2020-05-24 23:13:21 +05:30
---
2020-06-23 00:09:42 +05:30
stage: Secure
group: Static Analysis
2021-02-22 17:27:13 +05:30
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#assignments
2020-05-24 23:13:21 +05:30
---
2021-04-17 20:07:23 +05:30
# Secret Detection **(FREE)**
2020-05-24 23:13:21 +05:30
2022-03-02 08:16:31 +05:30
> [Moved](https://gitlab.com/gitlab-org/gitlab/-/issues/222788) from GitLab Ultimate to GitLab Free in 13.3.
2020-05-24 23:13:21 +05:30
2022-03-02 08:16:31 +05:30
A recurring problem when developing applications is that people may accidentally commit secrets to
their remote Git repositories. Secrets include keys, passwords, API tokens, and other sensitive
information. Anyone with access to the repository could use the secrets for malicious purposes.
Secrets exposed in this way must be treated as compromised, and be replaced, which can be costly.
It's important to prevent secrets from being committed to a Git repository.
2020-05-24 23:13:21 +05:30
2022-03-02 08:16:31 +05:30
Secret Detection uses the [Gitleaks ](https://github.com/zricethezav/gitleaks ) tool to scan the
repository for secrets. All identified secrets are reported in the:
2020-05-24 23:13:21 +05:30
2022-03-02 08:16:31 +05:30
- Merge request widget
2020-05-24 23:13:21 +05:30
- Pipelines' **Security** tab
2022-03-02 08:16:31 +05:30
- [Security Dashboard ](../security_dashboard/ )
2020-05-24 23:13:21 +05:30
2020-07-28 23:09:34 +05:30
![Secret Detection in merge request widget ](img/secret_detection_v13_2.png )
2020-05-24 23:13:21 +05:30
2022-03-02 08:16:31 +05:30
WARNING:
Secret Detection does not support scanning binary files.
2021-01-29 00:20:46 +05:30
2022-03-02 08:16:31 +05:30
## Detected secrets
2021-01-29 00:20:46 +05:30
2022-03-02 08:16:31 +05:30
Secret Detection uses a [default ruleset ](https://gitlab.com/gitlab-org/security-products/analyzers/secrets/-/blob/master/gitleaks.toml )
containing more than 90 secret detection patterns. You can also customize the secret detection
patterns using [custom rulesets ](#custom-rulesets ). If you want to contribute rulesets for
"well-identifiable" secrets, follow the steps detailed in the
[community contributions guidelines ](https://gitlab.com/gitlab-org/gitlab/-/issues/345453 ).
2021-09-04 01:27:46 +05:30
2020-06-23 00:09:42 +05:30
## Requirements
To run Secret Detection jobs, by default, you need GitLab Runner with the
[`docker` ](https://docs.gitlab.com/runner/executors/docker.html ) or
[`kubernetes` ](https://docs.gitlab.com/runner/install/kubernetes.html ) executor.
2020-11-24 15:15:51 +05:30
If you're using the shared runners on GitLab.com, this is enabled by default.
2020-06-23 00:09:42 +05:30
2021-02-22 17:27:13 +05:30
WARNING:
2022-05-07 20:08:51 +05:30
Our Secret Detection jobs expect a Linux/amd64 container type. Windows containers are not supported.
2020-06-23 00:09:42 +05:30
2021-02-22 17:27:13 +05:30
WARNING:
2020-11-24 15:15:51 +05:30
If you use your own runners, make sure the Docker version installed
2020-06-23 00:09:42 +05:30
is **not** `19.03.0` . See [troubleshooting information ](../sast#error-response-from-daemon-error-processing-tar-file-docker-tar-relocation-error ) for details.
2020-10-24 23:57:45 +05:30
### Making Secret Detection available to all GitLab tiers
To make Secret Detection available to as many customers as possible, we have enabled it for all GitLab tiers.
However not all features are available on every tier. See the breakdown below for more details.
#### Summary of features per tier
Different features are available in different [GitLab tiers ](https://about.gitlab.com/pricing/ ),
as shown in the following table:
2021-11-11 11:23:49 +05:30
| Capability | In Free & Premium | In Ultimate |
2021-03-11 19:13:27 +05:30
|:----------------------------------------------------------------|:--------------------|:-------------------|
2022-06-21 17:19:12 +05:30
| [Configure Secret Detection scanner ](#configuration ) | ** {check-circle}** | ** {check-circle}** |
| [Customize Secret Detection settings ](#customizing-settings ) | ** {check-circle}** | ** {check-circle}** |
| Download [JSON Report ](../sast/index.md#reports-json-format ) | ** {check-circle}** | ** {check-circle}** |
| See new findings in the merge request widget | ** {dotted-circle}** | ** {check-circle}** |
2021-11-11 11:23:49 +05:30
| View identified secrets in the pipelines' **Security** tab | ** {dotted-circle}** | ** {check-circle}** |
2022-06-21 17:19:12 +05:30
| [Manage vulnerabilities ](../vulnerabilities/index.md ) | ** {dotted-circle}** | ** {check-circle}** |
| [Access the Security Dashboard ](../security_dashboard/index.md ) | ** {dotted-circle}** | ** {check-circle}** |
| [Customize Secret Detection rulesets ](#custom-rulesets ) | ** {dotted-circle}** | ** {check-circle}** |
2020-10-24 23:57:45 +05:30
2020-05-24 23:13:21 +05:30
## Configuration
2021-09-04 01:27:46 +05:30
> - In GitLab 13.1, Secret Detection was split from the [SAST configuration](../sast#configuration) into its own CI/CD template. If you're using GitLab 13.0 or earlier and SAST is enabled, then Secret Detection is already enabled.
> - [In GitLab 14.0](https://gitlab.com/gitlab-org/gitlab/-/issues/297269), Secret Detection jobs `secret_detection_default_branch` and `secret_detection` were consolidated into one job, `secret_detection`.
2020-05-24 23:13:21 +05:30
2020-06-23 00:09:42 +05:30
Secret Detection is performed by a [specific analyzer ](https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/ci/templates/Security/Secret-Detection.gitlab-ci.yml )
2021-01-03 14:25:43 +05:30
during the `secret-detection` job. It runs regardless of your app's programming language.
2020-05-24 23:13:21 +05:30
2021-04-17 20:07:23 +05:30
The Secret Detection analyzer includes [Gitleaks ](https://github.com/zricethezav/gitleaks ) checks.
2020-05-24 23:13:21 +05:30
2021-01-03 14:25:43 +05:30
Note that the Secret Detection analyzer ignores Password-in-URL vulnerabilities if the password
begins with a dollar sign (`$`), as this likely indicates the password is an environment variable.
For example, `https://username:$password@example.com/path/to/repo` isn't detected, while
`https://username:password@example.com/path/to/repo` is.
2020-05-24 23:13:21 +05:30
2021-02-22 17:27:13 +05:30
NOTE:
2021-01-03 14:25:43 +05:30
You don't have to configure Secret Detection manually as shown in this section if you're using
2021-04-17 20:07:23 +05:30
[Auto Secret Detection ](../../../topics/autodevops/stages.md#auto-secret-detection ),
2020-06-23 00:09:42 +05:30
provided by [Auto DevOps ](../../../topics/autodevops/index.md ).
2021-01-03 14:25:43 +05:30
To enable Secret Detection for GitLab 13.1 and later, you must include the
`Secret-Detection.gitlab-ci.yml` template that's provided as a part of your GitLab installation. For
GitLab versions earlier than 11.9, you can copy and use the job as defined in that template.
2020-06-23 00:09:42 +05:30
2021-06-08 01:23:25 +05:30
Ensure your `.gitlab-ci.yml` file has a `stage` called `test` , and add the following to your `.gitlab-ci.yml` file:
2020-06-23 00:09:42 +05:30
```yaml
include:
2021-02-22 17:27:13 +05:30
- template: Security/Secret-Detection.gitlab-ci.yml
2020-06-23 00:09:42 +05:30
```
The included template creates Secret Detection jobs in your CI/CD pipeline and scans
your project's source code for secrets.
The results are saved as a
2022-01-26 12:08:38 +05:30
[Secret Detection report artifact ](../../../ci/yaml/artifacts_reports.md#artifactsreportssecret_detection )
2020-06-23 00:09:42 +05:30
that you can later download and analyze. Due to implementation limitations, we
always take the latest Secret Detection artifact available.
2022-06-21 17:19:12 +05:30
### Supported distributions
The default scanner images are build off a base Alpine image for size and maintainability.
#### FIPS-enabled images
> [Introduced](https://gitlab.com/groups/gitlab-org/-/epics/6479) in GitLab 14.10.
