)]}'
{"doc/source/user/index.rst":[{"author":{"_account_id":9995,"name":"Ricardo Rocha","email":"rocha.porto@gmail.com","username":"rocha"},"change_message_id":"277533f3c9fd8577b217b75558dfb459d684e8f7","unresolved":false,"context_lines":[{"line_number":1255,"context_line":"_`vulnerability_scanner_tag`"},{"line_number":1256,"context_line":"  This label allows the user to select a specific vulnerability scanner"},{"line_number":1257,"context_line":"  release based on its container tag."},{"line_number":1258,"context_line":"  If unset, the latest stable release will be installed."},{"line_number":1259,"context_line":""},{"line_number":1260,"context_line":"_`vulnerability_scanner_endpoint`"},{"line_number":1261,"context_line":"  This label allows the user to specify the address of a Clair instance that"}],"source_content_type":"text/x-rst","patch_set":1,"id":"3f79a3b5_d7cf1389","line":1258,"updated":"2018-09-26 13:45:35.000000000","message":"I would replace the last line with:\n\"The default value is \u0027latest\u0027.\"","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":27725,"name":"Roberto Soares","email":"robertomlsoares@gmail.com","username":"robertomls"},"change_message_id":"9b0b61645abba323846083ff5e94e4fdee944cb4","unresolved":false,"context_lines":[{"line_number":1255,"context_line":"_`vulnerability_scanner_tag`"},{"line_number":1256,"context_line":"  This label allows the user to select a specific vulnerability scanner"},{"line_number":1257,"context_line":"  release based on its container tag."},{"line_number":1258,"context_line":"  If unset, the latest stable release will be installed."},{"line_number":1259,"context_line":""},{"line_number":1260,"context_line":"_`vulnerability_scanner_endpoint`"},{"line_number":1261,"context_line":"  This label allows the user to specify the address of a Clair instance that"}],"source_content_type":"text/x-rst","patch_set":1,"id":"3f79a3b5_b077b63b","line":1258,"in_reply_to":"3f79a3b5_d7cf1389","updated":"2018-10-11 17:58:31.000000000","message":"Done","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":9995,"name":"Ricardo Rocha","email":"rocha.porto@gmail.com","username":"rocha"},"change_message_id":"277533f3c9fd8577b217b75558dfb459d684e8f7","unresolved":false,"context_lines":[{"line_number":1260,"context_line":"_`vulnerability_scanner_endpoint`"},{"line_number":1261,"context_line":"  This label allows the user to specify the address of a Clair instance that"},{"line_number":1262,"context_line":"  will be used by the vulnerability scanner."},{"line_number":1263,"context_line":"  If unset, the Clair instance available at `clair.cern.ch` will be used."},{"line_number":1264,"context_line":""},{"line_number":1265,"context_line":"Swarm"},{"line_number":1266,"context_line":"\u003d\u003d\u003d\u003d\u003d"}],"source_content_type":"text/x-rst","patch_set":1,"id":"3f79a3b5_17ed8bef","line":1263,"updated":"2018-09-26 13:45:35.000000000","message":"It\u0027s working for us, but maybe .cern.ch is not ideal here :)\n\nIt probably makes sense to have this label mandatory if vulnerability_scanner_enabled \u003d True. And document or point to documentation on how to setup the clair instance.","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":27725,"name":"Roberto Soares","email":"robertomlsoares@gmail.com","username":"robertomls"},"change_message_id":"9b0b61645abba323846083ff5e94e4fdee944cb4","unresolved":false,"context_lines":[{"line_number":1260,"context_line":"_`vulnerability_scanner_endpoint`"},{"line_number":1261,"context_line":"  This label allows the user to specify the address of a Clair instance that"},{"line_number":1262,"context_line":"  will be used by the vulnerability scanner."},{"line_number":1263,"context_line":"  If unset, the Clair instance available at `clair.cern.ch` will be used."},{"line_number":1264,"context_line":""},{"line_number":1265,"context_line":"Swarm"},{"line_number":1266,"context_line":"\u003d\u003d\u003d\u003d\u003d"}],"source_content_type":"text/x-rst","patch_set":1,"id":"3f79a3b5_eba8e38b","line":1263,"in_reply_to":"3f79a3b5_17ed8bef","updated":"2018-10-11 17:58:31.000000000","message":"Done","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":27725,"name":"Roberto Soares","email":"robertomlsoares@gmail.com","username":"robertomls"},"change_message_id":"484d66e5ec65ed672939f89704f3ada5d7b15a61","unresolved":false,"context_lines":[{"line_number":1260,"context_line":"_`vulnerability_scanner_endpoint`"},{"line_number":1261,"context_line":"  This label allows the user to specify the address of a Clair instance that"},{"line_number":1262,"context_line":"  will be used by the vulnerability scanner."