protect.go 3.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119
  1. package cmd
  2. import (
  3. "os"
  4. "path/filepath"
  5. "time"
  6. "github.com/rs/zerolog/log"
  7. "github.com/spf13/cobra"
  8. "github.com/spf13/viper"
  9. "github.com/zricethezav/gitleaks/v8/config"
  10. "github.com/zricethezav/gitleaks/v8/detect"
  11. "github.com/zricethezav/gitleaks/v8/report"
  12. )
  13. func init() {
  14. protectCmd.Flags().Bool("staged", false, "detect secrets in a --staged state")
  15. protectCmd.Flags().String("log-opts", "", "git log options")
  16. rootCmd.AddCommand(protectCmd)
  17. }
  18. var protectCmd = &cobra.Command{
  19. Use: "protect",
  20. Short: "protect secrets in code",
  21. Run: runProtect,
  22. }
  23. func runProtect(cmd *cobra.Command, args []string) {
  24. initConfig()
  25. var vc config.ViperConfig
  26. if err := viper.Unmarshal(&vc); err != nil {
  27. log.Fatal().Err(err).Msg("Failed to load config")
  28. }
  29. cfg, err := vc.Translate()
  30. if err != nil {
  31. log.Fatal().Err(err).Msg("Failed to load config")
  32. }
  33. cfg.Path, _ = cmd.Flags().GetString("config")
  34. exitCode, _ := cmd.Flags().GetInt("exit-code")
  35. staged, _ := cmd.Flags().GetBool("staged")
  36. start := time.Now()
  37. // Setup detector
  38. detector := detect.NewDetector(cfg)
  39. detector.Config.Path, err = cmd.Flags().GetString("config")
  40. if err != nil {
  41. log.Fatal().Err(err).Msg("")
  42. }
  43. source, err := cmd.Flags().GetString("source")
  44. if err != nil {
  45. log.Fatal().Err(err).Msg("")
  46. }
  47. // if config path is not set, then use the {source}/.gitleaks.toml path.
  48. // note that there may not be a `{source}/.gitleaks.toml` file, this is ok.
  49. if detector.Config.Path == "" {
  50. detector.Config.Path = filepath.Join(source, ".gitleaks.toml")
  51. }
  52. // set verbose flag
  53. if detector.Verbose, err = cmd.Flags().GetBool("verbose"); err != nil {
  54. log.Fatal().Err(err).Msg("")
  55. }
  56. // set redact flag
  57. if detector.Redact, err = cmd.Flags().GetBool("redact"); err != nil {
  58. log.Fatal().Err(err).Msg("")
  59. }
  60. if detector.MaxTargetMegaBytes, err = cmd.Flags().GetInt("max-target-megabytes"); err != nil {
  61. log.Fatal().Err(err).Msg("")
  62. }
  63. // set color flag
  64. if detector.NoColor, err = cmd.Flags().GetBool("no-color"); err != nil {
  65. log.Fatal().Err(err).Msg("")
  66. }
  67. if fileExists(filepath.Join(source, ".gitleaksignore")) {
  68. if err = detector.AddGitleaksIgnore(filepath.Join(source, ".gitleaksignore")); err != nil {
  69. log.Fatal().Err(err).Msg("could not call AddGitleaksIgnore")
  70. }
  71. }
  72. // get log options for git scan
  73. logOpts, err := cmd.Flags().GetString("log-opts")
  74. if err != nil {
  75. log.Fatal().Err(err).Msg("")
  76. }
  77. // start git scan
  78. var findings []report.Finding
  79. if staged {
  80. findings, err = detector.DetectGit(source, logOpts, detect.ProtectStagedType)
  81. } else {
  82. findings, err = detector.DetectGit(source, logOpts, detect.ProtectType)
  83. }
  84. if err != nil {
  85. // don't exit on error, just log it
  86. log.Error().Err(err).Msg("")
  87. }
  88. // log info about the scan
  89. log.Info().Msgf("scan completed in %s", FormatDuration(time.Since(start)))
  90. if len(findings) != 0 {
  91. log.Warn().Msgf("leaks found: %d", len(findings))
  92. } else {
  93. log.Info().Msg("no leaks found")
  94. }
  95. reportPath, _ := cmd.Flags().GetString("report-path")
  96. ext, _ := cmd.Flags().GetString("report-format")
  97. if reportPath != "" {
  98. if err = report.Write(findings, cfg, ext, reportPath); err != nil {
  99. log.Fatal().Err(err).Msg("")
  100. }
  101. }
  102. if len(findings) != 0 {
  103. os.Exit(exitCode)
  104. }
  105. }