root.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441
  1. package cmd
  2. import (
  3. "fmt"
  4. "io"
  5. "os"
  6. "path/filepath"
  7. "strings"
  8. "sync/atomic"
  9. "time"
  10. "github.com/rs/zerolog"
  11. "github.com/rs/zerolog/log"
  12. "github.com/spf13/cobra"
  13. "github.com/spf13/viper"
  14. "github.com/zricethezav/gitleaks/v8/config"
  15. "github.com/zricethezav/gitleaks/v8/detect"
  16. "github.com/zricethezav/gitleaks/v8/report"
  17. )
  18. const banner = `
  19. │╲
  20. │ ○
  21. ○ ░
  22. ░ gitleaks
  23. `
  24. const configDescription = `config file path
  25. order of precedence:
  26. 1. --config/-c
  27. 2. env var GITLEAKS_CONFIG
  28. 3. (target path)/.gitleaks.toml
  29. If none of the three options are used, then gitleaks will use the default config`
  30. var rootCmd = &cobra.Command{
  31. Use: "gitleaks",
  32. Short: "Gitleaks scans code, past or present, for secrets",
  33. Version: Version,
  34. }
  35. const (
  36. BYTE = 1.0
  37. KILOBYTE = BYTE * 1000
  38. MEGABYTE = KILOBYTE * 1000
  39. GIGABYTE = MEGABYTE * 1000
  40. )
  41. func init() {
  42. cobra.OnInitialize(initLog)
  43. rootCmd.PersistentFlags().StringP("config", "c", "", configDescription)
  44. rootCmd.PersistentFlags().Int("exit-code", 1, "exit code when leaks have been encountered")
  45. rootCmd.PersistentFlags().StringP("report-path", "r", "", "report file")
  46. rootCmd.PersistentFlags().StringP("report-format", "f", "json", "output format (json, jsonextra, csv, junit, sarif, template)")
  47. rootCmd.PersistentFlags().StringP("report-template", "", "", "template file used to generate the report (implies --report-format=template)")
  48. rootCmd.PersistentFlags().StringP("baseline-path", "b", "", "path to baseline with issues that can be ignored")
  49. rootCmd.PersistentFlags().StringP("log-level", "l", "info", "log level (trace, debug, info, warn, error, fatal)")
  50. rootCmd.PersistentFlags().BoolP("verbose", "v", false, "show verbose output from scan")
  51. rootCmd.PersistentFlags().BoolP("no-color", "", false, "turn off color for verbose output")
  52. rootCmd.PersistentFlags().Int("max-target-megabytes", 0, "files larger than this will be skipped")
  53. rootCmd.PersistentFlags().BoolP("ignore-gitleaks-allow", "", false, "ignore gitleaks:allow comments")
  54. rootCmd.PersistentFlags().Uint("redact", 0, "redact secrets from logs and stdout. To redact only parts of the secret just apply a percent value from 0..100. For example --redact=20 (default 100%)")
  55. rootCmd.Flag("redact").NoOptDefVal = "100"
  56. rootCmd.PersistentFlags().Bool("no-banner", false, "suppress banner")
  57. rootCmd.PersistentFlags().StringSlice("enable-rule", []string{}, "only enable specific rules by id")
  58. rootCmd.PersistentFlags().StringP("gitleaks-ignore-path", "i", ".", "path to .gitleaksignore file or folder containing one")
  59. rootCmd.PersistentFlags().Int("max-decode-depth", 0, "allow recursive decoding up to this depth (default \"0\", no decoding is done)")
  60. err := viper.BindPFlag("config", rootCmd.PersistentFlags().Lookup("config"))
  61. if err != nil {
  62. log.Fatal().Msgf("err binding config %s", err.Error())
  63. }
  64. }
  65. func initLog() {
  66. zerolog.SetGlobalLevel(zerolog.InfoLevel)
  67. ll, err := rootCmd.Flags().GetString("log-level")
  68. if err != nil {
  69. log.Fatal().Msg(err.Error())
  70. }
  71. switch strings.ToLower(ll) {
  72. case "trace":
  73. zerolog.SetGlobalLevel(zerolog.TraceLevel)
  74. case "debug":
  75. zerolog.SetGlobalLevel(zerolog.DebugLevel)
  76. case "info":
  77. zerolog.SetGlobalLevel(zerolog.InfoLevel)
  78. case "warn":
  79. zerolog.SetGlobalLevel(zerolog.WarnLevel)
  80. case "err", "error":
  81. zerolog.SetGlobalLevel(zerolog.ErrorLevel)
  82. case "fatal":
