You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@stevespringett I raised #2878 to address this. Problem is that filtering components like this will inevitably break the dependency graph.
Few ideas how to handle that:
Don't. Just accept that the graph will have holes.
Remove the dependency graph entirely from VDR exports.
Attempt to close the gaps by re-wiring broken edges to the next-best candidate (i.e., connect transitive dependency to root node when direct dependency was filtered out); Could become quite expensive for large projects with complex graphs.
In any case, I reckon we could make use of compositions to signal that something is missing. Question is, do we need to "fix" broken graphs?
Current Behavior
When exporting a VDR, the entire inventory is exported whether the components are affected by vulnerabilities or not.
Steps to Reproduce
Expected Behavior
The VDR should only contain components that are affected by a vulnerability, not the full inventory.
Dependency-Track Version
4.8.0
Dependency-Track Distribution
Container Image
Database Server
PostgreSQL
Database Server Version
No response
Browser
Google Chrome
Checklist
The text was updated successfully, but these errors were encountered: