root.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535
  1. package cmd
  2. import (
  3. "bytes"
  4. "fmt"
  5. "io"
  6. "os"
  7. "path/filepath"
  8. "strings"
  9. "time"
  10. "github.com/rs/zerolog"
  11. "github.com/rs/zerolog/log"
  12. "github.com/spf13/cobra"
  13. "github.com/spf13/viper"
  14. "github.com/zricethezav/gitleaks/v8/config"
  15. "github.com/zricethezav/gitleaks/v8/detect"
  16. "github.com/zricethezav/gitleaks/v8/logging"
  17. "github.com/zricethezav/gitleaks/v8/regexp"
  18. "github.com/zricethezav/gitleaks/v8/report"
  19. "github.com/zricethezav/gitleaks/v8/version"
  20. )
  21. const banner = `
  22. │╲
  23. │ ○
  24. ○ ░
  25. ░ gitleaks
  26. `
  27. const configDescription = `config file path
  28. order of precedence:
  29. 1. --config/-c
  30. 2. env var GITLEAKS_CONFIG
  31. 3. env var GITLEAKS_CONFIG_TOML with the file content
  32. 4. (target path)/.gitleaks.toml
  33. If none of the four options are used, then gitleaks will use the default config`
  34. var (
  35. rootCmd = &cobra.Command{
  36. Use: "gitleaks",
  37. Short: "Gitleaks scans code, past or present, for secrets",
  38. Version: version.Version,
  39. }
  40. // diagnostics manager is global to ensure it can be started before a scan begins
  41. // and stopped after a scan completes
  42. diagnosticsManager *DiagnosticsManager
  43. )
  44. const (
  45. BYTE = 1.0
  46. KILOBYTE = BYTE * 1000
  47. MEGABYTE = KILOBYTE * 1000
  48. GIGABYTE = MEGABYTE * 1000
  49. )
  50. func init() {
  51. cobra.OnInitialize(initLog)
  52. rootCmd.PersistentFlags().StringP("config", "c", "", configDescription)
  53. rootCmd.PersistentFlags().Int("exit-code", 1, "exit code when leaks have been encountered")
  54. rootCmd.PersistentFlags().StringP("report-path", "r", "", "report file")
  55. rootCmd.PersistentFlags().StringP("report-format", "f", "", "output format (json, csv, junit, sarif, template)")
  56. rootCmd.PersistentFlags().StringP("report-template", "", "", "template file used to generate the report (implies --report-format=template)")
  57. rootCmd.PersistentFlags().StringP("baseline-path", "b", "", "path to baseline with issues that can be ignored")
  58. rootCmd.PersistentFlags().StringP("log-level", "l", "info", "log level (trace, debug, info, warn, error, fatal)")
  59. rootCmd.PersistentFlags().BoolP("verbose", "v", false, "show verbose output from scan")
  60. rootCmd.PersistentFlags().BoolP("no-color", "", false, "turn off color for verbose output")
  61. rootCmd.PersistentFlags().Int("max-target-megabytes", 0, "files larger than this will be skipped")
  62. rootCmd.PersistentFlags().BoolP("ignore-gitleaks-allow", "", false, "ignore gitleaks:allow comments")
  63. rootCmd.PersistentFlags().Uint("redact", 0, "redact secrets from logs and stdout. To redact only parts of the secret just apply a percent value from 0..100. For example --redact=20 (default 100%)")
  64. rootCmd.Flag("redact").NoOptDefVal = "100"
  65. rootCmd.PersistentFlags().Bool("no-banner", false, "suppress banner")
  66. rootCmd.PersistentFlags().StringSlice("enable-rule", []string{}, "only enable specific rules by id")
  67. rootCmd.PersistentFlags().StringP("gitleaks-ignore-path", "i", ".", "path to .gitleaksignore file or folder containing one")
  68. rootCmd.PersistentFlags().Int("max-decode-depth", 0, "allow recursive decoding up to this depth (default \"0\", no decoding is done)")
  69. rootCmd.PersistentFlags().Int("max-archive-depth", 0, "allow scanning into nested archives up to this depth (default \"0\", no archive traversal is done)")
  70. // Add diagnostics flags
  71. rootCmd.PersistentFlags().String("diagnostics", "", "enable diagnostics (http OR comma-separated list: cpu,mem,trace). cpu=CPU prof, mem=memory prof, trace=exec tracing, http=serve via net/http/pprof")
  72. rootCmd.PersistentFlags().String("diagnostics-dir", "", "directory to store diagnostics output files when not using http mode (defaults to current directory)")
  73. err := viper.BindPFlag("config", rootCmd.PersistentFlags().Lookup("config"))
  74. if err != nil {
  75. logging.Fatal().Msgf("err binding config %s", err.Error())
  76. }
  77. }
