kubernetes.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415
  1. package rules
  2. import (
  3. "fmt"
  4. "regexp"
  5. "github.com/zricethezav/gitleaks/v8/cmd/generate/config/utils"
  6. "github.com/zricethezav/gitleaks/v8/config"
  7. )
  8. // KubernetesSecret validates if we detected a kubernetes secret which contains data!
  9. func KubernetesSecret() *config.Rule {
  10. // Only match basic variations of `kind: secret`, we don't want things like `kind: ExternalSecret`.
  11. //language=regexp
  12. kindPat := `\bkind:[ \t]*["']?secret["']?`
  13. // Only matches values (`key: value`) under `data:` that are:
  14. // - valid base64 characters
  15. // - longer than 10 characters (no "YmFyCg==")
  16. //language=regexp
  17. dataPat := `\bdata:(?:.|\s){0,100}?\s+([\w.-]+:(?:[ \t]*(?:\||>[-+]?)\s+)?[ \t]*(?:["']?[a-z0-9]{10,}={0,3}["']?|\{\{[ \t\w"|$:=,.-]+}}|""|''))`
  18. // define rule
  19. r := config.Rule{
  20. RuleID: "kubernetes-secret-yaml",
  21. Description: "Possible Kubernetes Secret detected, posing a risk of leaking credentials/tokens from your deployments",
  22. Regex: regexp.MustCompile(fmt.Sprintf(
  23. //language=regexp
  24. `(?i)(?:%s(?:.|\s){0,200}?%s|%s(?:.|\s){0,200}?%s)`, kindPat, dataPat, dataPat, kindPat)),
  25. Keywords: []string{
  26. "secret",
  27. },
  28. // Kubernetes secrets are usually yaml files.
  29. Path: regexp.MustCompile(`(?i)\.ya?ml$`),
  30. Allowlists: []config.Allowlist{
  31. {
  32. Regexes: []*regexp.Regexp{
  33. // Ignore empty or placeholder values.
  34. // variable: {{ .Values.Example }} (https://helm.sh/docs/chart_template_guide/variables/)
  35. // variable: ""
  36. // variable: ''
  37. regexp.MustCompile(`[\w.-]+:(?:[ \t]*(?:\||>[-+]?)\s+)?[ \t]*(?:\{\{[ \t\w"|$:=,.-]+}}|""|'')`),
  38. },
  39. },
  40. },
  41. }
  42. // validate
  43. tps := map[string]string{
  44. "comment.yaml": `
  45. apiVersion: v1
  46. kind: Secret
  47. metadata:
  48. name: heketi-secret
  49. namespace: default
  50. data:
  51. # base64 encoded password. E.g.: echo -n "mypassword" | base64
  52. key: bXlwYXNzd29yZA==`,
  53. // The "data"-key is before the identifier "kind: Secret"
  54. "before-kubernetes.yaml": `apiVersion: v1
  55. data:
  56. extra: YWRtaW46cGFzc3dvcmQ=
  57. kind: secret
  58. metadata:
  59. name: secret-sa-sample
  60. annotations:
  61. kubernetes.io/service-account.name: 'sa-name'`,
  62. "before-kubernetes.yml": `apiVersion: v1
  63. data:
  64. password: UyFCXCpkJHpEc2I9
  65. username: YWRtaW4=
  66. kind: Secret
  67. metadata:
  68. creationTimestamp: '2022-06-28T17:44:13Z'
  69. name: db-user-pass
  70. namespace: default
  71. type: Opaque`,
  72. "before-comment.yml": `apiVersion: v1
  73. data:
  74. # the data is abbreviated in this example
  75. password: UyFCXCpkJHpEc2I9
  76. username: YWRtaW4=
  77. kind: Secret
  78. metadata:
  79. creationTimestamp: '2022-06-28T17:44:13Z'
  80. name: db-user-pass
  81. namespace: default
  82. type: Opaque`,
  83. "before-quoted-1.yaml": `apiVersion: 'v1'
  84. data:
  85. extra: 'YWRtaW46cGFzc3dvcmQ='
  86. kind: 'Secret'
  87. metadata:
  88. name: 'secret-sa-sample'
  89. annotations:
  90. kubernetes.io/service-account.name: 'sa-name'`,
  91. "before-quoted-2.yaml": `apiVersion: "v1"
  92. data:
  93. extra: "YWRtaW46cGFzc3dvcmQ="
  94. kind: "secret"
  95. metadata:
