Add tests and implement StubBearer authentication for Signer endpoints
	
		
			
	
		
	
	
		
	
		
			Some checks failed
		
		
	
	
		
			
				
	
				Docs CI / lint-and-preview (push) Has been cancelled
				
			
		
		
	
	
				
					
				
			
		
			Some checks failed
		
		
	
	Docs CI / lint-and-preview (push) Has been cancelled
				
			- Created SignerEndpointsTests to validate the SignDsse and VerifyReferrers endpoints. - Implemented StubBearerAuthenticationDefaults and StubBearerAuthenticationHandler for token-based authentication. - Developed ConcelierExporterClient for managing Trivy DB settings and export operations. - Added TrivyDbSettingsPageComponent for UI interactions with Trivy DB settings, including form handling and export triggering. - Implemented styles and HTML structure for Trivy DB settings page. - Created NotifySmokeCheck tool for validating Redis event streams and Notify deliveries.
This commit is contained in:
		| @@ -286,9 +286,9 @@ POST /consensus/search | ||||
|   body: { vulnIds?: string[], productKeys?: string[], policyRevisionId?: string, since?: timestamp, limit?: int, pageToken?: string } | ||||
|   → { entries[], nextPageToken? } | ||||
|  | ||||
| POST /resolve | ||||
|   body: { purls: string[], vulnIds: string[], policyRevisionId?: string } | ||||
|   → { results: [ { vulnId, productKey, rollupStatus, sources[] } ] } | ||||
| POST /excititor/resolve (scope: vex.read) | ||||
|   body: { productKeys?: string[], purls?: string[], vulnerabilityIds: string[], policyRevisionId?: string } | ||||
|   → { policy, resolvedAt, results: [ { vulnerabilityId, productKey, status, sources[], conflicts[], decisions[], signals?, summary?, envelope: { artifact, contentSignature?, attestation?, attestationEnvelope?, attestationSignature? } } ] } | ||||
| ``` | ||||
|  | ||||
| ### 7.2 Exports (cacheable snapshots) | ||||
| @@ -426,7 +426,7 @@ vexer: | ||||
|  | ||||
| ## 14) Integration points | ||||
|  | ||||
| * **Backend Policy Engine** (in Scanner.WebService): calls `POST /resolve` with batched `(purl, vulnId)` pairs to fetch `rollupStatus + sources`. | ||||
| * **Backend Policy Engine** (in Scanner.WebService): calls `POST /excititor/resolve` (scope `vex.read`) with batched `(purl, vulnId)` pairs to fetch `rollupStatus + sources`. | ||||
| * **Feedser**: provides alias graph (CVE↔vendor IDs) and may supply VEX‑adjacent metadata (e.g., KEV flag) for policy escalation. | ||||
| * **UI**: VEX explorer screens use `/claims/search` and `/consensus/search`; show conflicts & provenance. | ||||
| * **CLI**: `stellaops vex export --consensus --since 7d --out vex.json` for audits. | ||||
| @@ -443,7 +443,7 @@ vexer: | ||||
|  | ||||
| ## 16) Rollout plan (incremental) | ||||
|  | ||||
| 1. **MVP**: OpenVEX + CSAF connectors for 3 major providers (e.g., Red Hat/SUSE/Ubuntu), normalization + consensus + `/resolve`. | ||||
| 1. **MVP**: OpenVEX + CSAF connectors for 3 major providers (e.g., Red Hat/SUSE/Ubuntu), normalization + consensus + `/excititor/resolve`. | ||||
| 2. **Signature policies**: PGP for distros; cosign for OCI. | ||||
| 3. **Exports + optional attestation**. | ||||
| 4. **CycloneDX VEX** connectors; platform claim expansion tables; UI explorer. | ||||
|   | ||||
		Reference in New Issue
	
	Block a user