- Introduced AGENTS.md, README.md, TASKS.md, and implementation_plan.md for Vexer, detailing mission, responsibilities, key components, and operational notes. - Established similar documentation structure for Vulnerability Explorer and Zastava modules, including their respective workflows, integrations, and observability notes. - Created risk scoring profiles documentation outlining the core workflow, factor model, governance, and deliverables. - Ensured all modules adhere to the Aggregation-Only Contract and maintain determinism and provenance in outputs.
5.0 KiB
5.0 KiB
Implementation plan — Export Center
Delivery phases
- Phase 1 – JSON & mirror foundations
Stand up the Export Center service + worker, deliver canonical JSON (json:raw,json:policy) andmirror:fullprofiles as download-only bundles, seed schema migrations, and publish manifest/provenance formats. - Phase 2 – Trivy adapters & distribution
Implement Trivy DB / Java DB adapters, wire OCI/object storage distribution paths, and expose policy snapshot embedding + verification tooling. - Phase 3 – Delta, encryption, scheduling
Release mirror deltas, bundle encryption, advanced scheduling/automation, resumable downloads, and CLI/Console verification workflows.
Component work breakdown
- Service & worker
- Define migrations for
export_profiles,export_runs,export_inputs,export_distributions. - Implement planner, adapter host, signing/attestation layer, distribution engines, and deterministic manifests.
- Enforce tenant quotas, concurrency controls, and audit logging for create/cancel/distribute events.
- Define migrations for
- Adapters
- JSON adapters: canonical JSONL writers, redaction guardrails, compression (zstd).
- Trivy adapters: field mapping, schema compatibility gating, validation suite.
- Mirror adapters: filesystem/OCI layout, delta computation, optional encryption with manifest updates.
- Integrations
- Findings Ledger streaming APIs for advisories, VEX, SBOMs, findings.
- Policy Engine deterministic snapshot endpoint; VEX Lens consensus snapshot.
- Export Center telemetry surfaced through Observability stack.
- Surfaces
- Console: profiles CRUD, run wizard, run detail + verification panel, distribution dashboards.
- CLI:
stella export profile|run|download|verifywith resumable downloads and signature verification.
- Security / RBAC
- Scope enforcement per tenant, role matrix coverage, encryption key rotation tests, redaction filters.
- Docs & ops
- Author module dossier (overview, architecture, profiles, API, CLI, mirror bundles, Trivy adapter, provenance & signing).
- Produce runbooks (
docs/operations/export-runbook.md) and hardening guidance (docs/security/export-hardening.md).
Documentation deliverables
docs/modules/export-center/overview.md— responsibilities, profiles, surfaces.docs/modules/export-center/architecture.md— service topology, adapters, manifests, distribution flow.docs/modules/export-center/profiles.md,trivy-adapter.md,mirror-bundles.md,provenance-and-signing.md,api.md,cli.md— keep aligned with shipped features.- Cross-link Orchestrator, Policy, VEX Lens, CLI, and Offline Kit docs whenever exports become dependencies.
Acceptance criteria
- Operators can create, monitor, and download an export;
cosign verify(and CLI verify) succeeds against manifest + provenance, mapping back to source artifacts. - Trivy bundles import cleanly into Trivy across supported versions; mirror bundles run in Offline Kit reference environment (full + delta).
- Policy snapshot runs reproduce deterministic decisions and include embedded
policyVersion+inputsHash. - Tenant scoping and RBAC block unauthorized actions; encryption-enabled bundles lock data to recipient keys.
- Metrics (
exporter_run_duration_seconds,exporter_bundle_bytes_total,exporter_run_failures_total) and dashboards reflect live runs; alerts trigger on sustained failure rates. - Retried runs remain idempotent: manifests, hashes, and distribution artefacts match across identical inputs.
Risks & mitigations
- Schema drift (Trivy / policy): versioned adapters with compatibility gates, CI integration tests, fail-fast with actionable errors.
- Bundle bloat: zstd compression, sharding, delta exports, OCI dedupe.
- Data leakage: strict schema allowlists, tenancy filters, redaction enforcement, encryption options.
- Non-determinism: embed policy snapshots, enforce deterministic ordering, include content hashes in manifest.
- Operational slowness: streaming downloads with range support, resumable CLI, concurrency limits, retry policies for workers.
Test strategy
- Unit: adapter mapping, manifest hashing, signing/attestation, delta computation, encryption round-trips.
- Integration: end-to-end runs for every profile, verification workflows, OCI push/pull, resume/abort scenarios.
- Compatibility: matrix tests for Trivy versions, mirror bundle import in Offline Kit sample environment.
- Security: tenant fuzzing, RBAC coverage, redaction/PII filters, key rotation.
- Performance & chaos: stress exports with large datasets, simulate worker/API failures mid-run, confirm deterministic recovery.
Definition of done
- Service, worker, and adapters deployed with telemetry & alerting.
- CLI & Console workflows published, Offline Kit instructions updated.
- Documentation set listed above refreshed; imposed rule statements appended where required.
- CI pipelines include schema validation, profile verification, and determinism checks.
- ./TASKS.md + ../../TASKS.md reflect current status for in-flight stories.