scorecard/pkg/json_raw_results.go
Spencer Schrock 0b9dfb656f
⚠️ Replace v4 module references with v5 (#4027)
Signed-off-by: Spencer Schrock <sschrock@google.com>
2024-04-12 14:51:50 -07:00

846 lines
24 KiB
Go

// Copyright 2021 OpenSSF Scorecard Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package pkg
import (
"encoding/json"
"errors"
"fmt"
"io"
"strconv"
"time"
"github.com/ossf/scorecard/v5/checker"
sce "github.com/ossf/scorecard/v5/errors"
)
// TODO: add a "check" field to all results so that they can be linked to a check.
// TODO(#1874): Add a severity field in all results.
// Flat JSON structure to hold raw results.
type jsonScorecardRawResult struct {
Date string `json:"date"`
Repo jsonRepoV2 `json:"repo"`
Scorecard jsonScorecardV2 `json:"scorecard"`
Metadata []string `json:"metadata"`
Results jsonRawResults `json:"results"`
}
// TODO: separate each check extraction into its own file.
type jsonFile struct {
Snippet *string `json:"snippet,omitempty"`
Path string `json:"path"`
Offset uint `json:"offset,omitempty"`
EndOffset uint `json:"endOffset,omitempty"`
}
type jsonTool struct {
URL *string `json:"url"`
Desc *string `json:"desc"`
Job *jsonWorkflowJob `json:"job,omitempty"`
Name string `json:"name"`
Files []jsonFile `json:"files,omitempty"`
// TODO: Runs, Issues, Merge requests.
}
type jsonBranchProtectionSettings struct {
RequiredApprovingReviewCount *int32 `json:"requiredReviewerCount"`
AllowsDeletions *bool `json:"allowsDeletions"`
AllowsForcePushes *bool `json:"allowsForcePushes"`
RequiresCodeOwnerReviews *bool `json:"requiresCodeOwnerReview"`
RequiresLinearHistory *bool `json:"requiredLinearHistory"`
DismissesStaleReviews *bool `json:"dismissesStaleReviews"`
EnforcesAdmins *bool `json:"enforcesAdmin"`
RequiresStatusChecks *bool `json:"requiresStatuChecks"`
RequiresUpToDateBranchBeforeMerging *bool `json:"requiresUpdatedBranchesToMerge"`
StatusCheckContexts []string `json:"statusChecksContexts"`
}
type jsonBranchProtection struct {
Protection *jsonBranchProtectionSettings `json:"protection"`
Name string `json:"name"`
}
type jsonBranchProtectionMetadata struct {
Branches []jsonBranchProtection `json:"branches"`
CodeownersFiles []string `json:"codeownersFiles"`
}
type jsonReview struct {
State string `json:"state"`
Reviewer jsonUser `json:"reviewer"`
}
type jsonUser struct {
RepoAssociation *string `json:"repoAssociation,omitempty"`
Login string `json:"login"`
// Organization refers to a GitHub org.
Organizations []jsonOrganization `json:"organization,omitempty"`
// Companies refer to a claim by a user in their profile.
Companies []jsonCompany `json:"company,omitempty"`
NumContributions int `json:"NumContributions,omitempty"`
IsBot bool `json:"isBot"`
}
type jsonContributors struct {
Users []jsonUser `json:"users"`
// TODO: high-level statistics, etc
}
type jsonOrganization struct {
Login string `json:"login"`
// TODO: other info.
}
type jsonCompany struct {
Name string `json:"name"`
// TODO: other info.
}
type jsonDefaultBranchChangeset struct {
// ApprovedReviews *jsonApprovedReviews `json:"approved-reviews"`
RevisionID string `json:"number"`
ReviewPlatform string `json:"platform"`
Reviews []jsonReview `json:"reviews"`
Authors []jsonUser `json:"authors"`
Commits []jsonCommit `json:"commits"`
// TODO: check runs, etc.
}
type jsonCommit struct {
Message string `json:"message"`
SHA string `json:"sha"`
Committer jsonUser `json:"committer"`
// TODO: check runs, etc.
}
type jsonDatabaseVulnerability struct {
// For OSV: OSV-2020-484
// For CVE: CVE-2022-23945
ID string `json:"id"`
// TODO: additional information
}
type jsonArchivedStatus struct {
Status bool `json:"status"`
// TODO: add fields, e.g. date of archival, etc.
}
type jsonCreatedAtTime struct {
Time time.Time `json:"timestamp"`
}
type jsonComment struct {
CreatedAt *time.Time `json:"createdAt"`
Author *jsonUser `json:"author"`
// TODO: add fields if needed, e.g., content.
}
type jsonIssue struct {
CreatedAt *time.Time `json:"createdAt"`
Author *jsonUser `json:"author"`
URL string `json:"URL"`
Comments []jsonComment `json:"comments"`
// TODO: add fields, e.g., state=[opened|closed]
}
type jsonRelease struct {
Tag string `json:"tag"`
URL string `json:"url"`
Assets []jsonReleaseAsset `json:"assets"`
// TODO: add needed fields, e.g. Path.
}
type jsonReleaseAsset struct {
Path string `json:"path"`
URL string `json:"url"`
}
type jsonOssfBestPractices struct {
Badge string `json:"badge"`
}
type jsonLicenseInfo struct {
File string `json:"path"`
Name string `json:"name,omitempty"`
SpdxID string `json:"spdxid,omitempty"`
Attribution string `json:"attribution,omitempty"`
Approved string `json:"approved,omitempty"`
}
type jsonLicense struct {
License jsonLicenseInfo `json:"file"`
}
type jsonWorkflow struct {
Job *jsonWorkflowJob `json:"job"`
File *jsonFile `json:"file"`
// Type is a string to allow different types for permissions, unpinned dependencies, etc.
Type string `json:"type"`
}
type jsonWorkflowJob struct {
Name *string `json:"name"`
ID *string `json:"id"`
}
type jsonPackage struct {
Name *string `json:"name,omitempty"`
Job *jsonWorkflowJob `json:"job,omitempty"`
File *jsonFile `json:"file,omitempty"`
Runs []jsonRun `json:"runs,omitempty"`
}
type jsonRun struct {
URL string `json:"url"`
// TODO: add fields, e.g., Result=["success", "failure"]
}
type jsonPinningDependenciesData struct {
Dependencies []jsonDependency `json:"dependencies"`
}
type jsonDependency struct {
// TODO: unique dependency name.
// TODO: Job *WorkflowJob
Location *jsonFile `json:"location"`
Name *string `json:"name"`
PinnedAt *string `json:"pinnedAt"`
Type string `json:"type"`
}
type jsonPermissionsData struct {
TokenPermissions []jsonTokenPermission `json:"tokens,omitempty"`
}
type jsonTokenPermission struct {
Job *jsonWorkflowJob `json:"job,omitempty"`
LocationType *string `json:"locationType,omitempty"`
Name *string `json:"name,omitempty"`
Value *string `json:"value,omitempty"`
File *jsonFile `json:"file,omitempty"`
Type string `json:"type"`
}
type jsonSecurityFile struct {
Path string `json:"path"`
Hits []jsonSecurityPolicyHits `json:"matches,omitempty"`
ContentLength uint `json:"contentLength,omitempty"`
}
type jsonSecurityPolicyHits struct {
Type string `json:"type"`
Match string `json:"match,omitempty"`
LineNumber uint `json:"lineNumber,omitempty"`
Offset uint `json:"offset,omitempty"`
}
//nolint:govet
type jsonRawResults struct {
// Workflow results.
Workflows []jsonWorkflow `json:"workflows"`
// Permissions.
Permissions jsonPermissionsData `json:"permissions"`
// License.
Licenses []jsonLicense `json:"licenses"`
// List of recent issues.
RecentIssues []jsonIssue `json:"issues"`
// OSSF best practices badge.
OssfBestPractices jsonOssfBestPractices `json:"openssfBestPracticesBadge"`
// Vulnerabilities.
DatabaseVulnerabilities []jsonDatabaseVulnerability `json:"databaseVulnerabilities"`
// List of binaries found in the repo.
Binaries []jsonFile `json:"binaries"`
// List of security policy files found in the repo.
// Note: we return one at most.
SecurityPolicies []jsonSecurityFile `json:"securityPolicies"`
// List of update tools.
// Note: we return one at most.
DependencyUpdateTools []jsonTool `json:"dependencyUpdateTools"`
// Branch protection settings for development and release branches.
BranchProtections jsonBranchProtectionMetadata `json:"branchProtections"`
// Contributors. Note: we could use the list of commits instead to store this data.
// However, it's harder to get statistics using commit list, so we have a dedicated
// structure for it.
Contributors jsonContributors `json:"Contributors"`
// Commits.
DefaultBranchChangesets []jsonDefaultBranchChangeset `json:"defaultBranchChangesets"`
// Archived status of the repo.
