Skip to content
GitLab
菜单
为什么选择 GitLab
定价
联系销售
探索
为什么选择 GitLab
定价
联系销售
探索
登录
获取免费试用
主导航
搜索或转到…
项目
GitLab
管理
动态
成员
标记
计划
议题
议题看板
里程碑
迭代
需求
代码
合并请求
仓库
分支
提交
标签
仓库图
比较修订版本
代码片段
锁定的文件
构建
流水线
作业
流水线计划
测试用例
产物
部署
发布
Package registry
Container registry
模型注册表
运维
环境
Terraform 模块
监控
事件
服务台
分析
价值流分析
贡献者分析
CI/CD 分析
仓库分析
代码评审分析
议题分析
洞察
模型实验
效能分析
帮助
帮助
支持
GitLab 文档
比较 GitLab 各版本
社区论坛
为极狐GitLab 提交贡献
提交反馈
隐私声明
快捷键
?
新增功能
4
代码片段
群组
项目
显示更多面包屑
gitlab-cn
GitLab
提交
120d09d5
提交
120d09d5
编辑于
3 years ago
作者:
Dominic Bauer
提交者:
Russell Dickenson
3 years ago
浏览文件
操作
下载
补丁
差异文件
Update Container Scanning usage instructions
上级
983e4443
No related branches found
分支 包含提交
No related tags found
标签 包含提交
无相关合并请求
变更
1
隐藏空白变更内容
行内
左右并排
显示
1 个更改的文件
doc/user/application_security/container_scanning/index.md
+46
-24
46 个添加, 24 个删除
doc/user/application_security/container_scanning/index.md
有
46 个添加
和
24 个删除
doc/user/application_security/container_scanning/index.md
+
46
−
24
浏览文件 @
120d09d5
...
@@ -47,19 +47,9 @@ To enable container scanning in your pipeline, you need the following:
...
@@ -47,19 +47,9 @@ To enable container scanning in your pipeline, you need the following:
-
An image matching the
[
supported distributions
](
#supported-distributions
)
.
-
An image matching the
[
supported distributions
](
#supported-distributions
)
.
-
[
Build and push
](
../../packages/container_registry/index.md#build-and-push-by-using-gitlab-cicd
)
-
[
Build and push
](
../../packages/container_registry/index.md#build-and-push-by-using-gitlab-cicd
)
the Docker image to your project's container registry.
the Docker image to your project's container registry.
-
The name of the Docker image to scan, in the
`DOCKER_IMAGE`
[
configuration variable
](
#available-cicd-variables
)
.
-
If you're using a third-party container registry, you might need to provide authentication
-
If you're using a third-party container registry, you might need to provide authentication
credentials through the
`DOCKER_USER`
and
`DOCKER_PASSWORD`
[
configuration variables
](
#available-cicd-variables
)
.
credentials through the
`DOCKER_USER`
and
`DOCKER_PASSWORD`
[
configuration variables
](
#available-cicd-variables
)
.
For example, if you are connecting to AWS ECR, you might use the following:
For more details on how to use these variables, see
[
authenticate to a remote registry
](
#authenticate-to-a-remote-registry
)
.
```
yaml
export AWS_ECR_PASSWORD=$(aws ecr get-login-password --region region)
include
:
-
template
:
Security/Container-Scanning.gitlab-ci.yml
DOCKER_USER
:
AWS
DOCKER_PASSWORD
:
"
$AWS_ECR_PASSWORD"
```
## Configuration
## Configuration
...
@@ -87,23 +77,19 @@ The following is a sample `.gitlab-ci.yml` that builds your Docker image, pushes
...
@@ -87,23 +77,19 @@ The following is a sample `.gitlab-ci.yml` that builds your Docker image, pushes
registry, and scans the image:
registry, and scans the image:
```
yaml
```
yaml
build
:
image
:
docker:latest
stage
:
build
services
:
-
docker:dind
variables
:
IMAGE
:
$CI_REGISTRY_IMAGE/$CI_COMMIT_REF_SLUG:$CI_COMMIT_SHA
script
:
-
docker info
-
docker login -u "$CI_REGISTRY_USER" -p "$CI_REGISTRY_PASSWORD" $CI_REGISTRY
-
docker build -t $IMAGE .
-
docker push $IMAGE
include
:
include
:
-
template
:
Jobs/Build.gitlab-ci.yml
-
template
:
Security/Container-Scanning.gitlab-ci.yml
-
template
:
Security/Container-Scanning.gitlab-ci.yml
container_scanning
:
variables
:
CS_DEFAULT_BRANCH_IMAGE
:
$CI_REGISTRY_IMAGE/$CI_DEFAULT_BRANCH:$CI_COMMIT_SHA
```
```
Setting
`CS_DEFAULT_BRANCH_IMAGE`
avoids duplicate vulnerability findings when an image name differs across branches.
The value of
`CS_DEFAULT_BRANCH_IMAGE`
indicates the name of the scanned image as it appears on the default branch.
For more details on how this deduplication is achieved, see
[
Setting the default branch image
](
#setting-the-default-branch-image
)
.
### Customizing the container scanning settings
### Customizing the container scanning settings
There may be cases where you want to customize how GitLab scans your containers. For example, you
There may be cases where you want to customize how GitLab scans your containers. For example, you
...
@@ -124,6 +110,42 @@ variables:
...
@@ -124,6 +110,42 @@ variables:
SECURE_LOG_LEVEL
:
'
debug'
SECURE_LOG_LEVEL
:
'
debug'
```
```
#### Scan an image in a remote registry
To scan images located in a registry other than the project's, use the following
`.gitlab-ci.yml`
:
```
yaml
include
:
-
template
:
Security/Container-Scanning.gitlab-ci.yml
container_scanning
:
variables
:
DOCKER_IMAGE
:
example.com/user/image:tag
```
##### Authenticate to a remote registry
Scanning an image in a private registry requires authentication. Provide the username in the
`DOCKER_USER`
variable, and the password in the
`DOCKER_PASSWORD`
configuration variable.
For example, to scan an image from AWS Elastic Container Registry:
```
yaml
container_scanning
:
before_script
:
-
curl "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip" --output "awscliv2.zip"
-
unzip awscliv2.zip
-
./aws/install
-
aws --version
-
export AWS_ECR_PASSWORD=$(aws ecr get-login-password --region region)
include
:
-
template
:
Security/Container-Scanning.gitlab-ci.yml
DOCKER_IMAGE
:
<aws_account_id>.dkr.ecr.<region>.amazonaws.com/<image>:<tag>
DOCKER_USER
:
AWS
DOCKER_PASSWORD
:
"
$AWS_ECR_PASSWORD"
```
#### Available CI/CD variables
#### Available CI/CD variables
You can
[
configure
](
#customizing-the-container-scanning-settings
)
analyzers by using the following CI/CD variables:
You can
[
configure
](
#customizing-the-container-scanning-settings
)
analyzers by using the following CI/CD variables:
...
...
此差异已折叠。
点击以展开。
预览
0%
加载中
请重试
或
添加新附件
.
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
保存评论
取消
想要评论请
注册
或
登录