GitLab offers [Red Hat UBI ](https://www.redhat.com/en/blog/introducing-red-hat-universal-base-image )
versions of the images that are FIPS-enabled. To use the FIPS-enabled images, you can either:
- Set the `SAST_IMAGE_SUFFIX` to `-fips` .
- Add the `-fips` extension to the default image name.
For example:
```yaml
variables:
SECRET_DETECTION_IMAGE_SUFFIX: '-fips'
include:
- template: Security/Secret-Detection.gitlab-ci.yml
```
2021-12-11 22:18:48 +05:30
### Enable Secret Detection via an automatic merge request
2021-06-08 01:23:25 +05:30
2021-12-11 22:18:48 +05:30
> - [Introduced](https://gitlab.com/groups/gitlab-org/-/epics/4496) in GitLab 13.11, deployed behind a feature flag, enabled by default.
2021-09-30 23:02:18 +05:30
> - [Feature flag removed](https://gitlab.com/gitlab-org/gitlab/-/issues/329886) in GitLab 14.1.
2021-06-08 01:23:25 +05:30
2022-06-21 17:19:12 +05:30
NOTE:
This method works best with no existing `.gitlab-ci.yml` file, or with a minimal configuration
file. If you have a complex GitLab configuration file it may not be parsed successfully, and an
error may occur.
2021-06-08 01:23:25 +05:30
2022-06-21 17:19:12 +05:30
To enable Secret Detection in a project, you can create a merge request:
2021-06-08 01:23:25 +05:30
2022-06-21 17:19:12 +05:30
1. On the top bar, select **Menu > Projects** and find your project.
1. On the left sidebar, select **Security & Compliance > Configuration** .
1. In the **Secret Detection** row, select **Configure with a merge request** .
1. Review and merge the merge request to enable Secret Detection.
2021-11-18 22:05:49 +05:30
2022-06-21 17:19:12 +05:30
Pipelines now include a Secret Detection job.
2021-06-08 01:23:25 +05:30
2020-06-23 00:09:42 +05:30
### Customizing settings
2021-09-04 01:27:46 +05:30
The Secret Detection scan settings can be changed through [CI/CD variables ](#available-cicd-variables )
2020-06-23 00:09:42 +05:30
by using the
2021-09-30 23:02:18 +05:30
[`variables` ](../../../ci/yaml/index.md#variables ) parameter in `.gitlab-ci.yml` .
2020-06-23 00:09:42 +05:30
2022-08-13 15:12:31 +05:30
WARNING:
All customization of GitLab security scanning tools should be tested in a merge request before
merging these changes to the default branch. Failure to do so can give unexpected results,
including a large number of false positives.
2020-06-23 00:09:42 +05:30
To override a job definition, (for example, change properties like `variables` or `dependencies` ),
2021-12-11 22:18:48 +05:30
declare a job with the same name as the secret detection job to override. Place this new job after the template
2020-06-23 00:09:42 +05:30
inclusion and specify any additional keys under it.
2021-03-11 19:13:27 +05:30
WARNING:
2021-09-30 23:02:18 +05:30
Beginning in GitLab 13.0, the use of [`only` and `except` ](../../../ci/yaml/index.md#only--except )
is no longer supported. When overriding the template, you must use [`rules` ](../../../ci/yaml/index.md#rules ) instead.
2021-03-11 19:13:27 +05:30
2021-11-18 22:05:49 +05:30
#### `GIT_DEPTH` variable
2021-03-11 19:13:27 +05:30
2021-09-04 01:27:46 +05:30
The [`GIT_DEPTH` CI/CD variable ](../../../ci/runners/configure_runners.md#shallow-cloning ) affects Secret Detection.
2021-03-11 19:13:27 +05:30
The Secret Detection analyzer relies on generating patches between commits to scan content for
secrets. If you override the default, ensure the value is greater than 1. If the number of commits
2021-11-18 22:05:49 +05:30
in an MR is greater than the `GIT_DEPTH` value, Secret Detection will [fail to detect secrets ](#error-couldnt-run-the-gitleaks-command-exit-status-2 ).
