Documentation ¶
Index ¶
- Variables
- type CISKubeBenchReports
- type ComplianceReports
- type Config
- type ConfigAuditReports
- type ExposedSecretReports
- type RbacAssessmentReports
- type Resolver
- func (r *Resolver) CISKubeBenchReportClient() (*kubebench.Client, error)
- func (r *Resolver) ClusterRbacAssessmentReportClient() (*clusterrbac.Client, error)
- func (r *Resolver) ComplianceReportClient() (*compliance.Client, error)
- func (r *Resolver) ConfigAuditReportClient() (*auditr.Client, error)
- func (r *Resolver) ExposedSecretReportClient() (*exposedsecret.Client, error)
- func (r *Resolver) Manager() (manager.Manager, error)
- func (r *Resolver) RbacAssessmentReportClient() (*rbac.Client, error)
- func (r *Resolver) VulnerabilityReportClient() (*vulnr.Client, error)
- type VulnerabilityReports
Constants ¶
This section is empty.
Variables ¶
View Source
var ( StarboardGroupVersion = schema.GroupVersion{ Group: aquasecurity.GroupName, Version: starboard.CISKubeBenchReportCRVersion, } StarboardSchemaBuilder = runtime.NewSchemeBuilder(func(s *runtime.Scheme) error { s.AddKnownTypes( StarboardGroupVersion, &starboard.CISKubeBenchReport{}, &starboard.CISKubeBenchReportList{}, ) meta.AddToGroupVersion(s, StarboardGroupVersion) return nil }) )
Functions ¶
This section is empty.
Types ¶
type CISKubeBenchReports ¶
type CISKubeBenchReports struct { Enabled bool `mapstructure:"enabled"` ApplyLabels []string `mapstructure:"applyLabels"` }
CISKubeBenchReports configuration
type ComplianceReports ¶
type ComplianceReports struct { Enabled bool `mapstructure:"enabled"` ApplyLabels []string `mapstructure:"applyLabels"` }
ComplianceReports configuration
type Config ¶
type Config struct { Kubeconfig string `mapstructure:"kubeconfig"` VulnerabilityReports VulnerabilityReports `mapstructure:"vulnerabilityReports"` ConfigAuditReports ConfigAuditReports `mapstructure:"configAuditReports"` CISKubeBenchReports CISKubeBenchReports `mapstructure:"cisKubeBenchReports"` ComplianceReports ComplianceReports `mapstructure:"complianceReports"` RbacAssessmentReports RbacAssessmentReports `mapstructure:"rbacAssessmentReports"` ExposedSecretReports ExposedSecretReports `mapstructure:"exposedSecretReports"` }
Config of the Tracee Adapter
type ConfigAuditReports ¶
type ConfigAuditReports struct { Enabled bool `mapstructure:"enabled"` ApplyLabels []string `mapstructure:"applyLabels"` }
ConfigAuditReports configuration
type ExposedSecretReports ¶ added in v0.1.0
type ExposedSecretReports struct { Enabled bool `mapstructure:"enabled"` ApplyLabels []string `mapstructure:"applyLabels"` }
ExposedSecretReports configuration
type RbacAssessmentReports ¶ added in v0.1.0
type RbacAssessmentReports struct { Enabled bool `mapstructure:"enabled"` ApplyLabels []string `mapstructure:"applyLabels"` }
RbacAssessmentReports configuration
type Resolver ¶
type Resolver struct {
// contains filtered or unexported fields
}
Resolver manages dependencies
func NewResolver ¶
NewResolver constructor function
func (*Resolver) CISKubeBenchReportClient ¶
CISKubeBenchReportClient resolver method
func (*Resolver) ClusterRbacAssessmentReportClient ¶ added in v0.1.0
func (r *Resolver) ClusterRbacAssessmentReportClient() (*clusterrbac.Client, error)
ClusterRbacAssessmentReportClient resolver method
func (*Resolver) ComplianceReportClient ¶ added in v0.1.0
func (r *Resolver) ComplianceReportClient() (*compliance.Client, error)
ComplianceReportClient resolver method
func (*Resolver) ConfigAuditReportClient ¶
ConfigAuditReportClient resolver method
func (*Resolver) ExposedSecretReportClient ¶ added in v0.1.0
func (r *Resolver) ExposedSecretReportClient() (*exposedsecret.Client, error)
RbacAssessmentReportClient resolver method
func (*Resolver) RbacAssessmentReportClient ¶ added in v0.1.0
RbacAssessmentReportClient resolver method
type VulnerabilityReports ¶
type VulnerabilityReports struct { Enabled bool `mapstructure:"enabled"` ApplyLabels []string `mapstructure:"applyLabels"` }
VulnerabilityReports configuration
Click to show internal directories.
Click to hide internal directories.