Skip to content

OSV vulnerabilities sync and ingest on fleet server POC#41589

Closed
ksykulev wants to merge 1 commit intomainfrom
osv-poc
Closed

OSV vulnerabilities sync and ingest on fleet server POC#41589
ksykulev wants to merge 1 commit intomainfrom
osv-poc

Conversation

@ksykulev
Copy link
Copy Markdown
Contributor

Related issue: Resolves #40201

Checklist for submitter

If some of the following don't apply, delete the relevant line.

  • Changes file added for user-visible changes in changes/, orbit/changes/ or ee/fleetd-chrome/changes.
    See Changes files for more information.

  • Input data is properly validated, SELECT * is avoided, SQL injection is prevented (using placeholders for values in statements), JS inline code is prevented especially for url redirects

  • If paths of existing endpoints are modified without backwards compatibility, checked the frontend/CLI for any necessary changes

Testing

For unreleased bug fixes in a release candidate, one of:

  • Confirmed that the fix is not expected to adversely impact load test results
  • Alerted the release DRI if additional load testing is needed

Database migrations

  • Checked schema for all modified table for columns that will auto-update timestamps during migration.
  • Confirmed that updating the timestamps is acceptable, and will not cause unwanted side effects.
  • Ensured the correct collation is explicitly set for character columns (COLLATE utf8mb4_unicode_ci).

New Fleet configuration settings

  • Setting(s) is/are explicitly excluded from GitOps

If you didn't check the box above, follow this checklist for GitOps-enabled settings:

  • Verified that the setting is exported via fleetctl generate-gitops
  • Verified the setting is documented in a separate PR to the GitOps documentation
  • Verified that the setting is cleared on the server if it is not supplied in a YAML file (or that it is documented as being optional)
  • Verified that any relevant UI is disabled when GitOps mode is enabled

fleetd/orbit/Fleet Desktop

  • Verified compatibility with the latest released version of Fleet (see Must rule)
  • If the change applies to only one platform, confirmed that runtime.GOOS is used as needed to isolate changes
  • Verified that fleetd runs on macOS, Linux and Windows
  • Verified auto-update works from the released version of component to the new version (see tools/tuf/test)

@codecov
Copy link
Copy Markdown

codecov Bot commented Mar 12, 2026

Codecov Report

❌ Patch coverage is 0% with 170 lines in your changes missing coverage. Please review.
✅ Project coverage is 65.57%. Comparing base (3a032b5) to head (c3c0c1e).
⚠️ Report is 1224 commits behind head on main.

Files with missing lines Patch % Lines
server/vulnerabilities/osv/analyzer.go 0.00% 164 Missing ⚠️
server/config/config.go 0.00% 6 Missing ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##             main   #41589      +/-   ##
==========================================
- Coverage   66.28%   65.57%   -0.72%     
==========================================
  Files        2466     2286     -180     
  Lines      197425   181519   -15906     
  Branches     8712     8712              
==========================================
- Hits       130860   119022   -11838     
+ Misses      54730    51196    -3534     
+ Partials    11835    11301     -534     
Flag Coverage Δ
backend 67.52% <0.00%> (-0.65%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

@ksykulev
Copy link
Copy Markdown
Contributor Author

ksykulev commented Apr 3, 2026

Implemented here: #42063

@ksykulev ksykulev closed this Apr 3, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

POC: Transition Ubuntu vulnerabilities from OVAL to OSV feeds

1 participant