debian-mirror-gitlab/doc/user/application_security/container_scanning/index.md

444 lines
24 KiB
Markdown
Raw Normal View History

2019-10-12 21:52:04 +05:30
---
type: reference, howto
2020-06-23 00:09:42 +05:30
stage: Defend
group: Container Security
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#designated-technical-writers
2019-10-12 21:52:04 +05:30
---
2019-09-30 21:07:59 +05:30
# Container Scanning **(ULTIMATE)**
2019-07-31 22:56:46 +05:30
2020-04-22 19:07:51 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/3672) in [GitLab Ultimate](https://about.gitlab.com/pricing/) 10.4.
2019-07-31 22:56:46 +05:30
2020-06-23 00:09:42 +05:30
Your application's Docker image may itself be based on Docker images that contain known
vulnerabilities. By including an extra job in your pipeline that scans for those vulnerabilities and
displays them in a merge request, you can use GitLab to audit your Docker-based apps.
By default, container scanning in GitLab is based on [Clair](https://github.com/quay/clair) and
[Klar](https://github.com/optiopay/klar), which are open-source tools for vulnerability static analysis in
containers. [GitLab's Klar analyzer](https://gitlab.com/gitlab-org/security-products/analyzers/klar/)
scans the containers and serves as a wrapper for Clair.
2019-07-31 22:56:46 +05:30
2020-06-23 00:09:42 +05:30
To integrate security scanners other than Clair and Klar into GitLab, see
[Security scanner integration](../../../development/integrations/secure.md).
2020-04-22 19:07:51 +05:30
2020-06-23 00:09:42 +05:30
You can enable container scanning by doing one of the following:
2020-04-22 19:07:51 +05:30
2020-06-23 00:09:42 +05:30
- [Include the CI job](#configuration) in your existing `.gitlab-ci.yml` file.
2020-11-24 15:15:51 +05:30
- Implicitly use [Auto Container Scanning](../../../topics/autodevops/stages.md#auto-container-scanning)
2020-06-23 00:09:42 +05:30
provided by [Auto DevOps](../../../topics/autodevops/index.md).
2019-07-31 22:56:46 +05:30
2020-06-23 00:09:42 +05:30
GitLab compares the found vulnerabilities between the source and target branches, and shows the
information directly in the merge request.
2019-07-31 22:56:46 +05:30
2020-07-28 23:09:34 +05:30
![Container Scanning Widget](img/container_scanning_v13_2.png)
2019-07-31 22:56:46 +05:30
2020-04-22 19:07:51 +05:30
<!-- NOTE: The container scanning tool references the following heading in the code, so if you
make a change to this heading, make sure to update the documentation URLs used in the
container scanning tool (https://gitlab.com/gitlab-org/security-products/analyzers/klar) -->
2020-04-08 14:13:33 +05:30
2019-07-31 22:56:46 +05:30
## Requirements
2020-11-24 15:15:51 +05:30
To enable container scanning in your pipeline, you need the following:
2020-06-23 00:09:42 +05:30
2020-11-24 15:15:51 +05:30
- [GitLab Runner](https://docs.gitlab.com/runner/) with the [`docker`](https://docs.gitlab.com/runner/executors/docker.html)
or [`kubernetes`](https://docs.gitlab.com/runner/install/kubernetes.html) executor.
- Docker `18.09.03` or higher installed on the same computer as the runner. If you're using the
shared runners on GitLab.com, then this is already the case.
