aops-ceres/0004-update-hotpatch-info-query-func.patch
rabbitali f8e001f27b update hostpatch info query func
(cherry picked from commit 77f59c8cc8f2037ae15ac8ee8f2d5185d74cf5ff)
2023-06-21 14:22:19 +08:00

27 lines
1015 B
Diff

From f198f261309b3f0b01ee1462c896b8d931346bbb Mon Sep 17 00:00:00 2001
From: gongzt <gong_zhengtang@163.com>
Date: Tue, 20 Jun 2023 15:07:59 +0800
Subject: [PATCH] update hostpatch info query func
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
---
ceres/manages/vulnerability_manage.py | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/ceres/manages/vulnerability_manage.py b/ceres/manages/vulnerability_manage.py
index c153190..8547abe 100644
--- a/ceres/manages/vulnerability_manage.py
+++ b/ceres/manages/vulnerability_manage.py
@@ -406,7 +406,7 @@ class VulnerabilityManage:
if not hotpatch_info.startswith("CVE"):
continue
cve_id, base_pkg, status = [info.strip() for info in hotpatch_info.split()]
- if status != "ACTIVED" and status != "ACCEPT":
+ if status != "ACTIVED" and status != "ACCEPTED":
continue
hotpatch_list[base_pkg].append(cve_id)
--