Documentation ¶
Index ¶
- Variables
- type ImageScanDeployInfoService
- type ImageScanDeployInfoServiceImpl
- type ImageScanService
- type ImageScanServiceImpl
- func (impl *ImageScanServiceImpl) CalculateSeverityCountInfo(vulnerabilities []*bean3.Vulnerabilities) *bean3.SeverityCount
- func (impl ImageScanServiceImpl) FetchAllDeployInfo(request *bean3.ImageScanRequest) ([]*repository3.ImageScanDeployInfo, error)
- func (impl ImageScanServiceImpl) FetchExecutionDetailResult(request *bean3.ImageScanRequest) (*bean3.ImageScanExecutionDetail, error)
- func (impl *ImageScanServiceImpl) FetchMinScanResultByAppIdAndEnvId(request *bean3.ImageScanRequest) (*bean3.ImageScanExecutionDetail, error)
- func (impl ImageScanServiceImpl) FetchScanExecutionListing(request *bean3.ImageScanRequest, deployInfoIds []int) (*bean3.ImageScanHistoryListingResponse, error)
- func (impl *ImageScanServiceImpl) GetArtifactVulnerabilityStatus(ctx context.Context, request *bean2.VulnerabilityCheckRequest) (bool, error)
- func (impl ImageScanServiceImpl) IsImageScanExecutionCompleted(image, imageDigest string) (bool, error)
- func (impl *ImageScanServiceImpl) VulnerabilityExposure(request *repository3.VulnerabilityRequest) (*repository3.VulnerabilityExposureListingResponse, error)
- type PolicyService
- type PolicyServiceImpl
- func (impl *PolicyServiceImpl) DeletePolicy(id int, userId int32) (*bean.IdVulnerabilityPolicyResult, error)
- func (impl *PolicyServiceImpl) GetApplicablePolicy(clusterId, envId, appId int, isAppstore bool) (map[string]*repository3.CvePolicy, ...)
- func (impl *PolicyServiceImpl) GetBlockedCVEList(cves []*repository3.CveStore, clusterId, envId, appId int, isAppstore bool) ([]*repository3.CveStore, error)
- func (impl *PolicyServiceImpl) GetCvePolicy(id int, userId int32) (*repository3.CvePolicy, error)
- func (impl *PolicyServiceImpl) GetPolicies(policyLevel securityBean.PolicyLevel, clusterId, environmentId, appId int) (*bean.GetVulnerabilityPolicyResult, error)
- func (impl *PolicyServiceImpl) HasBlockedCVE(cves []*repository3.CveStore, cvePolicy map[string]*repository3.CvePolicy, ...) bool
- func (impl *PolicyServiceImpl) SavePolicy(request bean.CreateVulnerabilityPolicyRequest, userId int32) (*bean.IdVulnerabilityPolicyResult, error)
- func (impl *PolicyServiceImpl) SendEventToClairUtility(event *ScanEvent) error
- func (impl *PolicyServiceImpl) UpdatePolicy(updatePolicyParams bean.UpdatePolicyParams, userId int32) (*bean.IdVulnerabilityPolicyResult, error)
- func (impl *PolicyServiceImpl) VerifyImage(verifyImageRequest *VerifyImageRequest) (map[string][]*VerifyImageResponse, error)
- type ScanEvent
- type ScanToolMetadataService
- type ScanToolMetadataServiceImpl
- type VerifyImageRequest
- type VerifyImageResponse
Constants ¶
This section is empty.