2021-01-03 14:25:43 +05:30
- [Build and push](../../packages/container_registry/index.md#build-and-push-by-using-gitlab-cicd)
2020-06-23 00:09:42 +05:30
your Docker image to your project's container registry. The name of the Docker image should use
the following [predefined environment variables](../../../ci/variables/predefined_variables.md):
2019-07-31 22:56:46 +05:30
2020-05-24 23:13:21 +05:30
```plaintext
2019-07-31 22:56:46 +05:30
$CI_REGISTRY_IMAGE/$CI_COMMIT_REF_SLUG:$CI_COMMIT_SHA
```
2020-06-23 00:09:42 +05:30
You can use these directly in your `.gitlab-ci.yml` file:
2020-03-13 15:44:24 +05:30
```yaml
build:
2020-07-28 23:09:34 +05:30
image: docker:19.03.12
2020-03-13 15:44:24 +05:30
stage: build
services:
2020-07-28 23:09:34 +05:30
- docker:19.03.12-dind
2020-03-13 15:44:24 +05:30
variables:
2020-04-08 14:13:33 +05:30
IMAGE_TAG: $CI_REGISTRY_IMAGE/$CI_COMMIT_REF_SLUG:$CI_COMMIT_SHA
2020-03-13 15:44:24 +05:30
script:
2021-01-03 14:25:43 +05:30
- docker login -u "$CI_REGISTRY_USER" -p "$CI_REGISTRY_PASSWORD" $CI_REGISTRY
2020-03-13 15:44:24 +05:30
- docker build -t $IMAGE_TAG .
- docker push $IMAGE_TAG
```
2019-07-31 22:56:46 +05:30
2019-09-30 21:07:59 +05:30
## Configuration
2019-07-31 22:56:46 +05:30
2020-11-24 15:15:51 +05:30
How you enable container scanning depends on your GitLab version:
2019-07-31 22:56:46 +05:30
2020-06-23 00:09:42 +05:30
- GitLab 11.9 and later: [Include](../../../ci/yaml/README.md#includetemplate) the
[`Container-Scanning.gitlab-ci.yml` template](https://gitlab.com/gitlab-org/gitlab/blob/master/lib/gitlab/ci/templates/Security/Container-Scanning.gitlab-ci.yml)
that comes with your GitLab installation.
- GitLab versions earlier than 11.9: Copy and use the job from the
[`Container-Scanning.gitlab-ci.yml` template](https://gitlab.com/gitlab-org/gitlab/blob/master/lib/gitlab/ci/templates/Security/Container-Scanning.gitlab-ci.yml).
To include the `Container-Scanning.gitlab-ci.yml` template (GitLab 11.9 and later), add the
following to your `.gitlab-ci.yml` file:
2019-07-31 22:56:46 +05:30
```yaml
include:
2020-03-13 15:44:24 +05:30
- template: Container-Scanning.gitlab-ci.yml
2019-07-31 22:56:46 +05:30
```
2020-06-23 00:09:42 +05:30
The included template:
2019-07-31 22:56:46 +05:30
2020-06-23 00:09:42 +05:30
- Creates a `container_scanning` job in your CI/CD pipeline.
2020-11-24 15:15:51 +05:30
- Pulls the built Docker image from your project's [container registry](../../packages/container_registry/index.md)
2020-06-23 00:09:42 +05:30
(see [requirements](#requirements)) and scans it for possible vulnerabilities.
2019-07-31 22:56:46 +05:30
2020-06-23 00:09:42 +05:30
GitLab saves the results as a
2020-11-24 15:15:51 +05:30
[Container Scanning report artifact](../../../ci/pipelines/job_artifacts.md#artifactsreportscontainer_scanning)
2020-06-23 00:09:42 +05:30
that you can download and analyze later. When downloading, you always receive the most-recent
artifact.
2019-07-31 22:56:46 +05:30
2020-11-24 15:15:51 +05:30
The following is a sample `.gitlab-ci.yml` that builds your Docker image, pushes it to the container
registry, and scans the containers:
2019-12-04 20:38:33 +05:30
```yaml
variables:
DOCKER_DRIVER: overlay2
stages:
- build
- test
build:
image: docker:stable
stage: build
2020-06-23 00:09:42 +05:30
services:
2020-07-28 23:09:34 +05:30
- docker:19.03.12-dind
2019-12-04 20:38:33 +05:30
variables:
IMAGE: $CI_REGISTRY_IMAGE/$CI_COMMIT_REF_SLUG:$CI_COMMIT_SHA
script:
- docker info
2021-01-03 14:25:43 +05:30
- docker login -u "$CI_REGISTRY_USER" -p "$CI_REGISTRY_PASSWORD" $CI_REGISTRY
2019-12-04 20:38:33 +05:30
- docker build -t $IMAGE .
