Documentation ¶
Index ¶
Constants ¶
View Source
const (
ECR_TAGS_MAX_CAPACITY = 500
)
Variables ¶
View Source
var ( OptJobsConfigPath string OptJobsTemplatesPath string OptJobsOutputPath string OptProwEcrRepository string OptCreatePR string )
View Source
var ( OptImagesConfigPath string OptSourceOwner string OptSourceRepo string OptCommitMessage string OptCommitBranch string )
View Source
var ( OptGithubIssueOwner string OptGithubIssueRepo string )
View Source
var ( OptBuildConfigPath string OptGoEcrRepository string )
TODO: need to add more flags to handle making a pull request
View Source
var (
OptEksDistroEcrRepository string
)
Functions ¶
func TestGetCveSummaries ¶
Types ¶
type BuildConfig ¶
type BuildConfig struct { // so far we only have the go-version GoVersion string `yaml:"go_version"` EksDistroVersion string `yaml:"eks_distro_version"` }
BuildConfig specifies the structure of build_config.yaml where the build versions are stored
type CVESummary ¶
type ImagesConfig ¶
type ImagesConfig struct { ImageRepo string `yaml:"image_repo"` Images map[string]string `yaml:"images"` }
ImagesConfig specifies the structure of images_config.yaml where the prow image versions are specified
type Result ¶
type Result struct { Vulnerabilities []Vulnerability `json:"Vulnerabilities"` // Including type here to specify the type of the component // being scanned Type string `json:"Type"` }
Results is stored in TrivyOutput It has the results of the scanned components
type TrivyOutput ¶
type TrivyOutput struct {
Results []Result `json:"Results"`
}
This is the struct to unmarshall trivy image scan output
type Vulnerability ¶
type Vulnerability struct { VulnerabilityId string `json:"VulnerabilityID"` InstalledVersion string `json:"InstalledVersion"` FixedVersion string `json:"FixedVersion"` Severity string `json:"Severity"` Title string `json:"Title"` }
With Vulnerability, we're extracting the components we need to create a Github Issue
Source Files ¶
Click to show internal directories.
Click to hide internal directories.