Documentation ¶
Overview ¶
Copyright © 2020 Red Hat Inc.
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
Index ¶
- Constants
- func AnyMcfgPoolLabelMatches(nodeSelector map[string]string, poolList *mcfgv1.MachineConfigPoolList) (bool, *mcfgv1.MachineConfigPool)
- func ComplianceOperatorRootCA(certname string, expire int) ([]byte, []byte, error)
- func DNSLengthName(hashPrefix string, format string, a ...interface{}) string
- func FindNewestPod(pods []corev1.Pod) *corev1.Pod
- func GetComponentImage(component ComplianceComponent) string
- func GetFirstNodeRole(nodeSelector map[string]string) string
- func GetFirstNodeRoleLabel(nodeSelector map[string]string) string
- func GetInstructionsForRule(rule *xmlquery.Node, ocilTable NodeByIdHashTable) string
- func GetNodeRoleSelector(role string) map[string]string
- func GetResultConfigMap(owner metav1.Object, configMapName, filename, nodeName string, ...) *corev1.ConfigMap
- func GetWarningsForRule(rule *xmlquery.Node) []string
- func HaveOutdatedRemediations(client runtimeclient.Client) (error, bool)
- func IsKind(obj *unstructured.Unstructured, kind string) bool
- func IsKubeletConfig(obj *unstructured.Unstructured) bool
- func IsMachineConfig(obj *unstructured.Unstructured) bool
- func IsMcfgPoolUsingKC(pool *mcfgv1.MachineConfigPool) (bool, string, error)
- func LengthName(maxLen int, hashPrefix string, format string, a ...interface{}) (string, error)
- func McfgPoolLabelMatches(nodeSelector map[string]string, pool *mcfgv1.MachineConfigPool) bool
- func NewClientCert(caCert, caKey []byte, certname string, expire int) ([]byte, []byte, error)
- func NewServerCert(caCert, caKey []byte, certname string, expire int) ([]byte, []byte, error)
- func ParseContent(dsReader io.Reader) (*xmlquery.Node, error)
- func ParseMachineConfig(rem *compv1alpha1.ComplianceRemediation, obj *unstructured.Unstructured) (*mcfgv1.MachineConfig, error)
- func ReadObjectsFromYAML(r io.Reader) ([]*unstructured.Unstructured, error)
- func RenderValues(in string, valuesList map[string]string) (string, []string, error)
- func RuleHasApiObjectWarning(rule *xmlquery.Node) bool
- func XmlNodeAsMarkdown(node *xmlquery.Node) string
- func XmlNodeAsMarkdownPreRender(node *xmlquery.Node, needsSpace bool) string
- type ComplianceComponent
- type CtlplaneSchedulingInfo
- type Directory
- type NodeByIdHashTable
- type ParseResult
- type ParseResultContext
- type ParseResultContextItem
- type ResourcePath
Constants ¶
const ( OPENSCAP = iota OPERATOR CONTENT )
Variables ¶
This section is empty.
Functions ¶
func AnyMcfgPoolLabelMatches ¶ added in v0.1.6
func AnyMcfgPoolLabelMatches(nodeSelector map[string]string, poolList *mcfgv1.MachineConfigPoolList) (bool, *mcfgv1.MachineConfigPool)
AnyMcfgPoolLabelMatches verifies if the given nodeSelector matches the nodeSelector in any of the given MachineConfigPools
func DNSLengthName ¶ added in v0.1.9
func FindNewestPod ¶ added in v0.1.15
FindNewestPod finds the newest pod in the given set
func GetComponentImage ¶ added in v0.1.9
func GetComponentImage(component ComplianceComponent) string
GetComponentImage returns a full image pull spec for a given component based on the component type
func GetFirstNodeRole ¶
func GetFirstNodeRoleLabel ¶
func GetInstructionsForRule ¶ added in v0.1.41
func GetInstructionsForRule(rule *xmlquery.Node, ocilTable NodeByIdHashTable) string
func GetNodeRoleSelector ¶
func GetResultConfigMap ¶ added in v0.1.14
func GetResultConfigMap(owner metav1.Object, configMapName, filename, nodeName string, contents io.Reader, compressed bool, exitcode string, warnings string) *corev1.ConfigMap
GetResultConfigMap gets a configmap that reflects a result or an error for a scan
func GetWarningsForRule ¶ added in v0.1.41
func HaveOutdatedRemediations ¶ added in v0.1.12
func HaveOutdatedRemediations(client runtimeclient.Client) (error, bool)
func IsKind ¶ added in v0.1.43
func IsKind(obj *unstructured.Unstructured, kind string) bool
func IsKubeletConfig ¶ added in v0.1.43
func IsKubeletConfig(obj *unstructured.Unstructured) bool
func IsMachineConfig ¶ added in v0.1.9
func IsMachineConfig(obj *unstructured.Unstructured) bool
IsMachineConfig checks if the specified object is a MachineConfig object
func IsMcfgPoolUsingKC ¶ added in v0.1.43
func IsMcfgPoolUsingKC(pool *mcfgv1.MachineConfigPool) (bool, string, error)
isMcfgPoolUsingKC check if a MachineConfig Pool is using a custom Kubelet Config if any custom Kublet Config used, return name of generated latest KC machine config from the custom kubelet config
func LengthName ¶ added in v0.1.9
LengthName creates a string of maximum defined length.
