root.go 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539
  1. package cmd
  2. import (
  3. "bytes"
  4. "fmt"
  5. "io"
  6. "os"
  7. "path/filepath"
  8. "strings"
  9. "time"
  10. "github.com/rs/zerolog"
  11. "github.com/rs/zerolog/log"
  12. "github.com/spf13/cobra"
  13. "github.com/spf13/viper"
  14. "github.com/zricethezav/gitleaks/v8/config"
  15. "github.com/zricethezav/gitleaks/v8/detect"
  16. "github.com/zricethezav/gitleaks/v8/logging"
  17. "github.com/zricethezav/gitleaks/v8/regexp"
  18. "github.com/zricethezav/gitleaks/v8/report"
  19. )
  20. const banner = `
  21. │╲
  22. │ ○
  23. ○ ░
  24. ░ gitleaks
  25. `
  26. const configDescription = `config file path
  27. order of precedence:
  28. 1. --config/-c
  29. 2. env var GITLEAKS_CONFIG
  30. 3. env var GITLEAKS_CONFIG_TOML with the file content
  31. 4. (target path)/.gitleaks.toml
  32. If none of the four options are used, then gitleaks will use the default config`
  33. var (
  34. rootCmd = &cobra.Command{
  35. Use: "gitleaks",
  36. Short: "Gitleaks scans code, past or present, for secrets",
  37. Version: Version,
  38. }
  39. // diagnostics manager is global to ensure it can be started before a scan begins
  40. // and stopped after a scan completes
  41. diagnosticsManager *DiagnosticsManager
  42. )
  43. const (
  44. BYTE = 1.0
  45. KILOBYTE = BYTE * 1000
  46. MEGABYTE = KILOBYTE * 1000
  47. GIGABYTE = MEGABYTE * 1000
  48. )
  49. func init() {
  50. cobra.OnInitialize(initLog)
  51. rootCmd.PersistentFlags().StringP("config", "c", "", configDescription)
  52. rootCmd.PersistentFlags().Int("exit-code", 1, "exit code when leaks have been encountered")
  53. rootCmd.PersistentFlags().StringP("report-path", "r", "", "report file")
  54. rootCmd.PersistentFlags().StringP("report-format", "f", "", "output format (json, csv, junit, sarif, template)")
  55. rootCmd.PersistentFlags().StringP("report-template", "", "", "template file used to generate the report (implies --report-format=template)")
  56. rootCmd.PersistentFlags().StringP("baseline-path", "b", "", "path to baseline with issues that can be ignored")
  57. rootCmd.PersistentFlags().StringP("log-level", "l", "info", "log level (trace, debug, info, warn, error, fatal)")
  58. rootCmd.PersistentFlags().BoolP("verbose", "v", false, "show verbose output from scan")
  59. rootCmd.PersistentFlags().BoolP("no-color", "", false, "turn off color for verbose output")
  60. rootCmd.PersistentFlags().Int("max-target-megabytes", 0, "files larger than this will be skipped")
  61. rootCmd.PersistentFlags().BoolP("ignore-gitleaks-allow", "", false, "ignore gitleaks:allow comments")
  62. rootCmd.PersistentFlags().Uint("redact", 0, "redact secrets from logs and stdout. To redact only parts of the secret just apply a percent value from 0..100. For example --redact=20 (default 100%)")
  63. rootCmd.Flag("redact").NoOptDefVal = "100"
  64. rootCmd.PersistentFlags().Bool("no-banner", false, "suppress banner")
  65. rootCmd.PersistentFlags().StringSlice("enable-rule", []string{}, "only enable specific rules by id")
  66. rootCmd.PersistentFlags().StringP("gitleaks-ignore-path", "i", ".", "path to .gitleaksignore file or folder containing one")
  67. rootCmd.PersistentFlags().Int("max-decode-depth", 0, "allow recursive decoding up to this depth (default \"0\", no decoding is done)")
  68. rootCmd.PersistentFlags().Int("max-archive-depth", 0, "allow scanning into nested archives up to this depth (default \"0\", no archive traversal is done)")