ArchivedStatus jsonArchivedStatus `json:"archived"`
// Repo creation time
CreatedAtTime jsonCreatedAtTime `json:"createdAt"`
// Fuzzers.
Fuzzers []jsonTool `json:"fuzzers"`
// Releases.
Releases []jsonRelease `json:"releases"`
// Packages.
Packages []jsonPackage `json:"packages"`
// Dependency pinning.
DependencyPinning jsonPinningDependenciesData `json:"dependencyPinning"`
}
func asPointer(s string) *string {
return &s
}
func (r *jsonScorecardRawResult) addTokenPermissionsRawResults(tp *checker.TokenPermissionsData) error {
r.Results.Permissions = jsonPermissionsData{}
for _, t := range tp.TokenPermissions {
// We ignore debug messages for read/none permissions.
if t.Type != checker.PermissionLevelUndeclared &&
t.Type != checker.PermissionLevelWrite {
continue
}
if t.LocationType == nil {
//nolint:goerr113
return errors.New("locationType is nil")
}
p := jsonTokenPermission{
LocationType: asPointer(string(*t.LocationType)),
Name: t.Name,
Value: t.Value,
Type: string(t.Type),
}
if t.Job != nil {
p.Job = &jsonWorkflowJob{
Name: t.Job.Name,
ID: t.Job.ID,
}
}
if t.File != nil {
p.File = &jsonFile{
Path: t.File.Path,
Offset: t.File.Offset,
}
if t.File.Snippet != "" {
p.File.Snippet = asPointer(t.File.Snippet)
}
}
r.Results.Permissions.TokenPermissions = append(r.Results.Permissions.TokenPermissions, p)
}
return nil
}
func (r *jsonScorecardRawResult) addPackagingRawResults(pk *checker.PackagingData) error {
r.Results.Packages = []jsonPackage{}
for _, p := range pk.Packages {
var jpk jsonPackage
// Ignore debug messages.
if p.Msg != nil {
continue
}
if p.File == nil {
//nolint:goerr113
return errors.New("file field is nil")
}
jpk.File = &jsonFile{
Path: p.File.Path,
Offset: p.File.Offset,
}
if p.File.Snippet != "" {
jpk.File.Snippet = asPointer(p.File.Snippet)
}
for _, run := range p.Runs {
jpk.Runs = append(jpk.Runs,
jsonRun{
URL: run.URL,
},
)
}
r.Results.Packages = append(r.Results.Packages, jpk)
}
return nil
}
//nolint:unparam
func (r *jsonScorecardRawResult) addDependencyPinningRawResults(pd *checker.PinningDependenciesData) error {
r.Results.DependencyPinning = jsonPinningDependenciesData{}
for i := range pd.Dependencies {
rr := pd.Dependencies[i]
if rr.Location == nil {
continue
}
v := jsonDependency{
Location: &jsonFile{
Path: rr.Location.Path,
Offset: rr.Location.Offset,
EndOffset: rr.Location.EndOffset,
},
Name: rr.Name,
PinnedAt: rr.PinnedAt,
Type: string(rr.Type),
}
if rr.Location.Snippet != "" {
v.Location.Snippet = &rr.Location.Snippet
}
r.Results.DependencyPinning.Dependencies = append(r.Results.DependencyPinning.Dependencies, v)
}
return nil
}
//nolint:unparam
func (r *jsonScorecardRawResult) addDangerousWorkflowRawResults(df *checker.DangerousWorkflowData) error {
r.Results.Workflows = []jsonWorkflow{}
for _, e := range df.Workflows {
v := jsonWorkflow{
File: &jsonFile{
Path: e.File.Path,
Offset: e.File.Offset,
EndOffset: e.File.EndOffset,
},
Type: string(e.Type),
}
if e.File.Snippet != "" {
v.File.Snippet = asPointer(e.File.Snippet)
}
if e.Job != nil {
v.Job = &jsonWorkflowJob{
Name: e.Job.Name,
ID: e.Job.ID,
}
}
r.Results.Workflows = append(r.Results.Workflows, v)
}
return nil
}
//nolint:unparam
func (r *jsonScorecardRawResult) addContributorsRawResults(cr *checker.ContributorsData) error {
r.Results.Contributors = jsonContributors{}
for _, user := range cr.Users {
u := jsonUser{
Login: user.Login,
NumContributions: user.NumContributions,
}
for _, org := range user.Organizations {
u.Organizations = append(u.Organizations,
jsonOrganization{
Login: org.Login,
},
)
}
for _, comp := range user.Companies {
u.Companies = append(u.Companies,
jsonCompany{
Name: comp,
},
)
}
r.Results.Contributors.Users = append(r.Results.Contributors.Users, u)
}
return nil
}
//nolint:unparam
func (r *jsonScorecardRawResult) addSignedReleasesRawResults(sr *checker.SignedReleasesData) error {
r.Results.Releases = []jsonRelease{}
for i, release := range sr.Releases {
r.Results.Releases = append(r.Results.Releases,
jsonRelease{
Tag: release.TagName,
URL: release.URL,
})
for _, asset := range release.Assets {
r.Results.Releases[i].Assets = append(r.Results.Releases[i].Assets,
jsonReleaseAsset{
Path: asset.Name,
URL: asset.URL,
},
)
}
}
return nil
}
//nolint:unparam
func (r *jsonScorecardRawResult) addMaintainedRawResults(mr *checker.MaintainedData) error {
// Set archived status.
