From f05bcd364223bc9b82f6cd577a0445d28fc852fa Mon Sep 17 00:00:00 2001 From: JanHoefelmeyer <107021473+JanHoefelmeyer@users.noreply.github.com> Date: Thu, 13 Jul 2023 15:59:23 +0200 Subject: [PATCH] Add info for Req 8-10 if direct url was given and as such no checks were performed. (#401) * Add info for Req 8-10 if direct url was given and as such no checks were performed. * Update cmd/csaf_checker/processor.go Co-authored-by: tschmidtb51 <65305130+tschmidtb51@users.noreply.github.com> * Break overly long lines --------- Co-authored-by: JanHoefelmeyer Co-authored-by: tschmidtb51 <65305130+tschmidtb51@users.noreply.github.com> --- cmd/csaf_checker/processor.go | 14 ++++++++++++++ 1 file changed, 14 insertions(+) diff --git a/cmd/csaf_checker/processor.go b/cmd/csaf_checker/processor.go index 36a22a4..e03261e 100644 --- a/cmd/csaf_checker/processor.go +++ b/cmd/csaf_checker/processor.go @@ -340,6 +340,20 @@ func (p *processor) domainChecks(domain string) []func(*processor, string) error if !direct { checks = append(checks, (*processor).checkWellknownSecurityDNS) + } else { + p.badSecurity.use() + p.badSecurity.info( + "Performed no test of security.txt " + + "since the direct url of the provider-metadata.json was used.") + p.badWellknownMetadata.use() + p.badWellknownMetadata.info( + "Performed no test on whether the provider-metadata.json is available " + + "under the .well-known path " + + "since the direct url of the provider-metadata.json was used.") + p.badDNSPath.use() + p.badDNSPath.info( + "Performed no test on the contents of https://csaf.data.security.DOMAIN " + + "since the direct url of the provider-metadata.json was used.") } checks = append(checks,