  96. name: "secret-sa-sample"
  97. annotations:
  98. kubernetes.io/service-account.name: "sa-name"`,
  99. "before-multiline-literal.yaml": `apiVersion: v1
  100. data:
  101. .dockercfg: |
  102. eyJhdXRocyI6eyJodHRwczovL2V4YW1wbGUvdjEvIjp7ImF1dGgiOiJvcGVuc2VzYW1lIn19fQo=
  103. metadata:
  104. name: secret-dockercfg
  105. type: kubernetes.io/dockercfg
  106. kind: Secret
  107. `,
  108. "before-multiline-folded.yaml": `apiVersion: v1
  109. data:
  110. .dockercfg: >
  111. eyJhdXRocyI6eyJodHRwczovL2V4YW1wbGUvdjEvIjp7ImF1dGgiOiJvcGVuc2VzYW1lIn19fQo=
  112. metadata:
  113. name: secret-dockercfg
  114. type: kubernetes.io/dockercfg
  115. kind: Secret`,
  116. // Sample Kubernetes Secret from https://kubernetes.io/docs/concepts/configuration/secret/
  117. // The "data"-key is after the identifier "kind: Secret"
  118. "after-kubernetes.yaml": `apiVersion: v1
  119. kind: secret
  120. data:
  121. extra: YWRtaW46cGFzc3dvcmQ=
  122. metadata:
  123. name: secret-sa-sample
  124. annotations:
  125. kubernetes.io/service-account.name: 'sa-name'`,
  126. "after-kubernetes.yml": `apiVersion: v1
  127. kind: Secret
  128. metadata:
  129. name: ca-secret
  130. type: Opaque
  131. data:
  132. ca.pem: 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
  133. `,
  134. "after-comment.yml": `apiVersion: v1
  135. kind: Secret
  136. metadata:
  137. creationTimestamp: '2022-06-28T17:44:13Z'
  138. name: db-user-pass
  139. namespace: default
  140. type: Opaque
  141. data:
  142. # the data is abbreviated in this example
  143. password: UyFCXCpkJHpEc2I9
  144. username: YWRtaW4=
  145. `,
  146. "after-quoted-1.yaml": `apiVersion: 'v1'
  147. kind: 'Secret'
  148. data:
  149. password: 'UyFCXCpkJHpEc2I9'
  150. username: 'YWRtaW4='
  151. metadata:
  152. name: 'db-user-pass'
  153. namespace: 'default'
  154. type: 'Opaque'`,
  155. "after-quoted-2.yaml": `apiVersion: "v1"
  156. kind: "Secret"
  157. data:
  158. password: "UyFCXCpkJHpEc2I9"
  159. username: "YWRtaW4="
  160. metadata:
  161. name: "db-user-pass"
  162. namespace: "default"
  163. type: "Opaque"`,
  164. "after-multiline-literal.yaml": `apiVersion: v1
  165. kind: Secret
  166. metadata:
  167. name: secret-dockercfg
  168. type: kubernetes.io/dockercfg
  169. data:
  170. .dockercfg: |
  171. eyJhdXRocyI6eyJodHRwczovL2V4YW1wbGUvdjEvIjp7ImF1dGgiOiJvcGVuc2VzYW1lIn19fQo=
  172. `,
  173. "after-multiline-folded.yaml": `apiVersion: v1
  174. kind: Secret
  175. metadata:
  176. name: secret-dockercfg
  177. type: kubernetes.io/dockercfg
  178. data:
  179. .dockercfg: >
  180. eyJhdXRocyI6eyJodHRwczovL2V4YW1wbGUvdjEvIjp7ImF1dGgiOiJvcGVuc2VzYW1lIn19fQo=`,
  181. }
  182. fps := map[string]string{
  183. "empty-quotes1.yml": `apiVersion: v1
  184. kind: Secret
  185. metadata:
  186. name: registry-auth-data
  187. type: Opaque
  188. data:
  189. htpasswd: ''
  190. `,
  191. "empty-quotes2.yml": `apiVersion: v1
  192. kind: Secret
  193. metadata:
  194. name: registry-auth-data
  195. type: Opaque
  196. data:
  197. htpasswd: ""
  198. `,
  199. "overly-permissive1.yaml": `apiVersion: v1
  200. kind: Secret
  201. metadata:
  202. name: registry-auth-data
  203. type: Opaque
  204. data:
  205. htpasswd: {{ htpasswd }}
  206. ---
  207. apiVersion: v1
  208. kind: ReplicationController`,
  209. "overly-permissive2.yaml": `apiVersion: v1
  210. kind: Secret
