjm <1076115376@qq.com> Date: Wed, 22 Jun 2022 14:19:02 +0800 Subject: [PATCH] mindspore add issue collaborators --- cve-vulner-manager/taskhandler/common.go | 75 ++++++++---------------- 1 file changed, 25 insertions(+), 50 deletions(-) diff --git a/cve-vulner-manager/taskhandler/common.go b/cve-vulner-manager/taskhandler/common.go index ffc3d6b..58d6482 100644 --- a/cve-vulner-manager/taskhandler/common.go +++ b/cve-vulner-manager/taskhandler/common.go @@ -986,16 +986,11 @@ func CreateIssueBody(accessToken, owner, path, assignee string, genPatchInfo(cve.CveNum), cveAnalysis, openEulerScore, oVector, affectedVersion) } } - requestBody = fmt.Sprintf(`{ - "access_token": "%s", - "repo": "%s", - "title": "%s", - "state": "%s", - "body": "%s", - "assignee": "%s", - "labels": "%s", - "security_hole": "false" - }`, accessToken, path, cve.CveNum, StatusName, body, assignee, labels) + if cve.OrganizationID == 3 && assignee != "fangzhou0329" { + requestBody = fmt.Sprintf(`{"access_token": "%s","repo": "%s","title": "%s","state": "%s","body": "%s","assignee": "%s","labels": "%s","security_hole": "false","collaborators":"fangzhou0329"}`, accessToken, path, cve.CveNum, StatusName, body, assignee, labels) + } else { + requestBody = fmt.Sprintf(`{"access_token": "%s","repo": "%s","title": "%s","state": "%s","body": "%s","assignee": "%s","labels": "%s","security_hole": "false"}`, accessToken, path, cve.CveNum, StatusName, body, assignee, labels) + } } else { nveScore := score + " " + cve.CveLevel nveVector := scoreType + "/" + sc.NvectorVule @@ -1010,16 +1005,11 @@ func CreateIssueBody(accessToken, owner, path, assignee string, cve.Description, cve.RepairTime, updateTime, cve.CveDetailUrl, commentCmd, holeSource(cve.DataSource), genPatchInfo(cve.CveNum), cveAnalysis, openEulerScore, affectedVersion) } - requestBody = fmt.Sprintf(`{ - "access_token": "%s", - "repo": "%s", - "title": "%s", - "state": "%s", - "body": "%s", - "assignee": "%s", - "labels": "%s", - "security_hole": "false" - }`, accessToken, path, cve.CveNum, StatusName, body, assignee, labels) + if cve.OrganizationID == 3 && assignee != "fangzhou0329"{ + requestBody = fmt.Sprintf(`{"access_token": "%s","repo": "%s","title": "%s","state": "%s","body": "%s","assignee": "%s","labels": "%s","security_hole": "false","collaborators":"fangzhou0329"}`, accessToken, path, cve.CveNum, StatusName, body, assignee, labels) + } else { + requestBody = fmt.Sprintf(`{"access_token": "%s","repo": "%s","title": "%s","state": "%s","body": "%s","assignee": "%s","labels": "%s","security_hole": "false"}`, accessToken, path, cve.CveNum, StatusName, body, assignee, labels) + } } } else if flag == 2 { nveScore := score + " " + cve.CveLevel @@ -1035,16 +1025,11 @@ func CreateIssueBody(accessToken, owner, path, assignee string, cve.Description, cve.RepairTime, updateTime, cve.CveDetailUrl, commentCmd, holeSource(cve.DataSource), genPatchInfo(cve.CveNum), cveAnalysis, openEulerScore, affectedVersion) } - requestBody = fmt.Sprintf(`{ - "access_token": "%s", - "repo": "%s", - "title": "%s", - "issue_type": "%s", - "body": "%s", - "assignee": "%s", - "labels": "%s", - "security_hole": "false" - }`, accessToken, path, cve.CveNum, issueType, body, assignee, labels) + if cve.OrganizationID == 3 && assignee != "fangzhou0329"{ + requestBody = fmt.Sprintf(`{"access_token": "%s","repo": "%s","title": "%s","issue_type": "%s","body": "%s","assignee": "%s","labels": "%s","security_hole": "false","collaborators":"fangzhou0329"}`, accessToken, path, cve.CveNum, issueType, body, assignee, labels) + } else { + requestBody = fmt.Sprintf(`{"access_token": "%s","repo": "%s","title": "%s","issue_type": "%s","body": "%s","assignee": "%s","labels": "%s","security_hole": "false"}`, accessToken, path, cve.CveNum, issueType, body, assignee, labels) + } } else { if floatOpenEulerScore > 0.0 || (its.OpenEulerVector != "" && len(its.OpenEulerVector) > 1) { nveScore := score + " " + cve.CveLevel @@ -1066,16 +1051,11 @@ func CreateIssueBody(accessToken, owner, path, assignee string, genPatchInfo(cve.CveNum), cveAnalysis, openEulerScore, oVector, affectedVersion) } } - requestBody = fmt.Sprintf(`{ - "access_token": "%s", - "repo": "%s", - "title": "%s", - "state": "%s", - "body": "%s", - "assignee": "%s", - "labels": "%s", - "security_hole": "false" - }`, accessToken, path, cve.CveNum, StatusName, body, its.Assignee, labels) + if cve.OrganizationID == 3 && its.Assignee != "fangzhou0329"{ + requestBody = fmt.Sprintf(`{"access_token": "%s","repo": "%s","title": "%s","state": "%s","body": "%s","assignee": "%s","labels": "%s","security_hole": "false","collaborators":"fangzhou0329"}`, accessToken, path, cve.CveNum, StatusName, body, its.Assignee, labels) + } else { + requestBody = fmt.Sprintf(`{"access_token": "%s","repo": "%s","title": "%s","state": "%s","body": "%s","assignee": "%s","labels": "%s","security_hole": "false"}`, accessToken, path, cve.CveNum, StatusName, body, its.Assignee, labels) + } } else { openEulerScore = " " nveScore := score + " " + cve.CveLevel @@ -1090,16 +1070,11 @@ func CreateIssueBody(accessToken, owner, path, assignee string, cve.Description, cve.RepairTime, updateTime, cve.CveDetailUrl, commentCmd, holeSource(cve.DataSource), genPatchInfo(cve.CveNum), cveAnalysis, openEulerScore, affectedVersion) } - requestBody = fmt.Sprintf(`{ - "access_token": "%s", - "repo": "%s", - "title": "%s", - "state": "%s", - "body": "%s", - "assignee": "%s", - "labels": "%s", - "security_hole": "false" - }`, accessToken, path, cve.CveNum, StatusName, body, its.Assignee, labels) + if cve.OrganizationID == 3 && its.Assignee != "fangzhou0329"{ + requestBody = fmt.Sprintf(`{"access_token": "%s","repo": "%s","title": "%s","state": "%s","body": "%s","assignee": "%s","labels": "%s","security_hole": "false","collaborators":"fangzhou0329"}`, accessToken, path, cve.CveNum, StatusName, body, its.Assignee, labels) + } else { + requestBody = fmt.Sprintf(`{"access_token": "%s","repo": "%s","title": "%s","state": "%s","body": "%s","assignee": "%s","labels": "%s","security_hole": "false"}`, accessToken, path, cve.CveNum, StatusName, body, its.Assignee, labels) + } } } return requestBody -- Gitee