Ensure that bulk CVE ingestion is done at first deployment #368
Labels
No labels
automation
backend
bug
contributor experience
data
deployment
documentation
duplicate
good first issue
help wanted
nice to have
notifications
package maintainer
performance
skin
tech debt
user story
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: lix-community/nix-security-tracker#368
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Right now operators need to remember to run
manage ingest_bulk_cve
when setting up the service. This is easy to forget, and there's currently no monitoring for startup errors, so everyone will wonder 24h later why there's no data in the suggestion queue.This can be solved in multiple ways:
PreStart
and leave a flag in the database to ensure the command is idempotentIs this still valid? Aren't ingestions handled automatically via the worker?
Yes, but it's neither done on startup (but at 03:00 UTC) nor is it documented how to trigger it or that it needs triggering. The problem is therefore that a fresh deployment will simply not do anything useful and there's no indication what to do about it. And as we discussed, reading the code to figure it out is not a particularly pleasant onboarding experience.