2021-03-11 19:13:27 +05:30
#### Custom settings example
2020-06-23 00:09:42 +05:30
In the following example, we include the Secret Detection template and at the same time we
2021-03-11 19:13:27 +05:30
override the `secret_detection` job with the `SECRET_DETECTION_HISTORIC_SCAN` CI/CD variable to `true` :
2020-06-23 00:09:42 +05:30
```yaml
include:
2021-02-22 17:27:13 +05:30
- template: Security/Secret-Detection.gitlab-ci.yml
2020-06-23 00:09:42 +05:30
2020-07-28 23:09:34 +05:30
secret_detection:
2020-06-23 00:09:42 +05:30
variables:
2020-07-28 23:09:34 +05:30
SECRET_DETECTION_HISTORIC_SCAN: "true"
2020-06-23 00:09:42 +05:30
```
2021-09-30 23:02:18 +05:30
Because the template is [evaluated before ](../../../ci/yaml/index.md#include )
2020-06-23 00:09:42 +05:30
the pipeline configuration, the last mention of the variable takes precedence.
2021-09-04 01:27:46 +05:30
#### Available CI/CD variables
2020-06-23 00:09:42 +05:30
2021-03-11 19:13:27 +05:30
Secret Detection can be customized by defining available CI/CD variables:
2020-06-23 00:09:42 +05:30
2021-03-11 19:13:27 +05:30
| CI/CD variable | Default value | Description |
|-----------------------------------|---------------|-------------|
| `SECRET_DETECTION_EXCLUDED_PATHS` | "" | Exclude vulnerabilities from output based on the paths. This is a comma-separated list of patterns. Patterns can be globs, or file or folder paths (for example, `doc,spec` ). Parent directories also match patterns. [Introduced ](https://gitlab.com/gitlab-org/gitlab/-/issues/225273 ) in GitLab 13.3. |
| `SECRET_DETECTION_HISTORIC_SCAN` | false | Flag to enable a historic Gitleaks scan. |
2022-07-23 23:45:48 +05:30
| `SECRET_DETECTION_IMAGE_SUFFIX` | "" | Suffix added to the image name. If set to `-fips` , `FIPS-enabled` images are used for scan. See [FIPS-enabled images ](#fips-enabled-images ) for more details. [Introduced ](https://gitlab.com/gitlab-org/gitlab/-/issues/355519 ) in GitLab 14.10. |
| `SECRET_DETECTION_LOG_OPTIONS` | "" | [`git log` ](https://git-scm.com/docs/git-log ) options used to define commit ranges. [Introduced ](https://gitlab.com/gitlab-org/gitlab/-/issues/350660 ) in GitLab 15.1.|
2020-06-23 00:09:42 +05:30
2022-07-16 23:28:13 +05:30
In previous GitLab versions, the following variables were also available:
| CI/CD variable | Default value | Description |
|-----------------------------------|---------------|-------------|
| `SECRET_DETECTION_COMMIT_FROM` | - | The commit a Gitleaks scan starts at. [Removed ](https://gitlab.com/gitlab-org/gitlab/-/issues/243564 ) in GitLab 13.5. Replaced with `SECRET_DETECTION_COMMITS` . |
| `SECRET_DETECTION_COMMIT_TO` | - | The commit a Gitleaks scan ends at. [Removed ](https://gitlab.com/gitlab-org/gitlab/-/issues/243564 ) in GitLab 13.5. Replaced with `SECRET_DETECTION_COMMITS` . |
| `SECRET_DETECTION_COMMITS` | - | The list of commits that Gitleaks should scan. [Introduced ](https://gitlab.com/gitlab-org/gitlab/-/issues/243564 ) in GitLab 13.5. [Removed ](https://gitlab.com/gitlab-org/gitlab/-/issues/352565 ) in GitLab 15.0. |
2021-01-29 00:20:46 +05:30
### Custom rulesets **(ULTIMATE)**
2021-01-03 14:25:43 +05:30
2022-01-26 12:08:38 +05:30
> - [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/211387) in GitLab 13.5.
> - [Added](https://gitlab.com/gitlab-org/gitlab/-/issues/339614) support for
> passthrough chains. Expanded to include additional passthrough types of `file`, `git`, and `url` in GitLab 14.6.
2022-04-04 11:22:00 +05:30
> - [Added](https://gitlab.com/gitlab-org/gitlab/-/issues/235359) support for overriding rules in GitLab 14.8.
2021-01-03 14:25:43 +05:30
You can customize the default secret detection rules provided with GitLab.