  69. rootCmd.PersistentFlags().BoolP("experimental-optimizations", "", false, "enables experimental allowlist optimizations, increasing performance at the cost of startup time")
  70. // Add diagnostics flags
  71. rootCmd.PersistentFlags().String("diagnostics", "", "enable diagnostics (http OR comma-separated list: cpu,mem,trace). cpu=CPU prof, mem=memory prof, trace=exec tracing, http=serve via net/http/pprof")
  72. rootCmd.PersistentFlags().String("diagnostics-dir", "", "directory to store diagnostics output files when not using http mode (defaults to current directory)")
  73. err := viper.BindPFlag("config", rootCmd.PersistentFlags().Lookup("config"))
  74. if err != nil {
  75. logging.Fatal().Msgf("err binding config %s", err.Error())
  76. }
  77. }
  78. var logLevel = zerolog.InfoLevel
  79. func initLog() {
  80. ll, err := rootCmd.Flags().GetString("log-level")
  81. if err != nil {
  82. logging.Fatal().Msg(err.Error())
  83. }
  84. switch strings.ToLower(ll) {
  85. case "trace":
  86. logLevel = zerolog.TraceLevel
  87. case "debug":
  88. logLevel = zerolog.DebugLevel
  89. case "info":
  90. logLevel = zerolog.InfoLevel
  91. case "warn":
  92. logLevel = zerolog.WarnLevel
  93. case "err", "error":
  94. logLevel = zerolog.ErrorLevel
  95. case "fatal":
  96. logLevel = zerolog.FatalLevel
  97. default:
  98. logging.Warn().Msgf("unknown log level: %s", ll)
  99. }
  100. logging.Logger = logging.Logger.Level(logLevel)
  101. }
  102. func initConfig(source string) {
  103. hideBanner, err := rootCmd.Flags().GetBool("no-banner")
  104. viper.SetConfigType("toml")
  105. if err != nil {
  106. logging.Fatal().Msg(err.Error())
  107. }
  108. if !hideBanner {
  109. _, _ = fmt.Fprint(os.Stderr, banner)
  110. }
  111. logging.Debug().Msgf("using %s regex engine", regexp.Version)
  112. cfgPath, err := rootCmd.Flags().GetString("config")
  113. if err != nil {
  114. logging.Fatal().Msg(err.Error())
  115. }
  116. if cfgPath != "" {
  117. viper.SetConfigFile(cfgPath)
  118. logging.Debug().Msgf("using gitleaks config %s from `--config`", cfgPath)
  119. } else if os.Getenv("GITLEAKS_CONFIG") != "" {
  120. envPath := os.Getenv("GITLEAKS_CONFIG")
  121. viper.SetConfigFile(envPath)
  122. logging.Debug().Msgf("using gitleaks config from GITLEAKS_CONFIG env var: %s", envPath)
  123. } else if os.Getenv("GITLEAKS_CONFIG_TOML") != "" {
  124. configContent := []byte(os.Getenv("GITLEAKS_CONFIG_TOML"))
  125. if err := viper.ReadConfig(bytes.NewBuffer(configContent)); err != nil {
  126. logging.Fatal().Err(err).Str("content", os.Getenv("GITLEAKS_CONFIG_TOML")).Msg("unable to load gitleaks config from GITLEAKS_CONFIG_TOML env var")
  127. }
  128. logging.Debug().Str("content", os.Getenv("GITLEAKS_CONFIG_TOML")).Msg("using gitleaks config from GITLEAKS_CONFIG_TOML env var content")
  129. return
  130. } else {
  131. fileInfo, err := os.Stat(source)
  132. if err != nil {
  133. logging.Fatal().Msg(err.Error())
  134. }
  135. if !fileInfo.IsDir() {
  136. logging.Debug().Msgf("unable to load gitleaks config from %s since --source=%s is a file, using default config",
  137. filepath.Join(source, ".gitleaks.toml"), source)
  138. if err = viper.ReadConfig(strings.NewReader(config.DefaultConfig)); err != nil {
  139. logging.Fatal().Msgf("err reading toml %s", err.Error())
  140. }
  141. return
  142. }
  143. if _, err := os.Stat(filepath.Join(source, ".gitleaks.toml")); os.IsNotExist(err) {
  144. logging.Debug().Msgf("no gitleaks config found in path %s, using default gitleaks config", filepath.Join(source, ".gitleaks.toml"))
  145. if err = viper.ReadConfig(strings.NewReader(config.DefaultConfig)); err != nil {
