玩足球的馒头 · Outlook OAuth2 SMTP ...· 10 月前 · |
会搭讪的蚂蚁 · C++ Web 编程 | 菜鸟教程· 1 年前 · |
有胆有识的自行车 · listview改变选中行字体颜色_51CT ...· 1 年前 · |
低调的枇杷 · Python如何释放内存? - ...· 1 年前 · |
CS_MAJOR_VERSION
from
2
to
3
.
CS_MAJOR_VERSION
from
3
to
4
.
4
to
5
in GitLab 15.0.
Security/Container-Scanning.gitlab-ci.yml
to
Jobs/Container-Scanning.gitlab-ci.yml
in GitLab 15.6.
Your application’s Docker image may itself be based on Docker images that contain known vulnerabilities. By including an extra Container Scanning job in your pipeline that scans for those vulnerabilities and displays them in a merge request, you can use GitLab to audit your Docker-based apps.
For an overview, see Container Scanning .
Container Scanning is often considered part of Software Composition Analysis (SCA). SCA can contain aspects of inspecting the items your code uses. These items typically include application and system dependencies that are almost always imported from external sources, rather than sourced from items you wrote yourself.
GitLab offers both Container Scanning and Dependency Scanning to ensure coverage for all of these dependency types. To cover as much of your risk area as possible, we encourage you to use all of our security scanners.
GitLab integrates with open-source tools for vulnerability static analysis in containers:
To integrate GitLab with security scanners other than those listed here, see Security scanner integration .
You can enable container scanning by doing one of the following:
.gitlab-ci.yml
file.
GitLab compares the found vulnerabilities between the source and target branches, and shows the information directly in the merge request.
To enable container scanning in your pipeline, you need the following:
test
stage, which is available unless overridden with the
stages
keyword.
docker
or
kubernetes
executor on Linux/amd64.
18.09.03
or later installed on the same computer as the runner. If you’re using the
shared runners on GitLab.com, then this is already the case.
CS_REGISTRY_USER
and
CS_REGISTRY_PASSWORD
configuration variables
.
For more details on how to use these variables, see
authenticate to a remote registry
.
To enable container scanning, add the
Container-Scanning.gitlab-ci.yml
template
to your
.gitlab-ci.yml
file:
include:
- template: Security/Container-Scanning.gitlab-ci.yml
The included template:
container_scanning
job in your CI/CD pipeline.
GitLab saves the results as a Container Scanning report artifact that you can download and analyze later. When downloading, you always receive the most-recent artifact. If dependency scan is enabled , a Dependency Scanning report artifact is also created.
The following is a sample
.gitlab-ci.yml
that builds your Docker image, pushes it to the container
registry, and scans the image:
include:
- template: Jobs/Build.gitlab-ci.yml
- template: Security/Container-Scanning.gitlab-ci.yml
container_scanning:
variables:
CS_DEFAULT_BRANCH_IMAGE: $CI_REGISTRY_IMAGE/$CI_DEFAULT_BRANCH:$CI_COMMIT_SHA
Setting
CS_DEFAULT_BRANCH_IMAGE
avoids duplicate vulnerability findings when an image name differs across branches.
The value of
CS_DEFAULT_BRANCH_IMAGE
indicates the name of the scanned image as it appears on the default branch.
For more details on how this deduplication is achieved, see
Setting the default branch image
.
There may be cases where you want to customize how GitLab scans your containers. For example, you
may want to enable more verbose output, access a Docker registry that requires
authentication, and more. To change such settings, use the
variables
parameter in your
.gitlab-ci.yml
to set
CI/CD variables
.
The variables you set in your
.gitlab-ci.yml
overwrite those in
Container-Scanning.gitlab-ci.yml
.
This example includes the container scanning template and enables verbose output for the analyzer:
include:
- template: Security/Container-Scanning.gitlab-ci.yml
variables:
SECURE_LOG_LEVEL: 'debug'
To scan images located in a registry other than the project’s, use the following
.gitlab-ci.yml
:
For example, to scan an image from AWS Elastic Container Registry:
Authenticating to a remote registry is not supported when FIPS mode is enabled.
Introduced in GitLab 14.6.
The
CS_DISABLE_DEPENDENCY_LIST
CI/CD variable controls whether the scan creates a
Dependency List
report. This variable is currently only supported when the
trivy
analyzer is used. The variable’s default setting of
"false"
causes the scan to create the report. To disable
the report, set the variable to
"true"
:
For example:
include:
- template: Security/Container-Scanning.gitlab-ci.yml
container_scanning:
variables:
CS_DISABLE_DEPENDENCY_LIST: "true"
Introduced in GitLab 14.6.
