diff --git a/cve-vulner-manager/task/issuetask.go b/cve-vulner-manager/task/issuetask.go index 14bf83205f46a054ad6af2f242023bce58405ffb..f45d9ad39147153f6a4e587afcee3ba95a502877 100644 --- a/cve-vulner-manager/task/issuetask.go +++ b/cve-vulner-manager/task/issuetask.go @@ -21,7 +21,7 @@ import ( var mutex sync.Mutex -//GetGiteeToken Get Code Cloud API TOKEN +// GetGiteeToken Get Code Cloud API TOKEN func GetGiteeToken() error { defer common.Catchs() // Query the cve to be processed, 1: add; 2: modify @@ -439,7 +439,7 @@ func addLimitedIssue(beforeTime string, prcnum int, years, toolYears, manYears i return nil } -//CreateIssue Create issue +// CreateIssue Create issue func CreateIssue() error { defer common.Catchs() logs.Info("The issue task of creating cve begins. . .") @@ -495,7 +495,7 @@ func CreateIssue() error { } } -//ProcUpdateIssue Update issue +// ProcUpdateIssue Update issue func ProcUpdateIssue(issueValue models.VulnCenter, accessToken, owner string) error { path := issueValue.PackName // Query and modify score @@ -583,7 +583,7 @@ func ProcUpdateIssue(issueValue models.VulnCenter, accessToken, owner string) er logs.Info("ProcUpdateIssue, Successfully updated the issue template, "+ "CveNum: ", issueValue.CveNum, ", templetID: ", templetID) // Judgment of necessary fields - if it.NVDScore <= 0 || len(issueValue.Description) < 2 || len(issueValue.CveNum) < 2 || + if (it.NVDScore <= 0 && it.OwnedComponent != "kernel") || len(issueValue.Description) < 2 || len(issueValue.CveNum) < 2 || len(issueValue.PackName) < 2 || len(issueValue.CveVersion) < 1 { logs.Error("ProcUpdateIssue, Field is empty: NVDScore: ", it.NVDScore, ",Description: ", issueValue.Description, ",CveNum:", issueValue.CveNum, ",PackName: ", @@ -769,7 +769,7 @@ func OpenLooKengIssue(issueValue models.VulnCenter, accessToken, owner, path, as return nil } -//ProcIssue Deal with issue +// ProcIssue Deal with issue func ProcIssue(issueValue models.VulnCenter, accessToken, owner string) error { owner, accessToken = common.GetOwnerAndToken(issueValue.CveNum, issueValue.OrganizationID, 1) if accessToken == beego.AppConfig.String("majun::token") && !common.ValidateMajunPack(issueValue.CveNum, issueValue.RepoName) {