| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452 |
- package config
- import (
- "fmt"
- "testing"
- "github.com/google/go-cmp/cmp"
- regexp "github.com/wasilibs/go-re2"
- "github.com/spf13/viper"
- "github.com/stretchr/testify/assert"
- "github.com/stretchr/testify/require"
- )
- const configPath = "../testdata/config/"
- func TestTranslate(t *testing.T) {
- tests := []struct {
- // Configuration file basename to load, from `../testdata/config/`.
- cfgName string
- // Expected result.
- cfg Config
- // Rules to compare.
- rules []string
- // Error to expect.
- wantError error
- }{
- {
- cfgName: "allowlist_old_compat",
- cfg: Config{
- Rules: map[string]Rule{"example": {
- RuleID: "example",
- Regex: regexp.MustCompile(`example\d+`),
- Tags: []string{},
- Keywords: []string{},
- Allowlists: []Allowlist{
- {
- MatchCondition: AllowlistMatchOr,
- Regexes: []*regexp.Regexp{regexp.MustCompile("123")},
- },
- },
- }},
- },
- },
- {
- cfgName: "allowlist_invalid_empty",
- cfg: Config{},
- wantError: fmt.Errorf("example: [[rules.allowlists]] must contain at least one check for: commits, paths, regexes, or stopwords"),
- },
- {
- cfgName: "allowlist_invalid_old_and_new",
- cfg: Config{},
- wantError: fmt.Errorf("example: [rules.allowlist] is deprecated, it cannot be used alongside [[rules.allowlist]]"),
- },
- {
- cfgName: "allowlist_invalid_regextarget",
- cfg: Config{},
- wantError: fmt.Errorf("example: unknown allowlist |regexTarget| 'mtach' (expected 'match', 'line')"),
- },
- {
- cfgName: "allow_aws_re",
- cfg: Config{
- Rules: map[string]Rule{"aws-access-key": {
- RuleID: "aws-access-key",
- Description: "AWS Access Key",
- Regex: regexp.MustCompile("(?:A3T[A-Z0-9]|AKIA|ASIA|ABIA|ACCA)[A-Z0-9]{16}"),
- Keywords: []string{},
- Tags: []string{"key", "AWS"},
- Allowlists: []Allowlist{
- {
- MatchCondition: AllowlistMatchOr,
- Regexes: []*regexp.Regexp{regexp.MustCompile("AKIALALEMEL33243OLIA")},
- },
- },
- }},
- },
- },
- {
- cfgName: "allow_commit",
- cfg: Config{
- Rules: map[string]Rule{"aws-access-key": {
- RuleID: "aws-access-key",
- Description: "AWS Access Key",
- Regex: regexp.MustCompile("(?:A3T[A-Z0-9]|AKIA|ASIA|ABIA|ACCA)[A-Z0-9]{16}"),
- Keywords: []string{},
- Tags: []string{"key", "AWS"},
- Allowlists: []Allowlist{
- {
- MatchCondition: AllowlistMatchOr,
- Commits: []string{"allowthiscommit"},
- },
- },
- }},
- },
- },
- {
- cfgName: "allow_path",
- cfg: Config{
- Rules: map[string]Rule{"aws-access-key": {
- RuleID: "aws-access-key",
- Description: "AWS Access Key",
- Regex: regexp.MustCompile("(?:A3T[A-Z0-9]|AKIA|ASIA|ABIA|ACCA)[A-Z0-9]{16}"),
- Keywords: []string{},
- Tags: []string{"key", "AWS"},
- Allowlists: []Allowlist{
- {
- MatchCondition: AllowlistMatchOr,
- Paths: []*regexp.Regexp{regexp.MustCompile(".go")},
- },
- },
- }},
- },
- },
- {
