Closes 3 of 4 tasks in SPRINT_20260422_007. EXCITITOR-CFG-04 (OCI
binary-material handling) stays BLOCKED pending a secret-reference
storage-model design decision — sprint header called that out as a
scope boundary.
Mirrors the SRC-CREDS pattern (commits 838257245 + earlier) to give
Excititor VEX providers the same persisted-credentials + blocked-
readiness contract that advisory sources now have.
Persistence (EXCITITOR-CFG-01):
- New vex.provider_settings table via embedded migration
007_vex_provider_settings.sql (auto-applied by AddStartupMigrations).
Key: provider_id; columns: settings jsonb, updated_by, timestamps.
- PostgresVexProviderSettingsStore (Dapper) + ProviderSettingsRow EfCore
model + InMemoryVexProviderSettingsStore for tests.
- IVexProviderSettingsStore + VexProviderSettingsRecord added to
StellaOps.Excititor.Core/Storage.
- Existing vex.providers row (trust, discovery, base_uris, enabled)
untouched — additive only.
API surface:
- GET /excititor/providers/{id}/configuration → masked snapshot with
fields: key, label, inputType, sensitive, required, value, hasValue,
isSecretRetained, helpText, placeholder. Plaintext secrets never
returned.
- PUT /excititor/providers/{id}/configuration with { values, clearKeys }.
Sensitive fields submitted blank are retained; clearKeys explicitly
deletes.
- Field schemas shipped for excititor:cisco / msrc / suse-rancher.
Effective settings + readiness (EXCITITOR-CFG-02):
- VexProviderConfigurationService.ComputeConfigurationFailure drives
readiness. When persisted-enabled but missing required fields, the
provider status reports blockingReasonCode=PROVIDER_CONFIG_REQUIRED
(or PROVIDER_CONFIG_INVALID on validation failure), readiness=blocked.
Configuration failures take priority over retry-backoff reasons so the
actionable message surfaces first.
- VexIngestOrchestrator.ValidateConnectorAsync + ExecuteRunAsync resolve
effective settings from VexProviderRuntimeSettingsCache; same
settings flow into DefaultVexProviderRunner (worker scheduled runs).
Previously those paths validated against empty / schedule-only options.
CLI + Web (EXCITITOR-CFG-03):
- CLI: `stella vex providers configure <provider> [--set k=v] [--clear k]
[--format text|json]`. Aliases cisco/msrc/rancher → excititor:*.
- Web: VexProviderManagementApi.getConfiguration / updateConfiguration
+VexProviderConfigurationComponent (Angular standalone). Component
renders masked-secret + clear toggles + required indicators + help/
placeholder. Routing intentionally minimal (no new route added) to
avoid stepping on the parallel FE test agent.
Tests: targeted xUnit via scripts/test-targeted-xunit.ps1:
- VexProviderConfigurationServiceTests → Total: 8, Failed: 0
- ProviderManagementEndpointsTests regression → Total: 5, Failed: 0
Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
7.5 KiB
Excititor Provider Control Plane
This document describes the operator-facing control plane for Excititor VEX providers.
Operator entry points
- Web UI:
Ops -> Integrations -> Advisory & VEX Sources -> VEX Providers - CLI:
stella excititor list-providersstella excititor show-provider --provider <id>stella excititor enable-provider --provider <id>stella excititor disable-provider --provider <id>stella excititor run-provider --provider <id> [--since ... --window ... --force]stella excititor update-provider --provider <id> ...
Backend API:
GET /excititor/providersGET /excititor/providers/{providerId}PUT /excititor/providers/{providerId}POST /excititor/providers/{providerId}/enablePOST /excititor/providers/{providerId}/disablePOST /excititor/providers/{providerId}/runGET /excititor/providers/{providerId}/configuration— persisted connector settings (masked secrets)PUT /excititor/providers/{providerId}/configuration—{ values, clearKeys }request shape, retains secrets submitted blank
Persisted connector configuration (Sprint 20260422_007) is the primary operator path for credentialed VEX providers. Host-config and environment binding remain compatibility fallbacks only. Persisted settings win when both define the same key.
Readiness states
Excititor providers use four runtime readiness states:
ready: persisted-enabled and the current host has a runnable connectorblocked: persisted-enabled but missing required persisted configuration, cooling down, or otherwise not runnabledisabled: persisted-disabledplanned: cataloged provider without a runnable connector registered on the current host
enabled remains the operator intent flag. A provider can be enabled=true and still show planned or blocked.
Blocked-readiness configuration codes (Sprint 20260422_007)
When a persisted-enabled provider lacks required settings or fails connector-option validation, the blocked-reason surface carries one of:
PROVIDER_CONFIG_REQUIRED— one or more required fields (e.g. MSRCtenantId,clientId,clientSecret) are absent.PROVIDER_CONFIG_INVALID— settings are present but the connector's own option validator rejected them (e.g. CiscometadataUriis not an absolute URI, Rancher hub credential set is partial).
