Skip to content

Commit

Permalink
fix: requested changes
Browse files Browse the repository at this point in the history
  • Loading branch information
mastersans committed Jun 30, 2024
1 parent e1da81d commit 642b925
Show file tree
Hide file tree
Showing 2 changed files with 8 additions and 9 deletions.
12 changes: 6 additions & 6 deletions cve_bin_tool/cli.py
Original file line number Diff line number Diff line change
Expand Up @@ -208,14 +208,14 @@ def main(argv=None):
input_group.add_argument(
"--vex",
action="store",
choices=["cyclonedx", "csaf", "open"],
help="specify type of vulnerability exchange (vex) (default: auto)",
choices=["cyclonedx", "csaf", "openvex"],
help="specify type of vulnerability exchange (vex) for triage processing (default: auto)",
default="auto",
)
input_group.add_argument(
"--vex-file",
action="store",
help="provide vulnerability exchange (vex) filename",
help="provide vulnerability exchange (vex) filename for triage processing",
default="",
)

Expand Down Expand Up @@ -373,19 +373,19 @@ def main(argv=None):
"--product",
action="store",
default="",
help="Product name for VEX generation",
help="Product Name",
)
output_group.add_argument(
"--release",
action="store",
default="",
help="Release version for VEX generation",
help="Release Version",
)
output_group.add_argument(
"--vendor",
action="store",
default="",
help="Vendor/Supplier name of Product for VEX generation",
help="Vendor/Supplier of Product",
)
parser.add_argument(
"-e",
Expand Down
5 changes: 2 additions & 3 deletions cve_bin_tool/vex_manager/generate.py
Original file line number Diff line number Diff line change
Expand Up @@ -134,9 +134,8 @@ def get_vulnerabilities(self) -> List[Vulnerability]:
vulnerability.set_status(self.analysis_state[self.vextype][cve.remarks])
if cve.justification:
vulnerability.set_justification(cve.justification)
# set_remediation is not available for lib4sbom pypi version for now
# if cve.response:
# vulnerability.set_remediation(cve.response[0])
if cve.response:
vulnerability.set_value("remediation", cve.response[0])
detail = (
f"{cve.remarks.name}: {cve.comments}"
if cve.comments
Expand Down

0 comments on commit 642b925

Please sign in to comment.