Documentation
¶
Index ¶
- Constants
- Variables
- func CacheGrafanaPackages(allPackages []lockfile.PackageDetails) ([]lockfile.PackageFlattened, error)
- func FilterOSVResults(source models.VulnerabilityResults, lockFile string) models.VulnerabilityResults
- func IncludedByGrafanaPackage(packageName string, cache []lockfile.PackageFlattened) (bool, string)
Constants ¶
View Source
const ( SeverityCritical = "CRITICAL" SeverityHigh = "HIGH" SeverityModerate = "MODERATE" SeverityLow = "LOW" )
Variables ¶
View Source
var Analyzer = &analysis.Analyzer{ Name: "osv-scanner", Requires: []*analysis.Analyzer{sourcecode.Analyzer, archive.Analyzer}, Run: run, Rules: []*analysis.Rule{ osvScannerCriticalSeverityDetected, osvScannerHighSeverityDetected, osvScannerModerateSeverityDetected, osvScannerLowSeverityDetected, scanningFailure, scanningParseFailure, scanningSucceeded, }, ReadmeInfo: analysis.ReadmeInfo{ Name: "Vulnerability Scanner", Description: "Detects critical vulnerabilities in Go modules and yarn lock files.", Dependencies: "[osv-scanner](https://github.com/google/osv-scanner), `sourceCodeUri`", }, }
View Source
var GrafanaPackages = map[string]bool{ "@grafana/data": true, "@grafana/e2e": true, "@grafana/runtime": true, "@grafana/toolkit": true, "@grafana/ui": true, }
View Source
var WhitelistedPackages = map[string]bool{ "playwright@1.55.0": true, }
Functions ¶
func CacheGrafanaPackages ¶ added in v0.10.0
func CacheGrafanaPackages( allPackages []lockfile.PackageDetails, ) ([]lockfile.PackageFlattened, error)
func FilterOSVResults ¶
func FilterOSVResults(source models.VulnerabilityResults, lockFile string) models.VulnerabilityResults
func IncludedByGrafanaPackage ¶ added in v0.10.0
func IncludedByGrafanaPackage( packageName string, cache []lockfile.PackageFlattened, ) (bool, string)
Types ¶
This section is empty.
Click to show internal directories.
Click to hide internal directories.