  78. var logLevel = zerolog.InfoLevel
  79. func initLog() {
  80. ll, err := rootCmd.Flags().GetString("log-level")
  81. if err != nil {
  82. logging.Fatal().Msg(err.Error())
  83. }
  84. switch strings.ToLower(ll) {
  85. case "trace":
  86. logLevel = zerolog.TraceLevel
  87. case "debug":
  88. logLevel = zerolog.DebugLevel
  89. case "info":
  90. logLevel = zerolog.InfoLevel
  91. case "warn":
  92. logLevel = zerolog.WarnLevel
  93. case "err", "error":
  94. logLevel = zerolog.ErrorLevel
  95. case "fatal":
  96. logLevel = zerolog.FatalLevel
  97. default:
  98. logging.Warn().Msgf("unknown log level: %s", ll)
  99. }
  100. logging.Logger = logging.Logger.Level(logLevel)
  101. }
  102. func initConfig(source string) {
  103. hideBanner, err := rootCmd.Flags().GetBool("no-banner")
  104. viper.SetConfigType("toml")
  105. if err != nil {
  106. logging.Fatal().Msg(err.Error())
  107. }
  108. if !hideBanner {
  109. _, _ = fmt.Fprint(os.Stderr, banner)
  110. }
  111. logging.Debug().Msgf("using %s regex engine", regexp.Version)
  112. cfgPath, err := rootCmd.Flags().GetString("config")
  113. if err != nil {
  114. logging.Fatal().Msg(err.Error())
  115. }
  116. if cfgPath != "" {
  117. viper.SetConfigFile(cfgPath)
  118. logging.Debug().Msgf("using gitleaks config %s from `--config`", cfgPath)
  119. } else if os.Getenv("GITLEAKS_CONFIG") != "" {
  120. envPath := os.Getenv("GITLEAKS_CONFIG")
  121. viper.SetConfigFile(envPath)
  122. logging.Debug().Msgf("using gitleaks config from GITLEAKS_CONFIG env var: %s", envPath)
  123. } else if os.Getenv("GITLEAKS_CONFIG_TOML") != "" {
  124. configContent := []byte(os.Getenv("GITLEAKS_CONFIG_TOML"))
  125. if err := viper.ReadConfig(bytes.NewBuffer(configContent)); err != nil {
  126. logging.Fatal().Err(err).Str("content", os.Getenv("GITLEAKS_CONFIG_TOML")).Msg("unable to load gitleaks config from GITLEAKS_CONFIG_TOML env var")
  127. }
  128. logging.Debug().Str("content", os.Getenv("GITLEAKS_CONFIG_TOML")).Msg("using gitleaks config from GITLEAKS_CONFIG_TOML env var content")
  129. return
  130. } else {
  131. fileInfo, err := os.Stat(source)
  132. if err != nil {
  133. logging.Fatal().Msg(err.Error())
  134. }
  135. if !fileInfo.IsDir() {
  136. logging.Debug().Msgf("unable to load gitleaks config from %s since --source=%s is a file, using default config",
  137. filepath.Join(source, ".gitleaks.toml"), source)
  138. if err = viper.ReadConfig(strings.NewReader(config.DefaultConfig)); err != nil {
  139. logging.Fatal().Msgf("err reading toml %s", err.Error())
  140. }
  141. return
  142. }
  143. if _, err := os.Stat(filepath.Join(source, ".gitleaks.toml")); os.IsNotExist(err) {
  144. logging.Debug().Msgf("no gitleaks config found in path %s, using default gitleaks config", filepath.Join(source, ".gitleaks.toml"))
  145. if err = viper.ReadConfig(strings.NewReader(config.DefaultConfig)); err != nil {
  146. logging.Fatal().Msgf("err reading default config toml %s", err.Error())
  147. }
  148. return
  149. } else {
  150. logging.Debug().Msgf("using existing gitleaks config %s from `(--source)/.gitleaks.toml`", filepath.Join(source, ".gitleaks.toml"))
  151. }
  152. viper.AddConfigPath(source)
  153. viper.SetConfigName(".gitleaks")
  154. }
  155. if err := viper.ReadInConfig(); err != nil {
  156. logging.Fatal().Msgf("unable to load gitleaks config, err: %s", err)
  157. }
  158. }
  159. func initDiagnostics() {
  160. // Initialize diagnostics manager
  161. diagnosticsFlag, err := rootCmd.PersistentFlags().GetString("diagnostics")
  162. if err != nil {
  163. logging.Fatal().Err(err).Msg("Error getting diagnostics flag")
  164. }
  165. diagnosticsDir, err := rootCmd.PersistentFlags().GetString("diagnostics-dir")
  166. if err != nil {
  167. logging.Fatal().Err(err).Msg("Error getting diagnostics-dir flag")
  168. }
  169. var diagErr error
  170. diagnosticsManager, diagErr = NewDiagnosticsManager(diagnosticsFlag, diagnosticsDir)
  171. if diagErr != nil {
  172. logging.Fatal().Err(diagErr).Msg("Error initializing diagnostics")
  173. }
  174. if diagnosticsManager.Enabled {
  175. logging.Info().Msg("Starting diagnostics...")