},{"line_number":1263,"context_line":"  If unset, the Clair instance available at `clair.cern.ch` will be used."},{"line_number":1264,"context_line":""},{"line_number":1265,"context_line":"Swarm"},{"line_number":1266,"context_line":"\u003d\u003d\u003d\u003d\u003d"}],"source_content_type":"text/x-rst","patch_set":1,"id":"3f79a3b5_eb8223ff","line":1263,"in_reply_to":"3f79a3b5_17ed8bef","updated":"2018-09-29 14:00:25.000000000","message":"Wasn\u0027t the idea to have a central Clair so that users wouldn\u0027t have to deploy their own?\nIf not, do you have an example on how to make this label mandatory based on another one? Do I need to check that on the shell script or is it somewhere else?","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":27725,"name":"Roberto Soares","email":"robertomlsoares@gmail.com","username":"robertomls"},"change_message_id":"9b0b61645abba323846083ff5e94e4fdee944cb4","unresolved":false,"context_lines":[{"line_number":1260,"context_line":"_`vulnerability_scanner_endpoint`"},{"line_number":1261,"context_line":"  This label allows the user to specify the address of a Clair instance that"},{"line_number":1262,"context_line":"  will be used by the vulnerability scanner."},{"line_number":1263,"context_line":"  If unset, the Clair instance available at `clair.cern.ch` will be used."},{"line_number":1264,"context_line":""},{"line_number":1265,"context_line":"Swarm"},{"line_number":1266,"context_line":"\u003d\u003d\u003d\u003d\u003d"}],"source_content_type":"text/x-rst","patch_set":1,"id":"3f79a3b5_ab8e6b2f","line":1263,"in_reply_to":"3f79a3b5_eb8223ff","updated":"2018-10-11 17:58:31.000000000","message":"Done","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"}],"magnum/drivers/common/templates/kubernetes/fragments/enable-vulnerability-scanner.sh":[{"author":{"_account_id":9995,"name":"Ricardo Rocha","email":"rocha.porto@gmail.com","username":"rocha"},"change_message_id":"277533f3c9fd8577b217b75558dfb459d684e8f7","unresolved":false,"context_lines":[{"line_number":16,"context_line":"    }"},{"line_number":17,"context_line":"}"},{"line_number":18,"context_line":""},{"line_number":19,"context_line":"if [ \"$(echo $ENABLE_VULNERABILITY_SCANNER | tr \u0027[:upper:]\u0027 \u0027[:lower:]\u0027)\" \u003d \"false\" ]; then"},{"line_number":20,"context_line":"    exit 0"},{"line_number":21,"context_line":"fi"},{"line_number":22,"context_line":""}],"source_content_type":"text/x-sh","patch_set":1,"id":"3f79a3b5_9780bbf9","line":19,"updated":"2018-09-26 13:45:35.000000000","message":"We have other cases where this caused problems. We should check explicitly for !\u003d \u0027true\u0027, so that everything else is false. Otherwise a typo will enable it by default (like faalse).","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":27725,"name":"Roberto Soares","email":"robertomlsoares@gmail.com","username":"robertomls"},"change_message_id":"9b0b61645abba323846083ff5e94e4fdee944cb4","unresolved":false,"context_lines":[{"line_number":16,"context_line":"    }"},{"line_number":17,"context_line":"}"},{"line_number":18,"context_line":""},{"line_number":19,"context_line":"if [ \"$(echo $ENABLE_VULNERABILITY_SCANNER | tr \u0027[:upper:]\u0027 \u0027[:lower:]\u0027)\" \u003d \"false\" ]; then"},{"line_number":20,"context_line":"    exit 0"},{"line_number":21,"context_line":"fi"},{"line_number":22,"context_line":""}],"source_content_type":"text/x-sh","patch_set":1,"id":"3f79a3b5_307ba6f4","line":19,"in_reply_to":"3f79a3b5_9780bbf9","updated":"2018-10-11 17:58:31.000000000","message":"Done","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":9995,"name":"Ricardo Rocha","email":"rocha.porto@gmail.com","username":"rocha"},"change_message_id":"277533f3c9fd8577b217b75558dfb459d684e8f7","unresolved":false,"context_lines":[{"line_number":20,"context_line":"    exit 