Skip to content

Commit f623701

Browse files
Whitespotsgitbook-bot
Whitespots
authored andcommitted
GITBOOK-469: No subject
1 parent e0cc999 commit f623701

File tree

6 files changed

+27
-2
lines changed

6 files changed

+27
-2
lines changed

.gitbook/assets/image (1) (1).png

24.9 KB
Loading

.gitbook/assets/image (1).png

-23.9 KB
Loading

.gitbook/assets/image.png

64.5 KB
Loading

appsec-portal/features/custom-reports.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Choose the necessary report settings for its output to meet your goals:
2525

2626
{% tabs %}
2727
{% tab title="Cover Page" %}
28-
<figure><img src="../../.gitbook/assets/image (1).png" alt=""><figcaption><p>Executive summary and Full report example</p></figcaption></figure>
28+
<figure><img src="../../.gitbook/assets/image (1) (1).png" alt=""><figcaption><p>Executive summary and Full report example</p></figcaption></figure>
2929
{% endtab %}
3030

3131
{% tab title="Overview" %}

appsec-portal/scanners/scanner-description/code-scanners/hadolint.md

+25
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,33 @@ description: Dockerfile linter, validate inline bash, written in Haskell
44

55
# Hadolint
66

7+
**AppSec Portal Importer Name**: Hadolint Dockerfile check
8+
79
[Hadolint ](https://github.com/hadolint/hadolint)is a specialized **Dockerfile** linter designed to ensure the correctness of Dockerfile syntax, adherence to best practices, and the identification of potential issues related to Docker image creation. It focuses on code quality and conformity to Dockerfile standards, assisting in the creation of secure and well-structured Docker images.
810

911
Hadolint analyzes Dockerfiles by checking for common mistakes, adherence to Dockerfile guidelines, and potential security issues. This tool can help developers and DevOps teams maintain high-quality Dockerfiles, ensuring that the resulting images are secure, efficient, and error-free.
1012

1113
One notable feature of Hadolint is its ability to provide feedback on Dockerfiles even before the images are built, allowing developers to catch potential issues early in the development process.
14+
15+
#### Curl example
16+
17+
{% code overflow="wrap" %}
18+
```
19+
curl -X POST localhost/api/v1/scan/import/ -H "Authorization: Token a75bb26171cf391671e67b128bfc8ae1c779ff7b" -H "Content-Type: multipart/form-data" -F "file=@./" -F "product_name=Product1" -F "product_type=Application" -F "scanner_name=Hadolint Dockerfile check" -F "branch=dev"
20+
```
21+
{% endcode %}
22+
23+
In this command, the following parameters are used:
24+
25+
1. `-X POST`: specifies the HTTP method to be used (in this case, POST)
26+
2. `-H "Authorization: Token <authorization_token>"`: specifies the [**authorization token**](../../importing-reports-from-scanners-to-appsec-portal/#authorization-token) obtained from AppSec Portal.
27+
3. `-H "Content-Type: multipart/form-data"`: specifies the content type of the request.
28+
4. `-F "file=@<report_file_path>"`: specifies the **path to the report file** generated by the scanner.
29+
5. `-F "product_name=<product_name>"`: specifies the **name of the product** being scanned.
30+
6. `-F "product_type=<product_type>"`: specifies the **type of the product** being scanned.
31+
7. `-F "scanner_name=<scanner_name>"`: specifies the **name of the scanner** used to generate the report (Hadolint Dockerfile check)
32+
8. `-F "branch=<branch_name>"`: (_optional_) specifies the name of the branch in the source code repository (if applicable) This parameter is particularly useful when you want to associate the scan results with a specific branch in your repository. If not provided, the scan will be associated with the default branch
33+
34+
**Report example:**
35+
36+
<figure><img src="../../../../.gitbook/assets/image.png" alt=""><figcaption></figcaption></figure>

auditor/run-audit/direct-use-of-auditor.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ Clicking on a pipeline provides information about the Jobs in it, as well as Log
5757

5858
<figure><img src="../../.gitbook/assets/audit3.png" alt=""><figcaption></figcaption></figure>
5959

60-
You can bulk delete all pipelines by clicking on the button <img src="../../.gitbook/assets/image.png" alt="" data-size="line">
60+
You can bulk delete all pipelines by clicking on the button <img src="../../.gitbook/assets/image (1).png" alt="" data-size="line">
6161

6262
<figure><img src="../../.gitbook/assets/audit2.png" alt=""><figcaption></figcaption></figure>
6363

0 commit comments

Comments
 (0)