@@ -524,13 +524,6 @@ func checkPolicyViolations(ctx context.Context, config *ScanOptions, scan *ws.Sc
524
524
return piperutils.Path {}, fmt .Errorf ("failed to retrieve project policy alerts from WhiteSource: %w" , err )
525
525
}
526
526
527
- // TODO add ignored alerts to list of all alerts
528
- _ , err = sys .GetProjectIgnoredAlertsByType (project .Token , "REJECTED_BY_POLICY_RESOURCE" )
529
- if err != nil {
530
- return piperutils.Path {}, fmt .Errorf ("failed to retrieve project policy ignored alerts from WhiteSource: %w" , err )
531
- }
532
- // alerts = append(alerts, ignoredAlerts...)
533
-
534
527
policyViolationCount += len (alerts )
535
528
allAlerts = append (allAlerts , alerts ... )
536
529
}
@@ -766,7 +759,11 @@ func reportGitHubIssuesAndCreateReports(
766
759
767
760
reportPaths = append (reportPaths , paths ... )
768
761
769
- sarif := ws .CreateSarifResultFile (scan , & allAlerts )
762
+ combinedAlerts := make ([]ws.Alert , 0 , len (allAlerts )+ len (allAssessedAlerts ))
763
+ combinedAlerts = append (combinedAlerts , allAlerts ... )
764
+ combinedAlerts = append (combinedAlerts , allAssessedAlerts ... )
765
+
766
+ sarif := ws .CreateSarifResultFile (scan , & combinedAlerts )
770
767
paths , err = ws .WriteSarifFile (sarif , utils )
771
768
if err != nil {
772
769
errorsOccured = append (errorsOccured , fmt .Sprint (err ))
@@ -816,18 +813,15 @@ func readAssessmentsFromFile(assessmentFilePath string, utils whitesourceUtils)
816
813
// checkSecurityViolations checks security violations and returns an error if the configured severity limit is crossed. Besides the potential error the list of unassessed and assessed alerts are being returned to allow generating reports and issues from the data.
817
814
func checkProjectSecurityViolations (config * ScanOptions , cvssSeverityLimit float64 , project ws.Project , sys whitesource , assessments * []format.Assessment , influx * whitesourceExecuteScanInflux ) (int , []ws.Alert , []ws.Alert , error ) {
818
815
// get project alerts (vulnerabilities)
819
- assessedAlerts := []ws.Alert {}
820
816
alerts , err := sys .GetProjectAlertsByType (project .Token , "SECURITY_VULNERABILITY" )
821
817
if err != nil {
822
- return 0 , alerts , assessedAlerts , fmt .Errorf ("failed to retrieve project alerts from WhiteSource: %w" , err )
818
+ return 0 , alerts , []ws. Alert {} , fmt .Errorf ("failed to retrieve project alerts from WhiteSource: %w" , err )
823
819
}
824
820
825
- // TODO add ignored alerts to list of all alerts
826
- _ , err = sys .GetProjectIgnoredAlertsByType (project .Token , "SECURITY_VULNERABILITY" )
821
+ assessedAlerts , err := sys .GetProjectIgnoredAlertsByType (project .Token , "SECURITY_VULNERABILITY" )
827
822
if err != nil {
828
- return 0 , alerts , assessedAlerts , fmt .Errorf ("failed to retrieve project ignored alerts from WhiteSource: %w" , err )
823
+ return 0 , alerts , []ws. Alert {} , fmt .Errorf ("failed to retrieve project ignored alerts from WhiteSource: %w" , err )
829
824
}
830
- // alerts = append(alerts, ignoredAlerts...)
831
825
832
826
// filter alerts related to existing assessments
833
827
filteredAlerts := []ws.Alert {}
@@ -915,13 +909,6 @@ func aggregateVersionWideVulnerabilities(config *ScanOptions, utils whitesourceU
915
909
return errors .Wrapf (err , "failed to get project alerts by type" )
916
910
}
917
911
918
- // TODO add ignored alerts to list of all alerts
919
- _ , err = sys .GetProjectIgnoredAlertsByType (project .Token , "SECURITY_VULNERABILITY" )
920
- if err != nil {
921
- return errors .Wrapf (err , "failed to get project ignored alerts by type" )
922
- }
923
- // alerts = append(alerts, ignoredAlerts...)
924
-
925
912
log .Entry ().Infof ("Found project: %s with %v vulnerabilities." , project .Name , len (alerts ))
926
913
versionWideAlerts = append (versionWideAlerts , alerts ... )
927
914
}
0 commit comments