Skip to content

Commit fb60a59

Browse files
tommytroenybelMekk
andcommitted
temp: test use of ingress
Co-authored-by: ybelmekk <[email protected]>
1 parent 9032023 commit fb60a59

File tree

1 file changed

+40
-43
lines changed

1 file changed

+40
-43
lines changed

cmd/client/main.go

+40-43
Original file line numberDiff line numberDiff line change
@@ -2,67 +2,64 @@ package main
22

33
import (
44
"context"
5+
"crypto/tls"
56
"fmt"
67
"github.com/nais/v13s/pkg/api/vulnerabilities/management"
7-
8-
"github.com/nais/v13s/pkg/api/vulnerabilities"
98
"google.golang.org/grpc"
9+
"google.golang.org/grpc/credentials"
1010
"google.golang.org/grpc/credentials/insecure"
11+
"strings"
12+
13+
"github.com/nais/v13s/pkg/api/vulnerabilities"
1114
)
1215

1316
func main() {
17+
url := "vulnerabilities.dev-nais.cloud.nais.io:443"
18+
dialOptions := make([]grpc.DialOption, 0)
19+
if strings.Contains(url, "localhost") {
20+
dialOptions = append(dialOptions, grpc.WithTransportCredentials(insecure.NewCredentials()))
21+
} else {
22+
tlsOpts := &tls.Config{}
23+
cred := credentials.NewTLS(tlsOpts)
24+
dialOptions = append(dialOptions, grpc.WithTransportCredentials(cred))
25+
}
26+
1427
c, err := vulnerabilities.NewClient(
15-
"localhost:50051",
16-
grpc.WithTransportCredentials(insecure.NewCredentials()),
28+
url,
29+
dialOptions...,
1730
)
1831
if err != nil {
1932
panic(err)
2033
}
2134

22-
workloadManagement(c)
23-
2435
listVulnz(c)
36+
//workloadManagement(c)
37+
/*
38+
listVulnz(c)
2539
26-
resp, err := c.ListVulnerabilitySummaries(
27-
context.Background(),
28-
vulnerabilities.ClusterFilter("prod-gcp"),
29-
vulnerabilities.NamespaceFilter("nais-system"),
30-
vulnerabilities.Limit(10),
31-
vulnerabilities.Offset(0),
32-
)
33-
34-
handle(resp, err)
40+
resp, err := c.ListVulnerabilitySummaries(
41+
context.Background(),
42+
vulnerabilities.ClusterFilter("prod-gcp"),
43+
vulnerabilities.NamespaceFilter("nais-system"),
44+
vulnerabilities.Limit(10),
45+
vulnerabilities.Offset(0),
46+
)
3547
36-
//resp3, err := c.ListVulnerabilities(
37-
// context.Background(),
38-
// vulnerabilities.ClusterFilter("prod-gcp"),
39-
// vulnerabilities.NamespaceFilter("nais-system"),
40-
// vulnerabilities.WorkloadTypeFilter("job"),
41-
// vulnerabilities.Limit(10),
42-
// vulnerabilities.Suppressed(),
43-
//)
44-
//if err != nil {
45-
// panic(err)
46-
//}
47-
//
48-
//fmt.Printf("Filters: %v\n", resp3.Filter)
49-
//for _, v := range resp3.Workloads {
50-
// fmt.Printf("workload: %v\n", v.Workload)
51-
// fmt.Printf("vulnerabilities: %v\n", v.Vulnerabilities)
52-
//}
48+
handle(resp, err)
5349
54-
resp2, err := c.GetVulnerabilitySummary(
55-
context.Background(),
56-
vulnerabilities.ClusterFilter("prod-gcp"),
57-
vulnerabilities.NamespaceFilter("nais-system"),
58-
vulnerabilities.WorkloadFilter("pull-metrics"),
59-
)
60-
if err != nil {
61-
panic(err)
62-
}
50+
resp2, err := c.GetVulnerabilitySummary(
51+
context.Background(),
52+
vulnerabilities.ClusterFilter("prod-gcp"),
53+
vulnerabilities.NamespaceFilter("nais-system"),
54+
vulnerabilities.WorkloadFilter("pull-metrics"),
55+
)
56+
if err != nil {
57+
panic(err)
58+
}
6359
64-
fmt.Printf("Filters: %v\n", resp2.Filter)
65-
fmt.Printf("summary: %v\n", resp2.VulnerabilitySummary)
60+
fmt.Printf("Filters: %v\n", resp2.Filter)
61+
fmt.Printf("summary: %v\n", resp2.VulnerabilitySummary)
62+
*/
6663
}
6764

6865
func listVulnz(c vulnerabilities.Client) {

0 commit comments

Comments
 (0)