r.Results.ArchivedStatus = jsonArchivedStatus{Status: mr.ArchivedStatus.Status}
r.Results.CreatedAtTime = jsonCreatedAtTime{Time: mr.CreatedAt}
// Issues.
for i := range mr.Issues {
issue := jsonIssue{
CreatedAt: mr.Issues[i].CreatedAt,
URL: *mr.Issues[i].URI,
}
if mr.Issues[i].Author != nil {
issue.Author = &jsonUser{
Login: mr.Issues[i].Author.Login,
RepoAssociation: getStrPtr(mr.Issues[i].AuthorAssociation.String()),
}
}
for j := range mr.Issues[i].Comments {
comment := jsonComment{
CreatedAt: mr.Issues[i].Comments[j].CreatedAt,
}
if mr.Issues[i].Comments[j].Author != nil {
comment.Author = &jsonUser{
Login: mr.Issues[i].Comments[j].Author.Login,
RepoAssociation: getStrPtr(mr.Issues[i].Comments[j].AuthorAssociation.String()),
}
}
issue.Comments = append(issue.Comments, comment)
}
r.Results.RecentIssues = append(r.Results.RecentIssues, issue)
}
return nil
}
func getStrPtr(s string) *string {
ret := s
return &ret
}
// Function shared between addMaintainedRawResults() and addCodeReviewRawResults().
func (r *jsonScorecardRawResult) setDefaultCommitData(changesets []checker.Changeset) error {
r.Results.DefaultBranchChangesets = []jsonDefaultBranchChangeset{}
for i := range changesets {
cs := changesets[i]
// commits field
commits := []jsonCommit{}
for j := range cs.Commits {
commit := cs.Commits[j]
commits = append(commits, jsonCommit{
Committer: jsonUser{
Login: commit.Committer.Login,
},
Message: commit.Message,
SHA: commit.SHA,
})
}
reviews := []jsonReview{}
for j := range cs.Reviews {
r := cs.Reviews[j]
reviews = append(reviews, jsonReview{
State: r.State,
Reviewer: jsonUser{
Login: r.Author.Login,
IsBot: r.Author.IsBot,
},
})
}
// Only add the Merge Request opener as the PR author
authors := []jsonUser{{
Login: cs.Author.Login,
}}
r.Results.DefaultBranchChangesets = append(r.Results.DefaultBranchChangesets,
jsonDefaultBranchChangeset{
RevisionID: cs.RevisionID,
ReviewPlatform: cs.ReviewPlatform,
Commits: commits,
Reviews: reviews,
Authors: authors,
},
)
}
return nil
}
//nolint:unparam
func (r *jsonScorecardRawResult) addOssfBestPracticesRawResults(cbp *checker.CIIBestPracticesData) error {
r.Results.OssfBestPractices.Badge = cbp.Badge.String()
return nil
}
func (r *jsonScorecardRawResult) addCodeReviewRawResults(cr *checker.CodeReviewData) error {
return r.setDefaultCommitData(cr.DefaultBranchChangesets)
}
//nolint:unparam
func (r *jsonScorecardRawResult) addLicenseRawResults(ld *checker.LicenseData) error {
r.Results.Licenses = []jsonLicense{}
for idx := range ld.LicenseFiles {
r.Results.Licenses = append(r.Results.Licenses,
jsonLicense{
License: jsonLicenseInfo{
File: ld.LicenseFiles[idx].File.Path,
Name: ld.LicenseFiles[idx].LicenseInformation.Name,
SpdxID: ld.LicenseFiles[idx].LicenseInformation.SpdxID,
Attribution: string(ld.LicenseFiles[idx].LicenseInformation.Attribution),
Approved: strconv.FormatBool(ld.LicenseFiles[idx].LicenseInformation.Approved),
},
},
)
}
return nil
}
//nolint:unparam
func (r *jsonScorecardRawResult) addVulnerabilitiesRawResults(vd *checker.VulnerabilitiesData) error {
r.Results.DatabaseVulnerabilities = []jsonDatabaseVulnerability{}
for _, v := range vd.Vulnerabilities {
r.Results.DatabaseVulnerabilities = append(r.Results.DatabaseVulnerabilities,
jsonDatabaseVulnerability{
ID: v.ID,
})
}
return nil
}
//nolint:unparam
