root.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445
  1. package cmd
  2. import (
  3. "fmt"
  4. "io"
  5. "os"
  6. "path/filepath"
  7. "strings"
  8. "sync/atomic"
  9. "time"
  10. "github.com/rs/zerolog"
  11. "github.com/rs/zerolog/log"
  12. "github.com/spf13/cobra"
  13. "github.com/spf13/viper"
  14. "github.com/zricethezav/gitleaks/v8/config"
  15. "github.com/zricethezav/gitleaks/v8/detect"
  16. "github.com/zricethezav/gitleaks/v8/logging"
  17. "github.com/zricethezav/gitleaks/v8/report"
  18. )
  19. const banner = `
  20. │╲
  21. │ ○
  22. ○ ░
  23. ░ gitleaks
  24. `
  25. const configDescription = `config file path
  26. order of precedence:
  27. 1. --config/-c
  28. 2. env var GITLEAKS_CONFIG
  29. 3. (target path)/.gitleaks.toml
  30. If none of the three options are used, then gitleaks will use the default config`
  31. var rootCmd = &cobra.Command{
  32. Use: "gitleaks",
  33. Short: "Gitleaks scans code, past or present, for secrets",
  34. Version: Version,
  35. }
  36. const (
  37. BYTE = 1.0
  38. KILOBYTE = BYTE * 1000
  39. MEGABYTE = KILOBYTE * 1000
  40. GIGABYTE = MEGABYTE * 1000
  41. )
  42. func init() {
  43. cobra.OnInitialize(initLog)
  44. rootCmd.PersistentFlags().StringP("config", "c", "", configDescription)
  45. rootCmd.PersistentFlags().Int("exit-code", 1, "exit code when leaks have been encountered")
  46. rootCmd.PersistentFlags().StringP("report-path", "r", "", "report file")
  47. rootCmd.PersistentFlags().StringP("report-format", "f", "json", "output format (json, jsonextra, csv, junit, sarif, template)")
  48. rootCmd.PersistentFlags().StringP("report-template", "", "", "template file used to generate the report (implies --report-format=template)")
  49. rootCmd.PersistentFlags().StringP("baseline-path", "b", "", "path to baseline with issues that can be ignored")
  50. rootCmd.PersistentFlags().StringP("log-level", "l", "info", "log level (trace, debug, info, warn, error, fatal)")
  51. rootCmd.PersistentFlags().BoolP("verbose", "v", false, "show verbose output from scan")
  52. rootCmd.PersistentFlags().BoolP("no-color", "", false, "turn off color for verbose output")
  53. rootCmd.PersistentFlags().Int("max-target-megabytes", 0, "files larger than this will be skipped")
  54. rootCmd.PersistentFlags().BoolP("ignore-gitleaks-allow", "", false, "ignore gitleaks:allow comments")
  55. rootCmd.PersistentFlags().Uint("redact", 0, "redact secrets from logs and stdout. To redact only parts of the secret just apply a percent value from 0..100. For example --redact=20 (default 100%)")
  56. rootCmd.Flag("redact").NoOptDefVal = "100"
  57. rootCmd.PersistentFlags().Bool("no-banner", false, "suppress banner")
  58. rootCmd.PersistentFlags().StringSlice("enable-rule", []string{}, "only enable specific rules by id")
  59. rootCmd.PersistentFlags().StringP("gitleaks-ignore-path", "i", ".", "path to .gitleaksignore file or folder containing one")
  60. rootCmd.PersistentFlags().Int("max-decode-depth", 0, "allow recursive decoding up to this depth (default \"0\", no decoding is done)")
  61. err := viper.BindPFlag("config", rootCmd.PersistentFlags().Lookup("config"))
  62. if err != nil {
  63. logging.Fatal().Msgf("err binding config %s", err.Error())
  64. }
  65. }
  66. var logLevel = zerolog.InfoLevel
  67. func initLog() {
  68. ll, err := rootCmd.Flags().GetString("log-level")
  69. if err != nil {
  70. logging.Fatal().Msg(err.Error())
  71. }
  72. switch strings.ToLower(ll) {
  73. case "trace":
  74. logLevel = zerolog.TraceLevel
  75. case "debug":
  76. logLevel = zerolog.DebugLevel
  77. case "info":
  78. logLevel = zerolog.InfoLevel
  79. case "warn":
  80. logLevel = zerolog.WarnLevel
  81. case "err", "error":
  82. logLevel = zerolog.ErrorLevel
  83. case "fatal":
  84. logLevel = zerolog.FatalLevel
  85. default:
  86. logging.Warn().Msgf("unknown log level: %s", ll)
