https://github.com/goharbor/pluggable-scanner-spec
Open API spec definition for the scanners that can be plugged into Harbor to do artifact scanning.
https://github.com/goharbor/pluggable-scanner-spec
api harbor openapi scanner swagger
Last synced: 11 months ago
JSON representation
Open API spec definition for the scanners that can be plugged into Harbor to do artifact scanning.
- Host: GitHub
- URL: https://github.com/goharbor/pluggable-scanner-spec
- Owner: goharbor
- License: apache-2.0
- Created: 2019-12-09T08:53:58.000Z (over 6 years ago)
- Default Branch: master
- Last Pushed: 2024-06-06T06:18:35.000Z (almost 2 years ago)
- Last Synced: 2024-07-30T19:44:31.045Z (over 1 year ago)
- Topics: api, harbor, openapi, scanner, swagger
- Size: 27.3 KB
- Stars: 20
- Watchers: 12
- Forks: 10
- Open Issues: 10
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# pluggable-scanner-spec

Open API spec definition for the scanners that can be plugged into Harbor to do artifact scanning.
## Background
Add support to Harbor for using other image scanners than _Trivy_ by providing an adapter layer implemented as an HTTP API between Harbor and the scanners' native
interfaces. This will provide runtime configurable scanner invocation to provide vulnerability scanning initially with
the option for other types of scanning in the future.
Introduce:
1. Scanner Adapter HTTP API (defined and maintained by Harbor)
- Core operations:
- Execute a scan (non-blocking)
- Retrieve a scan report (polling by Harbor)
- Describe the scanner’s capabilities, i.e. supported artifacts and reports
2. Scanner Adapter HTTP client in Harbor
3. Scanner Adapter configuration management and persistence in the Harbor DB
The adapter interface is a well-defined REST API specified and maintained by Harbor. Harbor will have a client for the
API, and manage configuration of the client. The configuration is primarily an endpoint registration, and multiple
configurations will be supported concurrently in the system. This will allow user-selectable and configurable scanning
of images at runtime with no restarts for Harbor required. Scanner adapters must implement the specified API, but the
deployment and configuration of the adapter services is out-of-scope and should be covered by the provider themselves. Harbor itself is
not responsible for management or deployment of the adapter services.
For more details, you can refer to the original [design proposal](https://github.com/goharbor/community/blob/master/proposals/pluggable-image-vulnerability-scanning_proposal.md).
## Capabilities
This spec currently supports a collection of capabilities, before version 1.2, scanner provides the ability to produce different reports with mime type, but these capabilities are corresponding to the vulnerability, so in 1.2 spec we emphasize and added a new filed `type` in the `ScannerCapability` to describe the different scanning capabilities, the following are the currently supported capabilities matrix.
| Capability Type | Supported consumed MIME types | Supported produced MIME types |
| --------------- | ----------------------------- | ----------------------------- |
| vulnerability | `application/vnd.oci.image.manifest.v1+json`
`application/vnd.docker.distribution.manifest.v2+json` | `application/vnd.scanner.adaptevuln.report.harbor+json; version=1.0`
`application/vnd.security.vulnerability.report; version=1.1`
`application/vnd.scanner.adapter.vuln.report.raw`|
| sbom | `application/vnd.oci.image.manifest.v1+json`
`application/vnd.docker.distribution.manifest.v2+json` | `application/vnd.security.sbom.repo+json; version=1.0` |
## Scanner Adapter API
The [Scanner Adapter v1.2 - OpenAPI Specification](./api/spec/scanner-adapter-openapi-v1.2.yaml) introduces a new [data spec model](./data/spec/SBOM.md) for the SBOMs(Software Bill of Materials), and bump several headers version to v1.1 so as to support specify the capability used, refer to the OpenAPI yaml for details.
- `application/vnd.scanner.adapter.metadata+json; version=1.1`
- `application/vnd.scanner.adapter.scan.request+json; version=1.1`
> Note: There is no breaking change compared to before, we extended some fields on top of the v1.1 model and bumped its version. Harbor will be compatible with both v1.1 and v1.2.
The [Scanner Adapter v1.1 - OpenAPI Specification](./api/spec/scanner-adapter-openapi-v1.1.yaml) normalizes the vulnerability schema to a base common representation and allowing scanners to provide more elaborate and richer information about vulnerabilities:
* CVSS 3.0 scores and vectors
* CVSS 2.0 scores and vectors
* CWE IDs for the vulnerability
* Ability to specify additional scanner specific details
It is mandated for the new scanner integrations to implement the current API specification.
Existing scanner integrations should plan to migrate to the current version of the API.
The older [Scanner Adapter v1.0 - OpenAPI Specification](./api/spec/scanner-adapter-openapi-v1.0.yaml) is being maintained only for backward compatibility until existing scanner integrations move to the new API specification.