- docker push $IMAGE
2020-04-08 14:13:33 +05:30
include:
- template: Container-Scanning.gitlab-ci.yml
```
2019-12-04 20:38:33 +05:30
2020-11-24 15:15:51 +05:30
### Customizing the container scanning settings
2019-12-04 20:38:33 +05:30
2020-06-23 00:09:42 +05:30
There may be cases where you want to customize how GitLab scans your containers. For example, you
may want to enable more verbose output from Clair or Klar, access a Docker registry that requires
authentication, and more. To change such settings, use the [`variables`](../../../ci/yaml/README.md#variables)
parameter in your `.gitlab-ci.yml` to set [environment variables](#available-variables).
The environment variables you set in your `.gitlab-ci.yml` overwrite those in
`Container-Scanning.gitlab-ci.yml`.
2019-12-04 20:38:33 +05:30
2020-11-24 15:15:51 +05:30
This example [includes](../../../ci/yaml/README.md#include) the container scanning template and
2020-06-23 00:09:42 +05:30
enables verbose output from Clair by setting the `CLAIR_OUTPUT` environment variable to `High`:
2019-12-04 20:38:33 +05:30
```yaml
include:
2020-07-28 23:09:34 +05:30
- template: Container-Scanning.gitlab-ci.yml
2019-12-04 20:38:33 +05:30
2020-04-08 14:13:33 +05:30
variables:
CLAIR_OUTPUT: High
2019-12-04 20:38:33 +05:30
```
2019-07-31 22:56:46 +05:30
2020-04-22 19:07:51 +05:30
<!-- NOTE: The container scanning tool references the following heading in the code, so if you"
make a change to this heading, make sure to update the documentation URLs used in the"
container scanning tool (https://gitlab.com/gitlab-org/security-products/analyzers/klar)" -->
2019-12-21 20:55:43 +05:30
2020-04-08 14:13:33 +05:30
#### Available variables
2019-12-21 20:55:43 +05:30
2020-11-24 15:15:51 +05:30
You can [configure](#customizing-the-container-scanning-settings) container
scanning by using the following environment variables:
| Environment Variable | Default | Description |
| ------------------------------ | ------------- | ----------- |
| `ADDITIONAL_CA_CERT_BUNDLE` | `""` | Bundle of CA certs that you want to trust. |
| `CLAIR_DB_CONNECTION_STRING` | `postgresql://postgres:password@clair-vulnerabilities-db:5432/postgres?sslmode=disable&statement_timeout=60000` | This variable represents the [connection string](https://www.postgresql.org/docs/9.3/libpq-connect.html#AEN39692) to the [PostgreSQL server hosting the vulnerabilities definitions](https://hub.docker.com/r/arminc/clair-db) database and **shouldn't be changed** unless you're running the image locally as described in the [Running the standalone container scanning tool](#running-the-standalone-container-scanning-tool) section. The host value for the connection string must match the [alias](https://gitlab.com/gitlab-org/gitlab/-/blob/898c5da43504eba87b749625da50098d345b60d6/lib/gitlab/ci/templates/Security/Container-Scanning.gitlab-ci.yml#L23) value of the `Container-Scanning.gitlab-ci.yml` template file, which defaults to `clair-vulnerabilities-db`. |
| `CLAIR_DB_IMAGE` | `arminc/clair-db:latest` | The Docker image name and tag for the [PostgreSQL server hosting the vulnerabilities definitions](https://hub.docker.com/r/arminc/clair-db). It can be useful to override this value with a specific version, for example, to provide a consistent set of vulnerabilities for integration testing purposes, or to refer to a locally hosted vulnerabilities database for an on-premise offline installation. |
| `CLAIR_DB_IMAGE_TAG` | `latest` | (**DEPRECATED - use `CLAIR_DB_IMAGE` instead**) The Docker image tag for the [PostgreSQL server hosting the vulnerabilities definitions](https://hub.docker.com/r/arminc/clair-db). It can be useful to override this value with a specific version, for example, to provide a consistent set of vulnerabilities for integration testing purposes. |
| `CLAIR_OUTPUT` | `Unknown` | Severity level threshold. Vulnerabilities with severity level higher than or equal to this threshold are outputted. Supported levels are `Unknown`, `Negligible`, `Low`, `Medium`, `High`, `Critical` and `Defcon1`. |
| `CLAIR_TRACE` | `"false"` | Set to true to enable more verbose output from the clair server process. |
| `CLAIR_VULNERABILITIES_DB_URL` | `clair-vulnerabilities-db` | (**DEPRECATED - use `CLAIR_DB_CONNECTION_STRING` instead**) This variable is explicitly set in the [services section](https://gitlab.com/gitlab-org/gitlab/-/blob/898c5da43504eba87b749625da50098d345b60d6/lib/gitlab/ci/templates/Security/Container-Scanning.gitlab-ci.yml#L23) of the `Container-Scanning.gitlab-ci.yml` file and defaults to `clair-vulnerabilities-db`. This value represents the address that the [PostgreSQL server hosting the vulnerabilities definitions](https://hub.docker.com/r/arminc/clair-db) is running on and **shouldn't be changed** unless you're running the image locally as described in the [Running the standalone container scanning tool](#running-the-standalone-container-scanning-tool) section. |
| `CI_APPLICATION_REPOSITORY` | `$CI_REGISTRY_IMAGE/$CI_COMMIT_REF_SLUG` | Docker repository URL for the image to be scanned. |
| `CI_APPLICATION_TAG` | `$CI_COMMIT_SHA` | Docker repository tag for the image to be scanned. |
| `DOCKER_INSECURE` | `"false"` | Allow [Klar](https://github.com/optiopay/klar) to access secure Docker registries using HTTPS with bad (or self-signed) SSL certificates. |
| `DOCKER_PASSWORD` | `$CI_REGISTRY_PASSWORD` | Password for accessing a Docker registry requiring authentication. |
| `DOCKER_USER` | `$CI_REGISTRY_USER` | Username for accessing a Docker registry requiring authentication. |
| `DOCKERFILE_PATH` | `Dockerfile` | The path to the `Dockerfile` to be used for generating remediations. By default, the scanner looks for a file named `Dockerfile` in the root directory of the project, so this variable should only be configured if your `Dockerfile` is in a non-standard location, such as a subdirectory. See [Solutions for vulnerabilities](#solutions-for-vulnerabilities-auto-remediation) for more details. |
| `KLAR_TRACE` | `"false"` | Set to true to enable more verbose output from klar. |
| `REGISTRY_INSECURE` | `"false"` | Allow [Klar](https://github.com/optiopay/klar) to access insecure registries (HTTP only). Should only be set to `true` when testing the image locally. |
| `SECURE_ANALYZERS_PREFIX` | `"registry.gitlab.com/gitlab-org/security-products/analyzers"` | Set the Docker registry base address from which to download the analyzer. |
| `SECURE_LOG_LEVEL` | `info` | Set the minimum logging level. Messages of this logging level or higher are output. From highest to lowest severity, the logging levels are: `fatal`, `error`, `warn`, `info`, `debug`. [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/10880) in GitLab 13.1. |
### Overriding the container scanning template
2019-07-31 22:56:46 +05:30
2020-06-23 00:09:42 +05:30
If you want to override the job definition (for example, to change properties like `variables`), you
must declare a `container_scanning` job after the template inclusion, and then
specify any additional keys. For example:
2019-09-30 21:07:59 +05:30
2020-04-08 14:13:33 +05:30
```yaml
include:
2020-07-28 23:09:34 +05:30
- template: Container-Scanning.gitlab-ci.yml
2020-03-13 15:44:24 +05:30
2020-04-08 14:13:33 +05:30
container_scanning:
variables:
GIT_STRATEGY: fetch
```
2020-03-13 15:44:24 +05:30
2020-06-23 00:09:42 +05:30
CAUTION: **Deprecated:**
GitLab 13.0 and later doesn't support [`only` and `except`](../../../ci/yaml/README.md#onlyexcept-basic).
