2020-04-08 14:13:33 +05:30
---
type: reference, howto
2020-06-23 00:09:42 +05:30
stage: Secure
group: Composition Analysis
2022-11-25 23:54:43 +05:30
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/product/ux/technical-writing/#assignments
2020-04-08 14:13:33 +05:30
---
2023-06-20 00:43:36 +05:30
# License Compliance (deprecated) **(ULTIMATE)**
2020-04-08 14:13:33 +05:30
2023-04-23 21:23:45 +05:30
> - [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/5483) in GitLab 11.0.
> - [Deprecated](https://gitlab.com/gitlab-org/gitlab/-/issues/387561) in GitLab 15.9.
WARNING:
2023-07-09 08:55:56 +05:30
This feature was [deprecated ](https://gitlab.com/gitlab-org/gitlab/-/issues/387561 ) in GitLab 15.9. You should instead migrate to use [License approval policies ](../license_approval_policies.md ) and the [new method of license scanning ](../license_scanning_of_cyclonedx_files/index.md ) prior to GitLab 16.1.
2020-04-08 14:13:33 +05:30
2021-09-30 23:02:18 +05:30
If you're using [GitLab CI/CD ](../../../ci/index.md ), you can use License Compliance to search your
2020-10-24 23:57:45 +05:30
project's dependencies for their licenses. You can then decide whether to allow or deny the use of
each license. For example, if your application uses an external (open source) library whose license
is incompatible with yours, then you can deny the use of that license.
2020-04-08 14:13:33 +05:30
2022-04-04 11:22:00 +05:30
To detect the licenses in use, License Compliance uses the [License Finder ](https://github.com/pivotal/LicenseFinder ) scan tool that runs as part of the CI/CD pipeline. The License Compliance job is not dependent on any other job in
a pipeline.
2021-04-17 20:07:23 +05:30
2022-01-26 12:08:38 +05:30
For the job to activate, License Finder needs to find a compatible package definition in the project directory. For details, see the [Activation on License Finder documentation ](https://github.com/pivotal/LicenseFinder#activation ).
GitLab checks the License Compliance report, compares the
2021-02-22 17:27:13 +05:30
licenses between the source and target branches, and shows the information right on the merge
request. Denied licenses are indicated by a `x` red icon next to them as well as new licenses that
2023-07-09 08:55:56 +05:30
need a decision from you. In addition, you can [manually allow or deny ](../license_approval_policies.md ) licenses in your
project's security policies section. If a denied license is detected in a new commit,
2021-02-22 17:27:13 +05:30
GitLab blocks any merge requests containing that commit and instructs the developer to remove the
license.
2020-04-08 14:13:33 +05:30
2023-04-23 21:23:45 +05:30
NOTE:
Starting with GitLab 15.9, License Compliance can detect the licenses in use
[using Dependency Scanning CI jobs ](../license_scanning_of_cyclonedx_files/index.md )
instead of the License Scanning ones.
2021-02-22 17:27:13 +05:30
NOTE:
2020-04-08 14:13:33 +05:30
If the license compliance report doesn't have anything to compare to, no information
2021-02-22 17:27:13 +05:30
is displayed in the merge request area. That is the case when you add the
2020-04-08 14:13:33 +05:30
`license_scanning` job in your `.gitlab-ci.yml` for the first time.
2021-02-22 17:27:13 +05:30
Consecutive merge requests have something to compare to and the license
compliance report is shown properly.
2020-04-08 14:13:33 +05:30
2022-04-04 11:22:00 +05:30
The results are saved as a
[License Compliance report artifact ](../../../ci/yaml/artifacts_reports.md#artifactsreportslicense_scanning )
2022-08-13 15:12:31 +05:30
that you can later download and analyze.
2022-04-04 11:22:00 +05:30
WARNING:
License Compliance Scanning does not support run-time installation of compilers and interpreters.
2023-06-20 00:43:36 +05:30
## Enable License Compliance
To enable License Compliance in your project's pipeline, either:
- Enable [Auto License Compliance ](../../../topics/autodevops/stages.md#auto-license-compliance )
(provided by [Auto DevOps ](../../../topics/autodevops/index.md )).
- Include the [`License-Scanning.gitlab-ci.yml` template ](https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Security/License-Scanning.gitlab-ci.yml ) in your `.gitlab-ci.yml` file.
License Compliance is not supported when GitLab is run with FIPS mode enabled.
### Include the License Scanning template
Prerequisites:
- [GitLab Runner ](../../../ci/runners/index.md ) available, with the
[`docker` executor ](https://docs.gitlab.com/runner/executors/docker.html ). If you're using the
shared runners on GitLab.com, this is enabled by default.
- License Scanning runs in the `test` stage, which is available by default. If you redefine the stages in the
`.gitlab-ci.yml` file, the `test` stage is required.
- [FIPS mode ](../../../development/fips_compliance.md#enable-fips-mode ) must be disabled.
To [include ](../../../ci/yaml/index.md#includetemplate ) the
[`License-Scanning.gitlab-ci.yml` template ](https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Security/License-Scanning.gitlab-ci.yml ), add it to your `.gitlab-ci.yml` file:
```yaml
include:
- template: Security/License-Scanning.gitlab-ci.yml
```
The included template creates a `license_scanning` job in your CI/CD pipeline and scans your
dependencies to find their licenses.
2021-11-11 11:23:49 +05:30
## License expressions
2023-04-23 21:23:45 +05:30
GitLab has limited support for [composite licenses ](https://spdx.github.io/spdx-spec/v2-draft/SPDX-license-expressions/ ).
2021-11-11 11:23:49 +05:30
License compliance can read multiple licenses, but always considers them combined using the `AND` operator. For example,
2023-07-09 08:55:56 +05:30
if a dependency has two licenses, and one of them is allowed and the other is denied by the project [license approval policy ](../license_approval_policies.md ),
2021-11-11 11:23:49 +05:30
GitLab evaluates the composite license as _denied_ , as this is the safer option.
The ability to support other license expression operators (like `OR` , `WITH` ) is tracked
in [this epic ](https://gitlab.com/groups/gitlab-org/-/epics/6571 ).
2020-04-08 14:13:33 +05:30
## Supported languages and package managers
The following languages and package managers are supported.