2022-04-04 11:22:00 +05:30
Ruleset customization supports the following capabilities that can be used
simultaneously:
- [Disabling predefined rules ](index.md#disable-predefined-analyzer-rules ).
- [Overriding predefined rules ](index.md#override-predefined-analyzer-rules ).
2022-07-23 23:45:48 +05:30
- Modifying the default behavior of the Secret Detection analyzer by [synthesizing and passing a custom configuration ](index.md#synthesize-a-custom-configuration ).
2022-04-04 11:22:00 +05:30
2022-01-26 12:08:38 +05:30
Customization allows replacing the default secret detection rules with rules that you define.
2021-01-03 14:25:43 +05:30
To create a custom ruleset:
1. Create a `.gitlab` directory at the root of your project, if one doesn't already exist.
1. Create a custom ruleset file named `secret-detection-ruleset.toml` in the `.gitlab` directory.
2022-04-04 11:22:00 +05:30
#### Disable predefined analyzer rules
To disable analyzer rules:
1. Set the `disabled` flag to `true` in the context of a `ruleset` section.
1. In one or more `ruleset.identifier` subsections, list the rules that you want disabled. Every `ruleset.identifier` section has:
- a `type` field, to name the predefined rule identifier.
- a `value` field, to name the rule to be disabled.
##### Example: Disable predefined rules of Secret Detection analyzer
In the following example, the disabled rules is assigned to `secrets`
by matching the `type` and `value` of identifiers:
```toml
[secrets]
[[secrets.ruleset]]
disable = true
[secrets.ruleset.identifier]
type = "gitleaks_rule_id"
value = "RSA private key"
```
#### Override predefined analyzer rules
To override rules:
1. In one or more `ruleset.identifier` subsections, list the rules that you want to override. Every `ruleset.identifier` section has:
- a `type` field, to name the predefined rule identifier that the Secret Detection analyzer uses.
- a `value` field, to name the rule to be overridden.
1. In the `ruleset.override` context of a `ruleset` section,
provide the keys to override. Any combination of keys can be
overridden. Valid keys are:
- description
- message
- name
- severity (valid options are: Critical, High, Medium, Low, Unknown, Info)
##### Example: Override predefined rules of Secret Detection analyzer
In the following example, rules
are matched by the `type` and `value` of identifiers and
then overridden:
```toml
[secrets]
[[secrets.ruleset]]
[secrets.ruleset.identifier]
type = "gitleaks_rule_id"
value = "RSA private key"
[secrets.ruleset.override]
description = "OVERRIDDEN description"
message = "OVERRIDDEN message"
name = "OVERRIDDEN name"
severity = "Info"
```
#### Synthesize a custom configuration
To create a custom configuration, you can use passthrough chains.
2021-01-03 14:25:43 +05:30
1. In the `secret-detection-ruleset.toml` file, do one of the following:
- Define a custom ruleset:
```toml
[secrets]
description = 'secrets custom rules configuration'
[[secrets.passthrough]]
type = "raw"
target = "gitleaks.toml"
value = """\
title = "gitleaks config"
# add regexes to the regex table
[[rules]]
description = "Test for Raw Custom Rulesets"
regex = '''Custom Raw Ruleset T[est]{3}'''
"""
```
- Provide the name of the file containing a custom ruleset:
```toml
[secrets]
description = 'secrets custom rules configuration'
[[secrets.passthrough]]
type = "file"
target = "gitleaks.toml"
value = "config/gitleaks.toml"
```
2022-01-26 12:08:38 +05:30
Passthroughs can also be chained to build more complex configurations.
For more details, see [SAST Customize ruleset section ](../sast/index.md#customize-rulesets ).
2020-10-24 23:57:45 +05:30
### Logging level
2021-03-11 19:13:27 +05:30
To control the verbosity of logs set the `SECURE_LOG_LEVEL` CI/CD variable. Messages of this logging level or higher are output. [Introduced ](https://gitlab.com/gitlab-org/gitlab/-/issues/10880 ) in GitLab 13.1.
2020-07-28 23:09:34 +05:30
2020-10-24 23:57:45 +05:30
From highest to lowest severity, the logging levels are:
2020-07-28 23:09:34 +05:30
- `fatal`
- `error`
- `warn`
2020-10-24 23:57:45 +05:30
- `info` (default)
2020-07-28 23:09:34 +05:30
- `debug`
2021-04-29 21:17:54 +05:30
## Post-processing and revocation
2022-04-04 11:22:00 +05:30
Upon detection of a secret, GitLab SaaS supports post-processing hooks.
