Skip to content

Fix SBOM ingestion errors caused by input file path validation

Oscar Tovar requested to merge otovar/increase-input-file-path-max-length into master

What does this MR do and why?

Fix SBOM ingestion errors caused by input file path validation

In !140282 (merged), we started to ingest the "input_file_path" of SBOM components found by Trivy. The components do not have an actual file path, so we instead convert them into a URI of sorts that can be detected by the "container-image:" magic string prefix. This pseudo URI contains the entire fully qualified name of the container image, and can often be longer than 255 characters, which started to cause a spike in SBOM ingestion errors. To fix this, we're going to raise the max size to 1024, or twice the limit of what we would get if the container image used the longest image name and tag supported by the GitLab container registry.

Fix #440705 (closed)

Changelog: fixed

MR acceptance checklist

Please evaluate this MR against the MR acceptance checklist. It helps you analyze changes to reduce risks in quality, performance, reliability, security, and maintainability.

Screenshots or screen recordings

Screenshots are required for UI changes, and strongly recommended for all other merge requests.

Before After

How to set up and validate locally

Numbered steps to set up and validate the change are strongly suggested.

Edited by Oscar Tovar

Merge request reports