2021-11-11 11:23:49 +05:30
Gradle 1.x projects are not supported. The minimum supported version of Maven is 3.2.5.
2020-05-24 23:13:21 +05:30
2021-02-22 17:27:13 +05:30
| Language | Package managers | Notes |
|------------|----------------------------------------------------------------------------------------------|-------|
2021-09-30 23:02:18 +05:30
| JavaScript | [Bower ](https://bower.io/ ), [npm ](https://www.npmjs.com/ ) (7 and earlier) | |
2022-03-02 08:16:31 +05:30
| Go | [Godep ](https://github.com/tools/godep ) ([deprecated](../../../update/deprecations.md#godep-support-in-license-compliance)), [go mod ](https://github.com/golang/go/wiki/Modules ) | |
2022-08-27 11:52:29 +05:30
| Java | [Gradle ](https://gradle.org/ ), [Maven ](https://maven.apache.org/ ) | |
2021-03-11 19:13:27 +05:30
| .NET | [NuGet ](https://www.nuget.org/ ) | The .NET Framework is supported via the [mono project ](https://www.mono-project.com/ ). There are, however, some limitations. The scanner doesn't support Windows-specific dependencies and doesn't report dependencies of your project's listed dependencies. Also, the scanner always marks detected licenses for all dependencies as `unknown` . |
2021-02-22 17:27:13 +05:30
| Python | [pip ](https://pip.pypa.io/en/stable/ ) | Python is supported through [requirements.txt ](https://pip.pypa.io/en/stable/user_guide/#requirements-files ) and [Pipfile.lock ](https://github.com/pypa/pipfile#pipfilelock ). |
| Ruby | [gem ](https://rubygems.org/ ) | |
2020-06-23 00:09:42 +05:30
2020-05-24 23:13:21 +05:30
### Experimental support
2021-02-22 17:27:13 +05:30
The following languages and package managers are [supported experimentally ](https://github.com/pivotal/LicenseFinder#experimental-project-types ).
The reported licenses might be incomplete or inaccurate.
| Language | Package managers |
|------------|---------------------------------------------------------------------------------------------------------------|
| JavaScript | [Yarn ](https://yarnpkg.com/ ) |
2021-03-11 19:13:27 +05:30
| Go | `go get` , `gvt` , `glide` , `dep` , `trash` , `govendor` |
2021-09-30 23:02:18 +05:30
| Erlang | [Rebar ](https://rebar3.org/ ) |
2021-02-22 17:27:13 +05:30
| Objective-C, Swift | [Carthage ](https://github.com/Carthage/Carthage ), [CocoaPods ](https://cocoapods.org/ ) v0.39 and below |
| Elixir | [Mix ](https://elixir-lang.org/getting-started/mix-otp/introduction-to-mix.html ) |
| C++/C | [Conan ](https://conan.io/ ) |
2022-05-07 20:08:51 +05:30
| Rust | [Cargo ](https://crates.io/ ) |
2021-02-22 17:27:13 +05:30
| PHP | [Composer ](https://getcomposer.org/ ) |
2020-04-08 14:13:33 +05:30
2023-06-20 00:43:36 +05:30
## Available CI/CD variables
2020-04-08 14:13:33 +05:30
2021-03-11 19:13:27 +05:30
License Compliance can be configured using CI/CD variables.
2020-04-08 14:13:33 +05:30
2021-03-11 19:13:27 +05:30
| CI/CD variable | Required | Description |
2020-05-24 23:13:21 +05:30
|-----------------------------|----------|-------------|
2021-03-11 19:13:27 +05:30
| `ADDITIONAL_CA_CERT_BUNDLE` | no | Bundle of trusted CA certificates (currently supported in Pip, Pipenv, Maven, Gradle, Yarn, and npm projects). |
2020-06-23 00:09:42 +05:30
| `ASDF_JAVA_VERSION` | no | Version of Java to use for the scan. |
| `ASDF_NODEJS_VERSION` | no | Version of Node.js to use for the scan. |
2021-11-11 11:23:49 +05:30
| `ASDF_PYTHON_VERSION` | no | Version of Python to use for the scan. [Configuration ](#selecting-the-version-of-python ) |
2020-06-23 00:09:42 +05:30
| `ASDF_RUBY_VERSION` | no | Version of Ruby to use for the scan. |
2021-03-11 19:13:27 +05:30
| `GRADLE_CLI_OPTS` | no | Additional arguments for the Gradle executable. If not supplied, defaults to `--exclude-task=test` . |
2022-07-16 23:28:13 +05:30
| `LICENSE_FINDER_CLI_OPTS` | no | Additional arguments for the `license_finder` executable. For example, if you have multiple projects in nested directories, you can update your `.gitlab-ci.yml` template to specify a recursive scan, like `LICENSE_FINDER_CLI_OPTS: '--recursive'` . |
2021-11-11 11:23:49 +05:30
| `LM_JAVA_VERSION` | no | Version of Java. If set to `11` , Maven and Gradle use Java 11 instead of Java 8. [Configuration ](#selecting-the-version-of-java ) |
| `LM_PYTHON_VERSION` | no | Version of Python. If set to `3` , dependencies are installed using Python 3 instead of Python 2.7. [Configuration ](#selecting-the-version-of-python ) |
2021-03-11 19:13:27 +05:30
| `MAVEN_CLI_OPTS` | no | Additional arguments for the `mvn` executable. If not supplied, defaults to `-DskipTests` . |
2020-05-24 23:13:21 +05:30
| `PIP_INDEX_URL` | no | Base URL of Python Package Index (default: `https://pypi.org/simple/` ). |
2020-06-23 00:09:42 +05:30
| `SECURE_ANALYZERS_PREFIX` | no | Set the Docker registry base address to download the analyzer from. |
2020-05-24 23:13:21 +05:30
| `SETUP_CMD` | no | Custom setup for the dependency installation (experimental). |
2020-04-08 14:13:33 +05:30
2023-06-20 00:43:36 +05:30
## Installing custom dependencies
2020-04-08 14:13:33 +05:30
2021-12-11 22:18:48 +05:30
> Introduced in GitLab 11.4.
2020-04-08 14:13:33 +05:30
2021-09-04 01:27:46 +05:30
The `license_finder` image already embeds many auto-detection scripts, languages,
2020-04-08 14:13:33 +05:30
and packages. Nevertheless, it's almost impossible to cover all cases for all projects.