When overriding the template, you must use [`rules`](../../../ci/yaml/README.md#rules)
instead.
2020-07-28 23:09:34 +05:30
### Vulnerability allowlisting
2020-03-13 15:44:24 +05:30
2020-07-28 23:09:34 +05:30
To allowlist specific vulnerabilities, follow these steps:
2019-09-30 21:07:59 +05:30
2020-06-23 00:09:42 +05:30
1. Set `GIT_STRATEGY: fetch` in your `.gitlab-ci.yml` file by following the instructions in
2020-11-24 15:15:51 +05:30
[overriding the container scanning template](#overriding-the-container-scanning-template).
2020-07-28 23:09:34 +05:30
1. Define the allowlisted vulnerabilities in a YAML file named `vulnerability-allowlist.yml`. This must use
the format described in the [allowlist example file](https://gitlab.com/gitlab-org/security-products/analyzers/klar/-/raw/master/testdata/vulnerability-allowlist.yml).
1. Add the `vulnerability-allowlist.yml` file to your project's Git repository.
2019-09-30 21:07:59 +05:30
2020-11-24 15:15:51 +05:30
### Running container scanning in an offline environment
2020-04-22 19:07:51 +05:30
For self-managed GitLab instances in an environment with limited, restricted, or intermittent access
2020-11-24 15:15:51 +05:30
to external resources through the internet, some adjustments are required for the container scanning job to
2020-04-22 19:07:51 +05:30
successfully run. For more information, see [Offline environments](../offline_deployments/index.md).
2020-11-24 15:15:51 +05:30
#### Requirements for offline container Scanning
2020-04-22 19:07:51 +05:30
2020-11-24 15:15:51 +05:30
To use container scanning in an offline environment, you need:
2020-04-22 19:07:51 +05:30
- GitLab Runner with the [`docker` or `kubernetes` executor](#requirements).
2020-11-24 15:15:51 +05:30
- To configure a local Docker container registry with copies of the container scanning [analyzer](https://gitlab.com/gitlab-org/security-products/analyzers/klar) images, found in the [container scanning container registry](https://gitlab.com/gitlab-org/security-products/analyzers/klar/container_registry).
2020-04-22 19:07:51 +05:30
2021-01-03 14:25:43 +05:30
Note that GitLab Runner has a [default `pull policy` of `always`](https://docs.gitlab.com/runner/executors/docker.html#using-the-always-pull-policy),
2020-11-24 15:15:51 +05:30
meaning the runner tries to pull Docker images from the GitLab container registry even if a local
copy is available. The GitLab Runner [`pull_policy` can be set to `if-not-present`](https://docs.gitlab.com/runner/executors/docker.html#using-the-if-not-present-pull-policy)
2020-05-24 23:13:21 +05:30
in an offline environment if you prefer using only locally available Docker images. However, we
recommend keeping the pull policy setting to `always` if not in an offline environment, as this
enables the use of updated scanners in your CI/CD pipelines.