func (r *jsonScorecardRawResult) addBinaryArtifactRawResults(ba *checker.BinaryArtifactData) error {
r.Results.Binaries = []jsonFile{}
for _, v := range ba.Files {
r.Results.Binaries = append(r.Results.Binaries, jsonFile{
Path: v.Path,
})
}
return nil
}
//nolint:unparam
func (r *jsonScorecardRawResult) addSecurityPolicyRawResults(sp *checker.SecurityPolicyData) error {
r.Results.SecurityPolicies = []jsonSecurityFile{}
if len(sp.PolicyFiles) > 0 {
for idx := range sp.PolicyFiles {
r.Results.SecurityPolicies = append(r.Results.SecurityPolicies, jsonSecurityFile{
Path: sp.PolicyFiles[idx].File.Path,
ContentLength: sp.PolicyFiles[idx].File.FileSize,
Hits: []jsonSecurityPolicyHits{},
})
for _, entry := range sp.PolicyFiles[idx].Information {
r.Results.SecurityPolicies[idx].Hits = append(r.Results.SecurityPolicies[idx].Hits, jsonSecurityPolicyHits{
Type: string(entry.InformationType),
Match: entry.InformationValue.Match,
LineNumber: entry.InformationValue.LineNumber,
Offset: entry.InformationValue.Offset,
})
}
}
}
return nil
}
//nolint:unparam
func (r *jsonScorecardRawResult) addFuzzingRawResults(fd *checker.FuzzingData) error {
r.Results.Fuzzers = []jsonTool{}
for i := range fd.Fuzzers {
f := fd.Fuzzers[i]
jt := jsonTool{
Name: f.Name,
URL: f.URL,
Desc: f.Desc,
}
if f.Files != nil {
for _, f := range f.Files {
jt.Files = append(jt.Files, jsonFile{
Path: f.Path,
})
}
}
r.Results.Fuzzers = append(r.Results.Fuzzers, jt)
}
return nil
}
//nolint:unparam
func (r *jsonScorecardRawResult) addDependencyUpdateToolRawResults(dut *checker.DependencyUpdateToolData) error {
r.Results.DependencyUpdateTools = []jsonTool{}
for i := range dut.Tools {
t := dut.Tools[i]
jt := jsonTool{
Name: t.Name,
URL: t.URL,
Desc: t.Desc,
}
if t.Files != nil {
for _, f := range t.Files {
jt.Files = append(jt.Files, jsonFile{
Path: f.Path,
})
}
}
r.Results.DependencyUpdateTools = append(r.Results.DependencyUpdateTools, jt)
}
return nil
}
func (r *jsonScorecardRawResult) addBranchProtectionRawResults(bp *checker.BranchProtectionsData) error {
branches := []jsonBranchProtection{}
//nolint:gocritic
for _, v := range bp.Branches {
var bp *jsonBranchProtectionSettings
if v.Protected != nil && *v.Protected {
bp = &jsonBranchProtectionSettings{
AllowsDeletions: v.BranchProtectionRule.AllowDeletions,
AllowsForcePushes: v.BranchProtectionRule.AllowForcePushes,
RequiresCodeOwnerReviews: v.BranchProtectionRule.PullRequestRule.RequireCodeOwnerReviews,
RequiresLinearHistory: v.BranchProtectionRule.RequireLinearHistory,
DismissesStaleReviews: v.BranchProtectionRule.PullRequestRule.DismissStaleReviews,
EnforcesAdmins: v.BranchProtectionRule.EnforceAdmins,
RequiresStatusChecks: v.BranchProtectionRule.CheckRules.RequiresStatusChecks,
RequiresUpToDateBranchBeforeMerging: v.BranchProtectionRule.CheckRules.UpToDateBeforeMerge,
RequiredApprovingReviewCount: v.BranchProtectionRule.PullRequestRule.RequiredApprovingReviewCount,
StatusCheckContexts: v.BranchProtectionRule.CheckRules.Contexts,
}
}
branches = append(branches, jsonBranchProtection{
Name: *v.Name,
Protection: bp,
})
}
r.Results.BranchProtections.Branches = branches
r.Results.BranchProtections.CodeownersFiles = bp.CodeownersFiles
return nil
}
func (r *jsonScorecardRawResult) fillJSONRawResults(raw *checker.RawResults) error {
// Licenses.