That's why sometimes it's necessary to install extra packages, or to have extra steps
in the project automated setup, like the download and installation of a certificate.
2021-04-29 21:17:54 +05:30
For that, a `SETUP_CMD` CI/CD variable can be passed to the container,
2020-04-08 14:13:33 +05:30
with the required commands to run before the license detection.
2021-02-22 17:27:13 +05:30
If present, this variable overrides the setup step necessary to install all the packages
2022-01-26 12:08:38 +05:30
of your application (for example: for a project with a `Gemfile` , the setup step could be
2020-04-08 14:13:33 +05:30
`bundle install` ).
For example:
```yaml
include:
2020-10-24 23:57:45 +05:30
- template: Security/License-Scanning.gitlab-ci.yml
2020-04-08 14:13:33 +05:30
variables:
2021-04-29 21:17:54 +05:30
SETUP_CMD: sh my-custom-install-script.sh
2020-04-08 14:13:33 +05:30
```
In this example, `my-custom-install-script.sh` is a shell script at the root
directory of your project.
2023-06-20 00:43:36 +05:30
## Working with Monorepos
2021-12-11 22:18:48 +05:30
2022-01-26 12:08:38 +05:30
Depending on your language, you may need to specify the path to the individual
projects of a monorepo using the `LICENSE_FINDER_CLI_OPTS` variable. Passing in
2021-12-11 22:18:48 +05:30
the project paths can significantly speed up builds over using the `--recursive`
2023-03-04 22:38:38 +05:30
License Finder option.
2021-12-11 22:18:48 +05:30
```yaml
include:
- template: Security/License-Scanning.gitlab-ci.yml
variables:
LICENSE_FINDER_CLI_OPTS: "--aggregate_paths=relative-path/to/sub-project/one relative-path/to/sub-project/two"
```
2023-06-20 00:43:36 +05:30
## Overriding the template
2020-04-08 14:13:33 +05:30
2021-02-22 17:27:13 +05:30
WARNING:
2021-09-30 23:02:18 +05:30
Beginning in GitLab 13.0, the use of [`only` and `except` ](../../../ci/yaml/index.md#only--except )
is no longer supported. When overriding the template, you must use [`rules` ](../../../ci/yaml/index.md#rules ) instead.
2020-04-22 19:07:51 +05:30
2020-04-08 14:13:33 +05:30
If you want to override the job definition (for example, change properties like
`variables` or `dependencies` ), you need to declare a `license_scanning` job
after the template inclusion and specify any additional keys under it. For example:
```yaml
include:
2020-10-24 23:57:45 +05:30
- template: Security/License-Scanning.gitlab-ci.yml
2020-04-08 14:13:33 +05:30
license_scanning:
variables:
CI_DEBUG_TRACE: "true"
```
2023-06-20 00:43:36 +05:30
## Configuring Maven projects
2020-04-08 14:13:33 +05:30
2021-03-11 19:13:27 +05:30
The License Compliance tool provides a `MAVEN_CLI_OPTS` CI/CD variable which can hold
2020-04-08 14:13:33 +05:30
the command line arguments to pass to the `mvn install` command which is executed under the hood.
Feel free to use it for the customization of Maven execution. For example:
```yaml
include:
2020-10-24 23:57:45 +05:30
- template: Security/License-Scanning.gitlab-ci.yml
2020-04-08 14:13:33 +05:30
license_scanning:
variables:
MAVEN_CLI_OPTS: --debug
```
2022-05-07 20:08:51 +05:30
`mvn install` runs through all of the [build life cycle ](https://maven.apache.org/guides/introduction/introduction-to-the-lifecycle.html )
2020-04-08 14:13:33 +05:30
stages prior to `install` , including `test` . Running unit tests is not directly
necessary for the license scanning purposes and consumes time, so it's skipped
by having the default value of `MAVEN_CLI_OPTS` as `-DskipTests` . If you want
to supply custom `MAVEN_CLI_OPTS` and skip tests at the same time, don't forget
to explicitly add `-DskipTests` to your options.
If you still need to run tests during `mvn install` , add `-DskipTests=false` to
`MAVEN_CLI_OPTS` .
2023-06-20 00:43:36 +05:30
### Using private Maven repositories
2020-04-22 19:07:51 +05:30
If you have a private Maven repository which requires login credentials,
2021-03-11 19:13:27 +05:30
you can use the `MAVEN_CLI_OPTS` CI/CD variable.
2020-04-22 19:07:51 +05:30
2021-03-11 19:13:27 +05:30
Read more on [how to use private Maven repositories ](../../application_security/index.md#using-private-maven-repositories ).
2020-04-22 19:07:51 +05:30
You can also use `MAVEN_CLI_OPTS` to connect to a trusted Maven repository that uses a self-signed
or internally trusted certificate. For example:
```yaml
include:
2020-10-24 23:57:45 +05:30
- template: Security/License-Scanning.gitlab-ci.yml
2020-04-22 19:07:51 +05:30
license_scanning:
variables:
MAVEN_CLI_OPTS: -Dmaven.wagon.http.ssl.allowall=true -Dmaven.wagon.http.ssl.ignore.validity.dates=true -Dmaven.wagon.http.ssl.insecure=true
```
Alternatively, you can use a Java key store to verify the TLS connection. For instructions on how to
generate a key store file, see the
2022-05-07 20:08:51 +05:30
[Maven Guide to Remote repository access through authenticated HTTPS ](https://maven.apache.org/guides/mini/guide-repository-ssl.html ).
2020-04-22 19:07:51 +05:30
2023-06-20 00:43:36 +05:30
## Selecting the version of Java
2021-11-11 11:23:49 +05:30
License Compliance uses Java 8 by default. You can specify a different Java version using `LM_JAVA_VERSION` .
`LM_JAVA_VERSION` only accepts versions: 8, 11, 14, 15.
2023-06-20 00:43:36 +05:30
## Selecting the version of Python
2020-04-08 14:13:33 +05:30
2021-12-11 22:18:48 +05:30
> - [Introduced](https://gitlab.com/gitlab-org/security-products/license-management/-/merge_requests/36) in GitLab 12.0.
