-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Print both vulnerabilities and violations tables if needed #163
Conversation
@@ -160,6 +161,10 @@ func (auditCmd *AuditCommand) CommandName() string { | |||
return "generic_audit" | |||
} | |||
|
|||
func (auditCmd *AuditCommand) HasViolationContext() bool { | |||
return len(auditCmd.watches) > 0 || auditCmd.projectKey != "" || auditCmd.targetRepoPath != "" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
why targetRepoPath is here?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
if you provide repoPath they can infer the project as far as I know and violations returns
--repo-path [Optional] Target repo path, to enable Xray to determine watches accordingly.
After upgrading the jf cli from 2.63.2 to 2.67.0, it is no longer printing the Security Violations and License Compliance Violations table in the console output. |
dev
branch.go vet ./...
.go fmt ./...
.If
--vuln
flag was provided intable
format. we only printed the vulnerabilities and not both