
- Added Program.cs to set up the web application with Serilog for logging, health check endpoints, and a placeholder admission endpoint. - Configured Kestrel server to use TLS 1.3 and handle client certificates appropriately. - Created StellaOps.Zastava.Webhook.csproj with necessary dependencies including Serilog and Polly. - Documented tasks in TASKS.md for the Zastava Webhook project, outlining current work and exit criteria for each task.
51 lines
1.1 KiB
JSON
51 lines
1.1 KiB
JSON
{
|
|
"schemaVersion": "scheduler.run@1",
|
|
"id": "run_20251018_0001",
|
|
"tenantId": "tenant-alpha",
|
|
"scheduleId": "sch_20251018a",
|
|
"trigger": "feedser",
|
|
"state": "running",
|
|
"stats": {
|
|
"candidates": 1280,
|
|
"deduped": 910,
|
|
"queued": 624,
|
|
"completed": 310,
|
|
"deltas": 42,
|
|
"newCriticals": 7,
|
|
"newHigh": 11,
|
|
"newMedium": 18,
|
|
"newLow": 6
|
|
},
|
|
"reason": {
|
|
"feedserExportId": "exp-20251018-03"
|
|
},
|
|
"createdAt": "2025-10-18T22:03:14+00:00",
|
|
"startedAt": "2025-10-18T22:03:20+00:00",
|
|
"deltas": [
|
|
{
|
|
"imageDigest": "sha256:a1b2c3",
|
|
"newFindings": 3,
|
|
"newCriticals": 1,
|
|
"newHigh": 1,
|
|
"newMedium": 1,
|
|
"newLow": 0,
|
|
"kevHits": [
|
|
"CVE-2025-0002"
|
|
],
|
|
"topFindings": [
|
|
{
|
|
"purl": "pkg:rpm/openssl@3.0.12-5.el9",
|
|
"vulnerabilityId": "CVE-2025-0002",
|
|
"severity": "critical",
|
|
"link": "https://ui.internal/scans/sha256:a1b2c3"
|
|
}
|
|
],
|
|
"attestation": {
|
|
"uuid": "rekor-314",
|
|
"verified": true
|
|
},
|
|
"detectedAt": "2025-10-18T22:03:21+00:00"
|
|
}
|
|
]
|
|
}
|