355 lines
12 KiB
YAML
355 lines
12 KiB
YAML
# Read more about this feature here: https://docs.gitlab.com/ee/user/application_security/sast/
|
|
#
|
|
# Configure the scanning tool through the environment variables.
|
|
# List of the variables: https://gitlab.com/gitlab-org/security-products/sast#settings
|
|
# How to set: https://docs.gitlab.com/ee/ci/yaml/#variables
|
|
|
|
variables:
|
|
# Setting this variable will affect all Security templates
|
|
# (SAST, Dependency Scanning, ...)
|
|
SECURE_ANALYZERS_PREFIX: "registry.gitlab.com/gitlab-org/security-products/analyzers"
|
|
|
|
SAST_DEFAULT_ANALYZERS: "bandit, brakeman, gosec, spotbugs, flawfinder, phpcs-security-audit, security-code-scan, nodejs-scan, eslint, sobelow, pmd-apex, kubesec, mobsf, semgrep"
|
|
SAST_EXCLUDED_ANALYZERS: ""
|
|
SAST_EXCLUDED_PATHS: "spec, test, tests, tmp"
|
|
SAST_ANALYZER_IMAGE_TAG: 2
|
|
SCAN_KUBERNETES_MANIFESTS: "false"
|
|
|
|
sast:
|
|
stage: test
|
|
artifacts:
|
|
reports:
|
|
sast: gl-sast-report.json
|
|
rules:
|
|
- when: never
|
|
variables:
|
|
SEARCH_MAX_DEPTH: 4
|
|
script:
|
|
- echo "$CI_JOB_NAME is used for configuration only, and its script should not be executed"
|
|
- exit 1
|
|
|
|
.sast-analyzer:
|
|
extends: sast
|
|
allow_failure: true
|
|
# `rules` must be overridden explicitly by each child job
|
|
# see https://gitlab.com/gitlab-org/gitlab/-/issues/218444
|
|
script:
|
|
- /analyzer run
|
|
|
|
bandit-sast:
|
|
extends: .sast-analyzer
|
|
image:
|
|
name: "$SAST_ANALYZER_IMAGE"
|
|
variables:
|
|
# SAST_ANALYZER_IMAGE is an undocumented variable used internally to allow QA to
|
|
# override the analyzer image with a custom value. This may be subject to change or
|
|
# breakage across GitLab releases.
|
|
SAST_ANALYZER_IMAGE: "$SECURE_ANALYZERS_PREFIX/bandit:$SAST_ANALYZER_IMAGE_TAG"
|
|
rules:
|
|
- if: $SAST_DISABLED
|
|
when: never
|
|
- if: $SAST_EXCLUDED_ANALYZERS =~ /bandit/
|
|
when: never
|
|
- if: $CI_COMMIT_BRANCH &&
|
|
$SAST_DEFAULT_ANALYZERS =~ /bandit/
|
|
exists:
|
|
- '**/*.py'
|
|
|
|
brakeman-sast:
|
|
extends: .sast-analyzer
|
|
image:
|
|
name: "$SAST_ANALYZER_IMAGE"
|
|
variables:
|
|
# SAST_ANALYZER_IMAGE is an undocumented variable used internally to allow QA to
|
|
# override the analyzer image with a custom value. This may be subject to change or
|
|
# breakage across GitLab releases.
|
|
SAST_ANALYZER_IMAGE: "$SECURE_ANALYZERS_PREFIX/brakeman:$SAST_ANALYZER_IMAGE_TAG"
|
|
rules:
|
|
- if: $SAST_DISABLED
|
|
when: never
|
|
- if: $SAST_EXCLUDED_ANALYZERS =~ /brakeman/
|
|
when: never
|
|
- if: $CI_COMMIT_BRANCH &&
|
|
$SAST_DEFAULT_ANALYZERS =~ /brakeman/
|
|
exists:
|
|
- '**/*.rb'
|
|
- '**/Gemfile'
|
|
|
|
eslint-sast:
|
|
extends: .sast-analyzer
|
|
image:
|
|
name: "$SAST_ANALYZER_IMAGE"
|
|
variables:
|
|
# SAST_ANALYZER_IMAGE is an undocumented variable used internally to allow QA to
|
|
# override the analyzer image with a custom value. This may be subject to change or
|
|
# breakage across GitLab releases.
|
|
SAST_ANALYZER_IMAGE: "$SECURE_ANALYZERS_PREFIX/eslint:$SAST_ANALYZER_IMAGE_TAG"
|
|
rules:
|
|
- if: $SAST_DISABLED
|
|
when: never
|
|
- if: $SAST_EXCLUDED_ANALYZERS =~ /eslint/
|
|
when: never
|
|
- if: $CI_COMMIT_BRANCH &&
|
|
$SAST_DEFAULT_ANALYZERS =~ /eslint/
|
|
exists:
|
|
- '**/*.html'
|
|
- '**/*.js'
|
|
- '**/*.jsx'
|
|
- '**/*.ts'
|
|
- '**/*.tsx'
|
|
|
|
flawfinder-sast:
|
|
extends: .sast-analyzer
|
|
image:
|
|
name: "$SAST_ANALYZER_IMAGE"
|
|
variables:
|
|
# SAST_ANALYZER_IMAGE is an undocumented variable used internally to allow QA to
|
|
# override the analyzer image with a custom value. This may be subject to change or
|
|
# breakage across GitLab releases.
|
|
SAST_ANALYZER_IMAGE: "$SECURE_ANALYZERS_PREFIX/flawfinder:$SAST_ANALYZER_IMAGE_TAG"
|
|
rules:
|
|
- if: $SAST_DISABLED
|
|
when: never
|
|
- if: $SAST_EXCLUDED_ANALYZERS =~ /flawfinder/
|
|
when: never
|
|
- if: $CI_COMMIT_BRANCH &&
|
|
$SAST_DEFAULT_ANALYZERS =~ /flawfinder/
|
|
exists:
|
|
- '**/*.c'
|
|
- '**/*.cpp'
|
|
|
|
kubesec-sast:
|
|
extends: .sast-analyzer
|
|
image:
|
|
name: "$SAST_ANALYZER_IMAGE"
|
|
variables:
|
|
# SAST_ANALYZER_IMAGE is an undocumented variable used internally to allow QA to
|
|
# override the analyzer image with a custom value. This may be subject to change or
|
|
# breakage across GitLab releases.
|
|
SAST_ANALYZER_IMAGE: "$SECURE_ANALYZERS_PREFIX/kubesec:$SAST_ANALYZER_IMAGE_TAG"
|
|
rules:
|
|
- if: $SAST_DISABLED
|
|
when: never
|
|
- if: $SAST_EXCLUDED_ANALYZERS =~ /kubesec/
|
|
when: never
|
|
- if: $CI_COMMIT_BRANCH &&
|
|
$SAST_DEFAULT_ANALYZERS =~ /kubesec/ &&
|
|
$SCAN_KUBERNETES_MANIFESTS == 'true'
|
|
|
|
gosec-sast:
|
|
extends: .sast-analyzer
|
|
image:
|
|
name: "$SAST_ANALYZER_IMAGE"
|
|
variables:
|
|
# SAST_ANALYZER_IMAGE is an undocumented variable used internally to allow QA to
|
|
# override the analyzer image with a custom value. This may be subject to change or
|
|
# breakage across GitLab releases.
|
|
SAST_ANALYZER_IMAGE: "$SECURE_ANALYZERS_PREFIX/gosec:$SAST_ANALYZER_IMAGE_TAG"
|
|
rules:
|
|
- if: $SAST_DISABLED
|
|
when: never
|
|
- if: $SAST_EXCLUDED_ANALYZERS =~ /gosec/
|
|
when: never
|
|
- if: $CI_COMMIT_BRANCH &&
|
|
$SAST_DEFAULT_ANALYZERS =~ /gosec/
|
|
exists:
|
|
- '**/*.go'
|
|
|
|
mobsf-android-sast:
|
|
extends: .sast-analyzer
|
|
services:
|
|
# this version must match with analyzer version mentioned in: https://gitlab.com/gitlab-org/security-products/analyzers/mobsf/-/blob/master/Dockerfile
|
|
# Unfortunately, we need to keep track of mobsf version in 2 different places for now.
|
|
- name: opensecurity/mobile-security-framework-mobsf:v3.4.0
|
|
alias: mobsf
|
|
image:
|
|
name: "$SAST_ANALYZER_IMAGE"
|
|
variables:
|
|
# SAST_ANALYZER_IMAGE is an undocumented variable used internally to allow QA to
|
|
# override the analyzer image with a custom value. This may be subject to change or
|
|
# breakage across GitLab releases.
|
|
SAST_ANALYZER_IMAGE: "$SECURE_ANALYZERS_PREFIX/mobsf:$SAST_ANALYZER_IMAGE_TAG"
|
|
MOBSF_API_KEY: key
|
|
rules:
|
|
- if: $SAST_DISABLED
|
|
when: never
|
|
- if: $SAST_EXCLUDED_ANALYZERS =~ /mobsf/
|
|
when: never
|
|
- if: $CI_COMMIT_BRANCH &&
|
|
$SAST_DEFAULT_ANALYZERS =~ /mobsf/ &&
|
|
$SAST_EXPERIMENTAL_FEATURES == 'true'
|
|
exists:
|
|
- '**/AndroidManifest.xml'
|
|
|
|
mobsf-ios-sast:
|
|
extends: .sast-analyzer
|
|
services:
|
|
# this version must match with analyzer version mentioned in: https://gitlab.com/gitlab-org/security-products/analyzers/mobsf/-/blob/master/Dockerfile
|
|
# Unfortunately, we need to keep track of mobsf version in 2 different places for now.
|
|
- name: opensecurity/mobile-security-framework-mobsf:v3.4.0
|
|
alias: mobsf
|
|
image:
|
|
name: "$SAST_ANALYZER_IMAGE"
|
|
variables:
|
|
# SAST_ANALYZER_IMAGE is an undocumented variable used internally to allow QA to
|
|
# override the analyzer image with a custom value. This may be subject to change or
|
|
# breakage across GitLab releases.
|
|
SAST_ANALYZER_IMAGE: "$SECURE_ANALYZERS_PREFIX/mobsf:$SAST_ANALYZER_IMAGE_TAG"
|
|
MOBSF_API_KEY: key
|
|
rules:
|
|
- if: $SAST_DISABLED
|
|
when: never
|
|
- if: $SAST_EXCLUDED_ANALYZERS =~ /mobsf/
|
|
when: never
|
|
- if: $CI_COMMIT_BRANCH &&
|
|
$SAST_DEFAULT_ANALYZERS =~ /mobsf/ &&
|
|
$SAST_EXPERIMENTAL_FEATURES == 'true'
|
|
exists:
|
|
- '**/*.xcodeproj/*'
|
|
|
|
nodejs-scan-sast:
|
|
extends: .sast-analyzer
|
|
image:
|
|
name: "$SAST_ANALYZER_IMAGE"
|
|
variables:
|
|
# SAST_ANALYZER_IMAGE is an undocumented variable used internally to allow QA to
|
|
# override the analyzer image with a custom value. This may be subject to change or
|
|
# breakage across GitLab releases.
|
|
SAST_ANALYZER_IMAGE: "$SECURE_ANALYZERS_PREFIX/nodejs-scan:$SAST_ANALYZER_IMAGE_TAG"
|
|
rules:
|
|
- if: $SAST_DISABLED
|
|
when: never
|
|
- if: $SAST_EXCLUDED_ANALYZERS =~ /nodejs-scan/
|
|
when: never
|
|
- if: $CI_COMMIT_BRANCH &&
|
|
$SAST_DEFAULT_ANALYZERS =~ /nodejs-scan/
|
|
exists:
|
|
- '**/package.json'
|
|
|
|
phpcs-security-audit-sast:
|
|
extends: .sast-analyzer
|
|
image:
|
|
name: "$SAST_ANALYZER_IMAGE"
|
|
variables:
|
|
# SAST_ANALYZER_IMAGE is an undocumented variable used internally to allow QA to
|
|
# override the analyzer image with a custom value. This may be subject to change or
|
|
# breakage across GitLab releases.
|
|
SAST_ANALYZER_IMAGE: "$SECURE_ANALYZERS_PREFIX/phpcs-security-audit:$SAST_ANALYZER_IMAGE_TAG"
|
|
rules:
|
|
- if: $SAST_DISABLED
|
|
when: never
|
|
- if: $SAST_EXCLUDED_ANALYZERS =~ /phpcs-security-audit/
|
|
when: never
|
|
- if: $CI_COMMIT_BRANCH &&
|
|
$SAST_DEFAULT_ANALYZERS =~ /phpcs-security-audit/
|
|
exists:
|
|
- '**/*.php'
|
|
|
|
pmd-apex-sast:
|
|
extends: .sast-analyzer
|
|
image:
|
|
name: "$SAST_ANALYZER_IMAGE"
|
|
variables:
|
|
# SAST_ANALYZER_IMAGE is an undocumented variable used internally to allow QA to
|
|
# override the analyzer image with a custom value. This may be subject to change or
|
|
# breakage across GitLab releases.
|
|
SAST_ANALYZER_IMAGE: "$SECURE_ANALYZERS_PREFIX/pmd-apex:$SAST_ANALYZER_IMAGE_TAG"
|
|
rules:
|
|
- if: $SAST_DISABLED
|
|
when: never
|
|
- if: $SAST_EXCLUDED_ANALYZERS =~ /pmd-apex/
|
|
when: never
|
|
- if: $CI_COMMIT_BRANCH &&
|
|
$SAST_DEFAULT_ANALYZERS =~ /pmd-apex/
|
|
exists:
|
|
- '**/*.cls'
|
|
|
|
security-code-scan-sast:
|
|
extends: .sast-analyzer
|
|
image:
|
|
name: "$SAST_ANALYZER_IMAGE"
|
|
variables:
|
|
# SAST_ANALYZER_IMAGE is an undocumented variable used internally to allow QA to
|
|
# override the analyzer image with a custom value. This may be subject to change or
|
|
# breakage across GitLab releases.
|
|
SAST_ANALYZER_IMAGE: "$SECURE_ANALYZERS_PREFIX/security-code-scan:$SAST_ANALYZER_IMAGE_TAG"
|
|
rules:
|
|
- if: $SAST_DISABLED
|
|
when: never
|
|
- if: $SAST_EXCLUDED_ANALYZERS =~ /security-code-scan/
|
|
when: never
|
|
- if: $CI_COMMIT_BRANCH &&
|
|
$SAST_DEFAULT_ANALYZERS =~ /security-code-scan/
|
|
exists:
|
|
- '**/*.csproj'
|
|
- '**/*.vbproj'
|
|
|
|
semgrep-sast:
|
|
extends: .sast-analyzer
|
|
image:
|
|
name: "$SAST_ANALYZER_IMAGE"
|
|
variables:
|
|
# SAST_ANALYZER_IMAGE is an undocumented variable used internally to allow QA to
|
|
# override the analyzer image with a custom value. This may be subject to change or
|
|
# breakage across GitLab releases.
|
|
SAST_ANALYZER_IMAGE: "$SECURE_ANALYZERS_PREFIX/semgrep:latest"
|
|
rules:
|
|
- if: $SAST_DISABLED
|
|
when: never
|
|
- if: $SAST_EXCLUDED_ANALYZERS =~ /semgrep/
|
|
when: never
|
|
- if: $CI_COMMIT_BRANCH &&
|
|
$SAST_DEFAULT_ANALYZERS =~ /semgrep/ &&
|
|
$SAST_EXPERIMENTAL_FEATURES == 'true'
|
|
exists:
|
|
- '**/*.py'
|
|
- '**/*.js'
|
|
- '**/*.jsx'
|
|
- '**/*.ts'
|
|
- '**/*.tsx'
|
|
|
|
sobelow-sast:
|
|
extends: .sast-analyzer
|
|
image:
|
|
name: "$SAST_ANALYZER_IMAGE"
|
|
variables:
|
|
# SAST_ANALYZER_IMAGE is an undocumented variable used internally to allow QA to
|
|
# override the analyzer image with a custom value. This may be subject to change or
|
|
# breakage across GitLab releases.
|
|
SAST_ANALYZER_IMAGE: "$SECURE_ANALYZERS_PREFIX/sobelow:$SAST_ANALYZER_IMAGE_TAG"
|
|
rules:
|
|
- if: $SAST_DISABLED
|
|
when: never
|
|
- if: $SAST_EXCLUDED_ANALYZERS =~ /sobelow/
|
|
when: never
|
|
- if: $CI_COMMIT_BRANCH &&
|
|
$SAST_DEFAULT_ANALYZERS =~ /sobelow/
|
|
exists:
|
|
- 'mix.exs'
|
|
|
|
spotbugs-sast:
|
|
extends: .sast-analyzer
|
|
image:
|
|
name: "$SAST_ANALYZER_IMAGE"
|
|
variables:
|
|
# SAST_ANALYZER_IMAGE is an undocumented variable used internally to allow QA to
|
|
# override the analyzer image with a custom value. This may be subject to change or
|
|
# breakage across GitLab releases.
|
|
SAST_ANALYZER_IMAGE: "$SECURE_ANALYZERS_PREFIX/spotbugs:$SAST_ANALYZER_IMAGE_TAG"
|
|
rules:
|
|
- if: $SAST_EXCLUDED_ANALYZERS =~ /spotbugs/
|
|
when: never
|
|
- if: $SAST_DEFAULT_ANALYZERS =~ /mobsf/ &&
|
|
$SAST_EXPERIMENTAL_FEATURES == 'true'
|
|
exists:
|
|
- '**/AndroidManifest.xml'
|
|
when: never
|
|
- if: $SAST_DISABLED
|
|
when: never
|
|
- if: $CI_COMMIT_BRANCH &&
|
|
$SAST_DEFAULT_ANALYZERS =~ /spotbugs/
|
|
exists:
|
|
- '**/*.groovy'
|
|
- '**/*.java'
|
|
- '**/*.scala'
|
|
- '**/*.kt'
|