> Note: OpenAPI spec yaml file can be opened in the online [Swagger Editor](https://editor.swagger.io/?url=https://raw.githubusercontent.com/goharbor/pluggable-scanner-spec/master/api/spec/scanner-adapter-openapi-v1.1.yaml).
- The deployment method is up to the vendor as long as the mounted API endpoint URL is accessible to Harbor services.
- For each ScanRequest a Scanner Adapter generates a unique identifier which is used to poll for the corresponding
ScanReport.
- The lifetime of ScanRequest identifier returned by a Scanner Adapter is defined by the adapter. The TTL of the
ScanReport and its identifier is long enough to support polling with reasonable timeouts.
- Scanner Adapters are not expected to persist scan reports forever, Harbor is supposed to cache at least the latest
Scan Report.
- Scanner Adapters are not expected to make responses for the given artifact immutable, i.e. Scan Reports might change
over time when new vulnerabilities are discovered.
- A Scan Job may get a 404 response status for a ScanRequest identifier and should treat it as failed and return a
failure in the job. Harbor is expected to send a new Scan Request in that case.
- Scanner Adapter API leverages content negotiation by using MIME types in the `Accept` header to define schema of
a result returned by GET `/scan/{scan_request_id}/report` requests.
### Sample Interaction between Harbor and Scanner Adapter
1. Make sure that the Scanner Adapter has expected capabilities:
```
curl -H 'Accept: application/vnd.scanner.adapter.metadata+json; version=1.1" \
http://scanner-adapter:8080/api/v1/metadata
Content-Type: application/vnd.scanner.adapter.scanner.metadata+json; version=1.1
Status: 200 OK
{
"scanner": {
"name": "Trivy",
"vendor": "Aqua Security",
"version": "0.18.0",
},
"capabilities": [
{
"type": "vulnerability"
"consumes_mime_types": [
"application/vnd.oci.image.manifest.v1+json",
"application/vnd.docker.distribution.manifest.v2+json"
],
"produces_mime_types": [
"application/vnd.scanner.adapter.vuln.report.harbor+json; version=1.0",
"application/vnd.security.vulnerability.report; version=1.1"
]
}
],
"properties": {
"harbor.scanner-adapter/scanner-type": "os-package-vulnerability",
"harbor.scanner-adapter/vulnerability-database-updated-at": "2019-08-13T08:16:33.345Z"
}
}
```
2. Submit the scan request
1. Submit an invalid scan request:
```
curl http://scanner-adapter:8080/api/v1/scan \
-H 'Content-Type: application/vnd.scanner.adapter.scan.request+json; version=1.1' \
-d @- << EOF
{
"registry": {
"url": "INVALID_REGISTRY_URL",
"authorization": "Bearer JWTTOKENGOESHERE"
},
"artifact": {
"repository": "library/mongo",
"digest": "sha256:917f5b7f4bef1b35ee90f03033f33a81002511c1e0767fd44276d4bd9cd2fa8e"
},
"enabled_capabilities": [
{
"type": "vulnerability"
"produces_mime_types": ["application/vnd.security.vulnerability.report; version=1.1"]
}
]
}
EOF
Status: 422 Unprocessable Entity
Content-Type: application/vnd.scanner.adapter.error+json; version=1.0'
{
"error": {
"message": "invalid registry_url"
}
}
```
2. Submit a valid scan request:
```
curl http://scanner-adapter:8080/api/v1/scan \
-H 'Content-Type: application/vnd.scanner.adapter.scan.request+json; version=1.1' \
-d @- << EOF
{
"registry": {
"url": "harbor-harbor-registry:5000",
"authorization": "Bearer: JWTTOKENGOESHERE"
},
"artifact": {
"repository": "library/mongo",
"digest": "sha256:917f5b7f4bef1b35ee90f03033f33a81002511c1e0767fd44276d4bd9cd2fa8e"
},
"enabled_capabilities": [
{
"type": "vulnerability"
"produces_mime_types": ["application/vnd.security.vulnerability.report; version=1.1"]
}
]
}
EOF
Status: 202 Accepted
Content-Type: application/vnd.scanner.adapter.scan.response+json; version=1.0'
{
"id": "3fa85f64-5717-4562-b3fc-2c963f66afa6"
}
```
3. Try getting scan report (in the new v1.1 format understandable by Harbor Web console):
```
curl -H 'Accept: application/vnd.security.vulnerability.report; version=1.1' \
http://scanner-adapter:8080/api/v1/scan/3fa85f64-5717-4562-b3fc-2c963f66afa6/report