0"},{"line_number":21,"context_line":"fi"},{"line_number":22,"context_line":""},{"line_number":23,"context_line":"_prefix\u003d${CONTAINER_INFRA_PREFIX:-gitlab-registry.cern.ch/cloud/}"},{"line_number":24,"context_line":""},{"line_number":25,"context_line":"VULNERABILITY_SCANNER_MANIFEST\u003d/srv/magnum/kubernetes/vulnerability-scanner.yaml"},{"line_number":26,"context_line":"VULNERABILITY_SCANNER_MANIFEST_CONTENT\u003d$(cat \u003c\u003cEOF"}],"source_content_type":"text/x-sh","patch_set":1,"id":"3f79a3b5_b7985769","line":23,"updated":"2018-09-26 13:45:35.000000000","message":"CERN patch leftover. I\u0027m guessing we will push the image to -docker.io/openstackmagnum/, so maybe use that here.","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":27725,"name":"Roberto Soares","email":"robertomlsoares@gmail.com","username":"robertomls"},"change_message_id":"9b0b61645abba323846083ff5e94e4fdee944cb4","unresolved":false,"context_lines":[{"line_number":20,"context_line":"    exit 0"},{"line_number":21,"context_line":"fi"},{"line_number":22,"context_line":""},{"line_number":23,"context_line":"_prefix\u003d${CONTAINER_INFRA_PREFIX:-gitlab-registry.cern.ch/cloud/}"},{"line_number":24,"context_line":""},{"line_number":25,"context_line":"VULNERABILITY_SCANNER_MANIFEST\u003d/srv/magnum/kubernetes/vulnerability-scanner.yaml"},{"line_number":26,"context_line":"VULNERABILITY_SCANNER_MANIFEST_CONTENT\u003d$(cat \u003c\u003cEOF"}],"source_content_type":"text/x-sh","patch_set":1,"id":"3f79a3b5_70459e9a","line":23,"in_reply_to":"3f79a3b5_b7985769","updated":"2018-10-11 17:58:31.000000000","message":"Done","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":27725,"name":"Roberto Soares","email":"robertomlsoares@gmail.com","username":"robertomls"},"change_message_id":"484d66e5ec65ed672939f89704f3ada5d7b15a61","unresolved":false,"context_lines":[{"line_number":20,"context_line":"    exit 0"},{"line_number":21,"context_line":"fi"},{"line_number":22,"context_line":""},{"line_number":23,"context_line":"_prefix\u003d${CONTAINER_INFRA_PREFIX:-gitlab-registry.cern.ch/cloud/}"},{"line_number":24,"context_line":""},{"line_number":25,"context_line":"VULNERABILITY_SCANNER_MANIFEST\u003d/srv/magnum/kubernetes/vulnerability-scanner.yaml"},{"line_number":26,"context_line":"VULNERABILITY_SCANNER_MANIFEST_CONTENT\u003d$(cat \u003c\u003cEOF"}],"source_content_type":"text/x-sh","patch_set":1,"id":"3f79a3b5_6ba3739c","line":23,"in_reply_to":"3f79a3b5_b7985769","updated":"2018-09-29 14:00:25.000000000","message":"Okay. Do you mind pushing the image there? Not sure I have the necessary permissions to do that.","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"}],"magnum/drivers/k8s_fedora_atomic_v1/templates/kubecluster.yaml":[{"author":{"_account_id":9995,"name":"Ricardo Rocha","email":"rocha.porto@gmail.com","username":"rocha"},"change_message_id":"277533f3c9fd8577b217b75558dfb459d684e8f7","unresolved":false,"context_lines":[{"line_number":493,"context_line":"    type: boolean"},{"line_number":494,"context_line":"    description: Enable or disable the openstack kubernetes cloud provider"},{"line_number":495,"context_line":"    default: true"},{"line_number":496,"context_line":"  "},{"line_number":497,"context_line":"  vulnerability_scanner_enabled:"},{"line_number":498,"context_line":"    type: boolean"},{"line_number":499,"context_line":"    description: Enable or disable the vulnerability scanner"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3f79a3b5_b7e617e7","line":496,"updated":"2018-09-26 13:45:35.000000000","message":"Cleanup spaces.","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":27725,"name":"Roberto Soares","email":"robertomlsoares@gmail.com","username":"robertomls"},"change_message_id":"9b0b61645abba323846083ff5e94e4fdee944cb4","unresolved":false,"context_lines":[{"line_number":493,"context_line":"    type: boolean"},{"line_number":494,"context_line":"    description: Enable or disable the openstack kubernetes cloud provider"},{"line_number":495,"context_line":"    default: true"},{"line_number":496,"context_line":"  "},{"line_number":497,"context_line":"  vulnerability_scanner_enabled:"},{"line_number":498,"context_line":"    type: boolean"},{"line_number":499,"context_line":"    