root.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402
  1. package cmd
  2. import (
  3. "fmt"
  4. "io"
  5. "os"
  6. "path/filepath"
  7. "strings"
  8. "time"
  9. "github.com/rs/zerolog"
  10. "github.com/rs/zerolog/log"
  11. "github.com/spf13/cobra"
  12. "github.com/spf13/viper"
  13. "github.com/zricethezav/gitleaks/v8/config"
  14. "github.com/zricethezav/gitleaks/v8/detect"
  15. "github.com/zricethezav/gitleaks/v8/report"
  16. )
  17. const banner = `
  18. │╲
  19. │ ○
  20. ○ ░
  21. ░ gitleaks
  22. `
  23. const configDescription = `config file path
  24. order of precedence:
  25. 1. --config/-c
  26. 2. env var GITLEAKS_CONFIG
  27. 3. (target path)/.gitleaks.toml
  28. If none of the three options are used, then gitleaks will use the default config`
  29. var rootCmd = &cobra.Command{
  30. Use: "gitleaks",
  31. Short: "Gitleaks scans code, past or present, for secrets",
  32. Version: Version,
  33. }
  34. func init() {
  35. cobra.OnInitialize(initLog)
  36. rootCmd.PersistentFlags().StringP("config", "c", "", configDescription)
  37. rootCmd.PersistentFlags().Int("exit-code", 1, "exit code when leaks have been encountered")
  38. rootCmd.PersistentFlags().StringP("report-path", "r", "", "report file")
  39. rootCmd.PersistentFlags().StringP("report-format", "f", "json", "output format (json, jsonextra, csv, junit, sarif, template)")
  40. rootCmd.PersistentFlags().StringP("report-template", "", "", "template file used to generate the report (implies --report-format=template)")
  41. rootCmd.PersistentFlags().StringP("baseline-path", "b", "", "path to baseline with issues that can be ignored")
  42. rootCmd.PersistentFlags().StringP("log-level", "l", "info", "log level (trace, debug, info, warn, error, fatal)")
  43. rootCmd.PersistentFlags().BoolP("verbose", "v", false, "show verbose output from scan")
  44. rootCmd.PersistentFlags().BoolP("no-color", "", false, "turn off color for verbose output")
  45. rootCmd.PersistentFlags().Int("max-target-megabytes", 0, "files larger than this will be skipped")
  46. rootCmd.PersistentFlags().BoolP("ignore-gitleaks-allow", "", false, "ignore gitleaks:allow comments")
  47. rootCmd.PersistentFlags().Uint("redact", 0, "redact secrets from logs and stdout. To redact only parts of the secret just apply a percent value from 0..100. For example --redact=20 (default 100%)")
  48. rootCmd.Flag("redact").NoOptDefVal = "100"
  49. rootCmd.PersistentFlags().Bool("no-banner", false, "suppress banner")
  50. rootCmd.PersistentFlags().StringSlice("enable-rule", []string{}, "only enable specific rules by id")
  51. rootCmd.PersistentFlags().StringP("gitleaks-ignore-path", "i", ".", "path to .gitleaksignore file or folder containing one")
  52. rootCmd.PersistentFlags().Int("max-decode-depth", 0, "allow recursive decoding up to this depth (default \"0\", no decoding is done)")
  53. err := viper.BindPFlag("config", rootCmd.PersistentFlags().Lookup("config"))
  54. if err != nil {
  55. log.Fatal().Msgf("err binding config %s", err.Error())
  56. }
  57. }
  58. func initLog() {
  59. zerolog.SetGlobalLevel(zerolog.InfoLevel)
  60. ll, err := rootCmd.Flags().GetString("log-level")
  61. if err != nil {
  62. log.Fatal().Msg(err.Error())
  63. }
  64. switch strings.ToLower(ll) {
  65. case "trace":
  66. zerolog.SetGlobalLevel(zerolog.TraceLevel)
  67. case "debug":
  68. zerolog.SetGlobalLevel(zerolog.DebugLevel)
  69. case "info":
  70. zerolog.SetGlobalLevel(zerolog.InfoLevel)
  71. case "warn":
  72. zerolog.SetGlobalLevel(zerolog.WarnLevel)
  73. case "err", "error":
  74. zerolog.SetGlobalLevel(zerolog.ErrorLevel)
  75. case "fatal":
  76. zerolog.SetGlobalLevel(zerolog.FatalLevel)
  77. default:
  78. zerolog.SetGlobalLevel(zerolog.InfoLevel)