- cfgName: "entropy_group",
- cfg: Config{
- Rules: map[string]Rule{"discord-api-key": {
- RuleID: "discord-api-key",
- Description: "Discord API key",
- Regex: regexp.MustCompile(`(?i)(discord[a-z0-9_ .\-,]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-h0-9]{64})['\"]`),
- Entropy: 3.5,
- SecretGroup: 3,
- Keywords: []string{},
- Tags: []string{},
- }},
- },
- },
- {
- cfgName: "missing_id",
- cfg: Config{},
- wantError: fmt.Errorf("rule |id| is missing or empty, regex: (?i)(discord[a-z0-9_ .\\-,]{0,25})(=|>|:=|\\|\\|:|<=|=>|:).{0,5}['\\\"]([a-h0-9]{64})['\\\"]"),
- },
- {
- cfgName: "no_regex_or_path",
- cfg: Config{},
- wantError: fmt.Errorf("discord-api-key: both |regex| and |path| are empty, this rule will have no effect"),
- },
- {
- cfgName: "bad_entropy_group",
- cfg: Config{},
- wantError: fmt.Errorf("discord-api-key: invalid regex secret group 5, max regex secret group 3"),
- },
- {
- cfgName: "base",
- cfg: Config{
- Rules: map[string]Rule{
- "aws-access-key": {
- RuleID: "aws-access-key",
- Description: "AWS Access Key",
- Regex: regexp.MustCompile("(?:A3T[A-Z0-9]|AKIA|ASIA|ABIA|ACCA)[A-Z0-9]{16}"),
- Keywords: []string{},
- Tags: []string{"key", "AWS"},
- },
- "aws-secret-key": {
- RuleID: "aws-secret-key",
- Description: "AWS Secret Key",
- Regex: regexp.MustCompile(`(?i)aws_(.{0,20})?=?.[\'\"0-9a-zA-Z\/+]{40}`),
- Keywords: []string{},
- Tags: []string{"key", "AWS"},
- },
- "aws-secret-key-again": {
- RuleID: "aws-secret-key-again",
- Description: "AWS Secret Key",
- Regex: regexp.MustCompile(`(?i)aws_(.{0,20})?=?.[\'\"0-9a-zA-Z\/+]{40}`),
- Keywords: []string{},
- Tags: []string{"key", "AWS"},
- },
- },
- },
- },
- {
- cfgName: "extend_rule_allowlist_or",
- cfg: Config{
- Rules: map[string]Rule{
- "aws-secret-key-again-again": {
- RuleID: "aws-secret-key-again-again",
- Description: "AWS Secret Key",
- Regex: regexp.MustCompile(`(?i)aws_(.{0,20})?=?.[\'\"0-9a-zA-Z\/+]{40}`),
- Keywords: []string{},
- Tags: []string{"key", "AWS"},
- Allowlists: []Allowlist{
- {
- MatchCondition: AllowlistMatchOr,
- StopWords: []string{"fake"},
- },
- {
- MatchCondition: AllowlistMatchOr,
- Commits: []string{"abcdefg1"},
- Paths: []*regexp.Regexp{regexp.MustCompile(`ignore\.xaml`)},
- Regexes: []*regexp.Regexp{regexp.MustCompile(`foo.+bar`)},
- RegexTarget: "line",
- StopWords: []string{"example"},
- },
- },
- },
- },
- },
- },
- {
- cfgName: "extend_rule_allowlist_and",
- cfg: Config{
- Rules: map[string]Rule{
- "aws-secret-key-again-again": {
- RuleID: "aws-secret-key-again-again",
- Description: "AWS Secret Key",
- Regex: regexp.MustCompile(`(?i)aws_(.{0,20})?=?.[\'\"0-9a-zA-Z\/+]{40}`),
- Keywords: []string{},
- Tags: []string{"key", "AWS"},
- Allowlists: []Allowlist{
- {
- MatchCondition: AllowlistMatchOr,
- StopWords: []string{"fake"},
- },
- {
- MatchCondition: AllowlistMatchAnd,
- Commits: []string{"abcdefg1"},
- Paths: []*regexp.Regexp{regexp.MustCompile(`ignore\.xaml`)},
- Regexes: []*regexp.Regexp{regexp.MustCompile(`foo.+bar`)},
- RegexTarget: "line",
- StopWords: []string{"example"},
- },
- },
- },
- },
- },
- },
- {
- cfgName: "extend_empty_regexpath",
- cfg: Config{
- Rules: map[string]Rule{
- "aws-secret-key-again-again": {
- RuleID: "aws-secret-key-again-again",
- Description: "AWS Secret Key",
- Regex: regexp.MustCompile(`(?i)aws_(.{0,20})?=?.[\'\"0-9a-zA-Z\/+]{40}`),
- Keywords: []string{},
- Tags: []string{"key", "AWS"},
- Allowlists: []Allowlist{
- {
- MatchCondition: AllowlistMatchOr,
- Paths: []*regexp.Regexp{regexp.MustCompile(`something.py`)},
- },
- },
- },
- },
- },
- },
- {
- cfgName: "override_description",
- rules: []string{"aws-access-key"},
- cfg: Config{
- Rules: map[string]Rule{"aws-access-key": {
- RuleID: "aws-access-key",
- Description: "Puppy Doggy",
- Regex: regexp.MustCompile("(?:A3T[A-Z0-9]|AKIA|ASIA|ABIA|ACCA)[A-Z0-9]{16}"),
- Keywords: []string{},
- Tags: []string{"key", "AWS"},
- },
- },
- },
- },
- {
- cfgName: "override_entropy",
- rules: []string{"aws-access-key"},
- cfg: Config{
- Rules: map[string]Rule{"aws-access-key": {
- RuleID: "aws-access-key",
- Description: "AWS Access Key",
- Regex: regexp.MustCompile("(?:A3T[A-Z0-9]|AKIA|ASIA|ABIA|ACCA)[A-Z0-9]{16}"),
- Entropy: 999.0,
- Keywords: []string{},
- Tags: []string{"key", "AWS"},
- },
- },
- },
- },
- {
- cfgName: "override_secret_group",
- rules: []string{"aws-access-key"},
- cfg: Config{
- Rules: map[string]Rule{"aws-access-key": {
- RuleID: "aws-access-key",
- Description: "AWS Access Key",
- Regex: regexp.MustCompile("(?:a)(?:a)"),
- SecretGroup: 2,
- Keywords: []string{},
- Tags: []string{"key", "AWS"},
- },
- },
- },
- },
- {
- cfgName: "override_regex",
- rules: []string{"aws-access-key"},
- cfg: Config{
- Rules: map[string]Rule{"aws-access-key": {
- RuleID: "aws-access-key",
- Description: "AWS Access Key",
- Regex: regexp.MustCompile("(?:a)"),
- Keywords: []string{},
- Tags: []string{"key", "AWS"},
- },
- },
- },
- },
- {
- cfgName: "override_path",
- rules: []string{"aws-access-key"},
- cfg: Config{
- Rules: map[string]Rule{"aws-access-key": {
- RuleID: "aws-access-key",
- Description: "AWS Access Key",
- Regex: regexp.MustCompile("(?:A3T[A-Z0-9]|AKIA|ASIA|ABIA|ACCA)[A-Z0-9]{16}"),
- Path: regexp.MustCompile("(?:puppy)"),
- Keywords: []string{},
- Tags: []string{"key", "AWS"},
- },
- },
- },
- },
- {
- cfgName: "override_tags",
- rules: []string{"aws-access-key"},
- cfg: Config{
- Rules: map[string]Rule{"aws-access-key": {
- RuleID: "aws-access-key",
- Description: "AWS Access Key",
- Regex: regexp.MustCompile("(?:A3T[A-Z0-9]|AKIA|ASIA|ABIA|ACCA)[A-Z0-9]{16}"),
- Keywords: []string{},
- Tags: []string{"key", "AWS", "puppy"},