description: Enable or disable the vulnerability scanner"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3f79a3b5_2b86db66","line":496,"in_reply_to":"3f79a3b5_b7e617e7","updated":"2018-10-11 17:58:31.000000000","message":"Done","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":9995,"name":"Ricardo Rocha","email":"rocha.porto@gmail.com","username":"rocha"},"change_message_id":"277533f3c9fd8577b217b75558dfb459d684e8f7","unresolved":false,"context_lines":[{"line_number":498,"context_line":"    type: boolean"},{"line_number":499,"context_line":"    description: Enable or disable the vulnerability scanner"},{"line_number":500,"context_line":"    default: False"},{"line_number":501,"context_line":"  "},{"line_number":502,"context_line":"  vulnerability_scanner_tag:"},{"line_number":503,"context_line":"    type: string"},{"line_number":504,"context_line":"    description: Tag of the vulnerability scanner image"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3f79a3b5_57cd435c","line":501,"updated":"2018-09-26 13:45:35.000000000","message":"Cleanup spaces.","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":27725,"name":"Roberto Soares","email":"robertomlsoares@gmail.com","username":"robertomls"},"change_message_id":"9b0b61645abba323846083ff5e94e4fdee944cb4","unresolved":false,"context_lines":[{"line_number":498,"context_line":"    type: boolean"},{"line_number":499,"context_line":"    description: Enable or disable the vulnerability scanner"},{"line_number":500,"context_line":"    default: False"},{"line_number":501,"context_line":"  "},{"line_number":502,"context_line":"  vulnerability_scanner_tag:"},{"line_number":503,"context_line":"    type: string"},{"line_number":504,"context_line":"    description: Tag of the vulnerability scanner image"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3f79a3b5_cb764793","line":501,"in_reply_to":"3f79a3b5_57cd435c","updated":"2018-10-11 17:58:31.000000000","message":"Done","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":9995,"name":"Ricardo Rocha","email":"rocha.porto@gmail.com","username":"rocha"},"change_message_id":"277533f3c9fd8577b217b75558dfb459d684e8f7","unresolved":false,"context_lines":[{"line_number":503,"context_line":"    type: string"},{"line_number":504,"context_line":"    description: Tag of the vulnerability scanner image"},{"line_number":505,"context_line":"    default: v1.0.0"},{"line_number":506,"context_line":"  "},{"line_number":507,"context_line":"  vulnerability_scanner_endpoint:"},{"line_number":508,"context_line":"    type: string"},{"line_number":509,"context_line":"    description: Clair endpoint to be used by the vulnerability scanner"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3f79a3b5_77c87f4c","line":506,"updated":"2018-09-26 13:45:35.000000000","message":"Cleanup spaces.","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":27725,"name":"Roberto Soares","email":"robertomlsoares@gmail.com","username":"robertomls"},"change_message_id":"9b0b61645abba323846083ff5e94e4fdee944cb4","unresolved":false,"context_lines":[{"line_number":503,"context_line":"    type: string"},{"line_number":504,"context_line":"    description: Tag of the vulnerability scanner image"},{"line_number":505,"context_line":"    default: v1.0.0"},{"line_number":506,"context_line":"  "},{"line_number":507,"context_line":"  vulnerability_scanner_endpoint:"},{"line_number":508,"context_line":"    type: string"},{"line_number":509,"context_line":"    description: Clair endpoint to be used by the vulnerability scanner"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3f79a3b5_eb7b0377","line":506,"in_reply_to":"3f79a3b5_77c87f4c","updated":"2018-10-11 17:58:31.000000000","message":"Done","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"}],"magnum/drivers/k8s_fedora_atomic_v1/templates/kubemaster.yaml":[{"author":{"_account_id":9995,"name":"Ricardo Rocha","email":"rocha.porto@gmail.com","username":"rocha"},"change_message_id":"277533f3c9fd8577b217b75558dfb459d684e8f7","unresolved":false,"context_lines":[{"line_number":390,"context_line":"  cloud_provider_enabled:"},{"line_number":391,"context_line":"    type: boolean"},{"line_number":392,"context_line":"    description: Enable or disable the