  83. zerolog.SetGlobalLevel(zerolog.FatalLevel)
  84. default:
  85. zerolog.SetGlobalLevel(zerolog.InfoLevel)
  86. }
  87. }
  88. func initConfig(source string) {
  89. hideBanner, err := rootCmd.Flags().GetBool("no-banner")
  90. if err != nil {
  91. log.Fatal().Msg(err.Error())
  92. }
  93. if !hideBanner {
  94. _, _ = fmt.Fprint(os.Stderr, banner)
  95. }
  96. cfgPath, err := rootCmd.Flags().GetString("config")
  97. if err != nil {
  98. log.Fatal().Msg(err.Error())
  99. }
  100. if cfgPath != "" {
  101. viper.SetConfigFile(cfgPath)
  102. log.Debug().Msgf("using gitleaks config %s from `--config`", cfgPath)
  103. } else if os.Getenv("GITLEAKS_CONFIG") != "" {
  104. envPath := os.Getenv("GITLEAKS_CONFIG")
  105. viper.SetConfigFile(envPath)
  106. log.Debug().Msgf("using gitleaks config from GITLEAKS_CONFIG env var: %s", envPath)
  107. } else {
  108. fileInfo, err := os.Stat(source)
  109. if err != nil {
  110. log.Fatal().Msg(err.Error())
  111. }
  112. if !fileInfo.IsDir() {
  113. log.Debug().Msgf("unable to load gitleaks config from %s since --source=%s is a file, using default config",
  114. filepath.Join(source, ".gitleaks.toml"), source)
  115. viper.SetConfigType("toml")
  116. if err = viper.ReadConfig(strings.NewReader(config.DefaultConfig)); err != nil {
  117. log.Fatal().Msgf("err reading toml %s", err.Error())
  118. }
  119. return
  120. }
  121. if _, err := os.Stat(filepath.Join(source, ".gitleaks.toml")); os.IsNotExist(err) {
  122. log.Debug().Msgf("no gitleaks config found in path %s, using default gitleaks config", filepath.Join(source, ".gitleaks.toml"))
  123. viper.SetConfigType("toml")
  124. if err = viper.ReadConfig(strings.NewReader(config.DefaultConfig)); err != nil {
  125. log.Fatal().Msgf("err reading default config toml %s", err.Error())
  126. }
  127. return
  128. } else {
  129. log.Debug().Msgf("using existing gitleaks config %s from `(--source)/.gitleaks.toml`", filepath.Join(source, ".gitleaks.toml"))
  130. }
  131. viper.AddConfigPath(source)
  132. viper.SetConfigName(".gitleaks")
  133. viper.SetConfigType("toml")
  134. }
  135. if err := viper.ReadInConfig(); err != nil {
  136. log.Fatal().Msgf("unable to load gitleaks config, err: %s", err)
  137. }
  138. }
  139. func Execute() {
  140. if err := rootCmd.Execute(); err != nil {
  141. if strings.Contains(err.Error(), "unknown flag") {
  142. // exit code 126: Command invoked cannot execute
  143. os.Exit(126)
  144. }
  145. log.Fatal().Msg(err.Error())
  146. }
  147. }
  148. func Config(cmd *cobra.Command) config.Config {
  149. var vc config.ViperConfig
  150. if err := viper.Unmarshal(&vc); err != nil {
  151. log.Fatal().Err(err).Msg("Failed to load config")
  152. }
  153. cfg, err := vc.Translate()
  154. if err != nil {
  155. log.Fatal().Err(err).Msg("Failed to load config")
  156. }
  157. cfg.Path, _ = cmd.Flags().GetString("config")
  158. return cfg
  159. }
  160. func Detector(cmd *cobra.Command, cfg config.Config, source string) *detect.Detector {
  161. var err error
  162. // Setup common detector
  163. detector := detect.NewDetector(cfg)
  164. if detector.MaxDecodeDepth, err = cmd.Flags().GetInt("max-decode-depth"); err != nil {
  165. log.Fatal().Err(err).Msg("")
  166. }
  167. // set color flag at first
  168. if detector.NoColor, err = cmd.Flags().GetBool("no-color"); err != nil {
  169. log.Fatal().Err(err).Msg("")
  170. }
  171. // also init logger again without color
  172. if detector.NoColor {
  173. log.Logger = log.Output(zerolog.ConsoleWriter{
  174. Out: os.Stderr,
  175. NoColor: detector.NoColor,
  176. })
  177. }
  178. detector.Config.Path, err = cmd.Flags().GetString("config")
  179. if err != nil {
  180. log.Fatal().Err(err).Msg("")
  181. }
  182. // if config path is not set, then use the {source}/.gitleaks.toml path.