  146. logging.Fatal().Msgf("err reading default config toml %s", err.Error())
  147. }
  148. return
  149. } else {
  150. logging.Debug().Msgf("using existing gitleaks config %s from `(--source)/.gitleaks.toml`", filepath.Join(source, ".gitleaks.toml"))
  151. }
  152. viper.AddConfigPath(source)
  153. viper.SetConfigName(".gitleaks")
  154. }
  155. if err := viper.ReadInConfig(); err != nil {
  156. logging.Fatal().Msgf("unable to load gitleaks config, err: %s", err)
  157. }
  158. }
  159. func initDiagnostics() {
  160. // Initialize diagnostics manager
  161. diagnosticsFlag, err := rootCmd.PersistentFlags().GetString("diagnostics")
  162. if err != nil {
  163. logging.Fatal().Err(err).Msg("Error getting diagnostics flag")
  164. }
  165. diagnosticsDir, err := rootCmd.PersistentFlags().GetString("diagnostics-dir")
  166. if err != nil {
  167. logging.Fatal().Err(err).Msg("Error getting diagnostics-dir flag")
  168. }
  169. var diagErr error
  170. diagnosticsManager, diagErr = NewDiagnosticsManager(diagnosticsFlag, diagnosticsDir)
  171. if diagErr != nil {
  172. logging.Fatal().Err(diagErr).Msg("Error initializing diagnostics")
  173. }
  174. if diagnosticsManager.Enabled {
  175. logging.Info().Msg("Starting diagnostics...")
  176. if diagErr := diagnosticsManager.StartDiagnostics(); diagErr != nil {
  177. logging.Fatal().Err(diagErr).Msg("Failed to start diagnostics")
  178. }
  179. }
  180. }
  181. func Execute() {
  182. if err := rootCmd.Execute(); err != nil {
  183. if strings.Contains(err.Error(), "unknown flag") {
  184. // exit code 126: Command invoked cannot execute
  185. os.Exit(126)
  186. }
  187. logging.Fatal().Msg(err.Error())
  188. }
  189. }
  190. func Config(cmd *cobra.Command) config.Config {
  191. var vc config.ViperConfig
  192. if err := viper.Unmarshal(&vc); err != nil {
  193. logging.Fatal().Err(err).Msg("Failed to load config")
  194. }
  195. // set experimental feature flag(s)
  196. if mustGetBoolFlag(cmd, "experimental-optimizations") {
  197. logging.Warn().Msgf("using experimental allowlist optimizations, updates may contain breaking changes!")
  198. vc.EnableExperimentalAllowlistOptimizations = true
  199. }
  200. cfg, err := vc.Translate()
  201. if err != nil {
  202. logging.Fatal().Err(err).Msg("Failed to load config")
  203. }
  204. cfg.Path, _ = cmd.Flags().GetString("config")
  205. return cfg
  206. }
  207. func Detector(cmd *cobra.Command, cfg config.Config, source string) *detect.Detector {
  208. var err error
  209. // Setup common detector
  210. detector := detect.NewDetector(cfg)
  211. if detector.MaxDecodeDepth, err = cmd.Flags().GetInt("max-decode-depth"); err != nil {
  212. logging.Fatal().Err(err).Send()
  213. }
  214. if detector.MaxArchiveDepth, err = cmd.Flags().GetInt("max-archive-depth"); err != nil {
  215. logging.Fatal().Err(err).Send()
  216. }
  217. // set color flag at first
  218. if detector.NoColor, err = cmd.Flags().GetBool("no-color"); err != nil {
  219. logging.Fatal().Err(err).Send()
  220. }
  221. // also init logger again without color
  222. if detector.NoColor {
  223. logging.Logger = log.Output(zerolog.ConsoleWriter{
  224. Out: os.Stderr,
  225. NoColor: detector.NoColor,
  226. }).Level(logLevel)
  227. }
  228. detector.Config.Path, err = cmd.Flags().GetString("config")
  229. if err != nil {
  230. logging.Fatal().Err(err).Send()
  231. }
  232. // if config path is not set, then use the {source}/.gitleaks.toml path.
  233. // note that there may not be a `{source}/.gitleaks.toml` file, this is ok.
