Open API spec definition for the scanners that can be plugged into Harbor to do artifact scanning.
Add support to Harbor for using other image scanners than Trivy by providing an adapter layer implemented as an HTTP API between Harbor and the scanners' native interfaces. This will provide runtime configurable scanner invocation to provide vulnerability scanning initially with the option for other types of scanning in the future.
Introduce:
- Scanner Adapter HTTP API (defined and maintained by Harbor)
- Core operations:
- Execute a scan (non-blocking)
- Retrieve a scan report (polling by Harbor)
- Describe the scanner’s capabilities, i.e. supported artifacts and reports
- Core operations:
- Scanner Adapter HTTP client in Harbor
- Scanner Adapter configuration management and persistence in the Harbor DB
The adapter interface is a well-defined REST API specified and maintained by Harbor. Harbor will have a client for the API, and manage configuration of the client. The configuration is primarily an endpoint registration, and multiple configurations will be supported concurrently in the system. This will allow user-selectable and configurable scanning of images at runtime with no restarts for Harbor required. Scanner adapters must implement the specified API, but the deployment and configuration of the adapter services is out-of-scope and should be covered by the provider themselves. Harbor itself is not responsible for management or deployment of the adapter services.
For more details, you can refer to the original design proposal.
This spec currently supports a collection of capabilities, before version 1.2, scanner provides the ability to produce different reports with mime type, but these capabilities are corresponding to the vulnerability, so in 1.2 spec we emphasize and added a new filed type
in the ScannerCapability
to describe the different scanning capabilities, the following are the currently supported capabilities matrix.
Capability Type | Supported consumed MIME types | Supported produced MIME types |
---|---|---|
vulnerability | application/vnd.oci.image.manifest.v1+json application/vnd.docker.distribution.manifest.v2+json |
application/vnd.scanner.adaptevuln.report.harbor+json; version=1.0 application/vnd.security.vulnerability.report; version=1.1 application/vnd.scanner.adapter.vuln.report.raw |
sbom | application/vnd.oci.image.manifest.v1+json application/vnd.docker.distribution.manifest.v2+json |
application/vnd.security.sbom.repo+json; version=1.0 |
The Scanner Adapter v1.2 - OpenAPI Specification introduces a new data spec model for the SBOMs(Software Bill of Materials), and bump several headers version to v1.1 so as to support specify the capability used, refer to the OpenAPI yaml for details.
application/vnd.scanner.adapter.metadata+json; version=1.1
application/vnd.scanner.adapter.scan.request+json; version=1.1
Note: There is no breaking change compared to before, we extended some fields on top of the v1.1 model and bumped its version. Harbor will be compatible with both v1.1 and v1.2.
The Scanner Adapter v1.1 - OpenAPI Specification normalizes the vulnerability schema to a base common representation and allowing scanners to provide more elaborate and richer information about vulnerabilities:
- CVSS 3.0 scores and vectors
- CVSS 2.0 scores and vectors
- CWE IDs for the vulnerability
- Ability to specify additional scanner specific details
It is mandated for the new scanner integrations to implement the current API specification. Existing scanner integrations should plan to migrate to the current version of the API. The older Scanner Adapter v1.0 - OpenAPI Specification is being maintained only for backward compatibility until existing scanner integrations move to the new API specification.
Note: OpenAPI spec yaml file can be opened in the online Swagger Editor.
- The deployment method is up to the vendor as long as the mounted API endpoint URL is accessible to Harbor services.
- For each ScanRequest a Scanner Adapter generates a unique identifier which is used to poll for the corresponding ScanReport.
- The lifetime of ScanRequest identifier returned by a Scanner Adapter is defined by the adapter. The TTL of the ScanReport and its identifier is long enough to support polling with reasonable timeouts.
- Scanner Adapters are not expected to persist scan reports forever, Harbor is supposed to cache at least the latest Scan Report.
- Scanner Adapters are not expected to make responses for the given artifact immutable, i.e. Scan Reports might change over time when new vulnerabilities are discovered.
