CVE mirror troubleshooting
This topic provides guidance on the following actions:
Understanding CVE ingestion
The initial setup for CVEs in Package Security Manager is triggered during install, when you first enter a license—either from the UI or by making a call to the rest end point at https://<FQDN>/api/system/license
. When that happens, Package Security Manager creates a channel called cve (https://<FQDN>/channels/cve
).
By default, only admin users can navigate to this channel (URL). For users to be able to access this channel, an admin user must assign the Manage permission for CVEs to users from the User Management dashboard.
Package Security Manager will also set up a mirror in the channel called cve_ingestor
, which will mirror all the packages in https://api.anaconda.cloud/repo/anaconda-main by default. “Packages” in this context refers to cve metadata.
Your token is extracted from the license and used to authenticate to the CVE endpoint; without it, you will not be able to mirror from api.anaconda.cloud.
The SSL certificate that is used on api.anaconda.cloud is signed by Let’s Encrypt. This is important to know because repo.anaconda.cloud is signed by a different CA than repo.anaconda.com.
Validating CVE mirrors
Until your mirrored packages are matched to CVEs, you will not see metadata for those CVEs. In some cases, though, even entering your license does not provide you with mirrored CVE metadata. However, you can verify the CVEs are present by going through the following steps:
-
Navigate to your CVE view:
-
List your CVEs on the command line:
-
Use the rest end point with your admin user token:
-
As an alternate to step 3, you can use the rest end point with a bearer token, in case your user token doesn’t work:
If after these steps you find that the CVE mirroring did not work as expected, there are a few known causes for this issue persisting:
After you’ve ensured that any of the above issues you were having are resolved; api.anaconda.cloud can be reached; and the SSL validated from the API repo container is successful, you may proceed with the following CVE mirror fix:
If the connection is working correctly, you should receive a confirmation like the following:
Fixing CVE mirror failure during setup
Ensure you are using Package Security Manager version 6.1.2 or later before attempting this procedure.
If you work through the steps above and find that your channels still do not contain CVEs, try the following steps:
-
Rename the CVE channel by navigating to the following path, clicking edit, and renaming the channel:
-
Get the bearer token:
-
Call put
https://<FQDN>/api/system/license
endpoint: -
Verify that the new CVE channel and mirror are created by navigating to your CVE view:
-
Verify that CVE data is now available. If it is, you can safely delete the old CVE channel by navigating to the following path and deleting the channel from the green Edit button’s dropdown options:
Was this page helpful?