-
-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make bom-ref use relative paths for workspace items as well #556
Comments
Or just move away from using the filesystem paths in them for local dependencies. Technically the only requirement for them is to be unique; a hash will also work, although the human readability will suffer considerably. |
Keeping them somewhat human-readable would be great, yes. |
What if we replace "(path+file...)" on local dependencies with either a hash, a counting suffix or drop it all together based on a command line option? The name and version can remain leaving it mostly human-readable. If the drop it altogether option is chosen, the user should be sure there aren't multiple dependencies with the same name and version on the system. Is this common? |
When the repository is tracked in (private) source control, it it possible to set Also, how should we handle the case of subordinate packages? Say I've got app |
I would also be interested in the response here. Also an extension of this for purls. As far as I can see Cargo Metadata exports crates.io or nothing. Perhaps the problem lies in not using cargo to maintain concurrent versioning, which doesn't work for our CI approach. |
PURLs do already include the VCS URL for dependencies from git; if you want to recover it, that's what you should be looking at, not
|
I guess we just ran into this one too: trustification/trustify#546 (comment) … the concern being, that we'd leak build machine information. Which seems true:
I am ok contributing a change, if there's consent in which direction it should change :) One way to deal with this could be to have some |
Panic messages in the executable itself also leak this information. And even if we scrub the paths from IDs, they will still be included in other places, e.g. dependencies from the local filesystem. Do we scrub those as well? Knowing that your build included I don't think hashes are a good idea. However, I would accept a PR that optionally makes IDs reproducible, with say a In |
I think there's a difference between a panic, and serializing that information into an sbom that's intended to be distributed.
Wouldn't hashes of the current ID also be producible? I wouldn't see a difference there. That should be stable enough? |
The ID currently includes filesystem path, so no. The SBOM should be possible to reproduce when run from a different filesystem path and/or on another machine. Therefore it should be independent from the filesystem paths. |
That's the information I was missing, In that case, yes. That's not good enough. |
Similar to PURLs
The text was updated successfully, but these errors were encountered: