-
Notifications
You must be signed in to change notification settings - Fork 62
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes to vuln 0.1 spec and documentation #392
base: main
Are you sure you want to change the base?
Conversation
Signed-off-by: Brandon Lum <[email protected]>
@hectorj2f can you validate if any of the suggested changes here would reflect in #345 as well? fyi, i don't have maintainer bit here, so no control over that :) |
@@ -64,41 +64,39 @@ The `predicate` contains a JSON-encoded data with the following fields: | |||
|
|||
> > > The version of the Vulnerability DB. | |||
|
|||
**scanner.db.lastUpdate, required** string (timestamp) | |||
**scanner.db.lastUpdate, optional** string (timestamp) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I won't change this setting. It is important to reflect the update of the database used for the scanner.
> > > > > This is a list of key/value pairs where scanners can add additional custom information. | ||
|
||
**metadata.scanStartedOn, required** Timestamp | ||
**metadata.scanStartedOn, optional** Timestamp |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I have the same thoughts as above. This must be required to ensure all the details and reuse these attestations in the future.
|
||
> > > The vulnerability object defines information about each one of the vulnerabilities found by the scanner. | ||
**scanner.result.[*].id, required** string |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
These changes look good to me, we can remove the vulnerability, and assume they refer to vulnerabilities.
Addressing #391 and #390, and making several changes which help with implementing the spec. Comments welcome! Am happy to split up the changes if some of them may be potentially controversial. Tagging original author: @hectorj2f
#390
#391
from the spec since it is the only field within it (as reflected in
the example).
the example).
Make several fields which may not always be available optional.
available.
may not always be available when a DB uri/version is known.