Configuring a container to access scan artifacts

To scan an application using a Podman container, the respective files must be made available to the container: volume mount the directory containing scan artifacts to the Podman container.

Podman supports the option “--volume | -v” to mount a volume to a container.

For example, to mount the path /host_machine_workspace/simpleIOT/ from the host machine (where Podman is installed to the container’s path /container_workspace/simpleIOT/:
podman run -it --rm --env-file ./env.list --volume
        /host_machine_workspace/simpleIOT/:/container_workspace/simpleIOT/
        hcl/appscan/source/cli:10.1.0
Note:
  • Specify necessary permissions to the mounted directory such that a scan executed from the container can perform the necessary file operations. For example, the files/folders should have at least 755 permissions and should be added to root group.
  • All path references within the .paf/.ppf files should be resolvable within the container.
Note: As of version 10.3.0, AppScan® Source supports containerization using Podman. Since Docker is not supported in Red Hat Enterprise Linux 8 and 9, use Podman if your host is running RHEL 8 or 9. Podman supports all major Docker commands; replace Docker with Podman in the examples in this topic to create containers and scan in the Podman environment.