Skip to content
This repository was archived by the owner on Jan 23, 2025. It is now read-only.

Commit c606912

Browse files
committed
remove un-needed work
Signed-off-by: Simar <[email protected]>
1 parent 8cd9811 commit c606912

File tree

2 files changed

+3
-1
lines changed

2 files changed

+3
-1
lines changed

pkg/rego/scanner.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -281,7 +281,7 @@ func (s *Scanner) ScanInput(ctx context.Context, inputs ...Input) (scan.Results,
281281
}
282282

283283
func isPolicyWithSubtype(sourceType types.Source) bool {
284-
for _, s := range []types.Source{types.SourceCloud, types.SourceDefsec, types.SourceKubernetes} { // TODO(simar): Add types.Kubernetes once all k8s policy have subtype
284+
for _, s := range []types.Source{types.SourceCloud, types.SourceDefsec} { // TODO(simar): Add types.Kubernetes once all k8s policy have subtype
285285
if sourceType == s {
286286
return true
287287
}

pkg/scanners/kubernetes/scanner_test.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -615,6 +615,7 @@ spec:
615615
assert.Equal(t, "k8s.yaml", firstResult.Metadata().Range().GetFilename())
616616
}
617617

618+
/*
618619
// TODO(simar): Uncomment once all k8s policies have subtype selector added
619620
func Test_checkPolicyIsApplicable(t *testing.T) {
620621
srcFS := testutil.CreateFS(t, map[string]string{
@@ -734,3 +735,4 @@ spec:
734735
failure := results.GetFailed()[0].Rule()
735736
assert.Equal(t, "Process can elevate its own privileges", failure.Summary)
736737
}
738+
*/

0 commit comments

Comments
 (0)