kubernetes.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462
  1. package rules
  2. import (
  3. "fmt"
  4. regexp "github.com/wasilibs/go-re2"
  5. "github.com/zricethezav/gitleaks/v8/config"
  6. "github.com/zricethezav/gitleaks/v8/cmd/generate/config/utils"
  7. )
  8. // KubernetesSecret validates if we detected a kubernetes secret which contains data!
  9. func KubernetesSecret() *config.Rule {
  10. // Only match basic variations of `kind: secret`, we don't want things like `kind: ExternalSecret`.
  11. //language=regexp
  12. kindPat := `\bkind:[ \t]*["']?\bsecret\b["']?`
  13. // Only matches values (`key: value`) under `data:` that are:
  14. // - valid base64 characters
  15. // - longer than 10 characters (no "YmFyCg==")
  16. //language=regexp
  17. dataPat := `\bdata:(?:.|\s){0,100}?\s+([\w.-]+:(?:[ \t]*(?:\||>[-+]?)\s+)?[ \t]*(?:["']?[a-z0-9+/]{10,}={0,3}["']?|\{\{[ \t\w"|$:=,.-]+}}|""|''))`
  18. // define rule
  19. r := config.Rule{
  20. RuleID: "kubernetes-secret-yaml",
  21. Description: "Possible Kubernetes Secret detected, posing a risk of leaking credentials/tokens from your deployments",
  22. Regex: regexp.MustCompile(fmt.Sprintf(
  23. //language=regexp
  24. `(?i)(?:%s(?:.|\s){0,200}?%s|%s(?:.|\s){0,200}?%s)`, kindPat, dataPat, dataPat, kindPat)),
  25. Keywords: []string{
  26. "secret",
  27. },
  28. // Kubernetes secrets are usually yaml files.
  29. Path: regexp.MustCompile(`(?i)\.ya?ml$`),
  30. Allowlists: []config.Allowlist{
  31. {
  32. Regexes: []*regexp.Regexp{
  33. // Ignore empty or placeholder values.
  34. // variable: {{ .Values.Example }} (https://helm.sh/docs/chart_template_guide/variables/)
  35. // variable: ""
  36. // variable: ''
  37. regexp.MustCompile(`[\w.-]+:(?:[ \t]*(?:\||>[-+]?)\s+)?[ \t]*(?:\{\{[ \t\w"|$:=,.-]+}}|""|'')`),
  38. // TODO: Requires multiple allowlists to target match.
  39. // Avoid overreach between directives.
  40. // regexp.MustCompile(`(kind:(.|\s)+\n---\n(.|\s)+\bdata:|data:(.|\s)+\n---\n(.|\s)+\bkind:)`),
  41. },
  42. },
  43. },
  44. }
  45. // validate
  46. tps := map[string]string{
  47. "base64-characters.yaml": `
  48. apiVersion: v1
  49. kind: Secret
  50. data:
  51. password: AAAAAAAAAAC7hjsA+H3owFygUv4w5B67lcSx14zff9FCPADiNbSwYWgE+O7Dhiy5tkRecs21ljjofvebe6xsYlA4cVmght0=`,
  52. "comment.yaml": `
  53. apiVersion: v1
  54. kind: Secret
  55. metadata:
  56. name: heketi-secret
  57. namespace: default
  58. data:
  59. # base64 encoded password. E.g.: echo -n "mypassword" | base64
  60. key: bXlwYXNzd29yZA==`,
  61. // The "data"-key is before the identifier "kind: Secret"
  62. "before-kubernetes.yaml": `apiVersion: v1
  63. data:
  64. extra: YWRtaW46cGFzc3dvcmQ=
  65. kind: secret
  66. metadata:
  67. name: secret-sa-sample
  68. annotations:
  69. kubernetes.io/service-account.name: 'sa-name'`,
  70. "before-kubernetes.yml": `apiVersion: v1
  71. data:
  72. password: UyFCXCpkJHpEc2I9
  73. username: YWRtaW4=
  74. kind: Secret