2020-06-23 00:09:42 +05:30
> - In [GitLab 12.2](https://gitlab.com/gitlab-org/gitlab/-/issues/12032), Python 3.5 became the default.
2020-04-08 14:13:33 +05:30
> - In [GitLab 12.7](https://gitlab.com/gitlab-org/security-products/license-management/-/merge_requests/101), Python 3.8 became the default.
License Compliance uses Python 3.8 and pip 19.1 by default.
If your project requires Python 2, you can switch to Python 2.7 and pip 10.0
2021-03-11 19:13:27 +05:30
by setting the `LM_PYTHON_VERSION` CI/CD variable to `2` .
2020-04-08 14:13:33 +05:30
```yaml
include:
2020-10-24 23:57:45 +05:30
- template: Security/License-Scanning.gitlab-ci.yml
2020-04-08 14:13:33 +05:30
license_scanning:
variables:
LM_PYTHON_VERSION: 2
```
2021-11-11 11:23:49 +05:30
`LM_PYTHON_VERSION` or `ASDF_PYTHON_VERSION` can be used to specify the desired version of Python. When both variables are specified `LM_PYTHON_VERSION` takes precedence.
2023-06-20 00:43:36 +05:30
## Custom root certificates for Python
2020-04-22 19:07:51 +05:30
You can supply a custom root certificate to complete TLS verification by using the
2021-09-04 01:27:46 +05:30
`ADDITIONAL_CA_CERT_BUNDLE` [CI/CD variable ](#available-cicd-variables ).
2020-04-22 19:07:51 +05:30
2023-06-20 00:43:36 +05:30
### Using private Python repositories
2020-05-24 23:13:21 +05:30
2021-09-04 01:27:46 +05:30
If you have a private Python repository you can use the `PIP_INDEX_URL` [CI/CD variable ](#available-cicd-variables )
2020-11-24 15:15:51 +05:30
to specify its location.
2020-05-24 23:13:21 +05:30
2023-06-20 00:43:36 +05:30
## Configuring npm projects
2020-05-24 23:13:21 +05:30
2021-03-11 19:13:27 +05:30
You can configure npm projects by using an [`.npmrc` ](https://docs.npmjs.com/configuring-npm/npmrc.html/ )
2020-05-24 23:13:21 +05:30
file.
2023-06-20 00:43:36 +05:30
### Using private npm registries
2020-05-24 23:13:21 +05:30
2021-03-11 19:13:27 +05:30
If you have a private npm registry you can use the
2021-02-22 17:27:13 +05:30
[`registry` ](https://docs.npmjs.com/using-npm/config/#registry )
2020-05-24 23:13:21 +05:30
setting to specify its location.
For example:
```plaintext
registry = https://npm.example.com
```
2023-06-20 00:43:36 +05:30
### Custom root certificates for npm
2020-05-24 23:13:21 +05:30
You can supply a custom root certificate to complete TLS verification by using the
2021-09-04 01:27:46 +05:30
`ADDITIONAL_CA_CERT_BUNDLE` [CI/CD variable ](#available-cicd-variables ).
2020-05-24 23:13:21 +05:30
2021-02-22 17:27:13 +05:30
To disable TLS verification you can provide the [`strict-ssl` ](https://docs.npmjs.com/using-npm/config/#strict-ssl )
2020-05-24 23:13:21 +05:30
setting.
For example:
```plaintext
strict-ssl = false
```
2023-06-20 00:43:36 +05:30
## Configuring Yarn projects
2020-05-24 23:13:21 +05:30
2020-10-24 23:57:45 +05:30
You can configure Yarn projects by using a [`.yarnrc.yml` ](https://yarnpkg.com/configuration/yarnrc/ )
2020-05-24 23:13:21 +05:30
file.
2023-06-20 00:43:36 +05:30
### Using private Yarn registries
2020-05-24 23:13:21 +05:30
If you have a private Yarn registry you can use the
2020-10-24 23:57:45 +05:30
[`npmRegistryServer` ](https://yarnpkg.com/configuration/yarnrc/#npmRegistryServer )
2020-05-24 23:13:21 +05:30
setting to specify its location.
For example:
2020-06-23 00:09:42 +05:30
```plaintext
2020-05-24 23:13:21 +05:30
npmRegistryServer: "https://npm.example.com"
```
2023-06-20 00:43:36 +05:30
### Custom root certificates for Yarn
2020-05-24 23:13:21 +05:30
You can supply a custom root certificate to complete TLS verification by using the
2021-09-04 01:27:46 +05:30
`ADDITIONAL_CA_CERT_BUNDLE` [CI/CD variable ](#available-cicd-variables ).
2020-05-24 23:13:21 +05:30
2023-06-20 00:43:36 +05:30
## Configuring Bower projects
2020-06-23 00:09:42 +05:30
You can configure Bower projects by using a [`.bowerrc` ](https://bower.io/docs/config/#bowerrc-specification )
file.
2023-06-20 00:43:36 +05:30
### Using private Bower registries
2020-06-23 00:09:42 +05:30
If you have a private Bower registry you can use the
[`registry` ](https://bower.io/docs/config/#bowerrc-specification )
setting to specify its location.
For example:
```plaintext
{
"registry": "https://registry.bower.io"
}
```
2023-06-20 00:43:36 +05:30
### Custom root certificates for Bower
2020-06-23 00:09:42 +05:30
You can supply a custom root certificate to complete TLS verification by using the
2021-09-04 01:27:46 +05:30
`ADDITIONAL_CA_CERT_BUNDLE` [CI/CD variable ](#available-cicd-variables ), or by
2020-06-23 00:09:42 +05:30
specifying a `ca` setting in a [`.bowerrc` ](https://bower.io/docs/config/#bowerrc-specification )
file.
2023-06-20 00:43:36 +05:30
## Configuring Bundler projects
2020-10-24 23:57:45 +05:30
2023-06-20 00:43:36 +05:30
### Using private Bundler registries
2020-07-28 23:09:34 +05:30
If you have a private Bundler registry you can use the
[`source` ](https://bundler.io/man/gemfile.5.html#GLOBAL-SOURCES )
setting to specify its location.