- A Scan Job may get a 404 response status for a ScanRequest identifier and should treat it as failed and return a failure in the job. Harbor is expected to send a new Scan Request in that case.
- Scanner Adapter API leverages content negotiation by using MIME types in the
Accept
header to define schema of a result returned by GET/scan/{scan_request_id}/report
requests.
-
Make sure that the Scanner Adapter has expected capabilities:
curl -H 'Accept: application/vnd.scanner.adapter.metadata+json; version=1.1" \ http://scanner-adapter:8080/api/v1/metadata Content-Type: application/vnd.scanner.adapter.scanner.metadata+json; version=1.1 Status: 200 OK { "scanner": { "name": "Trivy", "vendor": "Aqua Security", "version": "0.18.0", }, "capabilities": [ { "type": "vulnerability" "consumes_mime_types": [ "application/vnd.oci.image.manifest.v1+json", "application/vnd.docker.distribution.manifest.v2+json" ], "produces_mime_types": [ "application/vnd.scanner.adapter.vuln.report.harbor+json; version=1.0", "application/vnd.security.vulnerability.report; version=1.1" ] } ], "properties": { "harbor.scanner-adapter/scanner-type": "os-package-vulnerability", "harbor.scanner-adapter/vulnerability-database-updated-at": "2019-08-13T08:16:33.345Z" } }
-
Submit the scan request
- Submit an invalid scan request:
curl http://scanner-adapter:8080/api/v1/scan \ -H 'Content-Type: application/vnd.scanner.adapter.scan.request+json; version=1.1' \ -d @- << EOF { "registry": { "url": "INVALID_REGISTRY_URL", "authorization": "Bearer JWTTOKENGOESHERE" }, "artifact": { "repository": "library/mongo", "digest": "sha256:917f5b7f4bef1b35ee90f03033f33a81002511c1e0767fd44276d4bd9cd2fa8e" }, "enabled_capabilities": [ { "type": "vulnerability" "produces_mime_types": ["application/vnd.security.vulnerability.report; version=1.1"] } ] } EOF Status: 422 Unprocessable Entity Content-Type: application/vnd.scanner.adapter.error+json; version=1.0' { "error": { "message": "invalid registry_url" } }
- Submit a valid scan request:
curl http://scanner-adapter:8080/api/v1/scan \ -H 'Content-Type: application/vnd.scanner.adapter.scan.request+json; version=1.1' \ -d @- << EOF { "registry": { "url": "harbor-harbor-registry:5000", "authorization": "Bearer: JWTTOKENGOESHERE" }, "artifact": { "repository": "library/mongo", "digest": "sha256:917f5b7f4bef1b35ee90f03033f33a81002511c1e0767fd44276d4bd9cd2fa8e" }, "enabled_capabilities": [ { "type": "vulnerability" "produces_mime_types": ["application/vnd.security.vulnerability.report; version=1.1"] } ] } EOF Status: 202 Accepted Content-Type: application/vnd.scanner.adapter.scan.response+json; version=1.0' { "id": "3fa85f64-5717-4562-b3fc-2c963f66afa6" }
- Submit an invalid scan request:
-
Try getting scan report (in the new v1.1 format understandable by Harbor Web console):
curl -H 'Accept: application/vnd.security.vulnerability.report; version=1.1' \ http://scanner-adapter:8080/api/v1/scan/3fa85f64-5717-4562-b3fc-2c963f66afa6/report Retry-After: 15 Status: 302 Found
-
Wait 15 seconds or use your own retry interval ...
