|
| 1 | +# TODO: Example |
| 2 | + |
| 3 | +# the output format(s) of the SBOM report (options: table, text, json, spdx, ...) |
| 4 | +# same as -o, --output, and SYFT_OUTPUT env var |
| 5 | +# to specify multiple output files in differing formats, use a list: |
| 6 | +# output: |
| 7 | +# - "json=<syft-json-output-file>" |
| 8 | +# - "spdx-json=<spdx-json-output-file>" |
| 9 | +output: "table" |
| 10 | + |
| 11 | +# suppress all output (except for the SBOM report) |
| 12 | +# same as -q ; SYFT_QUIET env var |
| 13 | +quiet: false |
| 14 | + |
| 15 | +# same as --file; write output report to a file (default is to write to stdout) |
| 16 | +file: "" |
| 17 | + |
| 18 | +# enable/disable checking for application updates on startup |
| 19 | +# same as SYFT_CHECK_FOR_APP_UPDATE env var |
| 20 | +check-for-app-update: true |
| 21 | + |
| 22 | +# a list of globs to exclude from scanning. same as --exclude ; for example: |
| 23 | +# exclude: |
| 24 | +# - "/etc/**" |
| 25 | +# - "./out/**/*.json" |
| 26 | +exclude: [] |
| 27 | + |
| 28 | +# os and/or architecture to use when referencing container images (e.g. "windows/armv6" or "arm64") |
| 29 | +# same as --platform; SYFT_PLATFORM env var |
| 30 | +platform: "" |
| 31 | + |
| 32 | +# set the list of package catalogers to use when generating the SBOM |
| 33 | +# default = empty (cataloger set determined automatically by the source type [image or file/directory]) |
| 34 | +# catalogers: |
| 35 | +# - ruby-gemfile |
| 36 | +# - ruby-gemspec |
| 37 | +# - python-index |
| 38 | +# - python-package |
| 39 | +# - javascript-lock |
| 40 | +# - javascript-package |
| 41 | +# - php-composer-installed |
| 42 | +# - php-composer-lock |
| 43 | +# - alpmdb |
| 44 | +# - dpkgdb |
| 45 | +# - rpmdb |
| 46 | +# - java |
| 47 | +# - apkdb |
| 48 | +# - go-module-binary |
| 49 | +# - go-mod-file |
| 50 | +# - dartlang-lock |
| 51 | +# - rust |
| 52 | +# - dotnet-deps |
| 53 | +catalogers: |
| 54 | + |
| 55 | +# cataloging packages is exposed through the packages and power-user subcommands |
| 56 | +package: |
| 57 | + |
| 58 | + # search within archives that do contain a file index to search against (zip) |
| 59 | + # note: for now this only applies to the java package cataloger |
| 60 | + # SYFT_PACKAGE_SEARCH_INDEXED_ARCHIVES env var |
| 61 | + search-indexed-archives: true |
| 62 | + |
| 63 | + # search within archives that do not contain a file index to search against (tar, tar.gz, tar.bz2, etc) |
| 64 | + # note: enabling this may result in a performance impact since all discovered compressed tars will be decompressed |
| 65 | + # note: for now this only applies to the java package cataloger |
| 66 | + # SYFT_PACKAGE_SEARCH_UNINDEXED_ARCHIVES env var |
| 67 | + search-unindexed-archives: false |
| 68 | + |
| 69 | + cataloger: |
| 70 | + # enable/disable cataloging of packages |
| 71 | + # SYFT_PACKAGE_CATALOGER_ENABLED env var |
| 72 | + enabled: true |
| 73 | + |
| 74 | + # the search space to look for packages (options: all-layers, squashed) |
| 75 | + # same as -s ; SYFT_PACKAGE_CATALOGER_SCOPE env var |
| 76 | + scope: "squashed" |
| 77 | + |
| 78 | +# cataloging file classifications is exposed through the power-user subcommand |
| 79 | +file-classification: |
| 80 | + cataloger: |
