 Documentation
      ¶
      Documentation
      ¶
    
    
  
    
  
    Index ¶
- func NewSBOMScanner(purlComparer comparer, cveRepository core.CveRepository) *sbomScanner
- type FirstPartyScanResponse
- type HTTPController
- func (s *HTTPController) DependencyVulnScan(c core.Context, bom normalize.SBOM) (ScanResponse, error)
- func (s *HTTPController) FirstPartyVulnScan(ctx core.Context) error
- func (s *HTTPController) ScanDependencyVulnFromProject(c core.Context) error
- func (s *HTTPController) ScanNormalizedSBOM(org models.Org, project models.Project, asset models.Asset, ...) (ScanResponse, error)
- func (s *HTTPController) ScanSbomFile(c core.Context) error
- func (s HTTPController) UploadVEX(ctx core.Context) error
 
- type PurlComparer
- type ScanResponse
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func NewSBOMScanner ¶
func NewSBOMScanner(purlComparer comparer, cveRepository core.CveRepository) *sbomScanner
Types ¶
type FirstPartyScanResponse ¶ added in v0.17.1
type FirstPartyScanResponse struct {
	AmountOpened    int                      `json:"amountOpened"`
	AmountClosed    int                      `json:"amountClosed"`
	FirstPartyVulns []vuln.FirstPartyVulnDTO `json:"firstPartyVulns"`
}
    type HTTPController ¶ added in v0.17.1
type HTTPController struct {
	// mark public to let it be overridden in tests
	core.FireAndForgetSynchronizer
	// contains filtered or unexported fields
}
    func NewHTTPController ¶ added in v0.17.1
func NewHTTPController(db core.DB, cveRepository core.CveRepository, componentRepository core.ComponentRepository, assetRepository core.AssetRepository, assetVersionRepository core.AssetVersionRepository, assetVersionService core.AssetVersionService, statisticsService core.StatisticsService, dependencyVulnService core.DependencyVulnService, firstPartyVulnService core.FirstPartyVulnService, artifactService core.ArtifactService, dependencyVulnRepository core.DependencyVulnRepository) *HTTPController
func (*HTTPController) DependencyVulnScan ¶ added in v0.17.1
func (s *HTTPController) DependencyVulnScan(c core.Context, bom normalize.SBOM) (ScanResponse, error)
func (*HTTPController) FirstPartyVulnScan ¶ added in v0.17.1
func (s *HTTPController) FirstPartyVulnScan(ctx core.Context) error
func (*HTTPController) ScanDependencyVulnFromProject ¶ added in v0.17.1
func (s *HTTPController) ScanDependencyVulnFromProject(c core.Context) error
func (*HTTPController) ScanNormalizedSBOM ¶ added in v0.17.1
func (*HTTPController) ScanSbomFile ¶ added in v0.17.1
func (s *HTTPController) ScanSbomFile(c core.Context) error
func (HTTPController) UploadVEX ¶ added in v0.17.1
func (s HTTPController) UploadVEX(ctx core.Context) error
UploadVEX accepts a multipart file upload (field name "file") containing an OpenVEX JSON document. It updates existing dependency vulnerabilities on the target asset version and creates vuln events.
type PurlComparer ¶ added in v0.17.1
type PurlComparer struct {
	// contains filtered or unexported fields
}
    func NewPurlComparer ¶
func NewPurlComparer(db core.DB) *PurlComparer
func (*PurlComparer) GetAffectedComponents ¶ added in v0.17.1
func (comparer *PurlComparer) GetAffectedComponents(purl, version string) ([]models.AffectedComponent, error)
GetAffectedComponents finds security vulnerabilities for a software package
func (*PurlComparer) GetVulns ¶ added in v0.17.1
func (comparer *PurlComparer) GetVulns(purl string, version string, _ string) ([]models.VulnInPackage, error)
some purls do contain versions, which cannot be found in the database. An example is git. the purl looks like: pkg:deb/debian/git@v2.30.2-1, while the version we would like it to match is: 1:2.30.2-1 ("1:" prefix)
type ScanResponse ¶
type ScanResponse struct {
	AmountOpened    int                      `json:"amountOpened"`
	AmountClosed    int                      `json:"amountClosed"`
	DependencyVulns []vuln.DependencyVulnDTO `json:"dependencyVulns"`
}
     Click to show internal directories. 
   Click to hide internal directories.