  211. metadata:
  212. labels:
  213. k8s-app: kubernetes-dashboard
  214. addonmanager.kubernetes.io/mode: EnsureExists
  215. name: kubernetes-dashboard-csrf
  216. namespace: kubernetes-dashboard
  217. type: Opaque
  218. data:
  219. csrf: ""
  220. ---
  221. apiVersion: v1
  222. kind: Secret
  223. metadata:
  224. labels:
  225. k8s-app: kubernetes-dashboard
  226. addonmanager.kubernetes.io/mode: EnsureExists
  227. name: kubernetes-dashboard-key-holder
  228. namespace: kubernetes-dashboard
  229. type: Opaque
  230. `,
  231. "sopssecret.yaml": `apiVersion: isindir.github.com/v1alpha3
  232. kind: SopsSecret
  233. metadata:
  234. name: app1-sopssecret
  235. namespace: test
  236. spec:
  237. suspend: false
  238. secretTemplates:
  239. - name: ENC[AES256_GCM,data:W3PiZ6lD6bpfAdI=,iv:2qF98ZkchgfWF4tZo8fok6zY0ZLNRV3wFpl8n2iyC7I=,tag:FzoL+CZHkLEqfWKniRApBA==,type:str]
  240. labels:
  241. app: ENC[AES256_GCM,data:t9ujIQ==,iv:slZBpmKF+DOg/wVBWmq5iTqkRBZUMao0a3MdoxzJs3s=,tag:xJyhdJ4rn/cB/4mxHzmGig==,type:str]
  242. stringData:
  243. db-password: ENC[AES256_GCM,data:O+5l4g==,iv:c/dS4BCBMbnKsXYuzBuCuVQt8RV9bOv5HgdpL+iwmns=,tag:KkQfh6OymvCt4uC13p318g==,type:str]
  244. sops:
  245. kms: []
  246. gcp_kms: []
  247. azure_kv: []
  248. hc_vault: []
  249. lastmodified: '2021-10-21T10:56:37Z'
  250. mac: ENC[AES256_GCM,data:Tl1V1PuI5tZ0Hu3qxxzpDNeKQkuW0g/x/Mlp1yM6HaBqDr+r2FukLdYSYqjjJ3A8g+YkpvMib50M7j0V7zoX9sgCvMKEg86pRsWtThv8n/L+bsjClVTqnhJ9nfYlaPOMlvggbiMOE5hXPIuVz8WXYoVYJ2cVNCd/GfwOraUmj7I=,iv:n7HVI13okfbW3FS/ZsJ2GNmibudxc/TlkLa3umQQ+vc=,tag:R4ikep1wlxlDWlODJqFHHw==,type:str]
  251. pgp:
  252. - created_at: '2021-10-21T10:56:37Z'
  253. enc: |
  254. -----BEGIN PGP MESSAGE-----
  255. hQGMA3muqimBu2IIAQwAkhR19/6roLq06oaD12vqDMes3/8FweAHxa6TLKg+LRjp
  256. 2/ntiRJHPBP9DYYFZbkTo8lAmIdVF7KfGIqWgPm5JiNhqfVRhyGPCRgBE7+I8qH6
  257. EML9Vo/76kJLHtIjs5rOg7OXgwwitaibs1q6uyVY8TuaGXYIOO1iwL9xVtbayIry
  258. NMQd1tFcNb6Vb86Plqm+T1VnSOJMUvryxrLelx89UNM0ctepyVu6YY9jpBjV0QLJ
  259. NqNkKAGIMv3RNa9bZHTwveo9T0oXtFnk5H33BxH0ky/DGpD+5Ch1YgbzbqVnr+Bm
  260. RX0R/GRhS9IDInd+eiyVX6y3LR5di0fc8TuK43+96wTG+2+ck+lbMrkHYsL2UJNv
  261. bAjlOWmIcL4UwGlEOj4EzwcEx+xP3dq57pJ+DasfNwVqps2Kk+ofodR7d6gx7ELH
  262. UQmLypCtkRic9v8fVSA2vEL8hAlg9bT8tpHLhHMOwe228cL5dTzFD60RoP+ovRar
  263. jIU59Pnu1bnM4pXWEVA20l4BzJ8Fd6gj3TfAg/7Mat+dnTaUwnPgRSybFn0ZZHMW
  264. RJDBPkMGFfSGRDfLeD37d61mI31360/w/61LaVp1sdDYodBJCRZFA1YzbqZcxnDl
  265. YRjRmpcVRnO+o72CnU/P
  266. =V4l4
  267. -----END PGP MESSAGE-----
  268. fp: 73019E949C1D3C3D1BE8B718C7CD51A565AB592C
  269. encrypted_suffix: Templates
  270. version: 3.6.1`, // https://github.com/luca-iachini/argocd-test/blob/af0c8eaba270bc918108c8bc3b909f26a4fe995d/kustomize/base/app1/secrets.enc.yaml#L4
  271. // The "data"-key is before the identifier "kind: Secret"
  272. "before-min-length.yaml": `apiVersion: v1
  273. data:
  274. extra: YmFyCg==
  275. kind: secret
  276. metadata:
  277. name: secret-sa-sample
  278. annotations:
  279. kubernetes.io/service-account.name: 'sa-name'`,
  280. "before-template.yaml": `apiVersion: v1
  281. data:
  282. password: {{ .Values.Password }}
  283. kind: secret
  284. metadata:
  285. name: secret-sa-sample
  286. annotations:
  287. kubernetes.io/service-account.name: 'sa-name'`,
  288. "before-externalsecret1.yml": `apiVersion: 'kubernetes-client.io/v1'
