validate.go 2.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990
  1. // == WARNING ==
  2. // These functions are used to generate GitLeak's default config.
  3. // You are free to use these in your own project, HOWEVER, no API stability is guaranteed.
  4. package utils
  5. import (
  6. "github.com/rs/zerolog/log"
  7. "github.com/zricethezav/gitleaks/v8/cmd/generate/config/base"
  8. "github.com/zricethezav/gitleaks/v8/config"
  9. "github.com/zricethezav/gitleaks/v8/detect"
  10. "strings"
  11. )
  12. func Validate(rule config.Rule, truePositives []string, falsePositives []string) *config.Rule {
  13. r := &rule
  14. d := createSingleRuleDetector(r)
  15. for _, tp := range truePositives {
  16. if len(d.DetectString(tp)) != 1 {
  17. log.Fatal().
  18. Str("rule", r.RuleID).
  19. Str("value", tp).
  20. Str("regex", r.Regex.String()).
  21. Msg("Failed to Validate. True positive was not detected by regex.")
  22. }
  23. }
  24. for _, fp := range falsePositives {
  25. if len(d.DetectString(fp)) != 0 {
  26. log.Fatal().
  27. Str("rule", r.RuleID).
  28. Str("value", fp).
  29. Str("regex", r.Regex.String()).
  30. Msg("Failed to Validate. False positive was detected by regex.")
  31. }
  32. }
  33. return r
  34. }
  35. func ValidateWithPaths(rule config.Rule, truePositives map[string]string, falsePositives map[string]string) *config.Rule {
  36. r := &rule
  37. d := createSingleRuleDetector(r)
  38. for path, tp := range truePositives {
  39. f := detect.Fragment{Raw: tp, FilePath: path}
  40. if len(d.Detect(f)) != 1 {
  41. log.Fatal().
  42. Str("rule", r.RuleID).
  43. Str("value", tp).
  44. Str("regex", r.Regex.String()).
  45. Str("path", r.Path.String()).
  46. Msg("Failed to Validate. True positive was not detected by regex and/or path.")
  47. }
  48. }
  49. for path, fp := range falsePositives {
  50. f := detect.Fragment{Raw: fp, FilePath: path}
  51. if len(d.Detect(f)) != 0 {
  52. log.Fatal().
  53. Str("rule", r.RuleID).
  54. Str("value", fp).
  55. Str("regex", r.Regex.String()).
  56. Str("path", r.Path.String()).
  57. Msg("Failed to Validate. False positive was detected by regex and/or path.")
  58. }
  59. }
  60. return r
  61. }
  62. func createSingleRuleDetector(r *config.Rule) *detect.Detector {
  63. // normalize keywords like in the config package
  64. var (
  65. uniqueKeywords = make(map[string]struct{})
  66. keywords []string
  67. )
  68. for _, keyword := range r.Keywords {
  69. k := strings.ToLower(keyword)
  70. if _, ok := uniqueKeywords[k]; ok {
  71. continue
  72. }
  73. keywords = append(keywords, k)
  74. uniqueKeywords[k] = struct{}{}
  75. }
  76. r.Keywords = keywords
  77. rules := map[string]config.Rule{
  78. r.RuleID: *r,
  79. }
  80. cfg := base.CreateGlobalConfig()
  81. cfg.Rules = rules
  82. cfg.Keywords = uniqueKeywords
  83. return detect.NewDetector(cfg)
  84. }