The
CS_DISABLE_LANGUAGE_VULNERABILITY_SCAN
CI/CD variable controls whether the scan reports
findings related to programming languages. The languages supported depend on the
scanner used
:
By default, the report only includes packages managed by the Operating System (OS) package manager
(for example,
yum
,
apt
,
apk
,
tdnf
). To report security findings in non-OS packages, set
CS_DISABLE_LANGUAGE_VULNERABILITY_SCAN
to
"false"
:
include:
- template: Security/Container-Scanning.gitlab-ci.yml
container_scanning:
variables:
CS_DISABLE_LANGUAGE_VULNERABILITY_SCAN: "false"
When you enable this feature, you may see duplicate findings in the Vulnerability Report if Dependency Scanning is enabled for your project. This happens because GitLab can’t automatically deduplicate findings across different types of scanning tools. Reference this comparison between GitLab Dependency Scanning and Container Scanning for more details on which types of dependencies are likely to be duplicated.
You can configure analyzers by using the following CI/CD variables.
CI/CD Variable | Default | Description | Scanner |
---|---|---|---|
ADDITIONAL_CA_CERT_BUNDLE
|
""
|
Bundle of CA certs that you want to trust. See Using a custom SSL CA certificate authority for more details. | All |
CI_APPLICATION_REPOSITORY
|
$CI_REGISTRY_IMAGE/$CI_COMMIT_REF_SLUG
|
Docker repository URL for the image to be scanned. | All |
CI_APPLICATION_TAG
|
$CI_COMMIT_SHA
|
Docker repository tag for the image to be scanned. | All |
CS_ANALYZER_IMAGE
|
registry.gitlab.com/security-products/container-scanning:6
|
Docker image of the analyzer. | All |
CS_DEFAULT_BRANCH_IMAGE
|
""
|
The name of the
CS_IMAGE
on the default branch. See
Setting the default branch image
for more details.
Introduced
in GitLab 14.5.
|
All |
CS_DISABLE_DEPENDENCY_LIST
|
"false"
|
Disable Dependency Scanning for packages installed in the scanned image. Introduced in GitLab 14.6. | All |
CS_DISABLE_LANGUAGE_VULNERABILITY_SCAN
|
"true"
|
Disable scanning for language-specific packages installed in the scanned image. Introduced in GitLab 14.6. | All |
CS_DOCKER_INSECURE
|
"false"
|
Allow access to secure Docker registries using HTTPS without validating the certificates. | All |
CS_IMAGE_SUFFIX
|
""
|
Suffix added to
CS_ANALYZER_IMAGE
. If set to
-fips
,
FIPS-enabled
image is used for scan. See
FIPS-enabled images
for more details.
Introduced
in GitLab 14.10.
|
All |
CS_IGNORE_UNFIXED
|
"false"
|
Ignore vulnerabilities that are not fixed. | All |
CS_REGISTRY_INSECURE
|
"false"
|
Allow access to insecure registries (HTTP only). Should only be set to
true
when testing the image locally. Works with all scanners, but the registry must listen on port
80/tcp
for Trivy to work.
|
All |
CS_SEVERITY_THRESHOLD
|
UNKNOWN
|
Severity level threshold. The scanner outputs vulnerabilities with severity level higher than or equal to this threshold. Supported levels are
UNKNOWN
,
LOW
,
MEDIUM
,
HIGH
, and
CRITICAL
.
|
Trivy |
CS_IMAGE
|
$CI_APPLICATION_REPOSITORY:$CI_APPLICATION_TAG
|
The Docker image to be scanned. If set, this variable overrides the
$CI_APPLICATION_REPOSITORY
and
$CI_APPLICATION_TAG
variables.
|
All |
CS_REGISTRY_PASSWORD
|
$CI_REGISTRY_PASSWORD
|
Password for accessing a Docker registry requiring authentication. The default is only set if
$CS_IMAGE
resides at
$CI_REGISTRY
. Not supported when
FIPS mode
is enabled.
|
All |
CS_REGISTRY_USER
|
$CI_REGISTRY_USER
|
Username for accessing a Docker registry requiring authentication. The default is only set if
$CS_IMAGE
resides at
$CI_REGISTRY
. Not supported when
FIPS mode
is enabled.