Retry-After: 15
Status: 302 Found
```
4. Wait 15 seconds or use your own retry interval ...
5. ... and try getting scan report again:
```
curl -H 'application/vnd.security.vulnerability.report; version=1.1' \
http://scanner-adapter:8080/api/v1/scan/3fa85f64-5717-4562-b3fc-2c963f66afa6/report
Content-Type: application/vnd.security.vulnerability.report; version=1.1;
Status: 200 OK
{
"generated_at": "2021-03-09T11:40:28.154072066Z",
"artifact": {
"repository": "library/docker",
"digest": "sha256:7215e8e09ea282e517aa350fc5380c1773c117b1867316fb59076d901e252d15",
"mime_type": "application/vnd.docker.distribution.manifest.v2+json"
},
"scanner": {
"name": "Trivy",
"vendor": "Aqua Security",
"version": "v0.16.0"
},
"severity": "High",
"vulnerabilities": [
{
"id": "CVE-2020-1967",
"package": "libcrypto1.1",
"version": "1.1.1c-r0",
"fix_version": "1.1.1g-r0",
"severity": "High",
"description": "Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the \"signature_algorithms_cert\" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).",
"links": [
"https://avd.aquasec.com/nvd/cve-2020-1967"
],
"preferred_cvss": {
"score_v2": 5,
"score_v3": 7.5,
"vector_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"vector_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"cwe_ids": [
"CWE-476"
],
"vendor_attributes": {
"CVSS": {
"nvd": {
"V2Score": 5,
"V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"V3Score": 7.5,
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"redhat": {
"V3Score": 7.5,
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
}
}
}
...
]
}
```
6. Alternatively we could request a proprietary vulnerability report (with an example report generated
by MicroScanner in JSON format):
```
curl -H 'Accept: application/vnd.scanner.adapter.vuln.report.raw' \
http://scanner-adapter:8080/api/v1/scan/3fa85f64-5717-4562-b3fc-2c963f66afa6/report
Content-Type: application/vnd.scanner.adapter.vuln.report.raw
Status: 200 OK
{
"scan_started": {
"seconds": 1561386673,
"nanos": 390482870
},
"scan_duration": 2,
"digest": "b3c8bc6c39af8e8f18f5caf53eec3c6c4af60a1332d1736a0cd03e710388e9c8",
"os": "debian",
"version": "8",
"resources": [
{
"resource": {
"format": "deb",
"name": "apt",
"version": "1.0.9.8.5",
"arch": "amd64",
"cpe": "pkg:/debian:8:apt:1.0.9.8.5",
"name_hash": "583f72a833c7dfd63c03edba3776247a"
},
"scanned": true,
"vulnerabilities": [
{
"name": "CVE-2011-3374",
"vendor_score_version": "Aqua",
"vendor_severity": "negligible",
"vendor_statement": "Not exploitable in Debian, since no keyring URI is defined",
"vendor_url": "https://security-tracker.debian.org/tracker/CVE-2011-3374",
"classification": "..."
}
]
}
]
}
```
- The `Accept` request header is required to indicate to Scanner Adapter an intended scan report format
- If the client does not specify the `Accept` header it's assumed to be Harbor vulnerability report with the
MIME type `application/vnd.scanner.adapter.vuln.report.harbor+json; version=1.0`. This behavior is currently maintained only for backward compatibility purposes.
- In phase 1 each Scanner Adapter should support at least the following artifact MIME types:
- `application/vnd.oci.image.manifest.v1+json`
- `application/vnd.docker.distribution.manifest.v2+json`
- In phase 1 each Scanner Adapter should support at least the following scan report MIME types:
- `application/vnd.scanner.adapter.vuln.report.harbor+json; version=1.0` - corresponds to `HarborVulnerabilityReport`
- fixed schema described in Scanner Adapter API spec
- can be parsed in type-safe manner and displayed in Harbor Web console.
- `application/vnd.scanner.adapter.vuln.report.raw`
- corresponds to a raw scan report
- no fixed schema, documented by a scanner's vendor
- New scan report MIME types might be introduced without breaking the backward compatibility of the API and introducing
new URL paths to the Scanner Adapter API spec.
- For example, there can be a vendor specific policy report returned by Anchore with the corresponding MIME type
`application/vnd.anchore.policy.report+json; version=0.3`:
```json
[
{
"sha256:57334c50959f26ce1ee025d08f136c2292c128f84e7b229d1b0da5dac89e9866": {
"docker.io/alpine:latest": [
{
"detail": {},
"last_evaluation": "2019-08-07T06:33:48Z",
"policyId": "2c53a13c-1765-11e8-82ef-23527761d060",
"status": "pass"
}
]
}
}
]
```
## Scanner Adapter Implementations
* [Aqua Trivy](https://github.com/aquasecurity/harbor-scanner-trivy)
* [Clair](https://github.com/goharbor/harbor-scanner-clair)
* [Anchore](https://github.com/anchore/harbor-scanner-adapter)
* [Aqua CSP](https://github.com/aquasecurity/harbor-scanner-aqua)
* [DoSec Scanner](https://github.com/dosec-cn/harbor-scanner/blob/master/README_en.md)
* [Sysdig](https://github.com/sysdiglabs/harbor-scanner-sysdig-secure)
* [TensorSecurity](https://github.com/tensorsecurity/harbor-scanner)
For more details, please refer to the [Harbor compatibility list](https://goharbor.io/docs/edge/install-config/harbor-compatibility-list/) document.