  75. metadata:
  76. creationTimestamp: '2022-06-28T17:44:13Z'
  77. name: db-user-pass
  78. namespace: default
  79. type: Opaque`,
  80. "before-comment.yml": `apiVersion: v1
  81. data:
  82. # the data is abbreviated in this example
  83. password: UyFCXCpkJHpEc2I9
  84. username: YWRtaW4=
  85. kind: Secret
  86. metadata:
  87. creationTimestamp: '2022-06-28T17:44:13Z'
  88. name: db-user-pass
  89. namespace: default
  90. type: Opaque`,
  91. "before-quoted-1.yaml": `apiVersion: 'v1'
  92. data:
  93. extra: 'YWRtaW46cGFzc3dvcmQ='
  94. kind: 'Secret'
  95. metadata:
  96. name: 'secret-sa-sample'
  97. annotations:
  98. kubernetes.io/service-account.name: 'sa-name'`,
  99. "before-quoted-2.yaml": `apiVersion: "v1"
  100. data:
  101. extra: "YWRtaW46cGFzc3dvcmQ="
  102. kind: "secret"
  103. metadata:
  104. name: "secret-sa-sample"
  105. annotations:
  106. kubernetes.io/service-account.name: "sa-name"`,
  107. "before-multiline-literal.yaml": `apiVersion: v1
  108. data:
  109. .dockercfg: |
  110. eyJhdXRocyI6eyJodHRwczovL2V4YW1wbGUvdjEvIjp7ImF1dGgiOiJvcGVuc2VzYW1lIn19fQo=
  111. metadata:
  112. name: secret-dockercfg
  113. type: kubernetes.io/dockercfg
  114. kind: Secret
  115. `,
  116. "before-multiline-folded.yaml": `apiVersion: v1
  117. data:
  118. .dockercfg: >
  119. eyJhdXRocyI6eyJodHRwczovL2V4YW1wbGUvdjEvIjp7ImF1dGgiOiJvcGVuc2VzYW1lIn19fQo=
  120. metadata:
  121. name: secret-dockercfg
  122. type: kubernetes.io/dockercfg
  123. kind: Secret`,
  124. // Sample Kubernetes Secret from https://kubernetes.io/docs/concepts/configuration/secret/
  125. // The "data"-key is after the identifier "kind: Secret"
  126. "after-kubernetes.yaml": `apiVersion: v1
  127. kind: secret
  128. data:
  129. extra: YWRtaW46cGFzc3dvcmQ=
  130. metadata:
  131. name: secret-sa-sample
  132. annotations:
  133. kubernetes.io/service-account.name: 'sa-name'`,
  134. "after-kubernetes.yml": `apiVersion: v1
  135. kind: Secret
  136. metadata:
  137. name: ca-secret
  138. type: Opaque
  139. data:
  140. ca.pem: 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
  141. `,
  142. "after-comment.yml": `apiVersion: v1
  143. kind: Secret
  144. metadata:
  145. creationTimestamp: '2022-06-28T17:44:13Z'
  146. name: db-user-pass
  147. namespace: default
  148. type: Opaque
  149. data:
  150. # the data is abbreviated in this example
  151. password: UyFCXCpkJHpEc2I9
  152. username: YWRtaW4=
  153. `,
  154. "after-quoted-1.yaml": `apiVersion: 'v1'
  155. kind: 'Secret'
  156. data:
  157. password: 'UyFCXCpkJHpEc2I9'
  158. username: 'YWRtaW4='
  159. metadata:
  160. name: 'db-user-pass'
  161. namespace: 'default'
  162. type: 'Opaque'`,
  163. "after-quoted-2.yaml": `apiVersion: "v1"
  164. kind: "Secret"
  165. data:
  166. password: "UyFCXCpkJHpEc2I9"
  167. username: "YWRtaW4="
  168. metadata:
  169. name: "db-user-pass"
  170. namespace: "default"
  171. type: "Opaque"`,
  172. "after-multiline-literal.yaml": `apiVersion: v1