  183. // note that there may not be a `{source}/.gitleaks.toml` file, this is ok.
  184. if detector.Config.Path == "" {
  185. detector.Config.Path = filepath.Join(source, ".gitleaks.toml")
  186. }
  187. // set verbose flag
  188. if detector.Verbose, err = cmd.Flags().GetBool("verbose"); err != nil {
  189. log.Fatal().Err(err).Msg("")
  190. }
  191. // set redact flag
  192. if detector.Redact, err = cmd.Flags().GetUint("redact"); err != nil {
  193. log.Fatal().Err(err).Msg("")
  194. }
  195. if detector.MaxTargetMegaBytes, err = cmd.Flags().GetInt("max-target-megabytes"); err != nil {
  196. log.Fatal().Err(err).Msg("")
  197. }
  198. // set ignore gitleaks:allow flag
  199. if detector.IgnoreGitleaksAllow, err = cmd.Flags().GetBool("ignore-gitleaks-allow"); err != nil {
  200. log.Fatal().Err(err).Msg("")
  201. }
  202. gitleaksIgnorePath, err := cmd.Flags().GetString("gitleaks-ignore-path")
  203. if err != nil {
  204. log.Fatal().Err(err).Msg("could not get .gitleaksignore path")
  205. }
  206. if fileExists(gitleaksIgnorePath) {
  207. if err = detector.AddGitleaksIgnore(gitleaksIgnorePath); err != nil {
  208. log.Fatal().Err(err).Msg("could not call AddGitleaksIgnore")
  209. }
  210. }
  211. if fileExists(filepath.Join(gitleaksIgnorePath, ".gitleaksignore")) {
  212. if err = detector.AddGitleaksIgnore(filepath.Join(gitleaksIgnorePath, ".gitleaksignore")); err != nil {
  213. log.Fatal().Err(err).Msg("could not call AddGitleaksIgnore")
  214. }
  215. }
  216. if fileExists(filepath.Join(source, ".gitleaksignore")) {
  217. if err = detector.AddGitleaksIgnore(filepath.Join(source, ".gitleaksignore")); err != nil {
  218. log.Fatal().Err(err).Msg("could not call AddGitleaksIgnore")
  219. }
  220. }
  221. // ignore findings from the baseline (an existing report in json format generated earlier)
  222. baselinePath, _ := cmd.Flags().GetString("baseline-path")
  223. if baselinePath != "" {
  224. err = detector.AddBaseline(baselinePath, source)
  225. if err != nil {
  226. log.Error().Msgf("Could not load baseline. The path must point of a gitleaks report generated using the default format: %s", err)
  227. }
  228. }
  229. // If set, only apply rules that are defined in the flag
  230. rules, _ := cmd.Flags().GetStringSlice("enable-rule")
  231. if len(rules) > 0 {
  232. log.Info().Msg("Overriding enabled rules: " + strings.Join(rules, ", "))
  233. ruleOverride := make(map[string]config.Rule)
  234. for _, ruleName := range rules {
  235. if r, ok := cfg.Rules[ruleName]; ok {
  236. ruleOverride[ruleName] = r
  237. } else {
  238. log.Fatal().Msgf("Requested rule %s not found in rules", ruleName)
  239. }
  240. }
  241. detector.Config.Rules = ruleOverride
  242. }
  243. // Validate report settings.
  244. reportPath := mustGetStringFlag("report-path")
  245. if reportPath != "" {
  246. if reportPath != report.StdoutReportPath {
  247. // Ensure the path is writable.
  248. if f, err := os.Create(reportPath); err != nil {
  249. log.Fatal().Err(err).Msgf("Report path is not writable: %s", reportPath)
  250. } else {
  251. _ = f.Close()
  252. _ = os.Remove(reportPath)
  253. }
  254. }
  255. // Build report writer.
