Documentation ¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func WriteJSONReport ¶
func WriteJSONReport(jsonReport CodeqlAudit, modulePath string) ([]piperutils.Path, error)
Types ¶
type CodeqlAudit ¶
type CodeqlAudit struct { ToolName string `json:"toolName"` RepositoryUrl string `json:"repositoryUrl"` RepositoryReferenceUrl string `json:"repositoryReferenceUrl"` //URL of PR or Branch where scan was performed CodeScanningLink string `json:"codeScanningLink"` QuerySuite string `json:"querySuite"` ScanResults []CodeqlFindings `json:"findings"` }
type CodeqlFindings ¶ added in v1.301.0
type CodeqlSarifUploader ¶ added in v1.296.0
type CodeqlSarifUploader interface {
GetSarifStatus() (SarifFileInfo, error)
}
type CodeqlSarifUploaderInstance ¶ added in v1.296.0
type CodeqlSarifUploaderInstance struct {
// contains filtered or unexported fields
}
func NewCodeqlSarifUploaderInstance ¶ added in v1.296.0
func NewCodeqlSarifUploaderInstance(url, token string) CodeqlSarifUploaderInstance
func (*CodeqlSarifUploaderInstance) GetSarifStatus ¶ added in v1.296.0
func (codeqlSarifUploader *CodeqlSarifUploaderInstance) GetSarifStatus() (SarifFileInfo, error)
type CodeqlScanAudit ¶
type CodeqlScanAuditInstance ¶
type CodeqlScanAuditInstance struct {
// contains filtered or unexported fields
}
func NewCodeqlScanAuditInstance ¶
func NewCodeqlScanAuditInstance(serverUrl, owner, repository, token string, trustedCerts []string) CodeqlScanAuditInstance
func (*CodeqlScanAuditInstance) GetVulnerabilities ¶
func (codeqlScanAudit *CodeqlScanAuditInstance) GetVulnerabilities(analyzedRef string) ([]CodeqlFindings, error)
type SarifFileInfo ¶ added in v1.296.0
Click to show internal directories.
Click to hide internal directories.