  289. metadata:
  290. name: actions-exporter
  291. namespace: github-actions-exporter
  292. spec:
  293. backendType: secretsManager
  294. data:
  295. - key: MySecretManagerKey
  296. name: github_token
  297. property: github_token
  298. kind: ExternalSecret
  299. `,
  300. "before-externalsecret2.yml": `apiVersion: external-secrets.io/v1beta1
  301. spec:
  302. secretStoreRef:
  303. kind: ClusterSecretStore
  304. name: aws-secretsmanager
  305. refreshInterval: 1h
  306. target:
  307. creationPolicy: Owner
  308. data:
  309. - secretKey: api-key
  310. remoteRef:
  311. key: my-secrets-manager-secret
  312. metadata:
  313. name: api-key
  314. namespace: my-namespace
  315. kind: ExternalSecret
  316. `,
  317. "before-sopssecret.yml": `apiVersion: isindir.github.com/v1alpha3
  318. spec:
  319. secretTemplates:
  320. - name: my-secret-name-1
  321. labels:
  322. label1: value1
  323. annotations:
  324. key1: value1
  325. data:
  326. data-name1: ZGF0YS12YWx1ZTE=
  327. data-nameM: ZGF0YS12YWx1ZU0=
  328. kind: SopsSecret
  329. metadata:
  330. name: sopssecret-sample
  331. `, // https://github.com/isindir/sops-secrets-operator/blob/8aaf8bb368dc841a2d57f251bd839f08216a9328/config/samples/isindir_v1alpha3_sopssecret.yaml#L4
  332. // The "data"-key is after the identifier "kind: Secret"
  333. "after-min-length.yaml": `apiVersion: v1
  334. kind: secret
  335. data:
  336. extra: YmFyCg==
  337. metadata:
  338. name: secret-sa-sample
  339. annotations:
  340. kubernetes.io/service-account.name: 'sa-name'`,
  341. "after-externalsecret1.yml": `apiVersion: 'kubernetes-client.io/v1'
  342. kind: ExternalSecret
  343. metadata:
  344. name: actions-exporter
  345. namespace: github-actions-exporter
  346. spec:
  347. backendType: secretsManager
  348. data:
  349. - key: MySecretManagerKey
  350. name: github_token
  351. property: github_token
  352. - key: MySecretManagerKey`,
  353. "after-externalsecret2.yml": `apiVersion: external-secrets.io/v1beta1
  354. kind: ExternalSecret
  355. metadata:
  356. name: api-key
  357. namespace: my-namespace
  358. spec:
  359. secretStoreRef:
  360. kind: ClusterSecretStore
  361. name: aws-secretsmanager
  362. refreshInterval: 1h
  363. target:
  364. creationPolicy: Owner
  365. data:
  366. - secretKey: api-key
  367. remoteRef:
  368. key: my-secrets-manager-secret`,
  369. "after-sopssecret.yml": `apiVersion: isindir.github.com/v1alpha3
  370. kind: SopsSecret
  371. metadata:
  372. name: sopssecret-sample
  373. spec:
  374. secretTemplates:
  375. - name: my-secret-name-0
  376. labels:
  377. label0: value0
  378. labelK: valueK
  379. annotations:
  380. key0: value0
  381. keyN: valueN
  382. stringData:
  383. data-name0: data-value0
  384. data-nameL: data-valueL
  385. - name: my-secret-name-1
  386. labels:
  387. label1: value1
  388. annotations:
  389. key1: value1
  390. data:
  391. data-name1: ZGF0YS12YWx1ZTE=
  392. data-nameM: ZGF0YS12YWx1ZU0=`,
  393. "after-empty-data.yaml": `apiVersion: v1
  394. kind: Secret
  395. metadata:
  396. labels:
  397. k8s-app: kubernetes-dashboard
  398. addonmanager.kubernetes.io/mode: EnsureExists
  399. name: kubernetes-dashboard-csrf
  400. namespace: kubernetes-dashboard
  401. type: Opaque
  402. data:
  403. csrf: ""
  404. `,
  405. }
  406. return utils.ValidateWithPaths(r, tps, fps)
  407. }