For example:
```plaintext
source "https://gems.example.com"
```
2023-06-20 00:43:36 +05:30
### Custom root certificates for Bundler
2020-07-28 23:09:34 +05:30
You can supply a custom root certificate to complete TLS verification by using the
2021-09-04 01:27:46 +05:30
`ADDITIONAL_CA_CERT_BUNDLE` [CI/CD variable ](#available-cicd-variables ), or by
2020-07-28 23:09:34 +05:30
specifying a [`BUNDLE_SSL_CA_CERT` ](https://bundler.io/v2.0/man/bundle-config.1.html )
2023-03-17 16:20:25 +05:30
[variable ](../../../ci/variables/index.md#define-a-cicd-variable-in-the-gitlab-ciyml-file )
2020-07-28 23:09:34 +05:30
in the job definition.
2023-06-20 00:43:36 +05:30
## Configuring Cargo projects
2020-10-24 23:57:45 +05:30
2023-06-20 00:43:36 +05:30
### Using private Cargo registries
2020-10-24 23:57:45 +05:30
If you have a private Cargo registry you can use the
[`registries` ](https://doc.rust-lang.org/cargo/reference/registries.html )
setting to specify its location.
For example:
```toml
[registries]
my-registry = { index = "https://my-intranet:8080/git/index" }
```
2023-06-20 00:43:36 +05:30
### Custom root certificates for Cargo
2020-10-24 23:57:45 +05:30
To supply a custom root certificate to complete TLS verification, do one of the following:
2021-09-04 01:27:46 +05:30
- Use the `ADDITIONAL_CA_CERT_BUNDLE` [CI/CD variable ](#available-cicd-variables ).
2020-10-24 23:57:45 +05:30
- Specify a [`CARGO_HTTP_CAINFO` ](https://doc.rust-lang.org/cargo/reference/environment-variables.html )
2023-03-17 16:20:25 +05:30
[variable ](../../../ci/variables/index.md#define-a-cicd-variable-in-the-gitlab-ciyml-file )
2020-10-24 23:57:45 +05:30
in the job definition.
2023-06-20 00:43:36 +05:30
## Configuring Composer projects
2020-10-24 23:57:45 +05:30
2023-06-20 00:43:36 +05:30
### Using private Composer registries
2020-10-24 23:57:45 +05:30
If you have a private Composer registry you can use the
[`repositories` ](https://getcomposer.org/doc/05-repositories.md )
setting to specify its location.
For example:
```json
{
"repositories": [
{ "packagist.org": false },
{
"type": "composer",
"url": "https://composer.example.com"
}
],
"require": {
"monolog/monolog": "1.0.*"
}
}
```
2023-06-20 00:43:36 +05:30
### Custom root certificates for Composer
2020-10-24 23:57:45 +05:30
You can supply a custom root certificate to complete TLS verification by using the
2021-09-04 01:27:46 +05:30
`ADDITIONAL_CA_CERT_BUNDLE` [CI/CD variable ](#available-cicd-variables ), or by
2020-10-24 23:57:45 +05:30
specifying a [`COMPOSER_CAFILE` ](https://getcomposer.org/doc/03-cli.md#composer-cafile )
2023-03-17 16:20:25 +05:30
[variable ](../../../ci/variables/index.md#define-a-cicd-variable-in-the-gitlab-ciyml-file )
2020-10-24 23:57:45 +05:30
in the job definition.
2023-06-20 00:43:36 +05:30
## Configuring Conan projects
2020-06-23 00:09:42 +05:30
You can configure [Conan ](https://conan.io/ ) projects by adding a `.conan` directory to your
project root. The project root serves as the [`CONAN_USER_HOME` ](https://docs.conan.io/en/latest/reference/env_vars.html#conan-user-home ).
Consult the [Conan ](https://docs.conan.io/en/latest/reference/config_files/conan.conf.html#conan-conf )
documentation for a list of settings that you can apply.
The `license_scanning` job runs in a [Debian 10 ](https://www.debian.org/releases/buster/ ) Docker
image. The supplied image ships with some build tools such as [CMake ](https://cmake.org/ ) and [GCC ](https://gcc.gnu.org/ ).
However, not all project types are supported by default. To install additional tools needed to
2021-09-30 23:02:18 +05:30
compile dependencies, use a [`before_script` ](../../../ci/yaml/index.md#before_script )
2020-06-23 00:09:42 +05:30
to install the necessary build tools using the [`apt` ](https://wiki.debian.org/PackageManagementTools )
package manager. For a comprehensive list, consult [the Conan documentation ](https://docs.conan.io/en/latest/introduction.html#all-platforms-all-build-systems-and-compilers ).
The default [Conan ](https://conan.io/ ) configuration sets [`CONAN_LOGIN_USERNAME` ](https://docs.conan.io/en/latest/reference/env_vars.html#conan-login-username-conan-login-username-remote-name )
to `ci_user` , and binds [`CONAN_PASSWORD` ](https://docs.conan.io/en/latest/reference/env_vars.html#conan-password-conan-password-remote-name )
to the [`CI_JOB_TOKEN` ](../../../ci/variables/predefined_variables.md )
2022-08-27 11:52:29 +05:30
for the running job. This allows Conan projects to fetch packages from a [GitLab Conan Repository ](../../packages/conan_repository/index.md#fetch-conan-package-information-from-the-package-registry )
2020-06-23 00:09:42 +05:30
if a GitLab remote is specified in the `.conan/remotes.json` file.
To override the default credentials specify a [`CONAN_LOGIN_USERNAME_{REMOTE_NAME}` ](https://docs.conan.io/en/latest/reference/env_vars.html#conan-login-username-conan-login-username-remote-name )
matching the name of the remote specified in the `.conan/remotes.json` file.
2021-02-22 17:27:13 +05:30
NOTE:
2020-06-23 00:09:42 +05:30
[MSBuild ](https://github.com/mono/msbuild#microsoftbuild-msbuild ) projects aren't supported. The
`license_scanning` image ships with [Mono ](https://www.mono-project.com/ ) and [MSBuild ](https://github.com/mono/msbuild#microsoftbuild-msbuild ).
Additional setup may be required to build packages for this project configuration.