| 81 | + # enable/disable cataloging of file classifications |
| 82 | + # SYFT_FILE_CLASSIFICATION_CATALOGER_ENABLED env var |
| 83 | + enabled: true |
| 84 | + |
| 85 | + # the search space to look for file classifications (options: all-layers, squashed) |
| 86 | + # SYFT_FILE_CLASSIFICATION_CATALOGER_SCOPE env var |
| 87 | + scope: "squashed" |
| 88 | + |
| 89 | +# cataloging file contents is exposed through the power-user subcommand |
| 90 | +file-contents: |
| 91 | + cataloger: |
| 92 | + # enable/disable cataloging of secrets |
| 93 | + # SYFT_FILE_CONTENTS_CATALOGER_ENABLED env var |
| 94 | + enabled: true |
| 95 | + |
| 96 | + # the search space to look for secrets (options: all-layers, squashed) |
| 97 | + # SYFT_FILE_CONTENTS_CATALOGER_SCOPE env var |
| 98 | + scope: "squashed" |
| 99 | + |
| 100 | + # skip searching a file entirely if it is above the given size (default = 1MB; unit = bytes) |
| 101 | + # SYFT_FILE_CONTENTS_SKIP_FILES_ABOVE_SIZE env var |
| 102 | + skip-files-above-size: 1048576 |
| 103 | + |
| 104 | + # file globs for the cataloger to match on |
| 105 | + # SYFT_FILE_CONTENTS_GLOBS env var |
| 106 | + globs: [] |
| 107 | + |
| 108 | +# cataloging file metadata is exposed through the power-user subcommand |
| 109 | +file-metadata: |
| 110 | + cataloger: |
| 111 | + # enable/disable cataloging of file metadata |
| 112 | + # SYFT_FILE_METADATA_CATALOGER_ENABLED env var |
| 113 | + enabled: true |
| 114 | + |
| 115 | + # the search space to look for file metadata (options: all-layers, squashed) |
| 116 | + # SYFT_FILE_METADATA_CATALOGER_SCOPE env var |
| 117 | + scope: "squashed" |
| 118 | + |
| 119 | + # the file digest algorithms to use when cataloging files (options: "sha256", "md5", "sha1") |
| 120 | + # SYFT_FILE_METADATA_DIGESTS env var |
| 121 | + digests: ["sha256"] |
| 122 | + |
| 123 | +# cataloging secrets is exposed through the power-user subcommand |
| 124 | +secrets: |
| 125 | + cataloger: |
| 126 | + # enable/disable cataloging of secrets |
| 127 | + # SYFT_SECRETS_CATALOGER_ENABLED env var |
| 128 | + enabled: true |
| 129 | + |
| 130 | + # the search space to look for secrets (options: all-layers, squashed) |
| 131 | + # SYFT_SECRETS_CATALOGER_SCOPE env var |
| 132 | + scope: "all-layers" |
| 133 | + |
| 134 | + # show extracted secret values in the final JSON report |
| 135 | + # SYFT_SECRETS_REVEAL_VALUES env var |
| 136 | + reveal-values: false |
| 137 | + |
| 138 | + # skip searching a file entirely if it is above the given size (default = 1MB; unit = bytes) |
| 139 | + # SYFT_SECRETS_SKIP_FILES_ABOVE_SIZE env var |
| 140 | + skip-files-above-size: 1048576 |
| 141 | + |
| 142 | + # name-regex pairs to consider when searching files for secrets. Note: the regex must match single line patterns |
| 143 | + # but may also have OPTIONAL multiline capture groups. Regexes with a named capture group of "value" will |
| 144 | + # use the entire regex to match, but the secret value will be assumed to be entirely contained within the |
| 145 | + # "value" named capture group. |
| 146 | + additional-patterns: {} |
| 147 | + |
| 148 | + # names to exclude from the secrets search, valid values are: "aws-access-key", "aws-secret-key", "pem-private-key", |
| 149 | + # "docker-config-auth", and "generic-api-key". Note: this does not consider any names introduced in the |
