Documentation
¶
Index ¶
- func NewSBOMScanner(purlComparer comparer, cveRepository core.CveRepository) *sbomScanner
- type FirstPartyScanResponse
- type HTTPController
- func (s *HTTPController) DependencyVulnScan(c core.Context, bom normalize.SBOM) (ScanResponse, error)
- func (s *HTTPController) FirstPartyVulnScan(ctx core.Context) error
- func (s *HTTPController) ScanDependencyVulnFromProject(c core.Context) error
- func (s *HTTPController) ScanNormalizedSBOM(org models.Org, project models.Project, asset models.Asset, ...) (ScanResponse, error)
- func (s *HTTPController) ScanSbomFile(c core.Context) error
- func (s HTTPController) UploadVEX(ctx core.Context) error
- type PurlComparer
- type ScanResponse
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func NewSBOMScanner ¶
func NewSBOMScanner(purlComparer comparer, cveRepository core.CveRepository) *sbomScanner
Types ¶
type FirstPartyScanResponse ¶ added in v0.17.2
type FirstPartyScanResponse struct { AmountOpened int `json:"amountOpened"` AmountClosed int `json:"amountClosed"` FirstPartyVulns []vuln.FirstPartyVulnDTO `json:"firstPartyVulns"` }
type HTTPController ¶ added in v0.17.2
type HTTPController struct { // mark public to let it be overridden in tests core.FireAndForgetSynchronizer // contains filtered or unexported fields }
func NewHTTPController ¶ added in v0.17.2
func NewHTTPController(db core.DB, cveRepository core.CveRepository, componentRepository core.ComponentRepository, assetRepository core.AssetRepository, assetVersionRepository core.AssetVersionRepository, assetVersionService core.AssetVersionService, statisticsService core.StatisticsService, dependencyVulnService core.DependencyVulnService, firstPartyVulnService core.FirstPartyVulnService, artifactService core.ArtifactService, dependencyVulnRepository core.DependencyVulnRepository) *HTTPController
func (*HTTPController) DependencyVulnScan ¶ added in v0.17.2
func (s *HTTPController) DependencyVulnScan(c core.Context, bom normalize.SBOM) (ScanResponse, error)
func (*HTTPController) FirstPartyVulnScan ¶ added in v0.17.2
func (s *HTTPController) FirstPartyVulnScan(ctx core.Context) error
func (*HTTPController) ScanDependencyVulnFromProject ¶ added in v0.17.2
func (s *HTTPController) ScanDependencyVulnFromProject(c core.Context) error
func (*HTTPController) ScanNormalizedSBOM ¶ added in v0.17.2
func (*HTTPController) ScanSbomFile ¶ added in v0.17.2
func (s *HTTPController) ScanSbomFile(c core.Context) error
func (HTTPController) UploadVEX ¶ added in v0.17.2
func (s HTTPController) UploadVEX(ctx core.Context) error
UploadVEX accepts a multipart file upload (field name "file") containing an OpenVEX JSON document. It updates existing dependency vulnerabilities on the target asset version and creates vuln events.
type PurlComparer ¶ added in v0.17.2
type PurlComparer struct {
// contains filtered or unexported fields
}
func NewPurlComparer ¶
func NewPurlComparer(db core.DB) *PurlComparer
func (*PurlComparer) GetAffectedComponents ¶ added in v0.17.2
func (comparer *PurlComparer) GetAffectedComponents(purl, version string) ([]models.AffectedComponent, error)
GetAffectedComponents finds security vulnerabilities for a software package
func (*PurlComparer) GetVulns ¶ added in v0.17.2
func (comparer *PurlComparer) GetVulns(purl string, version string, _ string) ([]models.VulnInPackage, error)
some purls do contain versions, which cannot be found in the database. An example is git. the purl looks like: pkg:deb/debian/git@v2.30.2-1, while the version we would like it to match is: 1:2.30.2-1 ("1:" prefix)
type ScanResponse ¶
type ScanResponse struct { AmountOpened int `json:"amountOpened"` AmountClosed int `json:"amountClosed"` DependencyVulns []vuln.DependencyVulnDTO `json:"dependencyVulns"` }
Click to show internal directories.
Click to hide internal directories.