Blog Security Upcoming GitLab.com narrow breaking changes to Secure Analyzers in GitLab 13.4
Published on: August 19, 2020
5 min read

Upcoming GitLab.com narrow breaking changes to Secure Analyzers in GitLab 13.4

Our next release, 13.4, will include narrow breaking changes for our Secure scanning features. Find out how this could affect you and what you need to do.

Blog fallback hero

We've spent the first few releases of GitLab 13 with several user-focused improvements to our Static Application Security Testing (SAST) capabilities:

With these changes we've modernized and simplified the way our Security scans work, requiring the deprecation and removal of a few configuration options to improve the security, stability, and speed of our analyzers.

With these removals, there are a few changes that you should make to your Secure scan configurations to ensure you continue enjoying those capabilities. All of these removals were previously announced as deprecations in the past few release blog posts.

These changes will release to GitLab.com as early as August 27th and will be released to self-managed customers with GitLab 13.4 on September 22. If you have questions or feedback, you can let us know in this feedback issue.

Removal of Secret Detection Job in SAST CI Template (High Impact)

Since GitLab 13.1, the Secret Detection CI/CD configuration settings moved to a separate GitLab-provided template and run as a new Secure scan type. This new Secret Detection template is also now included in Auto DevOps.

In 13.4 we will remove the old SAST secrets-sast job definition and if you have not switched to the new Secret Detection template you will not continue to scan for secrets. You can easily transition by adding the new template.

Before upgrading to GitLab 13.4 we recommend you add the new Secret Detection template to your gitlab-ci.yml file, and then remove the old SAST secrets-sast job definition from the SAST configuration template in SAST.gitlab-ci.yml file. We have made a video to guide you through the process of transitioning to this new template.

Removal of DinD (Medium impact)

To increase the security and reduce complexity of scans, use of Docker-in-Docker (DinD) in GitLab Secure scanners was deprecated in 13.0 and is scheduled for removal in 13.4. GitLab security products started to use non-DinD mode by default in vendor templates in GitLab 13.0. We encourage customers to update their vendor CI templates to use this new behavior. If you override or use custom Secure CI templates, you can follow the guides below to disable Docker in Docker (DinD) from your existing job templates:

Transition of Secure Analyzers to Linux Alpine image (Low impact)

To simplify and modernize our GitLab Secure SAST Analyzers, we will transition the GitLab Bandit Python Analyzer image from Debian Buster to Alpine Linux. This transition will reduce the image size and increase both the speed and security of our analyzer.

This transition will be backward incompatible though we expect limited impact. If you use a `before_script` to pre-build dependencies for your Python project, you should test this change before upgrading to GitLab 13.4. We will add a new section in the [SAST troubleshooting documentation](https://docs.gitlab.com/ee/user/application_security/sast/#troubleshooting) with more information about this change as we approach 13.4.

Transition of TSLint Job to ESLint (Low impact)

The recent update of our ESLint Secure analyzer includes new support for TypeScript which is actively maintained. Since 2019 the TSLint project has been deprecated in favor of ESLint. We have now unified these analyzers in GitLab's ESLint analyzer, which renders our TSLint analyzer obsolete.

In 13.2 we deprecated the TSLint Secure analyzer and have removed the TSLint job definition from the SAST template. If you leverage Auto DevOps or include the GitLab Secure SAST Template no action is required, as this transition happened automatically when you updated to GitLab 13.2. We recommend that anyone using the TSLint SAST job in a customized CI template to migrate to the newly updated ESLint Job.

The next time the SAST job runs after this transition you may see previously present TSLint vulnerabilities being marked as "resolved" and new TypeScript vulnerabilities from ESLint. This behavior is expected due to the new unique vulnerability signatures from ESLint which are different from old TSLint job scan vulnerability signatures.

Looking towards the future

We are always working to improve the security, efficiency, and quality of our Security scanning tools. These deprecations and removals help us rapidly improve our solution and allow us to deliver on our Secure product vision. We appreciate your understanding of these changes, and if you have questions about these deprecations and removals please let us know in this issue.

We want to hear from you

Enjoyed reading this blog post or have questions or feedback? Share your thoughts by creating a new topic in the GitLab community forum. Share your feedback

Ready to get started?

See what your team could do with a unified DevSecOps Platform.

Get free trial

Find out which plan works best for your team

Learn about pricing

Learn about what GitLab can do for your team

Talk to an expert