2019-12-26 22:10:19 +05:30
2021-01-03 14:25:43 +05:30
##### Support for Custom Certificate Authorities
Support for custom certificate authorities was introduced in the following versions:
| Analyzer | Version |
| -------- | ------- |
| `klar` | [v2.3.0](https://gitlab.com/gitlab-org/security-products/analyzers/klar/-/releases/v2.3.0) |
2020-11-24 15:15:51 +05:30
#### Make GitLab container scanning analyzer images available inside your Docker registry
2020-04-22 19:07:51 +05:30
2020-11-24 15:15:51 +05:30
For container scanning, import the following default images from `registry.gitlab.com` into your
2020-05-24 23:13:21 +05:30
[local Docker container registry](../../packages/container_registry/index.md):
2020-04-22 19:07:51 +05:30
2020-05-24 23:13:21 +05:30
```plaintext
registry.gitlab.com/gitlab-org/security-products/analyzers/klar
https://hub.docker.com/r/arminc/clair-db
```
2020-04-22 19:07:51 +05:30
The process for importing Docker images into a local offline Docker registry depends on
**your network security policy**. Please consult your IT staff to find an accepted and approved
2020-05-24 23:13:21 +05:30
process by which you can import or temporarily access external resources. Note that these scanners
are [updated periodically](../index.md#maintenance-and-update-of-the-vulnerabilities-database)
2020-04-22 19:07:51 +05:30
with new definitions, so consider if you are able to make periodic updates yourself.
2020-05-24 23:13:21 +05:30
For more information, see [the specific steps on how to update an image with a pipeline](#automating-container-scanning-vulnerability-database-updates-with-a-pipeline).
2020-04-22 19:07:51 +05:30
For details on saving and transporting Docker images as a file, see Docker's documentation on
[`docker save`](https://docs.docker.com/engine/reference/commandline/save/), [`docker load`](https://docs.docker.com/engine/reference/commandline/load/),
[`docker export`](https://docs.docker.com/engine/reference/commandline/export/), and [`docker import`](https://docs.docker.com/engine/reference/commandline/import/).
2020-11-24 15:15:51 +05:30
#### Set container scanning CI job variables to use local container scanner analyzers
2020-04-22 19:07:51 +05:30
2019-12-26 22:10:19 +05:30
1. [Override the container scanning template](#overriding-the-container-scanning-template) in your `.gitlab-ci.yml` file to refer to the Docker images hosted on your local Docker container registry:
```yaml
include:
- template: Container-Scanning.gitlab-ci.yml
container_scanning:
image: $CI_REGISTRY/namespace/gitlab-klar-analyzer
variables:
CLAIR_DB_IMAGE: $CI_REGISTRY/namespace/clair-vulnerabilities-db
```
2020-04-08 14:13:33 +05:30
1. If your local Docker container registry is running securely over `HTTPS`, but you're using a
2020-04-22 19:07:51 +05:30
self-signed certificate, then you must set `DOCKER_INSECURE: "true"` in the above
2020-04-08 14:13:33 +05:30
`container_scanning` section of your `.gitlab-ci.yml`.
2020-11-24 15:15:51 +05:30
#### Automating container scanning vulnerability database updates with a pipeline
2020-04-22 19:07:51 +05:30
It can be worthwhile to set up a [scheduled pipeline](../../../ci/pipelines/schedules.md) to
2020-11-24 15:15:51 +05:30
build a new version of the vulnerabilities database on a preset schedule. Automating
2020-04-22 19:07:51 +05:30
this with a pipeline means you won't have to do it manually each time. You can use the following
`.gitlab-yml.ci` as a template:
2019-12-26 22:10:19 +05:30
```yaml
image: docker:stable
stages:
- build
build_latest_vulnerabilities:
stage: build
2020-06-23 00:09:42 +05:30
services:
2020-07-28 23:09:34 +05:30
- docker:19.03.12-dind
2019-12-26 22:10:19 +05:30
script:
- docker pull arminc/clair-db:latest
- docker tag arminc/clair-db:latest $CI_REGISTRY/namespace/clair-vulnerabilities-db
2021-01-03 14:25:43 +05:30
- docker login -u "$CI_REGISTRY_USER" -p "$CI_REGISTRY_PASSWORD" $CI_REGISTRY
2019-12-26 22:10:19 +05:30
- docker push $CI_REGISTRY/namespace/clair-vulnerabilities-db
```
2020-10-24 23:57:45 +05:30
The above template works for a GitLab Docker registry running on a local installation, however, if you're using a non-GitLab Docker registry, you'll need to change the `$CI_REGISTRY` value and the `docker login` credentials to match the details of your local registry.