For more information, see [Post-processing and revocation ](post_processing.md ).
2021-04-29 21:17:54 +05:30
2021-11-18 22:05:49 +05:30
## Full History Secret Detection
2020-05-24 23:13:21 +05:30
2020-06-23 00:09:42 +05:30
GitLab 12.11 introduced support for scanning the full history of a repository. This new functionality
2020-05-24 23:13:21 +05:30
is particularly useful when you are enabling Secret Detection in a repository for the first time and you
2021-11-18 22:05:49 +05:30
want to perform a full secret detection scan. Running a secret detection scan on the full history can take a long time,
2021-03-11 19:13:27 +05:30
especially for larger repositories with lengthy Git histories. We recommend not setting this CI/CD variable
2020-06-23 00:09:42 +05:30
as part of your normal job definition.
2020-05-24 23:13:21 +05:30
2021-09-04 01:27:46 +05:30
A new configuration variable ([`SECRET_DETECTION_HISTORIC_SCAN`](#available-cicd-variables))
2020-05-24 23:13:21 +05:30
can be set to change the behavior of the GitLab Secret Detection scan to run on the entire Git history of a repository.
2021-02-22 17:27:13 +05:30
## Running Secret Detection in an offline environment
For self-managed GitLab instances in an environment with limited, restricted, or intermittent access
to external resources through the internet, some adjustments are required for the Secret Detection job to
run successfully. For more information, see [Offline environments ](../offline_deployments/index.md ).
### Requirements for offline Secret Detection
To use Secret Detection in an offline environment, you need:
- GitLab Runner with the [`docker` or `kubernetes` executor ](#requirements ).
- A Docker Container Registry with locally available copy of Secret Detection [analyzer ](https://gitlab.com/gitlab-org/security-products/analyzers ) images.
- Configure certificate checking of packages (optional).
GitLab Runner has a [default `pull policy` of `always` ](https://docs.gitlab.com/runner/executors/docker.html#using-the-always-pull-policy ),
meaning the runner tries to pull Docker images from the GitLab container registry even if a local
copy is available. The GitLab Runner [`pull_policy` can be set to `if-not-present` ](https://docs.gitlab.com/runner/executors/docker.html#using-the-if-not-present-pull-policy )
in an offline environment if you prefer using only locally available Docker images. However, we
recommend keeping the pull policy setting to `always` if not in an offline environment, as this
enables the use of updated scanners in your CI/CD pipelines.
2021-01-03 14:25:43 +05:30
### Make GitLab Secret Detection analyzer image available inside your Docker registry
Import the following default Secret Detection analyzer images from `registry.gitlab.com` into your
[local Docker container registry ](../../packages/container_registry/index.md ):
```plaintext
2021-11-11 11:23:49 +05:30
registry.gitlab.com/security-products/secret-detection:3
2021-01-03 14:25:43 +05:30
```
The process for importing Docker images into a local offline Docker registry depends on
**your network security policy**. Please consult your IT staff to find an accepted and approved
2022-04-04 11:22:00 +05:30
process by which external resources can be imported or temporarily accessed. These scanners are [periodically updated ](../index.md#vulnerability-scanner-maintenance )
2021-06-08 01:23:25 +05:30
with new definitions, and you may be able to make occasional updates on your own.
2021-01-03 14:25:43 +05:30
For details on saving and transporting Docker images as a file, see Docker's documentation on
[`docker save` ](https://docs.docker.com/engine/reference/commandline/save/ ), [`docker load` ](https://docs.docker.com/engine/reference/commandline/load/ ),
[`docker export` ](https://docs.docker.com/engine/reference/commandline/export/ ), and [`docker import` ](https://docs.docker.com/engine/reference/commandline/import/ ).
2021-12-11 22:18:48 +05:30
### Set Secret Detection CI/CD variables to use the local Secret Detection analyzer container image
Add the following configuration to your `.gitlab-ci.yml` file. You must replace
`SECURE_ANALYZERS_PREFIX` to refer to your local Docker container registry:
```yaml
include:
- template: Security/Secret-Detection.gitlab-ci.yml
variables:
SECURE_ANALYZERS_PREFIX: "localhost:5000/analyzers"
```
The Secret Detection job should now use the local copy of the Secret Detection analyzer Docker image to scan your code and generate
security reports without requiring internet access.