| 150 | + # "secrets.additional-patterns" config option. |
| 151 | + # SYFT_SECRETS_EXCLUDE_PATTERN_NAMES env var |
| 152 | + exclude-pattern-names: [] |
| 153 | + |
| 154 | +# options when pulling directly from a registry via the "registry:" scheme |
| 155 | +registry: |
| 156 | + # skip TLS verification when communicating with the registry |
| 157 | + # SYFT_REGISTRY_INSECURE_SKIP_TLS_VERIFY env var |
| 158 | + insecure-skip-tls-verify: false |
| 159 | + # use http instead of https when connecting to the registry |
| 160 | + # SYFT_REGISTRY_INSECURE_USE_HTTP env var |
| 161 | + insecure-use-http: false |
| 162 | + |
| 163 | + # credentials for specific registries |
| 164 | + auth: |
| 165 | + # the URL to the registry (e.g. "docker.io", "localhost:5000", etc.) |
| 166 | + # SYFT_REGISTRY_AUTH_AUTHORITY env var |
| 167 | + - authority: "" |
| 168 | + # SYFT_REGISTRY_AUTH_USERNAME env var |
| 169 | + username: "" |
| 170 | + # SYFT_REGISTRY_AUTH_PASSWORD env var |
| 171 | + password: "" |
| 172 | + # note: token and username/password are mutually exclusive |
| 173 | + # SYFT_REGISTRY_AUTH_TOKEN env var |
| 174 | + token: "" |
| 175 | + # - ... # note, more credentials can be provided via config file only |
| 176 | + |
| 177 | +# generate an attested SBOM |
| 178 | +attest: |
| 179 | + # path to the private key file to use for attestation |
| 180 | + # SYFT_ATTEST_KEY env var |
| 181 | + key: "cosign.key" |
| 182 | + |
| 183 | + # password to decrypt to given private key |
| 184 | + # SYFT_ATTEST_PASSWORD env var, additionally responds to COSIGN_PASSWORD |
| 185 | + password: "" |
| 186 | + |
| 187 | +log: |
| 188 | + # use structured logging |
| 189 | + # same as SYFT_LOG_STRUCTURED env var |
| 190 | + structured: false |
| 191 | + |
| 192 | + # the log level; note: detailed logging suppress the ETUI |
| 193 | + # same as SYFT_LOG_LEVEL env var |
| 194 | + level: "error" |
| 195 | + |
| 196 | + # location to write the log file (default is not to have a log file) |
| 197 | + # same as SYFT_LOG_FILE env var |
| 198 | + file: "" |
| 199 | + |
| 200 | +# uploading package SBOM is exposed through the packages subcommand |
| 201 | +anchore: |
| 202 | + # (feature-preview) the Anchore Enterprise Host or URL to upload results to (supported on Enterprise 3.0+) |
| 203 | + # same as -H ; SYFT_ANCHORE_HOST env var |
| 204 | + host: "" |
| 205 | + |
| 206 | + # (feature-preview) the path after the host to the Anchore External API (supported on Enterprise 3.0+) |
| 207 | + # same as SYFT_ANCHORE_PATH env var |
| 208 | + path: "" |
| 209 | + |
| 210 | + # (feature-preview) the username to authenticate against Anchore Enterprise (supported on Enterprise 3.0+) |
| 211 | + # same as -u ; SYFT_ANCHORE_USERNAME env var |
| 212 | + username: "" |
| 213 | + |
| 214 | + # (feature-preview) the password to authenticate against Anchore Enterprise (supported on Enterprise 3.0+) |
| 215 | + # same as -p ; SYFT_ANCHORE_PASSWORD env var |
| 216 | + password: "" |
| 217 | + |
| 218 | + # (feature-preview) path to dockerfile to be uploaded with the syft results to Anchore Enterprise (supported on Enterprise 3.0+) |
| 219 | + # same as -d ; SYFT_ANCHORE_DOCKERFILE env var |
| 220 | + dockerfile: "" |
0 commit comments