Variables ¶
View Source
var ImageScanningWireSet = wire.NewSet( NewPolicyServiceImpl, wire.Bind(new(PolicyService), new(*PolicyServiceImpl)), NewImageScanServiceImpl, wire.Bind(new(ImageScanService), new(*ImageScanServiceImpl)), read.NewImageScanHistoryReadService, wire.Bind(new(read.ImageScanHistoryReadService), new(*read.ImageScanHistoryReadServiceImpl)), read.NewImageScanDeployInfoReadService, wire.Bind(new(read.ImageScanDeployInfoReadService), new(*read.ImageScanDeployInfoReadServiceImpl)), NewImageScanDeployInfoService, wire.Bind(new(ImageScanDeployInfoService), new(*ImageScanDeployInfoServiceImpl)), read.NewImageScanResultReadServiceImpl, wire.Bind(new(read.ImageScanResultReadService), new(*read.ImageScanResultReadServiceImpl)), NewScanToolMetadataServiceImpl, wire.Bind(new(ScanToolMetadataService), new(*ScanToolMetadataServiceImpl)), repository.NewImageScanHistoryRepositoryImpl, wire.Bind(new(repository.ImageScanHistoryRepository), new(*repository.ImageScanHistoryRepositoryImpl)), repository.NewImageScanResultRepositoryImpl, wire.Bind(new(repository.ImageScanResultRepository), new(*repository.ImageScanResultRepositoryImpl)), repository.NewImageScanObjectMetaRepositoryImpl, wire.Bind(new(repository.ImageScanObjectMetaRepository), new(*repository.ImageScanObjectMetaRepositoryImpl)), repository.NewCveStoreRepositoryImpl, wire.Bind(new(repository.CveStoreRepository), new(*repository.CveStoreRepositoryImpl)), repository.NewImageScanDeployInfoRepositoryImpl, wire.Bind(new(repository.ImageScanDeployInfoRepository), new(*repository.ImageScanDeployInfoRepositoryImpl)), repository.NewScanToolMetadataRepositoryImpl, wire.Bind(new(repository.ScanToolMetadataRepository), new(*repository.ScanToolMetadataRepositoryImpl)), repository.NewPolicyRepositoryImpl, wire.Bind(new(repository.CvePolicyRepository), new(*repository.CvePolicyRepositoryImpl)), repository.NewScanToolExecutionHistoryMappingRepositoryImpl, wire.Bind(new(repository.ScanToolExecutionHistoryMappingRepository), new(*repository.ScanToolExecutionHistoryMappingRepositoryImpl)), )
Functions ¶
This section is empty.
Types ¶
type ImageScanDeployInfoService ¶
type ImageScanDeployInfoService interface { Save(model *repository.ImageScanDeployInfo) error Update(model *repository.ImageScanDeployInfo) error }
type ImageScanDeployInfoServiceImpl ¶
type ImageScanDeployInfoServiceImpl struct {
// contains filtered or unexported fields
}
func NewImageScanDeployInfoService ¶
func NewImageScanDeployInfoService(logger *zap.SugaredLogger, imageScanDeployInfoRepository repository.ImageScanDeployInfoRepository) *ImageScanDeployInfoServiceImpl
func (*ImageScanDeployInfoServiceImpl) Save ¶
func (impl *ImageScanDeployInfoServiceImpl) Save(model *repository.ImageScanDeployInfo) error
func (*ImageScanDeployInfoServiceImpl) Update ¶
func (impl *ImageScanDeployInfoServiceImpl) Update(model *repository.ImageScanDeployInfo) error
type ImageScanService ¶
type ImageScanService interface { FetchAllDeployInfo(request *bean3.ImageScanRequest) ([]*repository3.ImageScanDeployInfo, error) FetchScanExecutionListing(request *bean3.ImageScanRequest, ids []int) (*bean3.ImageScanHistoryListingResponse, error) FetchExecutionDetailResult(request *bean3.ImageScanRequest) (*bean3.ImageScanExecutionDetail, error) FetchMinScanResultByAppIdAndEnvId(request *bean3.ImageScanRequest) (*bean3.ImageScanExecutionDetail, error) VulnerabilityExposure(request *repository3.VulnerabilityRequest) (*repository3.VulnerabilityExposureListingResponse, error) GetArtifactVulnerabilityStatus(ctx context.Context, request *bean2.VulnerabilityCheckRequest) (bool, error) IsImageScanExecutionCompleted(image, imageDigest string) (bool, error) }
type ImageScanServiceImpl ¶
type ImageScanServiceImpl struct { Logger *zap.SugaredLogger // contains filtered or unexported fields }
func NewImageScanServiceImpl ¶