2023-06-20 00:43:36 +05:30
### Using private Conan registries
2020-06-23 00:09:42 +05:30
By default, [Conan ](https://conan.io/ ) uses the `conan-center` remote. For example:
```json
{
"remotes": [
{
"name": "conan-center",
"url": "https://conan.bintray.com",
"verify_ssl": true
}
]
}
```
To fetch dependencies from an alternate remote, specify that remote in a `.conan/remotes.json` . For
example:
```json
{
"remotes": [
{
"name": "gitlab",
"url": "https://gitlab.com/api/v4/packages/conan",
"verify_ssl": true
}
]
}
```
2023-03-17 16:20:25 +05:30
If credentials are required to authenticate then you can configure a [protected CI/CD variable ](../../../ci/variables/index.md#protect-a-cicd-variable )
2020-06-23 00:09:42 +05:30
following the naming convention described in the [`CONAN_LOGIN_USERNAME` documentation ](https://docs.conan.io/en/latest/reference/env_vars.html#conan-login-username-conan-login-username-remote-name ).
2023-06-20 00:43:36 +05:30
### Custom root certificates for Conan
2020-06-23 00:09:42 +05:30
You can provide custom certificates by adding a `.conan/cacert.pem` file to the project root and
setting [`CA_CERT_PATH` ](https://docs.conan.io/en/latest/reference/env_vars.html#conan-cacert-path )
to `.conan/cacert.pem` .
2021-09-04 01:27:46 +05:30
If you specify the `ADDITIONAL_CA_CERT_BUNDLE` [CI/CD variable ](#available-cicd-variables ), this
2020-06-23 00:09:42 +05:30
variable's X.509 certificates are installed in the Docker image's default trust store and Conan is
configured to use this as the default `CA_CERT_PATH` .
2023-06-20 00:43:36 +05:30
## Configuring Go projects
2020-06-23 00:09:42 +05:30
To configure [Go modules ](https://github.com/golang/go/wiki/Modules )
2022-01-26 12:08:38 +05:30
based projects, specify [CI/CD variables ](https://pkg.go.dev/cmd/go#hdr-Environment_variables )
2021-09-04 01:27:46 +05:30
in the `license_scanning` job's [variables ](#available-cicd-variables ) section in `.gitlab-ci.yml` .
2020-06-23 00:09:42 +05:30
2022-01-26 12:08:38 +05:30
If a project has [vendored ](https://pkg.go.dev/cmd/go#hdr-Vendor_Directories ) its modules,
2020-06-23 00:09:42 +05:30
then the combination of the `vendor` directory and `mod.sum` file are used to detect the software
licenses associated with the Go module dependencies.
2023-06-20 00:43:36 +05:30
### Using private Go registries
2020-06-23 00:09:42 +05:30
2022-01-26 12:08:38 +05:30
You can use the [`GOPRIVATE` ](https://pkg.go.dev/cmd/go#hdr-Environment_variables )
and [`GOPROXY` ](https://pkg.go.dev/cmd/go#hdr-Environment_variables )
2020-06-23 00:09:42 +05:30
environment variables to control where modules are sourced from. Alternatively, you can use
2022-01-26 12:08:38 +05:30
[`go mod vendor` ](https://go.dev/ref/mod#tmp_28 ) to vendor a project's modules.
2020-06-23 00:09:42 +05:30
2023-06-20 00:43:36 +05:30
### Custom root certificates for Go
2020-06-23 00:09:42 +05:30
2022-01-26 12:08:38 +05:30
You can specify the [`-insecure` ](https://pkg.go.dev/cmd/go/internal/get ) flag by exporting the
[`GOFLAGS` ](https://pkg.go.dev/cmd/go#hdr-Environment_variables )
2020-06-23 00:09:42 +05:30
environment variable. For example:
```yaml
include:
2020-10-24 23:57:45 +05:30
- template: Security/License-Scanning.gitlab-ci.yml
2020-06-23 00:09:42 +05:30
license_scanning:
variables:
GOFLAGS: '-insecure'
```
2023-06-20 00:43:36 +05:30
### Using private NuGet registries
2020-07-28 23:09:34 +05:30
If you have a private NuGet registry you can add it as a source
2022-11-25 23:54:43 +05:30
by adding it to the [`packageSources` ](https://learn.microsoft.com/en-us/nuget/reference/nuget-config-file#package-source-sections )
section of a [`nuget.config` ](https://learn.microsoft.com/en-us/nuget/reference/nuget-config-file ) file.
2020-07-28 23:09:34 +05:30
For example:
```xml
<?xml version="1.0" encoding="utf-8"?>
< configuration >
< packageSources >
< clear / >
< add key = "custom" value = "https://nuget.example.com/v3/index.json" / >
< / packageSources >
< / configuration >
```
2023-06-20 00:43:36 +05:30
### Custom root certificates for NuGet
2020-07-28 23:09:34 +05:30
You can supply a custom root certificate to complete TLS verification by using the
2021-09-04 01:27:46 +05:30
`ADDITIONAL_CA_CERT_BUNDLE` [CI/CD variable ](#available-cicd-variables ).
2020-07-28 23:09:34 +05:30
2020-04-08 14:13:33 +05:30
### Migration from `license_management` to `license_scanning`
2021-09-04 01:27:46 +05:30
WARNING:
The `license_management` job was deprecated in GitLab 12.8. The `License-Management.gitlab-ci.yml` template was removed from GitLab 14.0.
2020-04-08 14:13:33 +05:30
In GitLab 12.8 a new name for `license_management` job was introduced. This change was made to improve clarity around the purpose of the scan, which is to scan and collect the types of licenses present in a projects dependencies.
2020-05-24 23:13:21 +05:30
GitLab 13.0 drops support for `license_management` .
2020-04-08 14:13:33 +05:30
If you're using a custom setup for License Compliance, you're required
2021-03-11 19:13:27 +05:30
to update your CI configuration accordingly:
2020-04-08 14:13:33 +05:30
1. Change the CI template to `License-Scanning.gitlab-ci.yml` .
1. Change the job name to `license_scanning` (if you mention it in `.gitlab-ci.yml` ).
2021-03-11 19:13:27 +05:30
1. Change the artifact name to `license_scanning` , and the filename to `gl-license-scanning-report.json` (if you mention it in `.gitlab-ci.yml` ).
