|
44 | 44 | parser.add_argument("-s", "--save_dt",
|
45 | 45 | action='store_true',
|
46 | 46 | help="If set, the date/time will be saved to a file named '.last_run' in the current directory which can be used later with the -n option to see vulnerabilities published since the last run.")
|
47 |
| -parser.add_argument("-l", "--limit", default=9999, help="Set limit on number of vulnerabilitties to retrieve (default 9999)") |
48 |
| -parser.add_argument("-nd", type=bool, default=False, help="Disables retrieving details for each vulnerability to reduce execution time") |
| 47 | +parser.add_argument("-l", "--limit", |
| 48 | + default=9999, |
| 49 | + help="Set limit on number of vulnerabilitties to retrieve (default 9999)") |
| 50 | +parser.add_argument("-nd", "--nodetails", |
| 51 | + action='store_true', |
| 52 | + help="If set, disables retrieving details for each vulnerability to reduce execution time") |
49 | 53 | args = parser.parse_args()
|
50 | 54 |
|
51 | 55 |
|
|
69 | 73 | version = hub.get_version_by_name(project, args.version)
|
70 | 74 | version_id = object_id(version)
|
71 | 75 |
|
72 |
| -vulnerablity_limit = "limit?={}".format(args.limit) |
| 76 | +vulnerablity_limit = "?limit={}".format(args.limit) |
73 | 77 |
|
74 | 78 | vulnerable_components_url = hub.get_link(version, "vulnerable-components") + vulnerablity_limit
|
75 | 79 | custom_headers = {'Accept':'application/vnd.blackducksoftware.bill-of-materials-6+json'}
|
|
113 | 117 | elif source == "NVD":
|
114 | 118 | cve_records.add(vuln_name)
|
115 | 119 | else:
|
116 |
| - logging.warning(f"source {source} was not recognized") |
| 120 | + logging.warning("source {source} was not recognized") |
117 | 121 |
|
118 | 122 | if vulnerable_bom_components:
|
119 | 123 | vulnerable_bom_components = sorted(
|
|
0 commit comments