if err := r.addLicenseRawResults(&raw.LicenseResults); err != nil {
return sce.WithMessage(sce.ErrScorecardInternal, err.Error())
}
// Vulnerabilities.
if err := r.addVulnerabilitiesRawResults(&raw.VulnerabilitiesResults); err != nil {
return sce.WithMessage(sce.ErrScorecardInternal, err.Error())
}
// Binary-Artifacts.
if err := r.addBinaryArtifactRawResults(&raw.BinaryArtifactResults); err != nil {
return sce.WithMessage(sce.ErrScorecardInternal, err.Error())
}
// Security-Policy.
if err := r.addSecurityPolicyRawResults(&raw.SecurityPolicyResults); err != nil {
return sce.WithMessage(sce.ErrScorecardInternal, err.Error())
}
// Dependency-Update-Tool.
if err := r.addDependencyUpdateToolRawResults(&raw.DependencyUpdateToolResults); err != nil {
return sce.WithMessage(sce.ErrScorecardInternal, err.Error())
}
// Branch-Protection.
if err := r.addBranchProtectionRawResults(&raw.BranchProtectionResults); err != nil {
return sce.WithMessage(sce.ErrScorecardInternal, err.Error())
}
// Code-Review.
if err := r.addCodeReviewRawResults(&raw.CodeReviewResults); err != nil {
return sce.WithMessage(sce.ErrScorecardInternal, err.Error())
}
// Maintained.
if err := r.addMaintainedRawResults(&raw.MaintainedResults); err != nil {
return sce.WithMessage(sce.ErrScorecardInternal, err.Error())
}
// Signed-Releases.
if err := r.addSignedReleasesRawResults(&raw.SignedReleasesResults); err != nil {
return sce.WithMessage(sce.ErrScorecardInternal, err.Error())
}
// Contributors.
if err := r.addContributorsRawResults(&raw.ContributorsResults); err != nil {
return sce.WithMessage(sce.ErrScorecardInternal, err.Error())
}
// DependencyPinning.
if err := r.addDependencyPinningRawResults(&raw.PinningDependenciesResults); err != nil {
return sce.WithMessage(sce.ErrScorecardInternal, err.Error())
}
// CII-Best-Practices.
if err := r.addOssfBestPracticesRawResults(&raw.CIIBestPracticesResults); err != nil {
return sce.WithMessage(sce.ErrScorecardInternal, err.Error())
}
// Dangerous workflow.
if err := r.addDangerousWorkflowRawResults(&raw.DangerousWorkflowResults); err != nil {
return sce.WithMessage(sce.ErrScorecardInternal, err.Error())
}
// Fuzzers.
if err := r.addFuzzingRawResults(&raw.FuzzingResults); err != nil {
return sce.WithMessage(sce.ErrScorecardInternal, err.Error())
}
// Packaging.
if err := r.addPackagingRawResults(&raw.PackagingResults); err != nil {
return sce.WithMessage(sce.ErrScorecardInternal, err.Error())
}
if err := r.addTokenPermissionsRawResults(&raw.TokenPermissionsResults); err != nil {
return sce.WithMessage(sce.ErrScorecardInternal, err.Error())
}
return nil
}
// AsRawJSON exports results as JSON for raw results.
func (r *ScorecardResult) AsRawJSON(writer io.Writer) error {
encoder := json.NewEncoder(writer)
out := jsonScorecardRawResult{
Repo: jsonRepoV2{
Name: r.Repo.Name,
Commit: r.Repo.CommitSHA,
},
Scorecard: jsonScorecardV2{
Version: r.Scorecard.Version,
Commit: r.Scorecard.CommitSHA,
},
Date: r.Date.Format("2006-01-02"),
Metadata: r.Metadata,
}
if err := out.fillJSONRawResults(&r.RawResults); err != nil {
return err
}
if err := encoder.Encode(out); err != nil {
return sce.WithMessage(sce.ErrScorecardInternal, fmt.Sprintf("encoder.Encode: %v", err))
}
return nil
}