  176. if diagErr := diagnosticsManager.StartDiagnostics(); diagErr != nil {
  177. logging.Fatal().Err(diagErr).Msg("Failed to start diagnostics")
  178. }
  179. }
  180. }
  181. func Execute() {
  182. if err := rootCmd.Execute(); err != nil {
  183. if strings.Contains(err.Error(), "unknown flag") {
  184. // exit code 126: Command invoked cannot execute
  185. os.Exit(126)
  186. }
  187. logging.Fatal().Msg(err.Error())
  188. }
  189. }
  190. func Config(cmd *cobra.Command) config.Config {
  191. var vc config.ViperConfig
  192. if err := viper.Unmarshal(&vc); err != nil {
  193. logging.Fatal().Err(err).Msg("Failed to load config")
  194. }
  195. cfg, err := vc.Translate()
  196. if err != nil {
  197. logging.Fatal().Err(err).Msg("Failed to load config")
  198. }
  199. cfg.Path, _ = cmd.Flags().GetString("config")
  200. return cfg
  201. }
  202. func Detector(cmd *cobra.Command, cfg config.Config, source string) *detect.Detector {
  203. var err error
  204. // Setup common detector
  205. detector := detect.NewDetector(cfg)
  206. if detector.MaxDecodeDepth, err = cmd.Flags().GetInt("max-decode-depth"); err != nil {
  207. logging.Fatal().Err(err).Send()
  208. }
  209. if detector.MaxArchiveDepth, err = cmd.Flags().GetInt("max-archive-depth"); err != nil {
  210. logging.Fatal().Err(err).Send()
  211. }
  212. // set color flag at first
  213. if detector.NoColor, err = cmd.Flags().GetBool("no-color"); err != nil {
  214. logging.Fatal().Err(err).Send()
  215. }
  216. // also init logger again without color
  217. if detector.NoColor {
  218. logging.Logger = log.Output(zerolog.ConsoleWriter{
  219. Out: os.Stderr,
  220. NoColor: detector.NoColor,
  221. }).Level(logLevel)
  222. }
  223. detector.Config.Path, err = cmd.Flags().GetString("config")
  224. if err != nil {
  225. logging.Fatal().Err(err).Send()
  226. }
  227. // if config path is not set, then use the {source}/.gitleaks.toml path.
  228. // note that there may not be a `{source}/.gitleaks.toml` file, this is ok.