|
All |
CS_DOCKERFILE_PATH
|
Dockerfile
|
The path to the
Dockerfile
to use for generating remediations. By default, the scanner looks for a file named
Dockerfile
in the root directory of the project. You should configure this variable only if your
Dockerfile
is in a non-standard location, such as a subdirectory. See
Solutions for vulnerabilities
for more details.
|
All |
CS_QUIET
|
""
|
If set, this variable disables output of the vulnerabilities table in the job log. Introduced in GitLab 15.1. | All |
SECURE_LOG_LEVEL
|
info
|
Set the minimum logging level. Messages of this logging level or higher are output. From highest to lowest severity, the logging levels are:
fatal
,
error
,
warn
,
info
,
debug
.
Introduced
in GitLab 13.1.
|
All |
Support depends on which scanner is used:
Distribution | Grype | Trivy |
---|---|---|
Alma Linux | ✅ | |
Alpine Linux | ✅ | ✅ |
Amazon Linux | ✅ | ✅ |
BusyBox | ✅ | |
CentOS | ✅ | ✅ |
CBL-Mariner | ✅ | |
Debian | ✅ | ✅ |
Distroless | ✅ | ✅ |
Oracle Linux | ✅ | ✅ |
Photon OS | ✅ | |
Red Hat (RHEL) | ✅ | ✅ |
Rocky Linux | ✅ | |
SUSE | ✅ | |
Ubuntu | ✅ | ✅ |
Introduced in GitLab 14.1.
GitLab also offers
FIPS-enabled Red Hat UBI
versions of the container-scanning images. You can therefore replace standard images with FIPS-enabled
images. To configure the images, set the
CS_IMAGE_SUFFIX
to
-fips
or modify the
CS_ANALYZER_IMAGE
variable to the
standard tag plus the
-fips
extension.
Scanner name |
CS_ANALYZER_IMAGE
|
---|---|
Default (Trivy) |
registry.gitlab.com/security-products/container-scanning:6-fips
|
Grype |
registry.gitlab.com/security-products/container-scanning/grype:6-fips
|
Trivy |
registry.gitlab.com/security-products/container-scanning/trivy:6-fips
|
-ubi
image extension is also available. GitLab 15.0 and later only
support
-fips
.
Starting with GitLab 14.10,
-fips
is automatically added to
CS_ANALYZER_IMAGE
when FIPS mode is
enabled in the GitLab instance.
Container scanning of images in authenticated registries is not supported when
FIPS mode
is enabled. When
CI_GITLAB_FIPS_MODE
is
"true"
, and
CS_REGISTRY_USER
or
CS_REGISTRY_PASSWORD
is set,
the analyzer exits with an error and does not perform the scan.
Introduced in GitLab 14.9.
To enable Container Scanning in a project, create a merge request from the Security Configuration page:
This automatically creates a merge request with the changes necessary to enable Container Scanning. To complete the configuration, review and merge this merge request.
The configuration tool works best with no existing
.gitlab-ci.yml
file, or with a minimal
configuration file. If you have a complex GitLab configuration file, it may not be parsed
successfully and an error may occur.
This example sets
GIT_STRATEGY
to
fetch
:
The following options are available:
Scanner name |
CS_ANALYZER_IMAGE
|
---|---|
Default ( Trivy ) |
registry.gitlab.com/security-products/container-scanning:6
|
Grype |
registry.gitlab.com/security-products/container-scanning/grype:6
|
Trivy |
registry.gitlab.com/security-products/container-scanning/trivy:6
|
Introduced in GitLab 14.5.
By default, container scanning assumes that the image naming convention stores any branch-specific identifiers in the image tag rather than the image name. When the image name differs between the default branch and the non-default branch, previously-detected vulnerabilities show up as newly detected in merge requests.
When the same image has different names on the default branch and a non-default branch, you can use
the
CS_DEFAULT_BRANCH_IMAGE
variable to indicate what that image’s name is on the default branch.
GitLab then correctly determines if a vulnerability already exists when running scans on non-default
branches.
As an example, suppose the following:
$CI_REGISTRY_IMAGE/$CI_COMMIT_BRANCH:$CI_COMMIT_SHA
.
$CI_REGISTRY_IMAGE:$CI_COMMIT_SHA
.