2021-01-03 14:25:43 +05:30
#### If support for Custom Certificate Authorities are needed
Support for custom certificate authorities was introduced in the following versions.
| Analyzer | Version |
| -------- | ------- |
| secrets | [v3.0.0 ](https://gitlab.com/gitlab-org/security-products/analyzers/secrets/-/releases/v3.0.0 ) |
2021-09-30 23:02:18 +05:30
To trust a custom Certificate Authority, set the `ADDITIONAL_CA_CERT_BUNDLE` variable to the bundle
of CA certs that you want to trust in the SAST environment. The `ADDITIONAL_CA_CERT_BUNDLE` value should contain the [text representation of the X.509 PEM public-key certificate ](https://tools.ietf.org/html/rfc7468#section-5.1 ). For example, to configure this value in the `.gitlab-ci.yml` file, use the following:
```yaml
variables:
ADDITIONAL_CA_CERT_BUNDLE: |
-----BEGIN CERTIFICATE-----
MIIGqTCCBJGgAwIBAgIQI7AVxxVwg2kch4d56XNdDjANBgkqhkiG9w0BAQsFADCB
...
jWgmPqF3vUbZE0EyScetPJquRFRKIesyJuBFMAs=
-----END CERTIFICATE-----
```
The `ADDITIONAL_CA_CERT_BUNDLE` value can also be configured as a [custom variable in the UI ](../../../ci/variables/index.md#custom-cicd-variables ), either as a `file` , which requires the path to the certificate, or as a variable, which requires the text representation of the certificate.
2021-01-03 14:25:43 +05:30
## Troubleshooting
### Getting warning message `gl-secret-detection-report.json: no matching files`
For information on this, see the [general Application Security troubleshooting section ](../../../ci/pipelines/job_artifacts.md#error-message-no-files-to-upload ).
2021-02-22 17:27:13 +05:30
### Error: `Couldn't run the gitleaks command: exit status 2`
2022-04-04 11:22:00 +05:30
If a pipeline is triggered from a merge request containing 60 commits while the `GIT_DEPTH` variable's
2022-03-02 08:16:31 +05:30
value is less than that, the Secret Detection job fails as the clone is not deep enough to contain all of the
relevant commits. For information on the current default value, see the
[pipeline configuration documentation ](../../../ci/pipelines/settings.md#limit-the-number-of-changes-fetched-during-clone ).
2021-02-22 17:27:13 +05:30
2021-03-11 19:13:27 +05:30
To confirm this as the cause of the error, set the
[logging level ](../../application_security/secret_detection/index.md#logging-level ) to `debug` , then
rerun the pipeline. The logs should look similar to the following example. The text "object not
found" is a symptom of this error.
2021-02-22 17:27:13 +05:30
```plaintext
ERRO[2020-11-18T18:05:52Z] object not found
[ERRO] [secrets] [2020-11-18T18:05:52Z] ▶ Couldn't run the gitleaks command: exit status 2
[ERRO] [secrets] [2020-11-18T18:05:52Z] ▶ Gitleaks analysis failed: exit status 2
```
2021-09-04 01:27:46 +05:30
To resolve the issue, set the [`GIT_DEPTH` CI/CD variable ](../../../ci/runners/configure_runners.md#shallow-cloning )
2021-03-11 19:13:27 +05:30
to a higher value. To apply this only to the Secret Detection job, the following can be added to
your `.gitlab-ci.yml` file:
2021-02-22 17:27:13 +05:30
```yaml
secret_detection:
variables:
GIT_DEPTH: 100
```
2022-04-04 11:22:00 +05:30
### `secret-detection` job fails with `ERR fatal: ambiguous argument` message
2022-05-07 20:08:51 +05:30
Your `secret-detection` job can fail with `ERR fatal: ambiguous argument` error if your
repository's default branch is unrelated to the branch the job was triggered for.
2022-04-04 11:22:00 +05:30
See issue [!352014 ](https://gitlab.com/gitlab-org/gitlab/-/issues/352014 ) for more details.
2022-05-07 20:08:51 +05:30
To resolve the issue, make sure to correctly [set your default branch ](../../project/repository/branches/default.md#change-the-default-branch-name-for-a-project ) on your repository. You should set it to a branch
that has related history with the branch you run the `secret-detection` job on.