@@ -2,67 +2,64 @@ package main
2
2
3
3
import (
4
4
"context"
5
+ "crypto/tls"
5
6
"fmt"
6
7
"github.com/nais/v13s/pkg/api/vulnerabilities/management"
7
-
8
- "github.com/nais/v13s/pkg/api/vulnerabilities"
9
8
"google.golang.org/grpc"
9
+ "google.golang.org/grpc/credentials"
10
10
"google.golang.org/grpc/credentials/insecure"
11
+ "strings"
12
+
13
+ "github.com/nais/v13s/pkg/api/vulnerabilities"
11
14
)
12
15
13
16
func main () {
17
+ url := "vulnerabilities.dev-nais.cloud.nais.io:443"
18
+ dialOptions := make ([]grpc.DialOption , 0 )
19
+ if strings .Contains (url , "localhost" ) {
20
+ dialOptions = append (dialOptions , grpc .WithTransportCredentials (insecure .NewCredentials ()))
21
+ } else {
22
+ tlsOpts := & tls.Config {}
23
+ cred := credentials .NewTLS (tlsOpts )
24
+ dialOptions = append (dialOptions , grpc .WithTransportCredentials (cred ))
25
+ }
26
+
14
27
c , err := vulnerabilities .NewClient (
15
- "localhost:50051" ,
16
- grpc . WithTransportCredentials ( insecure . NewCredentials ()) ,
28
+ url ,
29
+ dialOptions ... ,
17
30
)
18
31
if err != nil {
19
32
panic (err )
20
33
}
21
34
22
- workloadManagement (c )
23
-
24
35
listVulnz (c )
36
+ //workloadManagement(c)
37
+ /*
38
+ listVulnz(c)
25
39
26
- resp , err := c .ListVulnerabilitySummaries (
27
- context .Background (),
28
- vulnerabilities .ClusterFilter ("prod-gcp" ),
29
- vulnerabilities .NamespaceFilter ("nais-system" ),
30
- vulnerabilities .Limit (10 ),
31
- vulnerabilities .Offset (0 ),
32
- )
33
-
34
- handle (resp , err )
40
+ resp, err := c.ListVulnerabilitySummaries(
41
+ context.Background(),
42
+ vulnerabilities.ClusterFilter("prod-gcp"),
43
+ vulnerabilities.NamespaceFilter("nais-system"),
44
+ vulnerabilities.Limit(10),
45
+ vulnerabilities.Offset(0),
46
+ )
35
47
36
- //resp3, err := c.ListVulnerabilities(
37
- // context.Background(),
38
- // vulnerabilities.ClusterFilter("prod-gcp"),
39
- // vulnerabilities.NamespaceFilter("nais-system"),
40
- // vulnerabilities.WorkloadTypeFilter("job"),
41
- // vulnerabilities.Limit(10),
42
- // vulnerabilities.Suppressed(),
43
- //)
44
- //if err != nil {
45
- // panic(err)
46
- //}
47
- //
48
- //fmt.Printf("Filters: %v\n", resp3.Filter)
49
- //for _, v := range resp3.Workloads {
50
- // fmt.Printf("workload: %v\n", v.Workload)
51
- // fmt.Printf("vulnerabilities: %v\n", v.Vulnerabilities)
52
- //}
48
+ handle(resp, err)
53
49
54
- resp2 , err := c .GetVulnerabilitySummary (
55
- context .Background (),
56
- vulnerabilities .ClusterFilter ("prod-gcp" ),
57
- vulnerabilities .NamespaceFilter ("nais-system" ),
58
- vulnerabilities .WorkloadFilter ("pull-metrics" ),
59
- )
60
- if err != nil {
61
- panic (err )
62
- }
50
+ resp2, err := c.GetVulnerabilitySummary(
51
+ context.Background(),
52
+ vulnerabilities.ClusterFilter("prod-gcp"),
53
+ vulnerabilities.NamespaceFilter("nais-system"),
54
+ vulnerabilities.WorkloadFilter("pull-metrics"),
55
+ )
56
+ if err != nil {
57
+ panic(err)
58
+ }
63
59
64
- fmt .Printf ("Filters: %v\n " , resp2 .Filter )
65
- fmt .Printf ("summary: %v\n " , resp2 .VulnerabilitySummary )
60
+ fmt.Printf("Filters: %v\n", resp2.Filter)
61
+ fmt.Printf("summary: %v\n", resp2.VulnerabilitySummary)
62
+ */
66
63
}
67
64
68
65
func listVulnz (c vulnerabilities.Client ) {
0 commit comments