diff --git a/clients/githubrepo/languages.go b/clients/githubrepo/languages.go index 28c8e3ebeba..a58f219c33d 100644 --- a/clients/githubrepo/languages.go +++ b/clients/githubrepo/languages.go @@ -41,7 +41,7 @@ func (handler *languagesHandler) init(ctx context.Context, repourl *repoURL) { handler.once = new(sync.Once) } -// TODO: Can add support to parse the raw reponse JSON and mark languages that are not in +// TODO: Can add support to parse the raw response JSON and mark languages that are not in // our defined Language consts in clients/languages.go as "not supported languages". func (handler *languagesHandler) setup() error { handler.once.Do(func() { @@ -53,7 +53,7 @@ func (handler *languagesHandler) setup() error { return } bodyJSON := map[clients.LanguageName]int{} - // The client.repoClient.Do API writes the reponse body to var bodyJSON, + // The client.repoClient.Do API writes the response body to var bodyJSON, // so we can ignore the first returned variable (the entire http response object) // since we only need the response body here. _, err = client.Do(handler.ctx, req, &bodyJSON) diff --git a/pkg/sarif.go b/pkg/sarif.go index 1db4ca90fe6..306eda4def5 100644 --- a/pkg/sarif.go +++ b/pkg/sarif.go @@ -565,7 +565,7 @@ func (r *ScorecardResult) AsSARIF(showDetails bool, logLevel log.Level, // We need to create a run entry even if the check is disabled or the policy is satisfied. // The reason is the following: if a check has findings and is later fixed by a user, // the absence of run for the check will indicate that the check was *not* run, - // so GitHub would keep the findings in the dahsboard. We don't want that. + // so GitHub would keep the findings in the dashboard. We don't want that. category, err := computeCategory(sarifCheckName, doc.GetSupportedRepoTypes()) if err != nil { return sce.WithMessage(sce.ErrScorecardInternal, fmt.Sprintf("computeCategory: %v: %s", err, check.Name)) diff --git a/policy/policy_test.go b/policy/policy_test.go index 306519b51ea..4ba9cb006ca 100644 --- a/policy/policy_test.go +++ b/policy/policy_test.go @@ -39,15 +39,15 @@ func TestPolicyRead(t *testing.T) { result: ScorecardPolicy{ Version: 1, Policies: map[string]*CheckPolicy{ - "Token-Permissions": &CheckPolicy{ + "Token-Permissions": { Score: 3, Mode: CheckPolicy_DISABLED, }, - "Branch-Protection": &CheckPolicy{ + "Branch-Protection": { Score: 5, Mode: CheckPolicy_ENFORCED, }, - "Vulnerabilities": &CheckPolicy{ + "Vulnerabilities": { Score: 1, Mode: CheckPolicy_ENFORCED, }, @@ -61,15 +61,15 @@ func TestPolicyRead(t *testing.T) { result: ScorecardPolicy{ Version: 1, Policies: map[string]*CheckPolicy{ - "Token-Permissions": &CheckPolicy{ + "Token-Permissions": { Score: 0, Mode: CheckPolicy_DISABLED, }, - "Branch-Protection": &CheckPolicy{ + "Branch-Protection": { Score: 5, Mode: CheckPolicy_ENFORCED, }, - "Vulnerabilities": &CheckPolicy{ + "Vulnerabilities": { Score: 1, Mode: CheckPolicy_ENFORCED, },