openstack kubernetes cloud provider"},{"line_number":393,"context_line":"  "},{"line_number":394,"context_line":"  vulnerability_scanner_enabled:"},{"line_number":395,"context_line":"    type: boolean"},{"line_number":396,"context_line":"    description: Enable or disable the vulnerability scanner"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3f79a3b5_57f6a392","line":393,"updated":"2018-09-26 13:45:35.000000000","message":"Cleanup spaces.","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":27725,"name":"Roberto Soares","email":"robertomlsoares@gmail.com","username":"robertomls"},"change_message_id":"9b0b61645abba323846083ff5e94e4fdee944cb4","unresolved":false,"context_lines":[{"line_number":390,"context_line":"  cloud_provider_enabled:"},{"line_number":391,"context_line":"    type: boolean"},{"line_number":392,"context_line":"    description: Enable or disable the openstack kubernetes cloud provider"},{"line_number":393,"context_line":"  "},{"line_number":394,"context_line":"  vulnerability_scanner_enabled:"},{"line_number":395,"context_line":"    type: boolean"},{"line_number":396,"context_line":"    description: Enable or disable the vulnerability scanner"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3f79a3b5_ebf0e3fe","line":393,"in_reply_to":"3f79a3b5_57f6a392","updated":"2018-10-11 17:58:31.000000000","message":"Done","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":9995,"name":"Ricardo Rocha","email":"rocha.porto@gmail.com","username":"rocha"},"change_message_id":"277533f3c9fd8577b217b75558dfb459d684e8f7","unresolved":false,"context_lines":[{"line_number":399,"context_line":"  vulnerability_scanner_tag:"},{"line_number":400,"context_line":"    type: string"},{"line_number":401,"context_line":"    description: Tag of the vulnerability scanner image"},{"line_number":402,"context_line":"    default: v1.0.0"},{"line_number":403,"context_line":"  "},{"line_number":404,"context_line":"  vulnerability_scanner_endpoint:"},{"line_number":405,"context_line":"    type: string"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3f79a3b5_771f1fb8","line":402,"updated":"2018-09-26 13:45:35.000000000","message":"In the docs we were mentioning the \u0027latest\u0027 stable release, while here we hard-code v1.0.0. I think the best to not depend on this value is to put a default \u0027latest\u0027, and then operators can set this to a specific version - the reason being that the release lifecycle of the scanner container will probably be very different from magnum.","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":27725,"name":"Roberto Soares","email":"robertomlsoares@gmail.com","username":"robertomls"},"change_message_id":"9b0b61645abba323846083ff5e94e4fdee944cb4","unresolved":false,"context_lines":[{"line_number":399,"context_line":"  vulnerability_scanner_tag:"},{"line_number":400,"context_line":"    type: string"},{"line_number":401,"context_line":"    description: Tag of the vulnerability scanner image"},{"line_number":402,"context_line":"    default: v1.0.0"},{"line_number":403,"context_line":"  "},{"line_number":404,"context_line":"  vulnerability_scanner_endpoint:"},{"line_number":405,"context_line":"    type: string"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3f79a3b5_8bd92f85","line":402,"in_reply_to":"3f79a3b5_771f1fb8","updated":"2018-10-11 17:58:31.000000000","message":"Done","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":9995,"name":"Ricardo Rocha","email":"rocha.porto@gmail.com","username":"rocha"},"change_message_id":"277533f3c9fd8577b217b75558dfb459d684e8f7","unresolved":false,"context_lines":[{"line_number":400,"context_line":"    type: string"},{"line_number":401,"context_line":"    description: Tag of the vulnerability scanner image"},{"line_number":402,"context_line":"    default: v1.0.0"},{"line_number":403,"context_line":"  "},{"line_number":404,"context_line":"  vulnerability_scanner_endpoint:"},{"line_number":405,"context_line":"    type: string"},{"line_number":406,"context_line":"    description: Clair endpoint to be used by the vulnerability scanner"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3f79a3b5_77f15f96","line":403,"updated":"2018-09-26 13:45:35.000000000","message":"Cleanup