Dependency Scanning is often considered part of Software Composition Analysis (SCA). SCA can contain aspects of inspecting the items your code uses. These items typically include application and system dependencies that are almost always imported from external sources, rather than sourced from items you wrote yourself.
The included gitlab container scanning only scans docker images and can't read lockfiles.
To fix this, you need to run a Trivy instance yourself and tell it to scan the filesystem instead.
This config template can be included in your .gitlab-ci.yml
to get the scanning job for free (similar to how the gitlab container scanning thing works).
At the very top of your .gitlab-ci.yml either add or expand the include:
section so it looks similar to this:
include:
- remote: https://raw.githubusercontent.com/ambient-innovation/gitlab-trivy-security-checks/main/security-checks.yaml
# There might be more includes here, usually starting with template like the following:
# - template: 'Workflows/Branch-Pipelines.gitlab-ci.yml'
You will also need to have at least one stage called test in your top-level stages config for the default configuration:
stages:
- prebuild
- build
- test
- posttest
- deploy
The test
stage has to come after the docker image has already been built and pushed to the registry or the scanner will not work.
Last but not least you need a job within that test stage going by the name container_scanning
. A minimal config looks like this:
container_scanning:
variables:
IMAGE: $IMAGE_TAG_BACKEND
DIRECTORY: "backend"
The example shown here will overwrite the container_scanning
job from the template and tell it to
a) scan an image as specified in the IMAGE_TAG_BACKEND
variable,
b) also scan the filesystem in a directory called frontend and
c) only report errors with a level of HIGH or CRITICAL.
You can also specify the FILENAME
of the result-output as you like.
If you wish to run the container_scanning
job in another job than "test
" (as it does by default) simply copy the above code to your .gitlab-ci.yml file and add the keyword stage
with your custom stage name.
Example for minimal stage-overwrite setup:
container_scanning:
stage: my-custom-stage
If you want to customise the job name, the above method will not work because the original job will be added to the pipeline in addition to any job that extends it.
To be able to fully customise the pipeline job, replace the entry in include
like so:
include:
- remote: https://raw.githubusercontent.com/ambient-innovation/gitlab-trivy-security-checks/main/security-checks.template.yaml
Note the file name change at the end.
With this file, the job will not be added to the pipeline automatically anymore, and to enable it you will have to extend it. For example:
# Any name goes.
frontend:container scanning:
# Notice the . at the start.
extends: [ .container_scanning ]
# Any stage you like, you don't need to include a `test` stage anymore.
stage: container scanning
# You can now have a uniform interface for different parts of the application:
backend:container scanning:
extends: [ .container_scanning ]
stage: container scanning
To scan multiple images/directories, you can simply copy the job above, add another key extends: container_scanning
and change the variable values for the other container.
Here's an example:
container_scanning_frontend:
extends:
- container_scanning
variables:
IMAGE: $IMAGE_TAG_FRONTEND
DIRECTORY: "frontend"
If you have no subdirectory (e.g. because you have a simple Django fullstack project), you need to set the DIRECTORY
and FILENAME
, as in this example:
container_scanning_frontend:
extends:
- container_scanning
variables:
IMAGE: $IMAGE_TAG_FRONTEND
DIRECTORY: "./"
FILENAME: "gl-codeclimate.json"
To have one combined job to set a pass/fail condition for all the errors found in any of the trivy scan jobs, you need to a) set allow_failure: true
in your scanning jobs and b) create another job to run in one of the following stages (can be an own stage or you can reuse one of your existing stages).
This secondary job will then read the report files from your scanning jobs, combine them and report them as code-quality to GitLab.
Here's an example of how that job could look like:
check security scan results:
stage: posttest
image: ${CI_DEPENDENCY_PROXY_GROUP_IMAGE_PREFIX}/alpine:latest
dependencies:
- container_scanning
# List all your container scanning jobs here, one per line
# - container_scanning_frontend
tags:
- low-load
before_script:
- apk update && apk add jq coreutils grep
script:
- echo "Step 1 - Merge all codeclimate reports from scanning jobs"
- jq -s 'add' gl-codeclimate-*.json > gl-codeclimate.json
- echo "Step 2 - Check if there were any vulnerabilities and exit with a status code equal to the number of vulnerabilities"
- jq '.[].type' .\gl-codeclimate.json | grep "issue" | exit $(wc -l)
# Enables https://docs.gitlab.com/ee/user/application_security/container_scanning/ (Container Scanning report is available on GitLab EE Ultimate or GitLab.com Gold)
artifacts:
paths:
- gl-codeclimate.json
If all is good, you'll see a new green bar above your test results.
If any vulnerabilities were found, you'll see a new yellow bar above the test results in your Merge-Request:
You can then expand that section and see all the results:
You can also just check the failed scanning jobs for a plaintext error report. This can also include additional details not visible in the GitLab-UI.
For JavaScript vulnerabilities found in a package-lock.json, it will also report the whole dependency tree to find which package caused the vulnerable version to be included in your project. (This sadly doesn't work for yarn.lock or pnpm-lock.yaml at the moment)
The container scanning job exposes a few more variables by which you can adjust the scanning if needed. The default settings are the recommendation of the TE-Circle, though.
By adding a new variable called SEVERITY
to your job, you can change which severity items should be reported. The default is to report HIGH and CRITICAL vulnerabilities. The remaining options are: UNKNOWN
, LOW
, MEDIUM
Trivy requires a full list of severities to report. To report all severities from MEDIUM and higher for example, you need to specify a comma-separated list like so: SEVERITY: "MEDIUM,HIGH,CRITICAL"
By default trivy performs one run in full-silence mode writing the results to the gitlab codeclimate report file and then another one showing the results in a plaintext table. If the scan is taking very long, you can also show a progress bar during the scan by setting the TRIVY_NO_PROGRESS
variable to "false"
.
To make sure you're doing a fresh run and instruct trivy to download a fresh vulnerability database, you can turn off/move the cache directory via the TRIVY_CACHE_DIR
variable. The default value for this variable is a directory called .trivycache
You can add more variables corresponding to the CLI switches as documented on the trivy homepage
NOTE: This link points to the reference as of v0.48 - December 2023, make sure to check the latest version for changes in newer versions.
Last, but not least, you can set up a .trivyignore.yaml file in your project's root directory and enter one Vulnerability-ID per line to ignore that specific vulnerability. See the trivy documentation for more (and up-to-date) info.
NOTE: This link points to the reference as of v0.48 - December 2023, make sure to check the latest version for changes in newer versions.