These codes mirror the Concelier SOURCE_CONFIG_REQUIRED / SOURCE_CONFIG_INVALID contract from SRC-CREDS-005 so CLI and Web surfaces can reuse the same rendering. The /excititor/providers list response exposes them via blockingReasonCode and blockingReason.
Provider inventory
| Provider ID | Kind | Default enabled | Registered in WebService | UI control plane | CLI control plane | Credential / config status | Notes |
|---|---|---|---|---|---|---|---|
excititor:redhat |
distro | true | yes | yes | yes | Public defaults; metadata and trust overrides can be persisted through the provider control plane. | Registered by default in StellaOps.Excititor.WebService. |
excititor:ubuntu |
distro | true | yes | yes | yes | Public defaults; metadata and trust overrides can be persisted through the provider control plane. | Registered by default in StellaOps.Excititor.WebService. |
excititor:oracle |
vendor | true | yes | yes | yes | Public defaults; metadata and trust overrides can be persisted through the provider control plane. | Registered by default in StellaOps.Excititor.WebService. |
excititor:cisco |
vendor | true | yes | yes | yes | Public CSAF metadata works without a persisted secret path. Optional API token support exists in connector host options, not in the new persisted UI or CLI surface. | Registered by default in StellaOps.Excititor.WebService. |
excititor:suse-rancher |
hub | false | yes | yes | yes | Discovery and trust metadata can be persisted. Authenticated discovery credentials remain host-config only today. Anonymous discovery can still be allowed by connector options. | Registered by default in StellaOps.Excititor.WebService. |
excititor:oci-openvex |
attestation | false | yes | yes | yes | Provider metadata and trust overrides can be persisted. Image subscriptions, registry credentials, and cosign credential material remain host-config only today. | Registered by default in StellaOps.Excititor.WebService. |
excititor:msrc |
vendor | false | conditional | yes | yes | Persisted provider metadata exists, but MSRC connector credentials and offline token settings remain host-config only today. | Registered only when Excititor:Connectors:Msrc exists in host configuration. Otherwise the provider remains planned. |
What the current provider control plane persists
The current update-provider surface persists:
- display name
- provider kind
- base URIs
- well-known metadata URI
- ROLIE service URI
- trust weight
- PGP fingerprints
- cosign issuer
- cosign identity pattern
- enabled / disabled intent
The current provider control plane does not yet persist connector-secret fields such as:
- OCI registry username, password, identity token, refresh token, cosign key pair, or image subscription list
Those settings still come from host configuration today. The control plane is truthful about the gap by surfacing planned or blocked readiness instead of pretending the connector is runnable.
Persisted scalar-provider configuration (Sprint 20260422_007)
The following provider connector settings can now be persisted through the UI or CLI and are kept in a dedicated vex.provider_settings row (distinct from vex.providers metadata):
| Provider | Persisted fields |
|---|---|
excititor:cisco |
metadataUri (optional override), apiToken (sensitive) |
excititor:suse-rancher |
discoveryUri, tokenEndpoint, clientId, clientSecret (sensitive), audience |
excititor:msrc |
tenantId, clientId, clientSecret (sensitive), scope (optional override) |
Operator surfaces:
- CLI:
stella vex providers configure <provider> [--set key=value ...] [--clear key ...] [--format text|json] - Web: provider configuration panel rendering masked secret state, required-field markers, and explicit clear toggles.
Sensitive values are never re-exposed on reads — the API returns only hasValue/isSecretRetained flags. Blank submissions retain existing secrets; explicit clearKeys entries delete them.
OCI OpenVEX remains on host-config only pending the dedicated artifact-backed configuration path (EXCITITOR-CFG-04).
Host wiring notes
StellaOps.Excititor.WebServicealways registers:- Red Hat CSAF
- Ubuntu CSAF
- Oracle CSAF
- Cisco CSAF
- SUSE Rancher VEX Hub
- OCI OpenVEX attestations
StellaOps.Excititor.WebServiceregisters Microsoft MSRC CSAF only when theExcititor:Connectors:Msrcconfiguration section exists.StellaOps.Excititor.Workerseeds these public defaults when no explicit provider schedule list is supplied:excititor:redhatexcititor:ubuntuexcititor:oracleexcititor:cisco
Verification state
Reverified in Sprint 20260422_004:
- targeted backend tests for provider management endpoints passed against
StellaOps.Excititor.WebService.Tests.ProviderManagementEndpointsTests - Angular route helper spec passed for the new VEX provider route
- Angular development build passed with the new provider catalog page
- CLI provider inspection and control verbs were added for the backend surface
The verification above covers the provider control plane and readiness behavior. It does not claim a fresh live ingest verification run for every upstream VEX provider in this sprint.