  173. kind: Secret
  174. metadata:
  175. name: secret-dockercfg
  176. type: kubernetes.io/dockercfg
  177. data:
  178. .dockercfg: |
  179. eyJhdXRocyI6eyJodHRwczovL2V4YW1wbGUvdjEvIjp7ImF1dGgiOiJvcGVuc2VzYW1lIn19fQo=
  180. `,
  181. "after-multiline-folded.yaml": `apiVersion: v1
  182. kind: Secret
  183. metadata:
  184. name: secret-dockercfg
  185. type: kubernetes.io/dockercfg
  186. data:
  187. .dockercfg: >
  188. eyJhdXRocyI6eyJodHRwczovL2V4YW1wbGUvdjEvIjp7ImF1dGgiOiJvcGVuc2VzYW1lIn19fQo=`,
  189. }
  190. fps := map[string]string{
  191. "empty-quotes1.yml": `apiVersion: v1
  192. kind: Secret
  193. metadata:
  194. name: registry-auth-data
  195. type: Opaque
  196. data:
  197. htpasswd: ''
  198. `,
  199. "empty-quotes2.yml": `apiVersion: v1
  200. kind: Secret
  201. metadata:
  202. name: registry-auth-data
  203. type: Opaque
  204. data:
  205. htpasswd: ""
  206. `,
  207. "overly-permissive1.yaml": `apiVersion: v1
  208. kind: Secret
  209. metadata:
  210. name: registry-auth-data
  211. type: Opaque
  212. data:
  213. htpasswd: {{ htpasswd }}
  214. ---
  215. apiVersion: v1
  216. kind: ReplicationController`,
  217. "overly-permissive2.yaml": `apiVersion: v1
  218. kind: Secret
  219. metadata:
  220. labels:
  221. k8s-app: kubernetes-dashboard
  222. addonmanager.kubernetes.io/mode: EnsureExists
  223. name: kubernetes-dashboard-csrf
  224. namespace: kubernetes-dashboard
  225. type: Opaque
  226. data:
  227. csrf: ""
  228. ---
  229. apiVersion: v1
  230. kind: Secret
  231. metadata:
  232. labels:
  233. k8s-app: kubernetes-dashboard
  234. addonmanager.kubernetes.io/mode: EnsureExists
  235. name: kubernetes-dashboard-key-holder
  236. namespace: kubernetes-dashboard
  237. type: Opaque
  238. `,
  239. // TODO: Requires multiple allowlists.
  240. // "overly-permissive3.yaml": ` kind: Secret
  241. // target:
  242. // name: mysecret
  243. // creationPolicy: Owner
  244. //
  245. // ---
  246. //
  247. // kind: ConfigMap
  248. // data:
  249. // conversionStrategy: Default
  250. // decodingStrategy: None
  251. // key: secret/mysecret
  252. // property: foo
  253. // secretKey: foo`,
  254. // https://github.com/gitleaks/gitleaks/issues/1644
  255. "wrong-kind.yaml": `apiVersion: external-secrets.io/v1beta1
  256. kind: ExternalSecret
  257. metadata:
  258. name: example
  259. namespace: example-ns
  260. spec:
  261. refreshInterval: 15s
  262. secretStoreRef:
  263. name: example
  264. kind: SecretStore
  265. target:
  266. name: mysecret
  267. creationPolicy: Owner
  268. data:
  269. - remoteRef:
  270. conversionStrategy: Default
  271. decodingStrategy: None
  272. key: secret/mysecret
  273. property: foo
  274. secretKey: foo
  275. `,
  276. "sopssecret.yaml": `apiVersion: isindir.github.com/v1alpha3
  277. kind: SopsSecret
  278. metadata:
  279. name: app1-sopssecret
  280. namespace: test
  281. spec:
  282. suspend: false
  283. secretTemplates:
  284. - name: ENC[AES256_GCM,data:W3PiZ6lD6bpfAdI=,iv:2qF98ZkchgfWF4tZo8fok6zY0ZLNRV3wFpl8n2iyC7I=,tag:FzoL+CZHkLEqfWKniRApBA==,type:str]
  285. labels:
  286. app: ENC[AES256_GCM,data:t9ujIQ==,iv:slZBpmKF+DOg/wVBWmq5iTqkRBZUMao0a3MdoxzJs3s=,tag:xJyhdJ4rn/cB/4mxHzmGig==,type:str]
  287. stringData:
  288. db-password: ENC[AES256_GCM,data:O+5l4g==,iv:c/dS4BCBMbnKsXYuzBuCuVQt8RV9bOv5HgdpL+iwmns=,tag:KkQfh6OymvCt4uC13p318g==,type:str]
  289. sops:
  290. kms: []
  291. gcp_kms: []
  292. azure_kv: []
  293. hc_vault: []
  294. lastmodified: '2021-10-21T10:56:37Z'
  295. mac: ENC[AES256_GCM,data:Tl1V1PuI5tZ0Hu3qxxzpDNeKQkuW0g/x/Mlp1yM6HaBqDr+r2FukLdYSYqjjJ3A8g+YkpvMib50M7j0V7zoX9sgCvMKEg86pRsWtThv8n/L+bsjClVTqnhJ9nfYlaPOMlvggbiMOE5hXPIuVz8WXYoVYJ2cVNCd/GfwOraUmj7I=,iv:n7HVI13okfbW3FS/ZsJ2GNmibudxc/TlkLa3umQQ+vc=,tag:R4ikep1wlxlDWlODJqFHHw==,type:str]
  296. pgp:
  297. - created_at: '2021-10-21T10:56:37Z'
  298. enc: |
  299. -----BEGIN PGP MESSAGE-----
  300. hQGMA3muqimBu2IIAQwAkhR19/6roLq06oaD12vqDMes3/8FweAHxa6TLKg+LRjp
  301. 2/ntiRJHPBP9DYYFZbkTo8lAmIdVF7KfGIqWgPm5JiNhqfVRhyGPCRgBE7+I8qH6
  302. EML9Vo/76kJLHtIjs5rOg7OXgwwitaibs1q6uyVY8TuaGXYIOO1iwL9xVtbayIry
  303. NMQd1tFcNb6Vb86Plqm+T1VnSOJMUvryxrLelx89UNM0ctepyVu6YY9jpBjV0QLJ
  304. NqNkKAGIMv3RNa9bZHTwveo9T0oXtFnk5H33BxH0ky/DGpD+5Ch1YgbzbqVnr+Bm
  305. RX0R/GRhS9IDInd+eiyVX6y3LR5di0fc8TuK43+96wTG+2+ck+lbMrkHYsL2UJNv
  306. bAjlOWmIcL4UwGlEOj4EzwcEx+xP3dq57pJ+DasfNwVqps2Kk+ofodR7d6gx7ELH
  307. UQmLypCtkRic9v8fVSA2vEL8hAlg9bT8tpHLhHMOwe228cL5dTzFD60RoP+ovRar
  308. jIU59Pnu1bnM4pXWEVA20l4BzJ8Fd6gj3TfAg/7Mat+dnTaUwnPgRSybFn0ZZHMW
  309. RJDBPkMGFfSGRDfLeD37d61mI31360/w/61LaVp1sdDYodBJCRZFA1YzbqZcxnDl
  310. YRjRmpcVRnO+o72CnU/P
  311. =V4l4
  312. -----END PGP MESSAGE-----
  313. fp: 73019E949C1D3C3D1BE8B718C7CD51A565AB592C
  314. encrypted_suffix: Templates
  315. version: 3.6.1`, // https://github.com/luca-iachini/argocd-test/blob/af0c8eaba270bc918108c8bc3b909f26a4fe995d/kustomize/base/app1/secrets.enc.yaml#L4
  316. // The "data"-key is before the identifier "kind: Secret"
  317. "before-min-length.yaml": `apiVersion: v1
  318. data:
  319. extra: YmFyCg==
  320. kind: secret
  321. metadata:
  322. name: secret-sa-sample
  323. annotations:
  324. kubernetes.io/service-account.name: 'sa-name'`,
  325. "before-template.yaml": `apiVersion: v1
  326. data:
  327. password: {{ .Values.Password }}
  328. kind: secret
  329. metadata:
  330. name: secret-sa-sample
  331. annotations:
  332. kubernetes.io/service-account.name: 'sa-name'`,
  333. "before-externalsecret1.yml": `apiVersion: 'kubernetes-client.io/v1'
  334. metadata:
  335. name: actions-exporter
  336. namespace: github-actions-exporter
  337. spec:
  338. backendType: secretsManager
  339. data:
  340. - key: MySecretManagerKey
  341. name: github_token
  342. property: github_token
  343. kind: ExternalSecret
  344. `,
  345. "before-externalsecret2.yml": `apiVersion: external-secrets.io/v1beta1
  346. spec:
  347. secretStoreRef:
  348. kind: ClusterSecretStore
  349. name: aws-secretsmanager
  350. refreshInterval: 1h
  351. target:
  352. creationPolicy: Owner
  353. data:
  354. - secretKey: api-key
  355. remoteRef:
  356. key: my-secrets-manager-secret
  357. metadata:
  358. name: api-key
  359. namespace: my-namespace
  360. kind: ExternalSecret
  361. `,
  362. "before-sopssecret.yml": `apiVersion: isindir.github.com/v1alpha3
  363. spec:
  364. secretTemplates:
  365. - name: my-secret-name-1
  366. labels:
  367. label1: value1
  368. annotations:
  369. key1: value1
  370. data:
  371. data-name1: ZGF0YS12YWx1ZTE=
  372. data-nameM: ZGF0YS12YWx1ZU0=
  373. kind: SopsSecret
  374. metadata:
  375. name: sopssecret-sample
  376. `, // https://github.com/isindir/sops-secrets-operator/blob/8aaf8bb368dc841a2d57f251bd839f08216a9328/config/samples/isindir_v1alpha3_sopssecret.yaml#L4
  377. // The "data"-key is after the identifier "kind: Secret"
  378. "after-min-length.yaml": `apiVersion: v1
  379. kind: secret
  380. data:
  381. extra: YmFyCg==
  382. metadata:
  383. name: secret-sa-sample
  384. annotations:
  385. kubernetes.io/service-account.name: 'sa-name'`,
  386. "after-externalsecret1.yml": `apiVersion: 'kubernetes-client.io/v1'
  387. kind: ExternalSecret
  388. metadata:
  389. name: actions-exporter
  390. namespace: github-actions-exporter
  391. spec:
  392. backendType: secretsManager
  393. data:
  394. - key: MySecretManagerKey
  395. name: github_token
  396. property: github_token
  397. - key: MySecretManagerKey`,
  398. "after-externalsecret2.yml": `apiVersion: external-secrets.io/v1beta1
  399. kind: ExternalSecret
  400. metadata:
  401. name: api-key
  402. namespace: my-namespace
  403. spec:
  404. secretStoreRef:
  405. kind: ClusterSecretStore
  406. name: aws-secretsmanager
  407. refreshInterval: 1h
  408. target:
  409. creationPolicy: Owner
  410. data:
  411. - secretKey: api-key
  412. remoteRef:
  413. key: my-secrets-manager-secret`,
  414. "after-sopssecret.yml": `apiVersion: isindir.github.com/v1alpha3
  415. kind: SopsSecret
  416. metadata:
  417. name: sopssecret-sample
  418. spec:
  419. secretTemplates:
  420. - name: my-secret-name-0
  421. labels:
  422. label0: value0
  423. labelK: valueK
  424. annotations:
  425. key0: value0
  426. keyN: valueN
  427. stringData:
  428. data-name0: data-value0
  429. data-nameL: data-valueL
  430. - name: my-secret-name-1
  431. labels:
  432. label1: value1
  433. annotations:
  434. key1: value1
  435. data:
  436. data-name1: ZGF0YS12YWx1ZTE=
  437. data-nameM: ZGF0YS12YWx1ZU0=`,
  438. "after-empty-data.yaml": `apiVersion: v1
  439. kind: Secret
  440. metadata:
  441. labels:
  442. k8s-app: kubernetes-dashboard
  443. addonmanager.kubernetes.io/mode: EnsureExists
  444. name: kubernetes-dashboard-csrf
  445. namespace: kubernetes-dashboard
  446. type: Opaque
  447. data:
  448. csrf: ""
  449. `,
  450. }
  451. return utils.ValidateWithPaths(r, tps, fps)
  452. }