  79. }
  80. }
  81. func initConfig(source string) {
  82. hideBanner, err := rootCmd.Flags().GetBool("no-banner")
  83. if err != nil {
  84. log.Fatal().Msg(err.Error())
  85. }
  86. if !hideBanner {
  87. _, _ = fmt.Fprint(os.Stderr, banner)
  88. }
  89. cfgPath, err := rootCmd.Flags().GetString("config")
  90. if err != nil {
  91. log.Fatal().Msg(err.Error())
  92. }
  93. if cfgPath != "" {
  94. viper.SetConfigFile(cfgPath)
  95. log.Debug().Msgf("using gitleaks config %s from `--config`", cfgPath)
  96. } else if os.Getenv("GITLEAKS_CONFIG") != "" {
  97. envPath := os.Getenv("GITLEAKS_CONFIG")
  98. viper.SetConfigFile(envPath)
  99. log.Debug().Msgf("using gitleaks config from GITLEAKS_CONFIG env var: %s", envPath)
  100. } else {
  101. fileInfo, err := os.Stat(source)
  102. if err != nil {
  103. log.Fatal().Msg(err.Error())
  104. }
  105. if !fileInfo.IsDir() {
  106. log.Debug().Msgf("unable to load gitleaks config from %s since --source=%s is a file, using default config",
  107. filepath.Join(source, ".gitleaks.toml"), source)
  108. viper.SetConfigType("toml")
  109. if err = viper.ReadConfig(strings.NewReader(config.DefaultConfig)); err != nil {
  110. log.Fatal().Msgf("err reading toml %s", err.Error())
  111. }
  112. return
  113. }
  114. if _, err := os.Stat(filepath.Join(source, ".gitleaks.toml")); os.IsNotExist(err) {
  115. log.Debug().Msgf("no gitleaks config found in path %s, using default gitleaks config", filepath.Join(source, ".gitleaks.toml"))
  116. viper.SetConfigType("toml")
  117. if err = viper.ReadConfig(strings.NewReader(config.DefaultConfig)); err != nil {
  118. log.Fatal().Msgf("err reading default config toml %s", err.Error())
  119. }
  120. return
  121. } else {
  122. log.Debug().Msgf("using existing gitleaks config %s from `(--source)/.gitleaks.toml`", filepath.Join(source, ".gitleaks.toml"))
  123. }
  124. viper.AddConfigPath(source)
  125. viper.SetConfigName(".gitleaks")
  126. viper.SetConfigType("toml")
  127. }
  128. if err := viper.ReadInConfig(); err != nil {
  129. log.Fatal().Msgf("unable to load gitleaks config, err: %s", err)
  130. }
  131. }
  132. func Execute() {
  133. if err := rootCmd.Execute(); err != nil {
  134. if strings.Contains(err.Error(), "unknown flag") {
  135. // exit code 126: Command invoked cannot execute
  136. os.Exit(126)
  137. }
  138. log.Fatal().Msg(err.Error())
  139. }
  140. }
  141. func Config(cmd *cobra.Command) config.Config {
  142. var vc config.ViperConfig
  143. if err := viper.Unmarshal(&vc); err != nil {
  144. log.Fatal().Err(err).Msg("Failed to load config")
  145. }
  146. cfg, err := vc.Translate()
  147. if err != nil {
  148. log.Fatal().Err(err).Msg("Failed to load config")
  149. }
  150. cfg.Path, _ = cmd.Flags().GetString("config")
  151. return cfg
  152. }
  153. func Detector(cmd *cobra.Command, cfg config.Config, source string) *detect.Detector {
  154. var err error
  155. // Setup common detector
  156. detector := detect.NewDetector(cfg)
  157. if detector.MaxDecodeDepth, err = cmd.Flags().GetInt("max-decode-depth"); err != nil {
  158. log.Fatal().Err(err).Msg("")
  159. }
  160. // set color flag at first
  161. if detector.NoColor, err = cmd.Flags().GetBool("no-color"); err != nil {
  162. log.Fatal().Err(err).Msg("")
  163. }
  164. // also init logger again without color
  165. if detector.NoColor {
  166. log.Logger = log.Output(zerolog.ConsoleWriter{
  167. Out: os.Stderr,
  168. NoColor: detector.NoColor,
  169. })
  170. }
  171. detector.Config.Path, err = cmd.Flags().GetString("config")
  172. if err != nil {
  173. log.Fatal().Err(err).Msg("")
  174. }
  175. // if config path is not set, then use the {source}/.gitleaks.toml path.
