Fix SBOM ingestion errors caused by input file path validation
What does this MR do and why?
Fix SBOM ingestion errors caused by input file path validation
In !140282 (merged), we started to ingest the "input_file_path" of SBOM components found by Trivy. The components do not have an actual file path, so we instead convert them into a URI of sorts that can be detected by the "container-image:" magic string prefix. This pseudo URI contains the entire fully qualified name of the container image, and can often be longer than 255 characters, which started to cause a spike in SBOM ingestion errors. To fix this, we're going to raise the max size to 1024, or twice the limit of what we would get if the container image used the longest image name and tag supported by the GitLab container registry.
Fix #440705 (closed)
Changelog: fixed
MR acceptance checklist
Please evaluate this MR against the MR acceptance checklist. It helps you analyze changes to reduce risks in quality, performance, reliability, security, and maintainability.
Screenshots or screen recordings
Screenshots are required for UI changes, and strongly recommended for all other merge requests.
Before | After |
---|---|
How to set up and validate locally
Numbered steps to set up and validate the change are strongly suggested.