| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247 |
- package main
- import (
- "bytes"
- "encoding/json"
- "fmt"
- "io/ioutil"
- "log"
- "os"
- "os/exec"
- "path/filepath"
- "sync"
- )
- // Repo represents a git repo
- type Repo struct {
- name string
- url string
- path string
- status string // TODO
- leaks []Leak
- reportPath string
- }
- // Leak struct for reporting
- type Leak struct {
- Line string `json:"line"`
- Commit string `json:"commit"`
- Offender string `json:"string"`
- Reason string `json:"reason"`
- Msg string `json:"commitMsg"`
- Time string `json:"time"`
- Author string `json:"author"`
- File string `json:"file"`
- RepoURL string `json:"repoURL"`
- }
- // Commit represents a git commit
- type Commit struct {
- Hash string
- Author string
- Time string
- Msg string
- }
- // newRepo creates a new repo based on name, url, and a clone path
- func newRepo(name string, url string, path string) *Repo {
- repo := &Repo{
- name: name,
- url: url,
- path: path,
- reportPath: opts.ReportPath,
- }
- return repo
- }
- // rmTmp removes the temporary directory: repo.path
- func (repo *Repo) rmTmp() {
- log.Printf("removing tmp gitleaks repo %s\n", repo.path)
- os.Remove(repo.path)
- }
- // Audit operates on a single repo and searches the full or partial history of the repo.
- // A semaphore is declared for every repo to bind concurrency. If unbounded, the system will throw a
- // `too many open files` error. Eventually, gitleaks should use src-d/go-git to avoid shelling out
- // commands so that users could opt for doing all clones/diffs in memory.
- // Audit also declares two WaitGroups, one for distributing regex/entropy checks, and one for receiving
- // the leaks if there are any. This could be done a little more elegantly in the future.
- func (repo *Repo) audit() (bool, error) {
- var (
- out []byte
- err error
- commitWG sync.WaitGroup
- gitLeakReceiverWG sync.WaitGroup
- gitLeaksChan = make(chan Leak)
- leaks []Leak
- semaphoreChan = make(chan struct{}, opts.Concurrency)
- leaksPst bool
- )
- if opts.Tmp {
- defer repo.rmTmp()
- }
- dotGitPath := filepath.Join(repo.path, ".git")
- // Navigate to proper location to being audit. Clone repo
- // if not present, otherwise fetch for new changes.
- if _, err := os.Stat(dotGitPath); os.IsNotExist(err) {
- if opts.LocalMode {
- return false, fmt.Errorf("%s does not exist", repo.path)
- }
- // no repo present, clone it
- log.Printf("cloning \x1b[37;1m%s\x1b[0m into %s...\n", repo.url, repo.path)
- err = exec.Command("git", "clone", repo.url, repo.path).Run()
- if err != nil {
- return false, fmt.Errorf("cannot clone %s into %s", repo.url, repo.path)
- }
- } else {
- log.Printf("fetching \x1b[37;1m%s\x1b[0m from %s ...\n", repo.name, repo.path)
- err = os.Chdir(fmt.Sprintf(repo.path))
- if err != nil {
- return false, fmt.Errorf("cannot navigate to %s", repo.path)
- }
- err = exec.Command("git", "fetch").Run()
- if err != nil {
- return false, fmt.Errorf("cannot fetch %s from %s", repo.url, repo.path)
- }
- }
- err = os.Chdir(fmt.Sprintf(repo.path))
- if err != nil {
- return false, fmt.Errorf("cannot navigate to %s", repo.path)
- }
- gitFormat := "--format=%H%n%an%n%s%n%ci"
- out, err = exec.Command("git", "rev-list", "--all",
- "--remotes", "--topo-order", gitFormat).Output()
- if err != nil {
- return false, fmt.Errorf("could not retreive rev-list from %s", repo.name)
- }
- revListLines := bytes.Split(out, []byte("\n"))
- commits := parseRevList(revListLines)
- for _, commit := range commits {
- if commit.Hash == "" {
- continue
- }
- commitWG.Add(1)
- go auditDiff(commit, repo, &commitWG, &gitLeakReceiverWG,
- semaphoreChan, gitLeaksChan)
- if commit.Hash == opts.SinceCommit {
- break
- }
- }
- go reportAggregator(&gitLeakReceiverWG, gitLeaksChan, &leaks)
- commitWG.Wait()
- gitLeakReceiverWG.Wait()
- if len(leaks) != 0 {
- leaksPst = true
- log.Printf("\x1b[31;2mLEAKS DETECTED for %s\x1b[0m!\n", repo.name)
- } else {
- log.Printf("No Leaks detected for \x1b[32;2m%s\x1b[0m\n", repo.name)
- }
- if opts.ReportPath != "" && len(leaks) != 0 {
- err = repo.writeReport(leaks)
- if err != nil {
- return leaksPst, fmt.Errorf("could not write report to %s", opts.ReportPath)
- }
- }
- return leaksPst, nil
- }
- // Used by audit, writeReport will generate a report and write it out to
- // --report-path=<path> if specified, otherwise a report will be generated to
- // $PWD/<repo_name>_leaks.json. No report will be generated if
- // no leaks have been found or --report-out is not set.
