The for Radix Vulnerability Scanner API provides access to vulnerability scan results for applications hosted in Radix. See Radix Vulnerability Scanner for details on installation and DB Credentials (we use managed identities).
You need Go installed. Make sure GOPATH
and GOROOT
are properly set up.
Also needed:
go-swagger
(on a Mac, you can install it with Homebrew:brew install go-swagger
)statik
(install withgo get github.com/rakyll/statik
)gomock
(GO111MODULE=on go get github.com/golang/mock/[email protected])
Clone the repo into your GOPATH
and run go mod download
.
Want to contribute? Read our contributing guidelines
We use gomock to generate mocks used in unit test. You need to regenerate mocks if you make changes to any of the interface types used by the application
make mocks
Run once after cloning of the GitHub repository:
go mod download
make swagger
make generate-radix-api-client
The following env var is needed. Useful default values in brackets.
SQL_SERVER
- SQL server nameSQL_DATABASE
- SQL database nameRADIX_ENVIRONMENT
- Radix environment (ex.qa
)RADIX_CLUSTERNAME
- Radix cluster name (ex.weekly-33
)RADIX_DNS_ZONE
- Radix DNS zone (ex.dev.radix.equinor.com
)USE_LOCAL_RADIX_API
false
,0
or not set- connecting to in-cluster
radix-api`true
or1
- connecting toradix-api
, running onhttp://localhost:3002
USE_PROFILER
-
false
,0
ornot set
- do not use profiler -
true
or1
- use pprof profiler, running onhttp://localhost:7070/debug/pprof
. Use web-UI to profile, when started service:go tool pprof -http=:6070 http://localhost:7070/debug/pprof/heap
-
Radix Vulnerability Scanner API follows the standard procedure defined in how we work.
Radix Vulnerability Scanner API is installed as a Radix application in script when setting up a cluster.
This is how we handle security issues