2020-04-08 14:13:33 +05:30
For example, the following `.gitlab-ci.yml` :
```yaml
include:
- template: License-Management.gitlab-ci.yml
license_management:
artifacts:
reports:
license_management: gl-license-management-report.json
```
Should be changed to:
```yaml
include:
2020-10-24 23:57:45 +05:30
- template: Security/License-Scanning.gitlab-ci.yml
2020-04-08 14:13:33 +05:30
license_scanning:
artifacts:
reports:
license_scanning: gl-license-scanning-report.json
```
2020-05-24 23:13:21 +05:30
If you use the `license_management` artifact in GitLab 13.0 or later, the License Compliance job generates this error:
```plaintext
WARNING: Uploading artifacts to coordinator... failed id=:id responseStatus=400 Bad Request status=400 Bad Request token=:sha
FATAL: invalid_argument
```
If you encounter this error, follow the instructions described in this section.
2020-04-22 19:07:51 +05:30
## Running License Compliance in an offline environment
For self-managed GitLab instances in an environment with limited, restricted, or intermittent access
to external resources through the internet, some adjustments are required for the License Compliance job to
2020-05-24 23:13:21 +05:30
successfully run. For more information, see [Offline environments ](../../application_security/offline_deployments/index.md ).
2020-04-22 19:07:51 +05:30
### Requirements for offline License Compliance
To use License Compliance in an offline environment, you need:
2022-04-04 11:22:00 +05:30
- To meet the standard [License Compliance prerequisites ](#include-the-license-scanning-template ).
2020-04-22 19:07:51 +05:30
- Docker Container Registry with locally available copies of License Compliance [analyzer ](https://gitlab.com/gitlab-org/security-products/analyzers ) images.
2021-02-22 17:27:13 +05:30
NOTE:
2020-04-22 19:07:51 +05:30
GitLab Runner has a [default `pull policy` of `always` ](https://docs.gitlab.com/runner/executors/docker.html#using-the-always-pull-policy ),
2020-11-24 15:15:51 +05:30
meaning the runner tries to pull Docker images from the GitLab container registry even if a local
copy is available. The GitLab Runner [`pull_policy` can be set to `if-not-present` ](https://docs.gitlab.com/runner/executors/docker.html#using-the-if-not-present-pull-policy )
2020-04-22 19:07:51 +05:30
in an offline environment if you prefer using only locally available Docker images. However, we
2020-05-24 23:13:21 +05:30
recommend keeping the pull policy setting to `always` if not in an offline environment, as this
enables the use of updated scanners in your CI/CD pipelines.
2020-04-22 19:07:51 +05:30
### Make GitLab License Compliance analyzer images available inside your Docker registry
For License Compliance with all [supported languages and package managers ](#supported-languages-and-package-managers ),
import the following default License Compliance analyzer images from `registry.gitlab.com` to your
offline [local Docker container registry ](../../packages/container_registry/index.md ):
```plaintext
2022-05-07 20:08:51 +05:30
registry.gitlab.com/security-products/license-finder:latest
2020-04-22 19:07:51 +05:30
```
The process for importing Docker images into a local offline Docker registry depends on
2022-11-25 23:54:43 +05:30
**your network security policy**. Consult your IT staff to find an accepted and approved
2023-07-09 08:55:56 +05:30
process by which external resources can be imported or temporarily accessed. These scanners are [updated periodically ](../../application_security/index.md#vulnerability-scanner-maintenance )
2020-04-22 19:07:51 +05:30
with new definitions, so consider if you are able to make periodic updates yourself.
2023-03-04 22:38:38 +05:30
For details on saving and transporting Docker images as a file, see the Docker documentation on
2020-04-22 19:07:51 +05:30
[`docker save` ](https://docs.docker.com/engine/reference/commandline/save/ ), [`docker load` ](https://docs.docker.com/engine/reference/commandline/load/ ),
[`docker export` ](https://docs.docker.com/engine/reference/commandline/export/ ), and [`docker import` ](https://docs.docker.com/engine/reference/commandline/import/ ).
2021-03-11 19:13:27 +05:30
### Set License Compliance CI/CD variables to use local License Compliance analyzers
2020-04-22 19:07:51 +05:30
2020-05-24 23:13:21 +05:30
Add the following configuration to your `.gitlab-ci.yml` file. You must replace `image` to refer to
the License Compliance Docker image hosted on your local Docker container registry:
2020-04-22 19:07:51 +05:30
```yaml
include:
2020-10-24 23:57:45 +05:30
- template: Security/License-Scanning.gitlab-ci.yml
2020-04-22 19:07:51 +05:30
license_scanning:
image:
name: localhost:5000/analyzers/license-management:latest
```
The License Compliance job should now use local copies of the License Compliance analyzers to scan
your code and generate security reports, without requiring internet access.
2021-03-11 19:13:27 +05:30
Additional configuration may be needed for connecting to private registries for:
- [Bower ](#using-private-bower-registries ),
- [Bundler ](#using-private-bundler-registries ),
- [Conan ](#using-private-bower-registries ),
- [Go ](#using-private-go-registries ),
- [Maven repositories ](#using-private-maven-repositories ),
- [npm ](#using-private-npm-registries ),
- [Python repositories ](#using-private-python-repositories ),
- [Yarn ](#using-private-yarn-registries ).
2020-04-22 19:07:51 +05:30
2020-10-24 23:57:45 +05:30
### SPDX license list name matching
2021-12-11 22:18:48 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/212388) in GitLab 13.3.
2020-10-24 23:57:45 +05:30
2023-07-09 08:55:56 +05:30
Prior to GitLab 13.3, offline environments required an exact name match for [project policies ](../license_approval_policies.md ).
In GitLab 13.3 and later, GitLab matches the name of [project policies ](../license_approval_policies.md )
2020-10-24 23:57:45 +05:30
with identifiers from the [SPDX license list ](https://spdx.org/licenses/ ).
A local copy of the SPDX license list is distributed with the GitLab instance. If needed, the GitLab
instance's administrator can manually update it with a [Rake task ](../../../raketasks/spdx.md ).
2022-03-02 08:16:31 +05:30
## Warnings
We recommend that you use the most recent version of all containers, and the most recent supported version of all package managers and languages. Using previous versions carries an increased security risk because unsupported versions may no longer benefit from active security reporting and backporting of security fixes.
