|
59 | 59 | "name": "Name", |
60 | 60 | "published": "Published", |
61 | 61 | "cwe": "CWE", |
| 62 | + "cwe_full": "Common Weakness Enumeration (CWE)", |
62 | 63 | "cwe_id": "CWE ID", |
63 | 64 | "cwe_desc": "Common Weakness Enumeration (CWE) is a taxonomy of software and hardware weakness types", |
64 | 65 | "select_cwe": "Select CWE", |
|
99 | 100 | "component_created": "Component created", |
100 | 101 | "component_updated": "Component updated", |
101 | 102 | "component_deleted": "Component deleted", |
| 103 | + "component_hash": "Component Hash", |
102 | 104 | "property_created": "Property created", |
103 | 105 | "property_deleted": "Property deleted", |
104 | 106 | "create_project": "Create Project", |
|
237 | 239 | "hashes": "Hashes", |
238 | 240 | "component_name": "Component name", |
239 | 241 | "component_namespace_group_vendor": "Namespace / group / vendor", |
| 242 | + "component_author": "Author", |
240 | 243 | "coordinates": "Coordinates", |
241 | 244 | "coordinates_version_tooltip": "You can use the comparison operators >, <, >=, <=, == and != to match specific versions or version ranges", |
242 | 245 | "package_url_full": "Package URL (PURL)", |
|
262 | 265 | "component_name_desc": "The name of the component as provided by the supplier", |
263 | 266 | "component_version_desc": "The version of the component as provided by the supplier", |
264 | 267 | "component_group_desc": "The suppliers higher-level namespace, group, or vendor identifier", |
| 268 | + "component_author_desc": "The author of the component", |
265 | 269 | "component_package_url_desc": "A Valid Package URL is required for libraries and frameworks. PURL syntax: pkg:type/namespace/name@version?qualifiers#subpath", |
266 | 270 | "component_cpe_desc": "The CPE v2.2 or v2.3 URI as provided by MITRE or NIST. All assets (applications, operating systems, and hardware) should have a CPE specified", |
267 | 271 | "component_swid_tagid_desc": "The ISO/IEC 19770-2:2015 (SWID) tag ID provided by the software vendor", |
|
275 | 279 | "component_removed": "Component removed", |
276 | 280 | "required_project_name": "The project name is required", |
277 | 281 | "project_name_desc": "The name of the project or component as provided by the supplier", |
278 | | - "profile": "Profile", |
| 282 | + "connected_as": "Connected as", |
279 | 283 | "profile_update": "Update Profile", |
280 | 284 | "profile_updated": "Profile updated", |
281 | 285 | "logout": "Logout", |
|
436 | 440 | "internal_identification_queued": "Internal component identification queued", |
437 | 441 | "internal_identification_error": "An error occurred queueing internal component identification. Check server logs for details", |
438 | 442 | "analyzer_internal_enable": "Enable internal analyzer", |
| 443 | + "analyzer_internal_fuzzy_enable": "Enable fuzzy CPE matching. Helps with inconsistent NVD data, highlighting missing risks but also increasing false positives", |
| 444 | + "analyzer_internal_fuzzy_exclude_purl": "Enable fuzzy CPE matching on components that have a Package URL (PURL) defined", |
| 445 | + "analyzer_internal_fuzzy_exclude_internal": "Enable fuzzy CPE matching on internal components", |
439 | 446 | "analyzer_internal_desc": "The internal analyzer evaluates components against an internal vulnerability database derived from the National Vulnerability Database, GitHub Advisories (if enabled) and VulnDB (if enabled). This analyzer makes use of the Common Platform Enumeration (CPE) defined in components. Components with a valid CPE will be evaluated with this analyzer.", |
440 | 447 | "analyzer_ossindex_enable": "Enable OSS Index analyzer", |
441 | 448 | "analyzer_ossindex_desc": "OSS Index is a service provided by Sonatype which identifies vulnerabilities in third-party components. Dependency-Track integrates natively with the OSS Index service to provide highly accurate results. Use of this analyzer requires a valid PackageURL for the components being analyzed.", |
|
460 | 467 | "enabled": "Enabled", |
461 | 468 | "integration_fortify_ssc_enable": "Enable Fortify SSC integration", |
462 | 469 | "integration_defectdojo_enable": "Enable DefectDojo integration", |
| 470 | + "integration_defectdojo_reimport_enable": "Enable reimport", |
463 | 471 | "synchronization_cadence_minutes": "Synchronization cadence (in minutes)", |
464 | 472 | "synchronization_cadence_restart_required": "Restarting Dependency-Track is required for cadence changes to take effect", |
465 | 473 | "integration_kenna_enable": "Enable Kenna Security integration", |
|
529 | 537 | "repository_deleted": "Repository deleted", |
530 | 538 | "portfolio_access_control": "Portfolio Access Control", |
531 | 539 | "project_access": "Project access", |
532 | | - "select_project": "Select Project" |
| 540 | + "select_project": "Select Project", |
| 541 | + "create_template": "Create Template", |
| 542 | + "template_created": "Template created", |
| 543 | + "delete_template": "Delete Template", |
| 544 | + "template_deleted": "Template deleted", |
| 545 | + "template_basedir": "Template base directory", |
| 546 | + "template_basedir_tooltip": "This property is used as base directory for notification templates search", |
| 547 | + "general_template_configuration": "General template configuration", |
| 548 | + "template_override_description": "Switching the template override control on and providing a template base directory allow you to override Dependency Track default notification publisher templates.", |
| 549 | + "template_override_file_hierarchy": "Any Pebble templates available in the template base directory with the appropriate directory hierarchy and naming scheme (e.g ${base directory}/templates/notification/publisher/email.peb) will override Dependency Track default one.", |
| 550 | + "template_override_security_warning": "You must set appropriate rights to the template base directory to prevent untrusted third party from supplying fraudulent Pebble templates that could lead to potential remote code execution.", |
| 551 | + "template_override_restart_needed": "Dependency Track restart is required for the modifications to be taken into account.", |
| 552 | + "enable_default_template_override": "Enable default template override", |
| 553 | + "restore_default_template": "Restore default templates", |
| 554 | + "default_template_restored": "Default templates restored", |
| 555 | + "clone_template": "Clone Template", |
| 556 | + "template_cloned": "Template cloned" |
533 | 557 | }, |
534 | 558 | "condition": { |
535 | 559 | "warning": "Warning", |
|
547 | 571 | "is": "is", |
548 | 572 | "is_not": "is not", |
549 | 573 | "matches": "matches", |
550 | | - "no_match": "does not match" |
| 574 | + "no_match": "does not match", |
| 575 | + "contains_any": "contains any", |
| 576 | + "contains_all": "contains all" |
| 577 | + }, |
| 578 | + "hashes" : { |
| 579 | + "md5": "MD5", |
| 580 | + "sha_1": "SHA-1", |
| 581 | + "sha_256": "SHA-256", |
| 582 | + "sha_384": "SHA-384", |
| 583 | + "sha_512": "SHA-512", |
| 584 | + "sha3_256": "SHA3-256", |
| 585 | + "sha3_384": "SHA3-384", |
| 586 | + "sha3_512": "SHA3-512", |
| 587 | + "blake_256": "BLAKE2b-256", |
| 588 | + "blake_384": "BLAKE2b-384", |
| 589 | + "blake_512": "BLAKE2b-512", |
| 590 | + "blake3": "BLAKE3" |
551 | 591 | }, |
552 | 592 | "policy_violation": { |
553 | 593 | "fails": "Violation Failures", |
|
0 commit comments