2019-12-26 22:10:19 +05:30
2020-11-24 15:15:51 +05:30
## Running the standalone container scanning tool
2020-04-08 14:13:33 +05:30
2020-11-24 15:15:51 +05:30
It's possible to run the [GitLab container scanning tool](https://gitlab.com/gitlab-org/security-products/analyzers/klar)
2020-04-08 14:13:33 +05:30
against a Docker container without needing to run it within the context of a CI job. To scan an
image directly, follow these steps:
1. Run [Docker Desktop](https://www.docker.com/products/docker-desktop) or [Docker Machine](https://github.com/docker/machine).
2020-04-22 19:07:51 +05:30
1. Run the latest [prefilled vulnerabilities database](https://hub.docker.com/repository/docker/arminc/clair-db) Docker image:
2020-04-08 14:13:33 +05:30
```shell
docker run -p 5432:5432 -d --name clair-db arminc/clair-db:latest
```
1. Configure an environment variable to point to your local machine's IP address (or insert your IP address instead of the `LOCAL_MACHINE_IP_ADDRESS` variable in the `CLAIR_DB_CONNECTION_STRING` in the next step):
```shell
export LOCAL_MACHINE_IP_ADDRESS=your.local.ip.address
```
1. Run the analyzer's Docker image, passing the image and tag you want to analyze in the `CI_APPLICATION_REPOSITORY` and `CI_APPLICATION_TAG` environment variables:
```shell
docker run \
--interactive --rm \
--volume "$PWD":/tmp/app \
-e CI_PROJECT_DIR=/tmp/app \
-e CLAIR_DB_CONNECTION_STRING="postgresql://postgres:password@${LOCAL_MACHINE_IP_ADDRESS}:5432/postgres?sslmode=disable&statement_timeout=60000" \
-e CI_APPLICATION_REPOSITORY=registry.gitlab.com/gitlab-org/security-products/dast/webgoat-8.0@sha256 \
-e CI_APPLICATION_TAG=bc09fe2e0721dfaeee79364115aeedf2174cce0947b9ae5fe7c33312ee019a4e \
registry.gitlab.com/gitlab-org/security-products/analyzers/klar
```
The results are stored in `gl-container-scanning-report.json`.
2020-01-01 13:55:28 +05:30
## Reports JSON format
2020-11-24 15:15:51 +05:30
The container scanning tool emits a JSON report file. For more information, see the
2020-06-23 00:09:42 +05:30
[schema for this report](https://gitlab.com/gitlab-org/security-products/security-report-schemas/-/blob/master/dist/container-scanning-report-format.json).
