@@ -10,7 +10,6 @@ import (
1010 "github.com/jfrog/jfrog-cli-security/utils/jasutils"
1111 "github.com/jfrog/jfrog-cli-security/utils/results"
1212 "github.com/jfrog/jfrog-cli-security/utils/severityutils"
13- "github.com/jfrog/jfrog-cli-security/utils/techutils"
1413 "github.com/jfrog/jfrog-client-go/xray/services"
1514 "github.com/owenrumney/go-sarif/v2/sarif"
1615)
@@ -236,10 +235,6 @@ func PrepareSimpleJsonVulnerabilities(target results.ScanTarget, scaResponse ser
236235
237236func addSimpleJsonVulnerability (target results.ScanTarget , vulnerabilitiesRows * []formats.VulnerabilityOrViolationRow , pretty bool ) results.ParseScaVulnerabilityFunc {
238237 return func (vulnerability services.Vulnerability , cves []formats.CveRow , applicabilityStatus jasutils.ApplicabilityStatus , severity severityutils.Severity , impactedPackagesName , impactedPackagesVersion , impactedPackagesType string , fixedVersion []string , directComponents []formats.ComponentRow , impactPaths [][]formats.ComponentRow ) error {
239- tech := target .Technology
240- if tech == "" {
241- tech = techutils .Technology (impactedPackagesType )
242- }
243238 * vulnerabilitiesRows = append (* vulnerabilitiesRows ,
244239 formats.VulnerabilityOrViolationRow {
245240 Summary : vulnerability .Summary ,
@@ -256,7 +251,7 @@ func addSimpleJsonVulnerability(target results.ScanTarget, vulnerabilitiesRows *
256251 References : vulnerability .References ,
257252 JfrogResearchInformation : convertJfrogResearchInformation (vulnerability .ExtendedInformation ),
258253 ImpactPaths : impactPaths ,
259- Technology : tech ,
254+ Technology : results . GetIssueTechnology ( vulnerability . Technology , target . Technology ) ,
260255 Applicable : applicabilityStatus .ToString (pretty ),
261256 },
262257 )
@@ -266,10 +261,6 @@ func addSimpleJsonVulnerability(target results.ScanTarget, vulnerabilitiesRows *
266261
267262func addSimpleJsonSecurityViolation (target results.ScanTarget , securityViolationsRows * []formats.VulnerabilityOrViolationRow , pretty bool ) results.ParseScaViolationFunc {
268263 return func (violation services.Violation , cves []formats.CveRow , applicabilityStatus jasutils.ApplicabilityStatus , severity severityutils.Severity , impactedPackagesName , impactedPackagesVersion , impactedPackagesType string , fixedVersion []string , directComponents []formats.ComponentRow , impactPaths [][]formats.ComponentRow ) error {
269- tech := target .Technology
270- if tech == "" {
271- tech = techutils .Technology (impactedPackagesType )
272- }
273264 * securityViolationsRows = append (* securityViolationsRows ,
274265 formats.VulnerabilityOrViolationRow {
275266 Summary : violation .Summary ,
@@ -290,7 +281,7 @@ func addSimpleJsonSecurityViolation(target results.ScanTarget, securityViolation
290281 References : violation .References ,
291282 JfrogResearchInformation : convertJfrogResearchInformation (violation .ExtendedInformation ),
292283 ImpactPaths : impactPaths ,
293- Technology : tech ,
284+ Technology : results . GetIssueTechnology ( violation . Technology , target . Technology ) ,
294285 Applicable : applicabilityStatus .ToString (pretty ),
295286 },
296287 )
0 commit comments