spaces.","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":27725,"name":"Roberto Soares","email":"robertomlsoares@gmail.com","username":"robertomls"},"change_message_id":"9b0b61645abba323846083ff5e94e4fdee944cb4","unresolved":false,"context_lines":[{"line_number":400,"context_line":"    type: string"},{"line_number":401,"context_line":"    description: Tag of the vulnerability scanner image"},{"line_number":402,"context_line":"    default: v1.0.0"},{"line_number":403,"context_line":"  "},{"line_number":404,"context_line":"  vulnerability_scanner_endpoint:"},{"line_number":405,"context_line":"    type: string"},{"line_number":406,"context_line":"    description: Clair endpoint to be used by the vulnerability scanner"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3f79a3b5_abd66b52","line":403,"in_reply_to":"3f79a3b5_77f15f96","updated":"2018-10-11 17:58:31.000000000","message":"Done","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":9995,"name":"Ricardo Rocha","email":"rocha.porto@gmail.com","username":"rocha"},"change_message_id":"277533f3c9fd8577b217b75558dfb459d684e8f7","unresolved":false,"context_lines":[{"line_number":404,"context_line":"  vulnerability_scanner_endpoint:"},{"line_number":405,"context_line":"    type: string"},{"line_number":406,"context_line":"    description: Clair endpoint to be used by the vulnerability scanner"},{"line_number":407,"context_line":"    default: \"http://clair.cern.ch\""},{"line_number":408,"context_line":""},{"line_number":409,"context_line":"resources:"},{"line_number":410,"context_line":""}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3f79a3b5_f7780ff8","line":407,"updated":"2018-09-26 13:45:35.000000000","message":"Do not set a default here, and not CERN :)","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":27725,"name":"Roberto Soares","email":"robertomlsoares@gmail.com","username":"robertomls"},"change_message_id":"9b0b61645abba323846083ff5e94e4fdee944cb4","unresolved":false,"context_lines":[{"line_number":404,"context_line":"  vulnerability_scanner_endpoint:"},{"line_number":405,"context_line":"    type: string"},{"line_number":406,"context_line":"    description: Clair endpoint to be used by the vulnerability scanner"},{"line_number":407,"context_line":"    default: \"http://clair.cern.ch\""},{"line_number":408,"context_line":""},{"line_number":409,"context_line":"resources:"},{"line_number":410,"context_line":""}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3f79a3b5_6bdcd370","line":407,"in_reply_to":"3f79a3b5_f7780ff8","updated":"2018-10-11 17:58:31.000000000","message":"Done","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":9995,"name":"Ricardo Rocha","email":"rocha.porto@gmail.com","username":"rocha"},"change_message_id":"277533f3c9fd8577b217b75558dfb459d684e8f7","unresolved":false,"context_lines":[{"line_number":732,"context_line":"      config: {get_resource: kubernetes_dashboard}"},{"line_number":733,"context_line":"      server: {get_resource: kube-master}"},{"line_number":734,"context_line":"      actions: [\u0027CREATE\u0027]"},{"line_number":735,"context_line":"  "},{"line_number":736,"context_line":"  enable_vulnerability_scanner:"},{"line_number":737,"context_line":"    type: OS::Heat::SoftwareConfig"},{"line_number":738,"context_line":"    properties:"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3f79a3b5_977f5bde","line":735,"updated":"2018-09-26 13:45:35.000000000","message":"Cleanup spaces.","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":27725,"name":"Roberto Soares","email":"robertomlsoares@gmail.com","username":"robertomls"},"change_message_id":"9b0b61645abba323846083ff5e94e4fdee944cb4","unresolved":false,"context_lines":[{"line_number":732,"context_line":"      config: {get_resource: kubernetes_dashboard}"},{"line_number":733,"context_line":"      server: {get_resource: kube-master}"},{"line_number":734,"context_line":"      actions: [\u0027CREATE\u0027]"},{"line_number":735,"context_line":"  "},{"line_number":736,"context_line":"  enable_vulnerability_scanner:"},{"line_number":737,"context_line":"    type: OS::Heat::SoftwareConfig"},{"line_number":738,"context_line":"    properties:"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3f79a3b5_8bc28f85","line":735,"in_reply_to":"3f79a3b5_977f5bde","updated":"2018-10-11 