-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: normalize SBOM purls to fix CVE mismatch in local eval #61
Conversation
Signed-off-by: felipecruz91 <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks ok to me, but I'd appreciate the eyes from @cdupuis
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could we move the copied bits to a place where we can use it from the scout-cli-plugin? Then we could delete the duplicate code in the other repo.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good! Thanks Felipe
After running the skill locally using this payload.edn I identified an issue where the vulnerabilities query response was not being unmarshaled correctly. I've pushed a fix for that in this commit. The
However, the Scout website reports 20 deviations (2C, 18H). Any ideas? |
Regarding the mismatch count in the comment above, I've pushed a fix in 2ddeb03. Now I get exactly 20 deviations (2C 18H). See the evidence below:
|
This PR normalizes the packages in the SBOM attestation which is consumed during a local evaluation.
Notice that a large portion of the code in this PR such as
NormalizeSBOM
andDenormalizeSBOM
among many other functions have been grabbed from thescout-cli-plugin
repo.