Hi all. I am new to Sonar Cloud. I am attempting to get sonarcloud to detect vulnerabilities.
using Git Hub, The intention is to scan with Git Hib actions. The project is Java built on gradle. It’s a private repository. I have initiated a sonar project with default sonar way quality gate and bound it to the repo.
My build.gradle as follows
plugins {
id 'java'
id 'io.freefair.lombok' version '6.6.2'
id 'application'
id 'org.springframework.boot' version '2.7.18'
id 'io.spring.dependency-management' version '1.1.3'
id 'nu.studer.jooq' version '8.2.1'
id 'com.avast.gradle.docker-compose' version '0.17.1'
id "org.sonarqube" version "4.4.1.3373"
}
sonar {
properties {
property "sonar.projectKey", <my Key>
property "sonar.organization", "< my Organization>
property "sonar.host.url", "https://sonarcloud.io"
}
Running gradle build or gradle sonar does run an analysis. It’s found bugs and code smells. However it has not picked up any vulnerabilities. I know there are vulnerabilities in the repo because the AWS scanner reports them. Many of these vulnerable libraries are pulled in through the docker image (as opposed to being accessed directly in the code).
Here is the docker file.
FROM debian:trixie-slim AS deps
RUN apt-get update && apt-get install -y wget
WORKDIR /work
RUN wget https://dtdg.co/latest-java-tracer -O dd-java-agent.jar
FROM gcr.io/distroless/java17-debian11:nonroot as builder
WORKDIR /service
ARG JAR_FILE=build/libs/<My Jar File>
COPY ${JAR_FILE} <My Jar File Location>
USER root
RUN ["java", "-Djarmode=layertools", "-jar", <My Jar File>, "extract"
FROM gcr.io/distroless/java17-debian11:nonroot
WORKDIR /service
COPY --from=deps /work/dd-java-agent.jar ./dd-java-agent.jar
COPY config ./config
COPY --from=builder service/spring-boot-loader/ ./
COPY --from=builder service/dependencies/ ./
COPY --from=builder service/snapshot-dependencies/ ./
COPY --from=builder service/application/ ./
EXPOSE 8080
ENTRYPOINT ["java", "org.springframework.boot.loader.JarLauncher"]
I know the debian distribution contains numerous vulnerabilities. Is it possible for sonar cloud to scan the dockerfile so detect them? If so how do I configure it?