func NewImageScanServiceImpl(Logger *zap.SugaredLogger, scanHistoryRepository repository3.ImageScanHistoryRepository, scanResultRepository repository3.ImageScanResultRepository, scanObjectMetaRepository repository3.ImageScanObjectMetaRepository, cveStoreRepository repository3.CveStoreRepository, imageScanDeployInfoRepository repository3.ImageScanDeployInfoRepository, userService user.UserService, appRepository repository1.AppRepository, envService environment.EnvironmentService, ciArtifactRepository repository.CiArtifactRepository, policyService PolicyService, pipelineRepository pipelineConfig.PipelineRepository, ciPipelineRepository pipelineConfig.CiPipelineRepository, scanToolMetaDataRepository repository3.ScanToolMetadataRepository, scanToolExecutionHistoryMappingRepository repository3.ScanToolExecutionHistoryMappingRepository, cvePolicyRepository repository3.CvePolicyRepository) *ImageScanServiceImpl
func (*ImageScanServiceImpl) CalculateSeverityCountInfo ¶
func (impl *ImageScanServiceImpl) CalculateSeverityCountInfo(vulnerabilities []*bean3.Vulnerabilities) *bean3.SeverityCount
func (ImageScanServiceImpl) FetchAllDeployInfo ¶
func (impl ImageScanServiceImpl) FetchAllDeployInfo(request *bean3.ImageScanRequest) ([]*repository3.ImageScanDeployInfo, error)
func (ImageScanServiceImpl) FetchExecutionDetailResult ¶
func (impl ImageScanServiceImpl) FetchExecutionDetailResult(request *bean3.ImageScanRequest) (*bean3.ImageScanExecutionDetail, error)
func (*ImageScanServiceImpl) FetchMinScanResultByAppIdAndEnvId ¶
func (impl *ImageScanServiceImpl) FetchMinScanResultByAppIdAndEnvId(request *bean3.ImageScanRequest) (*bean3.ImageScanExecutionDetail, error)
func (ImageScanServiceImpl) FetchScanExecutionListing ¶
func (impl ImageScanServiceImpl) FetchScanExecutionListing(request *bean3.ImageScanRequest, deployInfoIds []int) (*bean3.ImageScanHistoryListingResponse, error)
func (*ImageScanServiceImpl) GetArtifactVulnerabilityStatus ¶
func (impl *ImageScanServiceImpl) GetArtifactVulnerabilityStatus(ctx context.Context, request *bean2.VulnerabilityCheckRequest) (bool, error)
func (ImageScanServiceImpl) IsImageScanExecutionCompleted ¶
func (impl ImageScanServiceImpl) IsImageScanExecutionCompleted(image, imageDigest string) (bool, error)
func (*ImageScanServiceImpl) VulnerabilityExposure ¶
func (impl *ImageScanServiceImpl) VulnerabilityExposure(request *repository3.VulnerabilityRequest) (*repository3.VulnerabilityExposureListingResponse, error)
type PolicyService ¶
type PolicyService interface { SavePolicy(request bean.CreateVulnerabilityPolicyRequest, userId int32) (*bean.IdVulnerabilityPolicyResult, error) UpdatePolicy(updatePolicyParams bean.UpdatePolicyParams, userId int32) (*bean.IdVulnerabilityPolicyResult, error) DeletePolicy(id int, userId int32) (*bean.IdVulnerabilityPolicyResult, error) GetPolicies(policyLevel securityBean.PolicyLevel, clusterId, environmentId, appId int) (*bean.GetVulnerabilityPolicyResult, error) GetBlockedCVEList(cves []*repository3.CveStore, clusterId, envId, appId int, isAppstore bool) ([]*repository3.CveStore, error) VerifyImage(verifyImageRequest *VerifyImageRequest) (map[string][]*VerifyImageResponse, error) GetCvePolicy(id int, userId int32) (*repository3.CvePolicy, error) GetApplicablePolicy(clusterId, envId, appId int, isAppstore bool) (map[string]*repository3.CvePolicy, map[securityBean.Severity]*repository3.CvePolicy, error) HasBlockedCVE(cves []*repository3.CveStore, cvePolicy map[string]*repository3.CvePolicy, severityPolicy map[securityBean.Severity]*repository3.CvePolicy) bool }
type PolicyServiceImpl ¶
type PolicyServiceImpl struct { PipelineRepository pipelineConfig.PipelineRepository // contains filtered or unexported fields }
func NewPolicyServiceImpl ¶
