You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: doc/api/graphql/reference/index.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -3128,7 +3128,7 @@ Represents an external issue.
3128
3128
|`minimumReverificationInterval`|[`Int`](#int)| The interval (in days) in which the repository verification is valid. Once expired, it will be reverified. |
3129
3129
|`name`|[`String`](#string)| The unique identifier for this Geo node. |
3130
3130
|`packageFileRegistries`|[`PackageFileRegistryConnection`](#packagefileregistryconnection)| Package file registries of the GeoNode. |
3131
-
| `pipelineArtifactRegistries` | [`PipelineArtifactRegistryConnection`](#pipelineartifactregistryconnection) | Find pipeline artifact registries on this Geo node. Available only when feature flag `geo_pipeline_artifact_replication` is enabled. |
3131
+
|`pipelineArtifactRegistries`|[`PipelineArtifactRegistryConnection`](#pipelineartifactregistryconnection)| Find pipeline artifact registries on this Geo node. |
3132
3132
|`primary`|[`Boolean`](#boolean)| Indicates whether this Geo node is the primary. |
3133
3133
|`reposMaxCapacity`|[`Int`](#int)| The maximum concurrency of repository backfill for this secondary node. |
3134
3134
|`selectiveSyncNamespaces`|[`NamespaceConnection`](#namespaceconnection)| The namespaces that should be synced, if `selective_sync_type` == `namespaces`. |
Copy file name to clipboardExpand all lines: doc/user/application_security/container_scanning/index.md
+79-2
Original file line number
Diff line number
Diff line change
@@ -250,8 +250,85 @@ To allowlist specific vulnerabilities, follow these steps:
250
250
1. Set `GIT_STRATEGY: fetch` in your `.gitlab-ci.yml` file by following the instructions in
251
251
[overriding the container scanning template](#overriding-the-container-scanning-template).
252
252
1. Define the allowlisted vulnerabilities in a YAML file named `vulnerability-allowlist.yml`. This must use
253
-
the format described in the [allowlist example file](https://gitlab.com/gitlab-org/security-products/analyzers/klar/-/raw/master/testdata/vulnerability-allowlist.yml).
254
-
1. Add the `vulnerability-allowlist.yml` file to your project's Git repository.
253
+
the format described in [vulnerability-allowlist.yml data format](#vulnerability-allowlistyml-data-format).
254
+
1. Add the `vulnerability-allowlist.yml` file to the root folder of your project's Git repository.
255
+
256
+
#### vulnerability-allowlist.yml data format
257
+
258
+
The `vulnerability-allowlist.yml` file is a YAML file that specifies a list of CVE IDs of vulnerabilities that are **allowed** to exist, because they're _false positives_, or they're _not applicable_.
259
+
260
+
If a matching entry is found in the `vulnerability-allowlist.yml` file, the following happens:
261
+
262
+
- The vulnerability **is not included** when the analyzer generates the `gl-container-scanning-report.json` file.
263
+
- The Security tab of the pipeline **does not show** the vulnerability. It is not included in the JSON file, which is the source of truth for the Security tab.
This example excludes from `gl-container-scanning-report.json`:
281
+
282
+
1. All vulnerabilities with CVE IDs: _CVE-2019-8696_, _CVE-2014-8166_, _CVE-2017-18248_.
283
+
1. All vulnerabilities found in the `registry.gitlab.com/gitlab-org/security-products/dast/webgoat-8.0@sha256` container image with CVE ID _CVE-2018-4180_.
284
+
1. All vulnerabilities found in `your.private.registry:5000/centos` container with CVE IDs _CVE-2015-1419_, _CVE-2015-1447_.
285
+
286
+
##### File format
287
+
288
+
- `generalallowlist`block allows you to specify CVE IDs globally. All vulnerabilities with matching CVE IDs are excluded from the scan report.
289
+
290
+
- `images`block allows you to specify CVE IDs for each container image independently. All vulnerabilities from the given image with matching CVE IDs are excluded from the scan report. The image name is retrieved from one of the environment variables used to specify the Docker image to be scanned, such as `$CI_APPLICATION_REPOSITORY:$CI_APPLICATION_TAG` or `DOCKER_IMAGE`. The image provided in this block **must** match this value and **must not** include the tag value. For example, if you specify the image to be scanned using `DOCKER_IMAGE=alpine:3.7`, then you would use `alpine` in the `images` block, but you cannot use `alpine:3.7`.
291
+
292
+
You can specify container image in multiple ways:
293
+
294
+
- as image name only (ie. `centos`).
295
+
- as full image name with registry hostname (ie. `your.private.registry:5000/centos`).
296
+
- as full image name with registry hostname and sha256 label (ie. `registry.gitlab.com/gitlab-org/security-products/dast/webgoat-8.0@sha256`).
297
+
298
+
NOTE:
299
+
The string after CVE ID (`cups` and `libxml2` in the previous example) is an optional comment format. It has **no impact** on the handling of vulnerabilities. You can include comments to describe the vulnerability.
300
+
301
+
##### Container scanning job log format
302
+
303
+
You can verify the results of your scan and the correctness of your `vulnerability-allowlist.yml` file by looking
304
+
at the logs that are produced by the container scanning analyzer in `container_scanning` job details.
305
+
306
+
The log contains a list of found vulnerabilities as a table, for example:
0 commit comments