In this example, you can use the following CI/CD configuration to ensure that vulnerabilities aren’t duplicated:
include:
- template: Security/Container-Scanning.gitlab-ci.yml
container_scanning:
variables:
CS_DEFAULT_BRANCH_IMAGE: $CI_REGISTRY_IMAGE:$CI_COMMIT_SHA
before_script:
- export CS_IMAGE="$CI_REGISTRY_IMAGE/$CI_COMMIT_BRANCH:$CI_COMMIT_SHA"
if [ "$CI_COMMIT_BRANCH" == "$CI_DEFAULT_BRANCH" ]; then
export CS_IMAGE="$CI_REGISTRY_IMAGE:$CI_COMMIT_SHA"
CS_DEFAULT_BRANCH_IMAGE
should remain the same for a given
CS_IMAGE
. If it changes, then a
duplicate set of vulnerabilities are created, which must be manually dismissed.
When using
Auto DevOps
,
CS_DEFAULT_BRANCH_IMAGE
is
automatically set to
$CI_REGISTRY_IMAGE/$CI_DEFAULT_BRANCH:$CI_APPLICATION_TAG
.
You can use the
ADDITIONAL_CA_CERT_BUNDLE
CI/CD variable to configure a custom SSL CA certificate authority, which is used to verify the peer when fetching Docker images from a registry which uses HTTPS. The
ADDITIONAL_CA_CERT_BUNDLE
value should contain the
text representation of the X.509 PEM public-key certificate
. For example, to configure this value in the
.gitlab-ci.yml
file, use the following:
container_scanning:
variables:
ADDITIONAL_CA_CERT_BUNDLE: |
-----BEGIN CERTIFICATE-----
MIIGqTCCBJGgAwIBAgIQI7AVxxVwg2kch4d56XNdDjANBgkqhkiG9w0BAQsFADCB
jWgmPqF3vUbZE0EyScetPJquRFRKIesyJuBFMAs=
-----END CERTIFICATE-----
The
ADDITIONAL_CA_CERT_BUNDLE
value can also be configured as a
custom variable in the UI
, either as a
file
, which requires the path to the certificate, or as a variable, which requires the text representation of the certificate.
To allowlist specific vulnerabilities, follow these steps:
GIT_STRATEGY: fetch
in your
.gitlab-ci.yml
file by following the instructions in
overriding the container scanning template
.
vulnerability-allowlist.yml
. This must use
the format described in
vulnerability-allowlist.yml
data format
.
vulnerability-allowlist.yml
file to the root folder of your project’s Git repository.
vulnerability-allowlist.yml
data format
If a matching entry is found in the
vulnerability-allowlist.yml
file, the following happens:
Example
vulnerability-allowlist.yml
file:
This example excludes from
gl-container-scanning-report.json
:
generalallowlist
block allows you to specify CVE IDs globally. All vulnerabilities with matching CVE IDs are excluded from the scan report.
images
block allows you to specify CVE IDs for each container image independently. All vulnerabilities from the given image with matching CVE IDs are excluded from the scan report. The image name is retrieved from one of the environment variables used to specify the Docker image to be scanned, such as
$CI_APPLICATION_REPOSITORY:$CI_APPLICATION_TAG
or
CS_IMAGE
. The image provided in this block
must
match this value and
must not
include the tag value. For example, if you specify the image to be scanned using
CS_IMAGE=alpine:3.7
, then you would use
alpine
in the
images
block, but you cannot use
alpine:3.7
.
You can specify container image in multiple ways:
centos
).
your.private.registry:5000/centos
).
registry.gitlab.com/gitlab-org/security-products/dast/webgoat-8.0@sha256
).
cups
and
libxml2
in the previous example) is an optional comment format. It has
no impact
on the handling of vulnerabilities. You can include comments to describe the vulnerability.
The log contains a list of found vulnerabilities as a table, for example:
For self-managed GitLab instances in an environment with limited, restricted, or intermittent access to external resources through the internet, some adjustments are required for the container scanning job to successfully run. For more information, see Offline environments .
To use container scanning in an offline environment, you need:
docker
or
kubernetes
executor
.
GitLab Analyzer | Container Registry |
---|---|
Container-Scanning | Container-Scanning container registry |
GitLab Runner has a
default
pull policy
of
always
,
meaning the runner tries to pull Docker images from the GitLab container registry even if a local
copy is available. The GitLab Runner
pull_policy
can be set to
if-not-present
in an offline environment if you prefer using only locally available Docker images. However, we
recommend keeping the pull policy setting to
always
if not in an offline environment, as this
enables the use of updated scanners in your CI/CD pipelines.