  176. // note that there may not be a `{source}/.gitleaks.toml` file, this is ok.
  177. if detector.Config.Path == "" {
  178. detector.Config.Path = filepath.Join(source, ".gitleaks.toml")
  179. }
  180. // set verbose flag
  181. if detector.Verbose, err = cmd.Flags().GetBool("verbose"); err != nil {
  182. log.Fatal().Err(err).Msg("")
  183. }
  184. // set redact flag
  185. if detector.Redact, err = cmd.Flags().GetUint("redact"); err != nil {
  186. log.Fatal().Err(err).Msg("")
  187. }
  188. if detector.MaxTargetMegaBytes, err = cmd.Flags().GetInt("max-target-megabytes"); err != nil {
  189. log.Fatal().Err(err).Msg("")
  190. }
  191. // set ignore gitleaks:allow flag
  192. if detector.IgnoreGitleaksAllow, err = cmd.Flags().GetBool("ignore-gitleaks-allow"); err != nil {
  193. log.Fatal().Err(err).Msg("")
  194. }
  195. gitleaksIgnorePath, err := cmd.Flags().GetString("gitleaks-ignore-path")
  196. if err != nil {
  197. log.Fatal().Err(err).Msg("could not get .gitleaksignore path")
  198. }
  199. if fileExists(gitleaksIgnorePath) {
  200. if err = detector.AddGitleaksIgnore(gitleaksIgnorePath); err != nil {
  201. log.Fatal().Err(err).Msg("could not call AddGitleaksIgnore")
  202. }
  203. }
  204. if fileExists(filepath.Join(gitleaksIgnorePath, ".gitleaksignore")) {
  205. if err = detector.AddGitleaksIgnore(filepath.Join(gitleaksIgnorePath, ".gitleaksignore")); err != nil {
  206. log.Fatal().Err(err).Msg("could not call AddGitleaksIgnore")
  207. }
  208. }
  209. if fileExists(filepath.Join(source, ".gitleaksignore")) {
  210. if err = detector.AddGitleaksIgnore(filepath.Join(source, ".gitleaksignore")); err != nil {
  211. log.Fatal().Err(err).Msg("could not call AddGitleaksIgnore")
  212. }
  213. }
  214. // ignore findings from the baseline (an existing report in json format generated earlier)
  215. baselinePath, _ := cmd.Flags().GetString("baseline-path")
  216. if baselinePath != "" {
  217. err = detector.AddBaseline(baselinePath, source)
  218. if err != nil {
  219. log.Error().Msgf("Could not load baseline. The path must point of a gitleaks report generated using the default format: %s", err)
  220. }
  221. }
  222. // If set, only apply rules that are defined in the flag
  223. rules, _ := cmd.Flags().GetStringSlice("enable-rule")
  224. if len(rules) > 0 {
  225. log.Info().Msg("Overriding enabled rules: " + strings.Join(rules, ", "))
  226. ruleOverride := make(map[string]config.Rule)
  227. for _, ruleName := range rules {
  228. if r, ok := cfg.Rules[ruleName]; ok {
  229. ruleOverride[ruleName] = r
  230. } else {
  231. log.Fatal().Msgf("Requested rule %s not found in rules", ruleName)
  232. }
  233. }
  234. detector.Config.Rules = ruleOverride
  235. }
  236. // Validate report settings.
  237. reportPath := mustGetStringFlag("report-path")
  238. if reportPath != "" {
  239. if reportPath != report.StdoutReportPath {
  240. // Ensure the path is writable.