2020-01-01 13:55:28 +05:30
2020-11-24 15:15:51 +05:30
Here's an example container scanning report:
2020-01-01 13:55:28 +05:30
```json-doc
{
"version": "2.3",
"vulnerabilities": [
{
2020-04-22 19:07:51 +05:30
"id": "ac0997ad-1006-4c81-81fb-ee2bbe6e78e3",
2020-01-01 13:55:28 +05:30
"category": "container_scanning",
"message": "CVE-2019-3462 in apt",
"description": "Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.",
"severity": "High",
"confidence": "Unknown",
"solution": "Upgrade apt from 1.4.8 to 1.4.9",
"scanner": {
"id": "klar",
"name": "klar"
},
"location": {
"dependency": {
"package": {
"name": "apt"
},
"version": "1.4.8"
},
"operating_system": "debian:9",
"image": "registry.gitlab.com/gitlab-org/security-products/dast/webgoat-8.0@sha256:bc09fe2e0721dfaeee79364115aeedf2174cce0947b9ae5fe7c33312ee019a4e"
},
"identifiers": [
{
"type": "cve",
"name": "CVE-2019-3462",
"value": "CVE-2019-3462",
"url": "https://security-tracker.debian.org/tracker/CVE-2019-3462"
}
],
"links": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2019-3462"
}
]
}
],
"remediations": [
2020-03-13 15:44:24 +05:30
{
"fixes": [
{
2020-04-22 19:07:51 +05:30
"id": "c0997ad-1006-4c81-81fb-ee2bbe6e78e3"
2020-03-13 15:44:24 +05:30
}
],
"summary": "Upgrade apt from 1.4.8 to 1.4.9",
"diff": "YXB0LWdldCB1cGRhdGUgJiYgYXB0LWdldCB1cGdyYWRlIC15IGFwdA=="
}
2020-01-01 13:55:28 +05:30
]
}
```
2020-04-08 14:13:33 +05:30
## Security Dashboard
The [Security Dashboard](../security_dashboard/index.md) shows you an overview of all
the security vulnerabilities in your groups, projects and pipelines.
## Vulnerabilities database update
For more information about the vulnerabilities database update, check the
[maintenance table](../index.md#maintenance-and-update-of-the-vulnerabilities-database).
## Interacting with the vulnerabilities
2020-11-24 15:15:51 +05:30
After a vulnerability is found, you can [interact with it](../index.md#interacting-with-the-vulnerabilities).
2020-04-08 14:13:33 +05:30
## Solutions for vulnerabilities (auto-remediation)
Some vulnerabilities can be fixed by applying the solution that GitLab
automatically generates.
To enable remediation support, the scanning tool _must_ have access to the `Dockerfile` specified by
2020-04-22 19:07:51 +05:30
the [`DOCKERFILE_PATH`](#available-variables) environment variable. To ensure that the scanning tool
has access to this
2020-04-08 14:13:33 +05:30
file, it's necessary to set [`GIT_STRATEGY: fetch`](../../../ci/yaml/README.md#git-strategy) in
your `.gitlab-ci.yml` file by following the instructions described in this document's
2020-11-24 15:15:51 +05:30
[overriding the container scanning template](#overriding-the-container-scanning-template) section.
2020-04-08 14:13:33 +05:30
Read more about the [solutions for vulnerabilities](../index.md#solutions-for-vulnerabilities-auto-remediation).
2019-09-30 21:07:59 +05:30
## Troubleshooting
2020-06-23 00:09:42 +05:30
### `docker: Error response from daemon: failed to copy xattrs`
2019-09-30 21:07:59 +05:30
2020-11-24 15:15:51 +05:30
When the runner uses the `docker` executor and NFS is used
(for example, `/var/lib/docker` is on an NFS mount), container scanning might fail with
2019-09-30 21:07:59 +05:30
an error like the following:
2020-05-24 23:13:21 +05:30
```plaintext
2019-09-30 21:07:59 +05:30
docker: Error response from daemon: failed to copy xattrs: failed to set xattr "security.selinux" on /path/to/file: operation not supported.
```
This is a result of a bug in Docker which is now [fixed](https://github.com/containerd/continuity/pull/138 "fs: add WithAllowXAttrErrors CopyOpt").
2020-11-24 15:15:51 +05:30
To prevent the error, ensure the Docker version that the runner is using is
2019-09-30 21:07:59 +05:30
`18.09.03` or higher. For more information, see
2020-06-23 00:09:42 +05:30
[issue #10241](https://gitlab.com/gitlab-org/gitlab/-/issues/10241 "Investigate why Container Scanning is not working with NFS mounts").
2021-01-03 14:25:43 +05:30
### Getting warning message `gl-container-scanning-report.json: no matching files`
For information on this, see the [general Application Security troubleshooting section](../../../ci/pipelines/job_artifacts.md#error-message-no-files-to-upload).