Support for custom certificate authorities was introduced in the following versions:
Scanner | Version |
---|---|
Trivy
|
4.0.0 |
Grype
|
4.3.0 |
For container scanning, import the following images from
registry.gitlab.com
into your
local Docker container registry
:
registry.gitlab.com/security-products/container-scanning:6
registry.gitlab.com/security-products/container-scanning/grype:6
registry.gitlab.com/security-products/container-scanning/trivy:6
The process for importing Docker images into a local offline Docker registry depends on your network security policy . Consult your IT staff to find an accepted and approved process by which you can import or temporarily access external resources. These scanners are periodically updated , and you may be able to make occasional updates on your own.
For more information, see the specific steps on how to update an image with a pipeline .
For details on saving and transporting Docker images as a file, see the Docker documentation on
docker save
,
docker load
,
docker export
, and
docker import
.
Override the container scanning template
in your
.gitlab-ci.yml
file to refer to the Docker images hosted on your local Docker container registry:
include:
- template: Security/Container-Scanning.gitlab-ci.yml
container_scanning:
image: $CI_REGISTRY/namespace/container-scanning
If your local Docker container registry is running securely over HTTPS
, but you’re using a
self-signed certificate, then you must set CS_DOCKER_INSECURE: "true"
in the above
container_scanning
section of your .gitlab-ci.yml
.
Automating container scanning vulnerability database updates with a pipeline
We recommend that you set up a scheduled pipeline
to fetch the latest vulnerabilities database on a preset schedule.
Automating this with a pipeline means you do not have to do it manually each time. You can use the
following .gitlab-ci.yml
example as a template.
variables:
SOURCE_IMAGE: registry.gitlab.com/security-products/container-scanning:6
TARGET_IMAGE: $CI_REGISTRY/namespace/container-scanning
image: docker:stable
update-scanner-image:
services:
- docker:dind
script:
- docker pull $SOURCE_IMAGE
- docker tag $SOURCE_IMAGE $TARGET_IMAGE
- echo "$CI_REGISTRY_PASSWORD" | docker login $CI_REGISTRY --username $CI_REGISTRY_USER --password-stdin
- docker push $TARGET_IMAGE
The above template works for a GitLab Docker registry running on a local installation. However, if
you’re using a non-GitLab Docker registry, you must change the $CI_REGISTRY
value and the
docker login
credentials to match your local registry’s details.
Scan images in external private registries
If you use the GitLab Container Registry,
the CS_REGISTRY_USER
and CS_REGISTRY_PASSWORD
configuration variables
are set automatically and you can skip this configuration.
This example shows the configuration needed to scan images in a private Google Container Registry:
include:
- template: Security/Container-Scanning.gitlab-ci.yml
container_scanning:
variables:
CS_REGISTRY_USER: _json_key
CS_REGISTRY_PASSWORD: "$GCP_CREDENTIALS"
CS_IMAGE: "gcr.io/path-to-you-registry/image:tag"
Before you commit this configuration, add a CI/CD variable
for GCP_CREDENTIALS
containing the JSON key, as described in the
Google Cloud Platform Container Registry documentation.
Also:
- The value of the variable may not fit the masking requirements for the Mask variable option,
so the value could be exposed in the job logs.
- Scans may not run in unprotected feature branches if you select the Protect variable option.
- Consider creating credentials with read-only permissions and rotating them regularly if the
options aren’t selected.
Scanning images in external private registries is not supported when FIPS mode is enabled.
Running the standalone container scanning tool
It’s possible to run the GitLab container scanning tool
against a Docker container without needing to run it within the context of a CI job. To scan an
image directly, follow these steps:
Run Docker Desktop
or Docker Machine.
-
Run the analyzer’s Docker image, passing the image and tag you want to analyze in the
CI_APPLICATION_REPOSITORY
and CI_APPLICATION_TAG
variables:
docker run \
--interactive --rm \
--volume "$PWD":/tmp/app \
-e CI_PROJECT_DIR=/tmp/app \
-e CI_APPLICATION_REPOSITORY=registry.gitlab.com/gitlab-org/security-products/dast/webgoat-8.0@sha256 \
-e CI_APPLICATION_TAG=bc09fe2e0721dfaeee79364115aeedf2174cce0947b9ae5fe7c33312ee019a4e \
registry.gitlab.com/security-products/container-scanning
The results are stored in gl-container-scanning-report.json
.