-
... and try getting scan report again:
curl -H 'application/vnd.security.vulnerability.report; version=1.1' \ http://scanner-adapter:8080/api/v1/scan/3fa85f64-5717-4562-b3fc-2c963f66afa6/report Content-Type: application/vnd.security.vulnerability.report; version=1.1; Status: 200 OK { "generated_at": "2021-03-09T11:40:28.154072066Z", "artifact": { "repository": "library/docker", "digest": "sha256:7215e8e09ea282e517aa350fc5380c1773c117b1867316fb59076d901e252d15", "mime_type": "application/vnd.docker.distribution.manifest.v2+json" }, "scanner": { "name": "Trivy", "vendor": "Aqua Security", "version": "v0.16.0" }, "severity": "High", "vulnerabilities": [ { "id": "CVE-2020-1967", "package": "libcrypto1.1", "version": "1.1.1c-r0", "fix_version": "1.1.1g-r0", "severity": "High", "description": "Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the \"signature_algorithms_cert\" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).", "links": [ "https://avd.aquasec.com/nvd/cve-2020-1967" ], "preferred_cvss": { "score_v2": 5, "score_v3": 7.5, "vector_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "vector_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, "cwe_ids": [ "CWE-476" ], "vendor_attributes": { "CVSS": { "nvd": { "V2Score": 5, "V2Vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "V3Score": 7.5, "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, "redhat": { "V3Score": 7.5, "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } } } } ... ] }
-
Alternatively we could request a proprietary vulnerability report (with an example report generated by MicroScanner in JSON format):
curl -H 'Accept: application/vnd.scanner.adapter.vuln.report.raw' \ http://scanner-adapter:8080/api/v1/scan/3fa85f64-5717-4562-b3fc-2c963f66afa6/report Content-Type: application/vnd.scanner.adapter.vuln.report.raw Status: 200 OK { "scan_started": { "seconds": 1561386673, "nanos": 390482870 }, "scan_duration": 2, "digest": "b3c8bc6c39af8e8f18f5caf53eec3c6c4af60a1332d1736a0cd03e710388e9c8", "os": "debian", "version": "8", "resources": [ { "resource": { "format": "deb", "name": "apt", "version": "1.0.9.8.5", "arch": "amd64", "cpe": "pkg:/debian:8:apt:1.0.9.8.5", "name_hash": "583f72a833c7dfd63c03edba3776247a" }, "scanned": true, "vulnerabilities": [ { "name": "CVE-2011-3374", "vendor_score_version": "Aqua", "vendor_severity": "negligible", "vendor_statement": "Not exploitable in Debian, since no keyring URI is defined", "vendor_url": "https://security-tracker.debian.org/tracker/CVE-2011-3374", "classification": "..." } ] } ] }
- The
Accept
request header is required to indicate to Scanner Adapter an intended scan report format - If the client does not specify the
Accept
header it's assumed to be Harbor vulnerability report with the MIME typeapplication/vnd.scanner.adapter.vuln.report.harbor+json; version=1.0
. This behavior is currently maintained only for backward compatibility purposes. - In phase 1 each Scanner Adapter should support at least the following artifact MIME types:
application/vnd.oci.image.manifest.v1+json
application/vnd.docker.distribution.manifest.v2+json
- In phase 1 each Scanner Adapter should support at least the following scan report MIME types:
application/vnd.scanner.adapter.vuln.report.harbor+json; version=1.0
- corresponds toHarborVulnerabilityReport
- fixed schema described in Scanner Adapter API spec
- can be parsed in type-safe manner and displayed in Harbor Web console.
application/vnd.scanner.adapter.vuln.report.raw
- corresponds to a raw scan report
- no fixed schema, documented by a scanner's vendor
- New scan report MIME types might be introduced without breaking the backward compatibility of the API and introducing new URL paths to the Scanner Adapter API spec.
- For example, there can be a vendor specific policy report returned by Anchore with the corresponding MIME type
application/vnd.anchore.policy.report+json; version=0.3
:[ { "sha256:57334c50959f26ce1ee025d08f136c2292c128f84e7b229d1b0da5dac89e9866": { "docker.io/alpine:latest": [ { "detail": {}, "last_evaluation": "2019-08-07T06:33:48Z", "policyId": "2c53a13c-1765-11e8-82ef-23527761d060", "status": "pass" } ] } } ]
For more details, please refer to the Harbor compatibility list document.