Bundled commit covering pre-session work from multiple Concelier sprints already archived or in-flight: - SPRINT_20260419_006: mirror domain / source key validation - SPRINT_20260419_029 / 030: durable jobs orchestrator runtime + endpoint verification - SPRINT_20260421_001: advisory source projection truthful counts - SPRINT_20260421_002: FE advisory source consistency (connector-side bits) - SPRINT_20260421_003: advisory connector runtime alignment - SPRINT_20260422_003: source credential entry paths (in-flight) Includes connector internals (ACSC / Adobe / CERT-BUND / Chromium / Cisco / CVE-KEV / GHSA / JVN / KISA / MSRC / Oracle / Ubuntu), source management endpoints, mirror domain management, federation endpoints, topology setup, job registration, and associated dossier updates under docs/modules/concelier/. This commit groups ~229 file changes that accumulated across the above sprints; individual changes are preserved at file granularity so blame remains useful. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
886 B
886 B
Concelier ACSC Connector - Operations Runbook
Last updated: 2026-01-16
1. Overview
The ACSC connector ingests Australian Cyber Security Centre advisories and maps them to canonical IDs. The runtime/catalog source ID is auscert.
2. Authentication
- No authentication required for public feeds.
3. Configuration (concelier.yaml)
concelier:
sources:
auscert:
baseUri: "<acsc-feed-base>"
maxDocumentsPerFetch: 20
fetchTimeout: "00:00:45"
requestDelay: "00:00:00"
Legacy concelier:sources:acsc binding is still accepted for compatibility, but new setups should use concelier:sources:auscert so the documented defaults match /api/v1/advisory-sources.
4. Offline and air-gapped deployments
- Mirror ACSC feeds into the Offline Kit and repoint
baseUrito the mirror.
5. Common failure modes
- Feed schema updates.