3535 severities = []string {utils .CRITICAL , utils .HIGH , utils .MEDIUM , utils .LOW }
3636 productENV = utils .GetEnvOrDefault ("DEEPFENCE_PRODUCT" , "ThreatMapper" )
3737 licenseENV = utils .GetEnvOrDefault ("DEEPFENCE_LICENSE" , "" )
38+ dfConsoleURL = utils .GetEnvOrDefault ("DEEPFENCE_MGMT_CONSOLE_URL" , "" )
39+ dfKey = utils .GetEnvOrDefault ("DEEPFENCE_KEY" , "" )
3840 version string
3941 userCacheDir string
4042)
@@ -50,10 +52,10 @@ var (
5052 port = flag .String ("port" , "" , "Port for grpc server" )
5153 output = flag .String ("output" , utils .TableOutput , "Output format: json or table" )
5254 quiet = flag .Bool ("quiet" , false , "Don't display any output in stdout" )
53- consoleURL = flag .String ("console-url" , "" , "Deepfence Management Console URL" )
55+ consoleURL = flag .String ("console-url" , dfConsoleURL , "Deepfence Management Console URL" )
5456 consolePort = flag .Int ("console-port" , 443 , "Deepfence Management Console Port" )
5557 vulnerabilityScan = flag .Bool ("vulnerability-scan" , false , "Publish SBOM to Deepfence Management Console and run Vulnerability Scan" )
56- deepfenceKey = flag .String ("deepfence-key" , "" , "Deepfence key for auth" )
58+ deepfenceKey = flag .String ("deepfence-key" , dfKey , "Deepfence key for auth" )
5759 source = flag .String ("source" , "" , "Image name (nginx:latest) or directory (dir:/)" )
5860 scanType = flag .String ("scan-type" , "base,java,python,ruby,php,javascript,rust,rust-binary,golang,golang-binary,dotnet" , "base,java,python,ruby,php,javascript,rust,rust-binary,golang,golang-binary,dotnet" )
5961 scanID = flag .String ("scan-id" , "" , "(Optional) Scan id" )
0 commit comments