  87. }
  88. logging.Logger = logging.Logger.Level(logLevel)
  89. }
  90. func initConfig(source string) {
  91. hideBanner, err := rootCmd.Flags().GetBool("no-banner")
  92. if err != nil {
  93. logging.Fatal().Msg(err.Error())
  94. }
  95. if !hideBanner {
  96. _, _ = fmt.Fprint(os.Stderr, banner)
  97. }
  98. cfgPath, err := rootCmd.Flags().GetString("config")
  99. if err != nil {
  100. logging.Fatal().Msg(err.Error())
  101. }
  102. if cfgPath != "" {
  103. viper.SetConfigFile(cfgPath)
  104. logging.Debug().Msgf("using gitleaks config %s from `--config`", cfgPath)
  105. } else if os.Getenv("GITLEAKS_CONFIG") != "" {
  106. envPath := os.Getenv("GITLEAKS_CONFIG")
  107. viper.SetConfigFile(envPath)
  108. logging.Debug().Msgf("using gitleaks config from GITLEAKS_CONFIG env var: %s", envPath)
  109. } else {
  110. fileInfo, err := os.Stat(source)
  111. if err != nil {
  112. logging.Fatal().Msg(err.Error())
  113. }
  114. if !fileInfo.IsDir() {
  115. logging.Debug().Msgf("unable to load gitleaks config from %s since --source=%s is a file, using default config",
  116. filepath.Join(source, ".gitleaks.toml"), source)
  117. viper.SetConfigType("toml")
  118. if err = viper.ReadConfig(strings.NewReader(config.DefaultConfig)); err != nil {
  119. logging.Fatal().Msgf("err reading toml %s", err.Error())
  120. }
  121. return
  122. }
  123. if _, err := os.Stat(filepath.Join(source, ".gitleaks.toml")); os.IsNotExist(err) {
  124. logging.Debug().Msgf("no gitleaks config found in path %s, using default gitleaks config", filepath.Join(source, ".gitleaks.toml"))
  125. viper.SetConfigType("toml")
  126. if err = viper.ReadConfig(strings.NewReader(config.DefaultConfig)); err != nil {
  127. logging.Fatal().Msgf("err reading default config toml %s", err.Error())
  128. }
  129. return
  130. } else {
  131. logging.Debug().Msgf("using existing gitleaks config %s from `(--source)/.gitleaks.toml`", filepath.Join(source, ".gitleaks.toml"))
  132. }
  133. viper.AddConfigPath(source)
  134. viper.SetConfigName(".gitleaks")
  135. viper.SetConfigType("toml")
  136. }
  137. if err := viper.ReadInConfig(); err != nil {
  138. logging.Fatal().Msgf("unable to load gitleaks config, err: %s", err)
  139. }
  140. }
  141. func Execute() {
  142. if err := rootCmd.Execute(); err != nil {
  143. if strings.Contains(err.Error(), "unknown flag") {
  144. // exit code 126: Command invoked cannot execute
  145. os.Exit(126)
  146. }
  147. logging.Fatal().Msg(err.Error())
  148. }
  149. }
  150. func Config(cmd *cobra.Command) config.Config {
  151. var vc config.ViperConfig
  152. if err := viper.Unmarshal(&vc); err != nil {
  153. logging.Fatal().Err(err).Msg("Failed to load config")
  154. }
  155. cfg, err := vc.Translate()
  156. if err != nil {
  157. logging.Fatal().Err(err).Msg("Failed to load config")
  158. }
  159. cfg.Path, _ = cmd.Flags().GetString("config")
  160. return cfg
  161. }
  162. func Detector(cmd *cobra.Command, cfg config.Config, source string) *detect.Detector {
  163. var err error
  164. // Setup common detector
  165. detector := detect.NewDetector(cfg)
  166. if detector.MaxDecodeDepth, err = cmd.Flags().GetInt("max-decode-depth"); err != nil {
  167. logging.Fatal().Err(err).Msg("")
  168. }
  169. // set color flag at first
  170. if detector.NoColor, err = cmd.Flags().GetBool("no-color"); err != nil {
  171. logging.Fatal().Err(err).Msg("")
  172. }
  173. // also init logger again without color
  174. if detector.NoColor {
  175. logging.Logger = log.Output(zerolog.ConsoleWriter{
  176. Out: os.Stderr,
  177. NoColor: detector.NoColor,
  178. }).Level(logLevel)
  179. }
  180. detector.Config.Path, err = cmd.Flags().GetString("config")
  181. if err != nil {
  182. logging.Fatal().Err(err).Msg("")
  183. }
  184. // if config path is not set, then use the {source}/.gitleaks.toml path.
  185. // note that there may not be a `{source}/.gitleaks.toml` file, this is ok.
  186. if detector.Config.Path == "" {
  187. detector.Config.Path = filepath.Join(source, ".gitleaks.toml")
  188. }
  189. // set verbose flag
  190. if detector.Verbose, err = cmd.Flags().GetBool("verbose"); err != nil {
  191. logging.Fatal().Err(err).Msg("")
  192. }
  193. // set redact flag
  194. if detector.Redact, err = cmd.Flags().GetUint("redact"); err != nil {
  195. logging.Fatal().Err(err).Msg("")
  196. }
  197. if detector.MaxTargetMegaBytes, err = cmd.Flags().GetInt("max-target-megabytes"); err != nil {
  198. logging.Fatal().Err(err).Msg("")
  199. }
  200. // set ignore gitleaks:allow flag
  201. if detector.IgnoreGitleaksAllow, err = cmd.Flags().GetBool("ignore-gitleaks-allow"); err != nil {
  202. logging.Fatal().Err(err).Msg("")
  203. }
  204. gitleaksIgnorePath, err := cmd.Flags().GetString("gitleaks-ignore-path")
  205. if err != nil {
  206. logging.Fatal().Err(err).Msg("could not get .gitleaksignore path")
  207. }
  208. if fileExists(gitleaksIgnorePath) {
  209. if err = detector.AddGitleaksIgnore(gitleaksIgnorePath); err != nil {
  210. logging.Fatal().Err(err).Msg("could not call AddGitleaksIgnore")
  211. }
  212. }
  213. if fileExists(filepath.Join(gitleaksIgnorePath, ".gitleaksignore")) {
  214. if err = detector.AddGitleaksIgnore(filepath.Join(gitleaksIgnorePath, ".gitleaksignore")); err != nil {
  215. logging.Fatal().Err(err).Msg("could not call AddGitleaksIgnore")
  216. }
  217. }
  218. if fileExists(filepath.Join(source, ".gitleaksignore")) {
  219. if err = detector.AddGitleaksIgnore(filepath.Join(source, ".gitleaksignore")); err != nil {
  220. logging.Fatal().Err(err).Msg("could not call AddGitleaksIgnore")
  221. }
  222. }
  223. // ignore findings from the baseline (an existing report in json format generated earlier)
  224. baselinePath, _ := cmd.Flags().GetString("baseline-path")
  225. if baselinePath != "" {
  226. err = detector.AddBaseline(baselinePath, source)
  227. if err != nil {
  228. logging.Error().Msgf("Could not load baseline. The path must point of a gitleaks report generated using the default format: %s", err)
  229. }
  230. }
  231. // If set, only apply rules that are defined in the flag
  232. rules, _ := cmd.Flags().GetStringSlice("enable-rule")
  233. if len(rules) > 0 {
  234. logging.Info().Msg("Overriding enabled rules: " + strings.Join(rules, ", "))
  235. ruleOverride := make(map[string]config.Rule)
  236. for _, ruleName := range rules {
  237. if r, ok := cfg.Rules[ruleName]; ok {
  238. ruleOverride[ruleName] = r
  239. } else {
  240. logging.Fatal().Msgf("Requested rule %s not found in rules", ruleName)
  241. }
  242. }
  243. detector.Config.Rules = ruleOverride
  244. }
  245. // Validate report settings.
  246. reportPath := mustGetStringFlag("report-path")
  247. if reportPath != "" {
  248. if reportPath != report.StdoutReportPath {
  249. // Ensure the path is writable.
  250. if f, err := os.Create(reportPath); err != nil {
  251. logging.Fatal().Err(err).Msgf("Report path is not writable: %s", reportPath)
  252. } else {
  253. _ = f.Close()
  254. _ = os.Remove(reportPath)
  255. }
  256. }
  257. // Build report writer.