  241. if f, err := os.Create(reportPath); err != nil {
  242. log.Fatal().Err(err).Msgf("Report path is not writable: %s", reportPath)
  243. } else {
  244. _ = f.Close()
  245. _ = os.Remove(reportPath)
  246. }
  247. }
  248. // Build report writer.
  249. var (
  250. reporter report.Reporter
  251. reportFormat = mustGetStringFlag("report-format")
  252. reportTemplate = mustGetStringFlag("report-template")
  253. )
  254. switch strings.TrimSpace(strings.ToLower(reportFormat)) {
  255. case "csv":
  256. reporter = &report.CsvReporter{}
  257. case "json":
  258. reporter = &report.JsonReporter{}
  259. case "junit":
  260. reporter = &report.JunitReporter{}
  261. case "sarif":
  262. reporter = &report.SarifReporter{
  263. OrderedRules: cfg.GetOrderedRules(),
  264. }
  265. case "template":
  266. if reporter, err = report.NewTemplateReporter(reportTemplate); err != nil {
  267. log.Fatal().Err(err).Msg("Invalid report template")
  268. }
  269. default:
  270. log.Fatal().Msgf("unknown report format %s", reportFormat)
  271. }
  272. // Sanity check.
  273. if reportTemplate != "" && reportFormat != "template" {
  274. log.Fatal().Msgf("Report format must be 'template' if --report-template is specified")
  275. }
  276. detector.ReportPath = reportPath
  277. detector.Reporter = reporter
  278. }
  279. return detector
  280. }
  281. func mustGetStringFlag(name string) string {
  282. reportPath, err := rootCmd.Flags().GetString(name)
  283. if err != nil {
  284. log.Fatal().Msg(err.Error())
  285. }
  286. return reportPath
  287. }
  288. func findingSummaryAndExit(detector *detect.Detector, findings []report.Finding, exitCode int, start time.Time, err error) {
  289. if err == nil {
  290. log.Info().Msgf("scan completed in %s", FormatDuration(time.Since(start)))
  291. if len(findings) != 0 {
  292. log.Warn().Msgf("leaks found: %d", len(findings))
  293. } else {
  294. log.Info().Msg("no leaks found")
  295. }
  296. } else {
  297. log.Warn().Msgf("partial scan completed in %s", FormatDuration(time.Since(start)))
  298. if len(findings) != 0 {
  299. log.Warn().Msgf("%d leaks found in partial scan", len(findings))
  300. } else {
  301. log.Warn().Msg("no leaks found in partial scan")
  302. }
  303. }
  304. // write report if desired
  305. if detector.Reporter != nil && len(findings) > 0 {
  306. var (
  307. file io.WriteCloser
  308. reportErr error
  309. )
  310. if detector.ReportPath == report.StdoutReportPath {
  311. file = os.Stdout
  312. } else {
  313. // Open the file.
  314. if file, reportErr = os.Create(detector.ReportPath); reportErr != nil {
  315. goto ReportEnd
  316. }
  317. defer func() {
  318. _ = file.Close()
  319. }()
  320. }
  321. // Write to the file.
  322. if reportErr = detector.Reporter.Write(file, findings); reportErr != nil {
  323. goto ReportEnd
  324. }
  325. ReportEnd:
  326. if reportErr != nil {
  327. log.Fatal().Err(reportErr).Msg("failed to write report")
  328. }
  329. }
  330. if err != nil {
  331. os.Exit(1)
  332. }
  333. if len(findings) != 0 {
  334. os.Exit(exitCode)
  335. }
  336. }
  337. func fileExists(fileName string) bool {
  338. // check for a .gitleaksignore file
  339. info, err := os.Stat(fileName)
  340. if err != nil && !os.IsNotExist(err) {
  341. return false
  342. }
  343. if info != nil && err == nil {
  344. if !info.IsDir() {
  345. return true
  346. }
  347. }
  348. return false
  349. }
  350. func FormatDuration(d time.Duration) string {
  351. scale := 100 * time.Second
  352. // look for the max scale that is smaller than d
  353. for scale > d {
  354. scale = scale / 10
  355. }
  356. return d.Round(scale / 100).String()
  357. }