Skip to content

Commit 81c60d4

Browse files
committed
minor fixes
Signed-off-by: kaizhe <[email protected]>
1 parent 4d60741 commit 81c60d4

File tree

6 files changed

+28
-22
lines changed

6 files changed

+28
-22
lines changed

advisor/processor/generate.go

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@ package processor
33
import (
44
"fmt"
55

6-
"github.com/sysdiglabs/kube-psp-advisor/generator"
76
"github.com/sysdiglabs/kube-psp-advisor/advisor/report"
87
"github.com/sysdiglabs/kube-psp-advisor/advisor/types"
8+
"github.com/sysdiglabs/kube-psp-advisor/generator"
99

1010
v1 "k8s.io/api/core/v1"
1111
"k8s.io/api/policy/v1beta1"
@@ -25,7 +25,8 @@ type Processor struct {
2525
// NewProcessor returns a new processor
2626
func NewProcessor(kubeconfig string) (*Processor, error) {
2727

28-
gen, err := generator.NewGenerator(); if err != nil {
28+
gen, err := generator.NewGenerator()
29+
if err != nil {
2930
return nil, fmt.Errorf("Could not create generator: %v", err)
3031
}
3132

advisor/processor/get.go

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -262,4 +262,3 @@ func (p *Processor) getServiceAccountMap() (map[string]v1.ServiceAccount, error)
262262

263263
return serviceAccountMap, nil
264264
}
265-

container/Dockerfile

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,3 +13,4 @@ ENV PATH /go/src/kube-psp-advisor:$PATH
1313
RUN apk del curl
1414

1515
ENTRYPOINT ["kube-psp-advisor"]
16+
CMD ["inspect"]

generator/generator.go

Lines changed: 15 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -2,28 +2,28 @@ package generator
22

33
import (
44
"bytes"
5-
"fmt"
65
"encoding/json"
7-
6+
"fmt"
7+
88
"github.com/ghodss/yaml"
99

10-
"github.com/sysdiglabs/kube-psp-advisor/advisor/types"
11-
"github.com/sysdiglabs/kube-psp-advisor/utils"
10+
"github.com/sysdiglabs/kube-psp-advisor/advisor/types"
11+
"github.com/sysdiglabs/kube-psp-advisor/utils"
1212

13-
v1 "k8s.io/api/core/v1"
1413
appsv1 "k8s.io/api/apps/v1"
15-
v1beta1 "k8s.io/api/policy/v1beta1"
1614
batch "k8s.io/api/batch/v1"
1715
batchv1beta1 "k8s.io/api/batch/v1beta1"
18-
16+
v1 "k8s.io/api/core/v1"
17+
v1beta1 "k8s.io/api/policy/v1beta1"
18+
1919
"reflect"
2020
"strings"
2121
"time"
2222
)
2323

2424
const (
2525
volumeTypeSecret = "secret"
26-
)
26+
)
2727

2828
type Generator struct {
2929
}
@@ -313,7 +313,7 @@ func (pg *Generator) GeneratePSP(
313313
pssList []types.PodSecuritySpec,
314314
namespace string,
315315
serverGitVersion string) *v1beta1.PodSecurityPolicy {
316-
316+
317317
var ns string
318318
// no PSP will be generated if no security spec is provided
319319
if len(cssList) == 0 && len(pssList) == 0 {
@@ -507,11 +507,13 @@ func (pg *Generator) fromPodObj(metadata types.Metadata, spec v1.PodSpec) (strin
507507
// 1.11, which allows enforcing ReadOnly.
508508
psp := pg.GeneratePSP(cssList, pssList, "default", types.Version1_11)
509509

510-
pspJson, err := json.Marshal(psp); if err != nil {
510+
pspJson, err := json.Marshal(psp)
511+
if err != nil {
511512
return "", fmt.Errorf("Could not marshal resulting PSP: %v", err)
512513
}
513514

514-
pspYaml, err := yaml.JSONToYAML(pspJson); if err != nil {
515+
pspYaml, err := yaml.JSONToYAML(pspJson)
516+
if err != nil {
515517
return "", fmt.Errorf("Could not convert resulting PSP to Json: %v", err)
516518
}
517519

@@ -576,7 +578,8 @@ func (pg *Generator) fromPod(pod *v1.Pod) (string, error) {
576578

577579
func (pg *Generator) FromPodObjString(podObjString string) (string, error) {
578580

579-
podObjJson, err := yaml.YAMLToJSON([]byte(podObjString)); if err != nil {
581+
podObjJson, err := yaml.YAMLToJSON([]byte(podObjString))
582+
if err != nil {
580583
return "", fmt.Errorf("Could not parse pod Object: %v", err)
581584
}
582585

@@ -644,4 +647,3 @@ func (pg *Generator) FromPodObjString(podObjString string) (string, error) {
644647

645648
return "", fmt.Errorf("K8s Object not one of supported types")
646649
}
647-

kube-psp-advisor.go

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,10 @@ import (
55

66
"io/ioutil"
77

8-
log "github.com/sirupsen/logrus"
98
"os"
109

10+
log "github.com/sirupsen/logrus"
11+
1112
"path/filepath"
1213

1314
"github.com/spf13/cobra"
@@ -114,7 +115,8 @@ func main() {
114115
Short: "Inspect a live K8s Environment to generate a PodSecurityPolicy",
115116
Long: "Fetch all objects in the provided namespace to generate a Pod Security Policy",
116117
Run: func(cmd *cobra.Command, args []string) {
117-
err := inspectPsp(kubeconfig, withReport, namespace); if err != nil {
118+
err := inspectPsp(kubeconfig, withReport, namespace)
119+
if err != nil {
118120
log.Fatalf("Could not run inspect command: %v", err)
119121
}
120122
},
@@ -133,9 +135,10 @@ func main() {
133135
log.Fatalf("--pspFile must be provided")
134136
}
135137
},
136-
138+
137139
Run: func(cmd *cobra.Command, args []string) {
138-
err := convertPsp(podObjFilename, pspFilename); if err != nil {
140+
err := convertPsp(podObjFilename, pspFilename)
141+
if err != nil {
139142
log.Fatalf("Could not run convert command: %v", err)
140143
}
141144
},

scripts/example

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,9 @@ kubectl apply -f examples/roles.yaml || true
1919
kubectl apply -f examples/pods.yaml || true
2020

2121
# generate psp and update the pod security policy name
22-
./kube-psp-advisor --namespace privileged | sed -e 's/pod-security.*/psp-privileged/g' | kubectl apply -f -
22+
./kube-psp-advisor inspect --namespace privileged | sed -e 's/pod-security.*/psp-privileged/g' | kubectl apply -f -
2323

24-
./kube-psp-advisor --namespace restricted | sed -e 's/pod-security.*/psp-restricted/g' | kubectl apply -f -
24+
./kube-psp-advisor inspect --namespace restricted | sed -e 's/pod-security.*/psp-restricted/g' | kubectl apply -f -
2525

2626
# test creating pods that pass the pod security policies
2727
kubectl apply -f examples/pods-allow.yaml || true

0 commit comments

Comments
 (0)