- func (repo *Repo) writeReport(leaks []Leak) error {
- reportJSON, _ := json.MarshalIndent(leaks, "", "\t")
- if _, err := os.Stat(opts.ReportPath); os.IsNotExist(err) {
- os.MkdirAll(opts.ReportPath, os.ModePerm)
- }
- reportFileName := fmt.Sprintf("%s_leaks.json", repo.name)
- reportFile := filepath.Join(repo.reportPath, reportFileName)
- err := ioutil.WriteFile(reportFile, reportJSON, 0644)
- if err != nil {
- return err
- }
- log.Printf("report for %s written to %s", repo.name, reportFile)
- return nil
- }
- // parseRevList is responsible for parsing the output of
- // $ `git rev-list --all -remotes --topo-order --format=%H%n%an%n%s%n%ci`
- // sample output from the above command looks like:
- // ...
- // SHA
- // Author Name
- // Commit Msg
- // Commit Date
- // ...
- // Used by audit
- func parseRevList(revList [][]byte) []Commit {
- var commits []Commit
- for i := 0; i < len(revList)-1; i = i + 5 {
- commit := Commit{
- Hash: string(revList[i+1]),
- Author: string(revList[i+2]),
- Msg: string(revList[i+3]),
- Time: string(revList[i+4]),
- }
- commits = append(commits, commit)
- }
- return commits
- }
- // reportAggregator is will consume Leak messages from the gitLeaks channel and report them
- func reportAggregator(gitLeakReceiverWG *sync.WaitGroup, gitLeaks chan Leak, leaks *[]Leak) {
- for gitLeak := range gitLeaks {
- *leaks = append(*leaks, gitLeak)
- if opts.Verbose {
- b, err := json.MarshalIndent(gitLeak, "", " ")
- if err != nil {
- fmt.Printf("failed to output leak: %v", err)
- }
- fmt.Println(string(b))
- }
- gitLeakReceiverWG.Done()
- }
- }
- // Used by audit, auditDiff is a go func responsible for diffing and auditing a commit.
- // Three channels are input here: 1. a semaphore to bind gitleaks, 2. a leak stream, 3. error handling (TODO)
- // This func performs a diff and runs regexes checks on each line of the diff.
- func auditDiff(currCommit Commit, repo *Repo, commitWG *sync.WaitGroup,
- gitLeakReceiverWG *sync.WaitGroup, semaphoreChan chan struct{},
- gitLeaks chan Leak) {
- // signal to WG this diff is done being audited
- defer commitWG.Done()
- if err := os.Chdir(fmt.Sprintf(repo.path)); err != nil {
- log.Fatalf("unable to navigate to %s", repo.path)
- }
- commitCmp := fmt.Sprintf("%s^!", currCommit.Hash)
- semaphoreChan <- struct{}{}
- out, err := exec.Command("git", "diff", commitCmp).Output()
- <-semaphoreChan
- if err != nil {
- log.Fatalf("unable to diff for %s: %v", currCommit.Hash, err)
- }
- leaks := doChecks(string(out), currCommit, repo)
- if len(leaks) == 0 {
- return
- }
- for _, leak := range leaks {
- gitLeakReceiverWG.Add(1)
- gitLeaks <- leak
- }
- }
|