- Introduced a comprehensive CI job structure for VEX Lens, including build, test, linting, and load testing. - Defined load test parameters and SLOs for VEX Lens API and Issuer Directory. - Created Grafana dashboards and alerting mechanisms for monitoring API performance and error rates. - Established offline posture guidelines for CI jobs and load testing. feat: Implement deterministic projection verification script - Added `verify_projection.sh` script for verifying the integrity of projection exports against expected hashes. - Ensured robust error handling for missing files and hash mismatches. feat: Develop Vuln Explorer CI and Ops Plan - Created CI jobs for Vuln Explorer, including build, test, and replay verification. - Implemented backup and disaster recovery strategies for MongoDB and Redis. - Established Merkle anchoring verification and automation for ledger projector. feat: Introduce EventEnvelopeHasher for hashing event envelopes - Implemented `EventEnvelopeHasher` to compute SHA256 hashes for event envelopes. feat: Add Risk Store and Dashboard components - Developed `RiskStore` for managing risk data and state. - Created `RiskDashboardComponent` for displaying risk profiles with filtering capabilities. - Implemented unit tests for `RiskStore` and `RiskDashboardComponent`. feat: Enhance Vulnerability Detail Component - Developed `VulnerabilityDetailComponent` for displaying detailed information about vulnerabilities. - Implemented error handling for missing vulnerability IDs and loading failures.
43 lines
1.4 KiB
JSON
43 lines
1.4 KiB
JSON
{
|
|
"$id": "https://stella-ops.org/schemas/zastava/webhook_admission.schema.json",
|
|
"$schema": "http://json-schema.org/draft-07/schema#",
|
|
"title": "Zastava Webhook Admission",
|
|
"type": "object",
|
|
"required": [
|
|
"tenant_id",
|
|
"project_id",
|
|
"request_uid",
|
|
"resource_kind",
|
|
"namespace",
|
|
"workload_name",
|
|
"policy_hash",
|
|
"graph_revision_id",
|
|
"decision",
|
|
"decision_reason",
|
|
"decision_at",
|
|
"manifest_pointer",
|
|
"signature"
|
|
],
|
|
"properties": {
|
|
"tenant_id": { "type": "string" },
|
|
"project_id": { "type": "string" },
|
|
"request_uid": { "type": "string" },
|
|
"resource_kind": { "type": "string" },
|
|
"namespace": { "type": "string" },
|
|
"workload_name": { "type": "string" },
|
|
"policy_hash": { "type": "string" },
|
|
"graph_revision_id": { "type": "string" },
|
|
"ledger_id": { "type": "string" },
|
|
"replay_manifest": { "type": "string" },
|
|
"manifest_pointer": { "type": "string", "description": "Surface.FS manifest pointer" },
|
|
"decision": { "enum": ["allow", "deny", "dry-run"] },
|
|
"decision_reason": { "type": "string" },
|
|
"decision_at": { "type": "string", "format": "date-time" },
|
|
"monotonic_nanos": { "type": "integer" },
|
|
"side_effect": { "enum": ["none", "mutating", "bypass"] },
|
|
"bypass_waiver_id": { "type": "string" },
|
|
"payload_hash": { "type": "string" },
|
|
"signature": { "type": "string", "description": "DSSE envelope reference" }
|
|
}
|
|
}
|