Closed
Bug 1130749
Opened 10 years ago
Closed 10 years ago
Extended module configuration over STDIN for MIG
Categories
(Enterprise Information Security Graveyard :: MIG, task)
Tracking
(Not tracked)
RESOLVED
FIXED
People
(Reporter: alm, Assigned: alm)
References
Details
We have a new experimental library that can be turned into a module for MIG that will allow agent based OVAL vulnerability checks. The module needs more initialization data then the other modules (it needs to get the OVAL definitions somehow).
Talking with :ulfr we thought extended MIG to support passing data to a module over STDIN to the module, in addition to command line flags might be a good way to do it (Cmd.StdinPipe). This will allow us to pipe extended data into modules this way, as opposed to needing to do something like store a file on the file system the module reads.
Updated•10 years ago
|
Assignee | ||
Comment 1•10 years ago
|
||
Initial support for this has been added at branch:
https://github.com/ameihm0912/mig/tree/mig-mozoval
Needs a lot of review and cleanup.
Assignee: nobody → ameihm
Status: NEW → ASSIGNED
Comment 2•10 years ago
|
||
Status: ASSIGNED → RESOLVED
Closed: 10 years ago
Resolution: --- → FIXED
Updated•10 years ago
|
Component: Operations Security (OpSec): MIG → MIG
Product: mozilla.org → Enterprise Information Security
Updated•5 years ago
|
Product: Enterprise Information Security → Enterprise Information Security Graveyard
You need to log in
before you can comment on or make changes to this bug.
Description
•