Reports JSON format
The container scanning tool emits JSON reports which the GitLab Runner
recognizes through the artifacts:reports
keyword in the CI configuration file.
Once the CI job finishes, the Runner uploads these reports to GitLab, which are then available in
the CI Job artifacts. In GitLab Ultimate, these reports can be viewed in the corresponding pipeline
and become part of the Vulnerability Report.
These reports must follow a format defined in the
security report schemas. See:
For more information, see Security scanner integration.
CycloneDX Software Bill of Materials
Introduced in GitLab 15.11.
In addition to the
JSON report file
, the
Container Scanning
tool outputs a
CycloneDX
Software Bill of Materials (SBOM) for the scanned image. This CycloneDX SBOM is named
gl-sbom-report.cdx.json
and is saved in the same directory as the
JSON report file
. This feature is only supported when the
Trivy
analyzer is used.
You can download CycloneDX SBOMs
the same way as other job artifacts
.
Security Dashboard
The
Security Dashboard
shows you an overview of all
the security vulnerabilities in your groups, projects and pipelines.
Vulnerabilities database
All analyzer images are
updated daily
.
The images use data from upstream advisory databases depending on which scanner is used:
Data Source | Trivy | Grype |
---|---|---|
AlmaLinux Security Advisory | ✅ | ✅ |
Amazon Linux Security Center | ✅ | ✅ |
Arch Linux Security Tracker | ✅ | |
SUSE CVRF | ✅ | ✅ |
CWE Advisories | ✅ | |
Debian Security Bug Tracker | ✅ | ✅ |
GitHub Security Advisory | ✅ | ✅ |
Go Vulnerability Database | ✅ | |
CBL-Mariner Vulnerability Data | ✅ | |
NVD | ✅ | ✅ |
OSV | ✅ | |
Red Hat OVAL v2 | ✅ | ✅ |
Red Hat Security Data API | ✅ | ✅ |
Photon Security Advisories | ✅ | |
Rocky Linux UpdateInfo | ✅ | |
Ubuntu CVE Tracker (only data sources from mid 2021 and later) | ✅ | ✅ |
In addition to the sources provided by these scanners, GitLab maintains the following vulnerability databases:
-
The proprietary
GitLab Advisory Database
.
-
The open source
GitLab Advisory Database (Open Source Edition)
.
In the GitLab Ultimate tier, the data from the
GitLab Advisory Database
is merged in to augment the data from the external sources. In the GitLab Premium and Free tiers, the data from the
GitLab Advisory Database (Open Source Edition)
is merged in to augment the data from the external sources. This augmentation currently only applies to the analyzer images for the Trivy scanner.
Database update information for other analyzers is available in the
maintenance table
.
Interacting with the vulnerabilities
After a vulnerability is found, you can
address it
.
Solutions for vulnerabilities (auto-remediation)
Some vulnerabilities can be fixed by applying the solution that GitLab
automatically generates.
To enable remediation support, the scanning tool
must
have access to the
Dockerfile
specified by
the
CS_DOCKERFILE_PATH
CI/CD variable. To ensure that the scanning tool
has access to this
file, it’s necessary to set
GIT_STRATEGY: fetch
in
your
.gitlab-ci.yml
file by following the instructions described in this document’s
overriding the container scanning template
section.
Read more about the
solutions for vulnerabilities
.
Troubleshooting
docker: Error response from daemon: failed to copy xattrs
This is a result of a bug in Docker which is now
fixed
.
To prevent the error, ensure the Docker version that the runner is using is
18.09.03
or higher. For more information, see
issue #10241
.
Getting warning message
gl-container-scanning-report.json: no matching files
For information on this, see the
general Application Security troubleshooting section
.
Changes
Changes to the container scanning analyzer can be found in the project’s
changelog
.
Help & feedback
Docs
Edit this page
to fix an error or add an improvement in a merge request.
Create an issue
to suggest an improvement to this page.
Product
Create an issue
if there's something you don't like about this feature.
Propose functionality
by submitting a feature request.
Join First Look
to help shape new features.
Feature availability and product trials
View pricing
to see all GitLab tiers and features, or to upgrade.
Try GitLab for free
with access to all features for 30 days.
Get Help
If you didn't find what you were looking for,
search the docs
.
If you want help with something specific and could use community support,
post on the GitLab forum
.
For problems setting up or using this feature (depending on your GitLab
subscription).
Request support
会搭讪的蚂蚁 · C++ Web 编程 | 菜鸟教程 1 年前 |