func NewPolicyServiceImpl(environmentService environment.EnvironmentService, logger *zap.SugaredLogger, apRepository repository1.AppRepository, pipelineOverride chartConfig.PipelineOverrideRepository, cvePolicyRepository repository3.CvePolicyRepository, clusterService cluster.ClusterService, PipelineRepository pipelineConfig.PipelineRepository, scanResultRepository repository3.ImageScanResultRepository, imageScanDeployInfoRepository repository3.ImageScanDeployInfoRepository, imageScanObjectMetaRepository repository3.ImageScanObjectMetaRepository, client *http.Client, ciArtifactRepository repository.CiArtifactRepository, ciConfig *types.CiCdConfig, imageScanHistoryReadService read.ImageScanHistoryReadService, cveStoreRepository repository3.CveStoreRepository, ciTemplateRepository pipelineConfig.CiTemplateRepository) *PolicyServiceImpl
func (*PolicyServiceImpl) DeletePolicy ¶
func (impl *PolicyServiceImpl) DeletePolicy(id int, userId int32) (*bean.IdVulnerabilityPolicyResult, error)
input : policyId output: id
func (*PolicyServiceImpl) GetApplicablePolicy ¶
func (impl *PolicyServiceImpl) GetApplicablePolicy(clusterId, envId, appId int, isAppstore bool) (map[string]*repository3.CvePolicy, map[securityBean.Severity]*repository3.CvePolicy, error)
func (*PolicyServiceImpl) GetBlockedCVEList ¶
func (impl *PolicyServiceImpl) GetBlockedCVEList(cves []*repository3.CveStore, clusterId, envId, appId int, isAppstore bool) ([]*repository3.CveStore, error)
func (*PolicyServiceImpl) GetCvePolicy ¶
func (impl *PolicyServiceImpl) GetCvePolicy(id int, userId int32) (*repository3.CvePolicy, error)
func (*PolicyServiceImpl) GetPolicies ¶
func (impl *PolicyServiceImpl) GetPolicies(policyLevel securityBean.PolicyLevel, clusterId, environmentId, appId int) (*bean.GetVulnerabilityPolicyResult, error)
global: na cluster: clusterId environment: environmentId application : appId, envId
res:
func (*PolicyServiceImpl) HasBlockedCVE ¶
func (impl *PolicyServiceImpl) HasBlockedCVE(cves []*repository3.CveStore, cvePolicy map[string]*repository3.CvePolicy, severityPolicy map[securityBean.Severity]*repository3.CvePolicy) bool
func (*PolicyServiceImpl) SavePolicy ¶
func (impl *PolicyServiceImpl) SavePolicy(request bean.CreateVulnerabilityPolicyRequest, userId int32) (*bean.IdVulnerabilityPolicyResult, error)
func (*PolicyServiceImpl) SendEventToClairUtility ¶
func (impl *PolicyServiceImpl) SendEventToClairUtility(event *ScanEvent) error
func (*PolicyServiceImpl) UpdatePolicy ¶
func (impl *PolicyServiceImpl) UpdatePolicy(updatePolicyParams bean.UpdatePolicyParams, userId int32) (*bean.IdVulnerabilityPolicyResult, error)
1. policy id 2. action
func (*PolicyServiceImpl) VerifyImage ¶
func (impl *PolicyServiceImpl) VerifyImage(verifyImageRequest *VerifyImageRequest) (map[string][]*VerifyImageResponse, error)
type ScanEvent ¶
type ScanEvent struct { Image string `json:"image"` ImageDigest string `json:"imageDigest"` AppId int `json:"appId"` EnvId int `json:"envId"` PipelineId int `json:"pipelineId"` CiArtifactId int `json:"ciArtifactId"` UserId int `json:"userId"` AccessKey string `json:"accessKey"` SecretKey string `json:"secretKey"` Token string `json:"token"` AwsRegion string `json:"awsRegion"` DockerRegistryId string `json:"dockerRegistryId"` }
type ScanToolMetadataService ¶
type ScanToolMetadataServiceImpl ¶
type ScanToolMetadataServiceImpl struct {
// contains filtered or unexported fields
}
func NewScanToolMetadataServiceImpl ¶
func NewScanToolMetadataServiceImpl(logger *zap.SugaredLogger, scanToolMetadataRepository repository.ScanToolMetadataRepository) *ScanToolMetadataServiceImpl
func (*ScanToolMetadataServiceImpl) MarkOtherToolsInActive ¶
func (*ScanToolMetadataServiceImpl) MarkToolAsActive ¶
func (impl *ScanToolMetadataServiceImpl) MarkToolAsActive(toolName, version string, tx *pg.Tx) error
type VerifyImageRequest ¶
Source Files ¶
Click to show internal directories.
Click to hide internal directories.