- },
- },
- },
- },
- {
- cfgName: "override_keywords",
- rules: []string{"aws-access-key"},
- cfg: Config{
- Rules: map[string]Rule{"aws-access-key": {
- RuleID: "aws-access-key",
- Description: "AWS Access Key",
- Regex: regexp.MustCompile("(?:A3T[A-Z0-9]|AKIA|ASIA|ABIA|ACCA)[A-Z0-9]{16}"),
- Keywords: []string{"puppy"},
- Tags: []string{"key", "AWS"},
- },
- },
- },
- },
- {
- cfgName: "extend_disabled",
- cfg: Config{
- Rules: map[string]Rule{
- "aws-secret-key": {
- RuleID: "aws-secret-key",
- Regex: regexp.MustCompile(`(?i)aws_(.{0,20})?=?.[\'\"0-9a-zA-Z\/+]{40}`),
- Tags: []string{"key", "AWS"},
- Keywords: []string{},
- },
- "pypi-upload-token": {
- RuleID: "pypi-upload-token",
- Regex: regexp.MustCompile(`pypi-AgEIcHlwaS5vcmc[A-Za-z0-9\-_]{50,1000}`),
- Tags: []string{},
- Keywords: []string{},
- },
- },
- },
- },
- }
- for _, tt := range tests {
- t.Run(tt.cfgName, func(t *testing.T) {
- t.Cleanup(func() {
- extendDepth = 0
- viper.Reset()
- })
- viper.AddConfigPath(configPath)
- viper.SetConfigName(tt.cfgName)
- viper.SetConfigType("toml")
- err := viper.ReadInConfig()
- require.NoError(t, err)
- var vc ViperConfig
- err = viper.Unmarshal(&vc)
- require.NoError(t, err)
- cfg, err := vc.Translate()
- if err != nil && !assert.EqualError(t, tt.wantError, err.Error()) {
- return
- }
- if len(tt.rules) > 0 {
- rules := make(map[string]Rule)
- for _, name := range tt.rules {
- rules[name] = cfg.Rules[name]
- }
- cfg.Rules = rules
- }
- var regexComparer = func(x, y *regexp.Regexp) bool {
- if x == nil || y == nil {
- return x == y
- }
- return x.String() == y.String()
- }
- opts := cmp.Options{cmp.Comparer(regexComparer)}
- if diff := cmp.Diff(tt.cfg.Rules, cfg.Rules, opts); diff != "" {
- t.Errorf("%s diff: (-want +got)\n%s", tt.cfgName, diff)
- }
- })
- }
- }
- func TestExtendedRuleKeywordsAreDowncase(t *testing.T) {
- tests := []struct {
- name string
- cfgName string
- expectedKeywords string
- }{
- {
- name: "Extend base rule that includes AWS keyword with new attribute",
- cfgName: "extend_base_rule_including_keysword_with_attribute",
- expectedKeywords: "aws",
- },
- {
- name: "Extend base with a new rule with CMS keyword",
- cfgName: "extend_with_new_rule",
- expectedKeywords: "cms",
- },
- }
- for _, tt := range tests {
- t.Run(tt.name, func(t *testing.T) {
- t.Cleanup(func() {
- viper.Reset()
- })
- viper.AddConfigPath(configPath)
- viper.SetConfigName(tt.cfgName)
- viper.SetConfigType("toml")
- err := viper.ReadInConfig()
- require.NoError(t, err)
- var vc ViperConfig
- err = viper.Unmarshal(&vc)
- require.NoError(t, err)
- cfg, err := vc.Translate()
- require.NoError(t, err)
- _, exists := cfg.Keywords[tt.expectedKeywords]
- require.Truef(t, exists, "The expected keyword %s did not exist as a key of cfg.Keywords", tt.expectedKeywords)
- })
- }
- }
|