  229. if detector.Config.Path == "" {
  230. detector.Config.Path = filepath.Join(source, ".gitleaks.toml")
  231. }
  232. // set verbose flag
  233. if detector.Verbose, err = cmd.Flags().GetBool("verbose"); err != nil {
  234. logging.Fatal().Err(err).Send()
  235. }
  236. // set redact flag
  237. if detector.Redact, err = cmd.Flags().GetUint("redact"); err != nil {
  238. logging.Fatal().Err(err).Send()
  239. }
  240. if detector.MaxTargetMegaBytes, err = cmd.Flags().GetInt("max-target-megabytes"); err != nil {
  241. logging.Fatal().Err(err).Send()
  242. }
  243. // set ignore gitleaks:allow flag
  244. if detector.IgnoreGitleaksAllow, err = cmd.Flags().GetBool("ignore-gitleaks-allow"); err != nil {
  245. logging.Fatal().Err(err).Send()
  246. }
  247. gitleaksIgnorePath, err := cmd.Flags().GetString("gitleaks-ignore-path")
  248. if err != nil {
  249. logging.Fatal().Err(err).Msg("could not get .gitleaksignore path")
  250. }
  251. if fileExists(gitleaksIgnorePath) {
  252. if err = detector.AddGitleaksIgnore(gitleaksIgnorePath); err != nil {
  253. logging.Fatal().Err(err).Msg("could not call AddGitleaksIgnore")
  254. }
  255. }
  256. if fileExists(filepath.Join(gitleaksIgnorePath, ".gitleaksignore")) {
  257. if err = detector.AddGitleaksIgnore(filepath.Join(gitleaksIgnorePath, ".gitleaksignore")); err != nil {
  258. logging.Fatal().Err(err).Msg("could not call AddGitleaksIgnore")
  259. }
  260. }
  261. if fileExists(filepath.Join(source, ".gitleaksignore")) {
  262. if err = detector.AddGitleaksIgnore(filepath.Join(source, ".gitleaksignore")); err != nil {
  263. logging.Fatal().Err(err).Msg("could not call AddGitleaksIgnore")
  264. }
  265. }
  266. // ignore findings from the baseline (an existing report in json format generated earlier)
  267. baselinePath, _ := cmd.Flags().GetString("baseline-path")
  268. if baselinePath != "" {
  269. err = detector.AddBaseline(baselinePath, source)
  270. if err != nil {
  271. logging.Error().Msgf("Could not load baseline. The path must point of a gitleaks report generated using the default format: %s", err)
  272. }
  273. }
  274. // If set, only apply rules that are defined in the flag
  275. rules, _ := cmd.Flags().GetStringSlice("enable-rule")
  276. if len(rules) > 0 {
  277. logging.Info().Msg("Overriding enabled rules: " + strings.Join(rules, ", "))
  278. ruleOverride := make(map[string]config.Rule)
  279. for _, ruleName := range rules {
  280. if r, ok := cfg.Rules[ruleName]; ok {
  281. ruleOverride[ruleName] = r
  282. } else {
  283. logging.Fatal().Msgf("Requested rule %s not found in rules", ruleName)
  284. }
  285. }
  286. detector.Config.Rules = ruleOverride
  287. }
  288. // Validate report settings.
  289. reportPath := mustGetStringFlag(cmd, "report-path")
  290. if reportPath != "" {
  291. if reportPath != report.StdoutReportPath {
  292. // Ensure the path is writable.
  293. if f, err := os.Create(reportPath); err != nil {
  294. logging.Fatal().Err(err).Msgf("Report path is not writable: %s", reportPath)
  295. } else {
  296. _ = f.Close()
  297. _ = os.Remove(reportPath)
  298. }
  299. }
  300. // Build report writer.
  301. var (
  302. reporter report.Reporter
  303. reportFormat = mustGetStringFlag(cmd, "report-format")
  304. reportTemplate = mustGetStringFlag(cmd, "report-template")
  305. )
  306. if reportFormat == "" {
  307. ext := strings.ToLower(filepath.Ext(reportPath))
  308. switch ext {
  309. case ".csv":
  310. reportFormat = "csv"
  311. case ".json":
  312. reportFormat = "json"
  313. case ".sarif":
  314. reportFormat = "sarif"
  315. default:
  316. logging.Fatal().Msgf("Unknown report format: %s", reportFormat)
  317. }
  318. logging.Debug().Msgf("No report format specified, inferred %q from %q", reportFormat, ext)
  319. }
  320. switch strings.TrimSpace(strings.ToLower(reportFormat)) {
  321. case "csv":
  322. reporter = &report.CsvReporter{}
  323. case "json":
  324. reporter = &report.JsonReporter{}
  325. case "junit":
  326. reporter = &report.JunitReporter{}
  327. case "sarif":
  328. reporter = &report.SarifReporter{
  329. OrderedRules: cfg.GetOrderedRules(),
  330. }
  331. case "template":
  332. if reporter, err = report.NewTemplateReporter(reportTemplate); err != nil {
  333. logging.Fatal().Err(err).Msg("Invalid report template")
  334. }
  335. default:
  336. logging.Fatal().Msgf("unknown report format %s", reportFormat)
  337. }
  338. // Sanity check.