  256. var (
  257. reporter report.Reporter
  258. reportFormat = mustGetStringFlag("report-format")
  259. reportTemplate = mustGetStringFlag("report-template")
  260. )
  261. switch strings.TrimSpace(strings.ToLower(reportFormat)) {
  262. case "csv":
  263. reporter = &report.CsvReporter{}
  264. case "json":
  265. reporter = &report.JsonReporter{}
  266. case "junit":
  267. reporter = &report.JunitReporter{}
  268. case "sarif":
  269. reporter = &report.SarifReporter{
  270. OrderedRules: cfg.GetOrderedRules(),
  271. }
  272. case "template":
  273. if reporter, err = report.NewTemplateReporter(reportTemplate); err != nil {
  274. log.Fatal().Err(err).Msg("Invalid report template")
  275. }
  276. default:
  277. log.Fatal().Msgf("unknown report format %s", reportFormat)
  278. }
  279. // Sanity check.
  280. if reportTemplate != "" && reportFormat != "template" {
  281. log.Fatal().Msgf("Report format must be 'template' if --report-template is specified")
  282. }
  283. detector.ReportPath = reportPath
  284. detector.Reporter = reporter
  285. }
  286. return detector
  287. }
  288. func mustGetStringFlag(name string) string {
  289. reportPath, err := rootCmd.Flags().GetString(name)
  290. if err != nil {
  291. log.Fatal().Msg(err.Error())
  292. }
  293. return reportPath
  294. }
  295. func bytesConvert(bytes uint64) string {
  296. unit := ""
  297. value := float32(bytes)
  298. switch {
  299. case bytes >= GIGABYTE:
  300. unit = "GB"
  301. value = value / GIGABYTE
  302. case bytes >= MEGABYTE:
  303. unit = "MB"
  304. value = value / MEGABYTE
  305. case bytes >= KILOBYTE:
  306. unit = "KB"
  307. value = value / KILOBYTE
  308. case bytes >= BYTE:
  309. unit = "bytes"
  310. case bytes == 0:
  311. return "0"
  312. }
  313. stringValue := strings.TrimSuffix(
  314. fmt.Sprintf("%.2f", value), ".00",
  315. )
  316. return fmt.Sprintf("%s %s", stringValue, unit)
  317. }
  318. func findingSummaryAndExit(detector *detect.Detector, findings []report.Finding, exitCode int, start time.Time, err error) {
  319. totalBytes := atomic.LoadUint64(&detector.TotalBytes)
  320. bytesMsg := fmt.Sprintf("scanned ~%d bytes (%s)", totalBytes, bytesConvert(totalBytes))
  321. if err == nil {
  322. log.Info().Msgf("%s in %s", bytesMsg, FormatDuration(time.Since(start)))
  323. if len(findings) != 0 {
  324. log.Warn().Msgf("leaks found: %d", len(findings))
  325. } else {
  326. log.Info().Msg("no leaks found")
  327. }
  328. } else {
  329. log.Warn().Msg(bytesMsg)
  330. log.Warn().Msgf("partial scan completed in %s", FormatDuration(time.Since(start)))
  331. if len(findings) != 0 {
  332. log.Warn().Msgf("%d leaks found in partial scan", len(findings))
  333. } else {
  334. log.Warn().Msg("no leaks found in partial scan")
  335. }
  336. }
  337. // write report if desired
  338. if detector.Reporter != nil && len(findings) > 0 {
  339. var (
  340. file io.WriteCloser
  341. reportErr error
  342. )
  343. if detector.ReportPath == report.StdoutReportPath {
  344. file = os.Stdout
  345. } else {
  346. // Open the file.
  347. if file, reportErr = os.Create(detector.ReportPath); reportErr != nil {
  348. goto ReportEnd
  349. }
  350. defer func() {
  351. _ = file.Close()
  352. }()
  353. }
  354. // Write to the file.
  355. if reportErr = detector.Reporter.Write(file, findings); reportErr != nil {
  356. goto ReportEnd
  357. }
  358. ReportEnd:
  359. if reportErr != nil {
  360. log.Fatal().Err(reportErr).Msg("failed to write report")
  361. }
  362. }
  363. if err != nil {
  364. os.Exit(1)
  365. }
  366. if len(findings) != 0 {
  367. os.Exit(exitCode)
  368. }
  369. }
  370. func fileExists(fileName string) bool {
  371. // check for a .gitleaksignore file
  372. info, err := os.Stat(fileName)
  373. if err != nil && !os.IsNotExist(err) {
  374. return false
  375. }
  376. if info != nil && err == nil {
  377. if !info.IsDir() {
  378. return true
  379. }
  380. }
  381. return false
  382. }
  383. func FormatDuration(d time.Duration) string {
  384. scale := 100 * time.Second
  385. // look for the max scale that is smaller than d
  386. for scale > d {
  387. scale = scale / 10
  388. }
  389. return d.Round(scale / 100).String()
  390. }