func McfgPoolLabelMatches ¶ added in v0.1.6
func McfgPoolLabelMatches(nodeSelector map[string]string, pool *mcfgv1.MachineConfigPool) bool
McfgPoolLabelMatches verifies if the given nodeSelector matches the given MachineConfigPool's nodeSelector
func NewClientCert ¶
func NewServerCert ¶
func ParseContent ¶
ParseContent parses the DataStream and returns the XML document
func ParseMachineConfig ¶ added in v0.1.9
func ParseMachineConfig(rem *compv1alpha1.ComplianceRemediation, obj *unstructured.Unstructured) (*mcfgv1.MachineConfig, error)
ParseMachineConfig parses a Machineconfig object from an unstructured object for a specific remediation.
func ReadObjectsFromYAML ¶ added in v0.1.38
func ReadObjectsFromYAML(r io.Reader) ([]*unstructured.Unstructured, error)
Reads a YAML file and returns an unstructured object from it. This object can be taken into use by the dynamic client
func RenderValues ¶ added in v0.1.45
func RuleHasApiObjectWarning ¶ added in v0.1.41
func XmlNodeAsMarkdown ¶ added in v0.1.33
Types ¶
type ComplianceComponent ¶ added in v0.1.9
type ComplianceComponent uint
type CtlplaneSchedulingInfo ¶ added in v0.1.47
type CtlplaneSchedulingInfo struct { Selector map[string]string Tolerations []corev1.Toleration }
type NodeByIdHashTable ¶ added in v0.1.41
func GetRuleOvalTest ¶ added in v0.1.41
func GetRuleOvalTest(rule *xmlquery.Node, defTable NodeByIdHashTable) NodeByIdHashTable
func NewDefHashTable ¶ added in v0.1.41
func NewDefHashTable(dsDom *xmlquery.Node) NodeByIdHashTable
func NewOcilQuestionTable ¶ added in v0.1.41
func NewOcilQuestionTable(dsDom *xmlquery.Node) NodeByIdHashTable
type ParseResult ¶ added in v0.1.9
type ParseResult struct { Id string CheckResult *compv1alpha1.ComplianceCheckResult Remediations []*compv1alpha1.ComplianceRemediation }
type ParseResultContext ¶ added in v0.1.10
type ParseResultContext struct {
// contains filtered or unexported fields
}
ParseResultContext keeps track of items that are consistent across all "sources" in a ComplianceScan as well as items that are inconsistent
func NewParseResultContext ¶ added in v0.1.10
func NewParseResultContext() *ParseResultContext
func (*ParseResultContext) AddResults ¶ added in v0.1.10
func (prCtx *ParseResultContext) AddResults(source string, parsedResList []*ParseResult)
ParseResultContext.AddResults adds a batch of results coming from the parser and partitions them into either the consistent or the inconsistent list
func (*ParseResultContext) GetConsistentResults ¶ added in v0.1.10
func (prCtx *ParseResultContext) GetConsistentResults() []*ParseResultContextItem
type ParseResultContextItem ¶ added in v0.1.10
type ParseResultContextItem struct { ParseResult Annotations map[string]string Labels map[string]string // contains filtered or unexported fields }
ParseResultContextItem wraps ParseResult with some metadata that need to be added to the created k8s object based on the processing result as well as which nodes the result comes from and whether it's been processed during a single loop that processes a single CM yet or not. The sources are used to keep track of which nodes differ from the "canonical" state of the check
type ResourcePath ¶ added in v0.1.36
func GetPathFromWarningXML ¶ added in v0.1.31
getPathsFromRuleWarning finds the API endpoint from in. The expected structure is:
<warning category="general" lang="en-US"><code class="ocp-api-endpoint">/apis/config.openshift.io/v1/oauths/cluster </code></warning>