17:58:31.000000000","message":"Done","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":9995,"name":"Ricardo Rocha","email":"rocha.porto@gmail.com","username":"rocha"},"change_message_id":"277533f3c9fd8577b217b75558dfb459d684e8f7","unresolved":false,"context_lines":[{"line_number":738,"context_line":"    properties:"},{"line_number":739,"context_line":"      group: script"},{"line_number":740,"context_line":"      config: {get_file: ../../common/templates/kubernetes/fragments/enable-vulnerability-scanner.sh}"},{"line_number":741,"context_line":"  "},{"line_number":742,"context_line":"  enable_vulnerability_scanner_deployment:"},{"line_number":743,"context_line":"    type: OS::Heat::SoftwareDeployment"},{"line_number":744,"context_line":"    properties:"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3f79a3b5_5769c323","line":741,"updated":"2018-09-26 13:45:35.000000000","message":"Cleanup spaces.","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":27725,"name":"Roberto Soares","email":"robertomlsoares@gmail.com","username":"robertomls"},"change_message_id":"9b0b61645abba323846083ff5e94e4fdee944cb4","unresolved":false,"context_lines":[{"line_number":738,"context_line":"    properties:"},{"line_number":739,"context_line":"      group: script"},{"line_number":740,"context_line":"      config: {get_file: ../../common/templates/kubernetes/fragments/enable-vulnerability-scanner.sh}"},{"line_number":741,"context_line":"  "},{"line_number":742,"context_line":"  enable_vulnerability_scanner_deployment:"},{"line_number":743,"context_line":"    type: OS::Heat::SoftwareDeployment"},{"line_number":744,"context_line":"    properties:"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3f79a3b5_abbf4bfa","line":741,"in_reply_to":"3f79a3b5_5769c323","updated":"2018-10-11 17:58:31.000000000","message":"Done","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"}],"releasenotes/notes/bp-container-image-cve-scan-5e02ee2fc3c5d092.yaml":[{"author":{"_account_id":9995,"name":"Ricardo Rocha","email":"rocha.porto@gmail.com","username":"rocha"},"change_message_id":"277533f3c9fd8577b217b75558dfb459d684e8f7","unresolved":false,"context_lines":[{"line_number":8,"context_line":"    used (defaults to the latest stable version)."},{"line_number":9,"context_line":"    \u0027vulnerability_scanner_endpoint\u0027, which is the endpoint where a Clair"},{"line_number":10,"context_line":"    instance is running (defaults to http://clair.cern.ch)."},{"line_number":11,"context_line":"    "},{"line_number":12,"context_line":"    The scanner runs on every node and analyses the pods running on the node"},{"line_number":13,"context_line":"    it was assigned to. Results of the analysis are delivered by marking the"},{"line_number":14,"context_line":"    pods with labels and annotations. The label \u0027security_level\u0027 can have"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3f79a3b5_5752236a","line":11,"updated":"2018-09-26 13:45:35.000000000","message":"Cleanup spaces.","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"},{"author":{"_account_id":27725,"name":"Roberto Soares","email":"robertomlsoares@gmail.com","username":"robertomls"},"change_message_id":"9b0b61645abba323846083ff5e94e4fdee944cb4","unresolved":false,"context_lines":[{"line_number":8,"context_line":"    used (defaults to the latest stable version)."},{"line_number":9,"context_line":"    \u0027vulnerability_scanner_endpoint\u0027, which is the endpoint where a Clair"},{"line_number":10,"context_line":"    instance is running (defaults to http://clair.cern.ch)."},{"line_number":11,"context_line":"    "},{"line_number":12,"context_line":"    The scanner runs on every node and analyses the pods running on the node"},{"line_number":13,"context_line":"    it was assigned to. Results of the analysis are delivered by marking the"},{"line_number":14,"context_line":"    pods with labels and annotations. The label \u0027security_level\u0027 can have"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3f79a3b5_4b66b7be","line":11,"in_reply_to":"3f79a3b5_5752236a","updated":"2018-10-11 17:58:31.000000000","message":"Done","commit_id":"c7de72e3930461d18fa65726d038a1772cced9f1"}]}