  339. if reportTemplate != "" && reportFormat != "template" {
  340. logging.Fatal().Msgf("Report format must be 'template' if --report-template is specified")
  341. }
  342. detector.ReportPath = reportPath
  343. detector.Reporter = reporter
  344. }
  345. return detector
  346. }
  347. func bytesConvert(bytes uint64) string {
  348. unit := ""
  349. value := float32(bytes)
  350. switch {
  351. case bytes >= GIGABYTE:
  352. unit = "GB"
  353. value = value / GIGABYTE
  354. case bytes >= MEGABYTE:
  355. unit = "MB"
  356. value = value / MEGABYTE
  357. case bytes >= KILOBYTE:
  358. unit = "KB"
  359. value = value / KILOBYTE
  360. case bytes >= BYTE:
  361. unit = "bytes"
  362. case bytes == 0:
  363. return "0"
  364. }
  365. stringValue := strings.TrimSuffix(
  366. fmt.Sprintf("%.2f", value), ".00",
  367. )
  368. return fmt.Sprintf("%s %s", stringValue, unit)
  369. }
  370. func findingSummaryAndExit(detector *detect.Detector, findings []report.Finding, exitCode int, start time.Time, err error) {
  371. if diagnosticsManager.Enabled {
  372. logging.Debug().Msg("Finalizing diagnostics...")
  373. diagnosticsManager.StopDiagnostics()
  374. }
  375. totalBytes := detector.TotalBytes.Load()
  376. bytesMsg := fmt.Sprintf("scanned ~%d bytes (%s)", totalBytes, bytesConvert(totalBytes))
  377. if err == nil {
  378. logging.Info().Msgf("%s in %s", bytesMsg, FormatDuration(time.Since(start)))
  379. if len(findings) != 0 {
  380. logging.Warn().Msgf("leaks found: %d", len(findings))
  381. } else {
  382. logging.Info().Msg("no leaks found")
  383. }
  384. } else {
  385. logging.Warn().Msg(bytesMsg)
  386. logging.Warn().Msgf("partial scan completed in %s", FormatDuration(time.Since(start)))
  387. if len(findings) != 0 {
  388. logging.Warn().Msgf("%d leaks found in partial scan", len(findings))
  389. } else {
  390. logging.Warn().Msg("no leaks found in partial scan")
  391. }
  392. }
  393. // write report if desired
  394. if detector.Reporter != nil {
  395. var (
  396. file io.WriteCloser
  397. reportErr error
  398. )
  399. if detector.ReportPath == report.StdoutReportPath {
  400. file = os.Stdout
  401. } else {
  402. // Open the file.
  403. if file, reportErr = os.Create(detector.ReportPath); reportErr != nil {
  404. goto ReportEnd
  405. }
  406. defer func() {
  407. _ = file.Close()
  408. }()
  409. }
  410. // Write to the file.
  411. if reportErr = detector.Reporter.Write(file, findings); reportErr != nil {
  412. goto ReportEnd
  413. }
  414. ReportEnd:
  415. if reportErr != nil {
  416. logging.Fatal().Err(reportErr).Msg("failed to write report")
  417. }
  418. }
  419. if err != nil {
  420. os.Exit(1)
  421. }
  422. if len(findings) != 0 {
  423. os.Exit(exitCode)
  424. }
  425. }
  426. func fileExists(fileName string) bool {
  427. // check for a .gitleaksignore file
  428. info, err := os.Stat(fileName)
  429. if err != nil && !os.IsNotExist(err) {
  430. return false
  431. }
  432. if info != nil && err == nil {
  433. if !info.IsDir() {
  434. return true
  435. }
  436. }
  437. return false
  438. }
  439. func FormatDuration(d time.Duration) string {
  440. scale := 100 * time.Second
  441. // look for the max scale that is smaller than d
  442. for scale > d {
  443. scale = scale / 10
  444. }
  445. return d.Round(scale / 100).String()
  446. }
  447. func mustGetBoolFlag(cmd *cobra.Command, name string) bool {
  448. value, err := cmd.Flags().GetBool(name)
  449. if err != nil {
  450. logging.Fatal().Err(err).Msgf("could not get flag: %s", name)
  451. }
  452. return value
  453. }
  454. func mustGetIntFlag(cmd *cobra.Command, name string) int {
  455. value, err := cmd.Flags().GetInt(name)
  456. if err != nil {
  457. logging.Fatal().Err(err).Msgf("could not get flag: %s", name)
  458. }
  459. return value
  460. }
  461. func mustGetStringFlag(cmd *cobra.Command, name string) string {
  462. value, err := cmd.Flags().GetString(name)
  463. if err != nil {
  464. logging.Fatal().Err(err).Msgf("could not get flag: %s", name)
  465. }
  466. return value
  467. }