  258. var (
  259. reporter report.Reporter
  260. reportFormat = mustGetStringFlag("report-format")
  261. reportTemplate = mustGetStringFlag("report-template")
  262. )
  263. switch strings.TrimSpace(strings.ToLower(reportFormat)) {
  264. case "csv":
  265. reporter = &report.CsvReporter{}
  266. case "json":
  267. reporter = &report.JsonReporter{}
  268. case "junit":
  269. reporter = &report.JunitReporter{}
  270. case "sarif":
  271. reporter = &report.SarifReporter{
  272. OrderedRules: cfg.GetOrderedRules(),
  273. }
  274. case "template":
  275. if reporter, err = report.NewTemplateReporter(reportTemplate); err != nil {
  276. logging.Fatal().Err(err).Msg("Invalid report template")
  277. }
  278. default:
  279. logging.Fatal().Msgf("unknown report format %s", reportFormat)
  280. }
  281. // Sanity check.
  282. if reportTemplate != "" && reportFormat != "template" {
  283. logging.Fatal().Msgf("Report format must be 'template' if --report-template is specified")
  284. }
  285. detector.ReportPath = reportPath
  286. detector.Reporter = reporter
  287. }
  288. return detector
  289. }
  290. func mustGetStringFlag(name string) string {
  291. reportPath, err := rootCmd.Flags().GetString(name)
  292. if err != nil {
  293. logging.Fatal().Msg(err.Error())
  294. }
  295. return reportPath
  296. }
  297. func bytesConvert(bytes uint64) string {
  298. unit := ""
  299. value := float32(bytes)
  300. switch {
  301. case bytes >= GIGABYTE:
  302. unit = "GB"
  303. value = value / GIGABYTE
  304. case bytes >= MEGABYTE:
  305. unit = "MB"
  306. value = value / MEGABYTE
  307. case bytes >= KILOBYTE:
  308. unit = "KB"
  309. value = value / KILOBYTE
  310. case bytes >= BYTE:
  311. unit = "bytes"
  312. case bytes == 0:
  313. return "0"
  314. }
  315. stringValue := strings.TrimSuffix(
  316. fmt.Sprintf("%.2f", value), ".00",
  317. )
  318. return fmt.Sprintf("%s %s", stringValue, unit)
  319. }
  320. func findingSummaryAndExit(detector *detect.Detector, findings []report.Finding, exitCode int, start time.Time, err error) {
  321. totalBytes := atomic.LoadUint64(&detector.TotalBytes)
  322. bytesMsg := fmt.Sprintf("scanned ~%d bytes (%s)", totalBytes, bytesConvert(totalBytes))
  323. if err == nil {
  324. logging.Info().Msgf("%s in %s", bytesMsg, FormatDuration(time.Since(start)))
  325. if len(findings) != 0 {
  326. logging.Warn().Msgf("leaks found: %d", len(findings))
  327. } else {
  328. logging.Info().Msg("no leaks found")
  329. }
  330. } else {
  331. logging.Warn().Msg(bytesMsg)
  332. logging.Warn().Msgf("partial scan completed in %s", FormatDuration(time.Since(start)))
  333. if len(findings) != 0 {
  334. logging.Warn().Msgf("%d leaks found in partial scan", len(findings))
  335. } else {
  336. logging.Warn().Msg("no leaks found in partial scan")
  337. }
  338. }
  339. // write report if desired
  340. if detector.Reporter != nil {
  341. var (
  342. file io.WriteCloser
  343. reportErr error
  344. )
  345. if detector.ReportPath == report.StdoutReportPath {
  346. file = os.Stdout
  347. } else {
  348. // Open the file.
  349. if file, reportErr = os.Create(detector.ReportPath); reportErr != nil {
  350. goto ReportEnd
  351. }
  352. defer func() {
  353. _ = file.Close()
  354. }()
  355. }
  356. // Write to the file.
  357. if reportErr = detector.Reporter.Write(file, findings); reportErr != nil {
  358. goto ReportEnd
  359. }
  360. ReportEnd:
  361. if reportErr != nil {
  362. logging.Fatal().Err(reportErr).Msg("failed to write report")
  363. }
  364. }
  365. if err != nil {
  366. os.Exit(1)
  367. }
  368. if len(findings) != 0 {
  369. os.Exit(exitCode)
  370. }
  371. }
  372. func fileExists(fileName string) bool {
  373. // check for a .gitleaksignore file
  374. info, err := os.Stat(fileName)
  375. if err != nil && !os.IsNotExist(err) {
  376. return false
  377. }
  378. if info != nil && err == nil {
  379. if !info.IsDir() {
  380. return true
  381. }
  382. }
  383. return false
  384. }
  385. func FormatDuration(d time.Duration) string {
  386. scale := 100 * time.Second
  387. // look for the max scale that is smaller than d
  388. for scale > d {
  389. scale = scale / 10
  390. }
  391. return d.Round(scale / 100).String()
  392. }