2020-06-23 00:09:42 +05:30
## Troubleshooting
2021-04-29 21:17:54 +05:30
### ASDF_PYTHON_VERSION does not automatically install the version
Defining a non-latest Python version in ASDF_PYTHON_VERSION [doesn't have it automatically installed ](https://gitlab.com/gitlab-org/gitlab/-/issues/325604 ). If your project requires a non-latest version of Python:
1. Define the required version by setting the `ASDF_PYTHON_VERSION` CI/CD variable.
1. Pass a custom script to the `SETUP_CMD` CI/CD variable to install the required version and dependencies.
2021-06-08 01:23:25 +05:30
For example:
2021-04-29 21:17:54 +05:30
```yaml
include:
- template: Security/License-Scanning.gitlab-ci.yml
license_scanning:
SETUP_CMD: ./setup.sh
ASDF_PYTHON_VERSION: "3.7.2"
before_script:
- echo "asdf install python 3.7.2 && pip install -r requirements.txt" > setup.sh
- chmod +x setup.sh
- apt-get -y update
- apt-get -y install build-essential libssl-dev zlib1g-dev libbz2-dev libreadline-dev libsqlite3-dev wget curl llvm libncurses5-dev libncursesw5-dev xz-utils tk-dev libffi-dev liblzma-dev python-openssl git
```
2020-06-23 00:09:42 +05:30
### `ERROR -- : asdf: No preset version installed for command`
This error occurs when the version of the tools used by your project
do not match the version of the pre-installed tools available in the
`license_scanning` Docker image. The `license_scanning` job uses
[asdf-vm ](https://asdf-vm.com/ ) to activate the appropriate version of
a tool that your project relies on. For example, if your project relies on a specific
version of [Node.js ](https://nodejs.org/ ) or any other supported tool you can
specify the desired version by adding a
[`.tool-versions` ](https://asdf-vm.com/#/core-configuration?id=tool-versions ) file to the project
or using the appropriate [`ASDF_<tool>_VERSION` ](https://asdf-vm.com/#/core-configuration?id=environment-variables ) environment variable to
activate the appropriate version.
2021-02-22 17:27:13 +05:30
For example, the following `.tool-versions` file activates version `12.16.3` of [Node.js ](https://nodejs.org/ )
2021-11-11 11:23:49 +05:30
and version `2.7.4` of [Ruby ](https://www.ruby-lang.org/ ).
2020-06-23 00:09:42 +05:30
```plaintext
nodejs 12.16.3
2021-11-11 11:23:49 +05:30
ruby 2.7.4
2020-06-23 00:09:42 +05:30
```
2021-03-11 19:13:27 +05:30
The next example shows how to activate the same versions of the tools mentioned above by using CI/CD variables defined in your
2020-06-23 00:09:42 +05:30
project's `.gitlab-ci.yml` file.
```yaml
include:
2020-10-24 23:57:45 +05:30
- template: Security/License-Scanning.gitlab-ci.yml
2020-06-23 00:09:42 +05:30
license_scanning:
variables:
ASDF_NODEJS_VERSION: '12.16.3'
2021-11-11 11:23:49 +05:30
ASDF_RUBY_VERSION: '2.7.4'
2020-06-23 00:09:42 +05:30
```
2021-09-04 01:27:46 +05:30
A full list of variables can be found in [CI/CD variables ](#available-cicd-variables ).
2020-06-23 00:09:42 +05:30
To find out what tools are pre-installed in the `license_scanning` Docker image use the following command:
```shell
2022-11-25 23:54:43 +05:30
$ docker run --entrypoint='' -ti --rm registry.gitlab.com/security-products/license-finder:4 \
/bin/bash -c 'dpkg -i /opt/toolcache/*.deb & & asdf list'
...
dotnet-core
3.1.302
elixir
1.10.4
2020-06-23 00:09:42 +05:30
golang
2022-11-25 23:54:43 +05:30
1.15.5
1.16.2
2020-06-23 00:09:42 +05:30
gradle
2022-11-25 23:54:43 +05:30
No versions installed
2020-06-23 00:09:42 +05:30
java
2022-11-25 23:54:43 +05:30
11
14
15
8
2020-06-23 00:09:42 +05:30
maven
2022-11-25 23:54:43 +05:30
No versions installed
2020-06-23 00:09:42 +05:30
nodejs
2022-11-25 23:54:43 +05:30
10.21.0
12.18.2
14.17.1
2020-06-23 00:09:42 +05:30
php
2022-11-25 23:54:43 +05:30
7.4.8
2020-06-23 00:09:42 +05:30
python
2.7.18
2022-11-25 23:54:43 +05:30
3.3.7
3.4.10
3.5.9
3.6.11
3.7.7
3.8.5
2020-06-23 00:09:42 +05:30
ruby
2022-11-25 23:54:43 +05:30
2.4.10
2.4.5
2.4.9
2.5.8
2.6.0
2.6.1
2.6.2
2.6.3
2.6.4
2.6.5
2020-06-23 00:09:42 +05:30
2.6.6
2022-11-25 23:54:43 +05:30
2.7.0
2.7.1
2.7.2
rust
1.45.0
2020-06-23 00:09:42 +05:30
```
2022-11-25 23:54:43 +05:30
It might take more than 10 minutes to run the command above.
This is because it installs every single tool version available in the Docker image.
2020-06-23 00:09:42 +05:30
To interact with the `license_scanning` runtime environment use the following command:
```shell
2022-07-16 23:28:13 +05:30
$ docker run -it --entrypoint='' registry.gitlab.com/security-products/license-finder:4 /bin/bash -l
2020-06-23 00:09:42 +05:30
root@6abb70e9f193:~#
```
2021-02-22 17:27:13 +05:30
NOTE:
2021-09-30 23:02:18 +05:30
Selecting a custom version of [Mono ](https://www.mono-project.com/ ) or [.NET Core ](https://dotnet.microsoft.com/download/dotnet ) is currently not supported.
2022-10-11 01:57:18 +05:30
### LicenseFinder::Maven: is not installed error
If your project contains a `mvnw` or `mvnw.cmd` file, then the license scanning job may fail with the `LicenseFinder::Maven: is not installed error` error. To resolve this, modify the license scanning job to remove the files in the `before_script` section. Example:
```yaml
include:
- template: License-Scanning.gitlab-ci.yml
license_scanning:
before_script:
- rm mvnw
- rm mvnw.cmd
```