  234. if detector.Config.Path == "" {
  235. detector.Config.Path = filepath.Join(source, ".gitleaks.toml")
  236. }
  237. // set verbose flag
  238. if detector.Verbose, err = cmd.Flags().GetBool("verbose"); err != nil {
  239. logging.Fatal().Err(err).Send()
  240. }
  241. // set redact flag
  242. if detector.Redact, err = cmd.Flags().GetUint("redact"); err != nil {
  243. logging.Fatal().Err(err).Send()
  244. }
  245. if detector.MaxTargetMegaBytes, err = cmd.Flags().GetInt("max-target-megabytes"); err != nil {
  246. logging.Fatal().Err(err).Send()
  247. }
  248. // set ignore gitleaks:allow flag
  249. if detector.IgnoreGitleaksAllow, err = cmd.Flags().GetBool("ignore-gitleaks-allow"); err != nil {
  250. logging.Fatal().Err(err).Send()
  251. }
  252. gitleaksIgnorePath, err := cmd.Flags().GetString("gitleaks-ignore-path")
  253. if err != nil {
  254. logging.Fatal().Err(err).Msg("could not get .gitleaksignore path")
  255. }
  256. if fileExists(gitleaksIgnorePath) {
  257. if err = detector.AddGitleaksIgnore(gitleaksIgnorePath); err != nil {
  258. logging.Fatal().Err(err).Msg("could not call AddGitleaksIgnore")
  259. }
  260. }
  261. if fileExists(filepath.Join(gitleaksIgnorePath, ".gitleaksignore")) {
  262. if err = detector.AddGitleaksIgnore(filepath.Join(gitleaksIgnorePath, ".gitleaksignore")); err != nil {
  263. logging.Fatal().Err(err).Msg("could not call AddGitleaksIgnore")
  264. }
  265. }
  266. if fileExists(filepath.Join(source, ".gitleaksignore")) {
  267. if err = detector.AddGitleaksIgnore(filepath.Join(source, ".gitleaksignore")); err != nil {
  268. logging.Fatal().Err(err).Msg("could not call AddGitleaksIgnore")
  269. }
  270. }
  271. // ignore findings from the baseline (an existing report in json format generated earlier)
  272. baselinePath, _ := cmd.Flags().GetString("baseline-path")
  273. if baselinePath != "" {
  274. err = detector.AddBaseline(baselinePath, source)
  275. if err != nil {
  276. logging.Error().Msgf("Could not load baseline. The path must point of a gitleaks report generated using the default format: %s", err)
  277. }
  278. }
  279. // If set, only apply rules that are defined in the flag
  280. rules, _ := cmd.Flags().GetStringSlice("enable-rule")
  281. if len(rules) > 0 {
  282. logging.Info().Msg("Overriding enabled rules: " + strings.Join(rules, ", "))
  283. ruleOverride := make(map[string]config.Rule)
  284. for _, ruleName := range rules {
  285. if r, ok := cfg.Rules[ruleName]; ok {
  286. ruleOverride[ruleName] = r
  287. } else {
  288. logging.Fatal().Msgf("Requested rule %s not found in rules", ruleName)
  289. }
  290. }
  291. detector.Config.Rules = ruleOverride
  292. }
  293. // Validate report settings.
  294. reportPath := mustGetStringFlag(cmd, "report-path")
  295. if reportPath != "" {
  296. if reportPath != report.StdoutReportPath {
  297. // Ensure the path is writable.
  298. if f, err := os.Create(reportPath); err != nil {
  299. logging.Fatal().Err(err).Msgf("Report path is not writable: %s", reportPath)
  300. } else {
  301. _ = f.Close()
  302. _ = os.Remove(reportPath)
  303. }
  304. }
  305. // Build report writer.
  306. var (
  307. reporter report.Reporter
  308. reportFormat = mustGetStringFlag(cmd, "report-format")
  309. reportTemplate = mustGetStringFlag(cmd, "report-template")
  310. )
  311. if reportFormat == "" {
  312. ext := strings.ToLower(filepath.Ext(reportPath))
  313. switch ext {
  314. case ".csv":
  315. reportFormat = "csv"
  316. case ".json":
  317. reportFormat = "json"
  318. case ".sarif":
  319. reportFormat = "sarif"
  320. default:
  321. logging.Fatal().Msgf("Unknown report format: %s", reportFormat)
  322. }
  323. logging.Debug().Msgf("No report format specified, inferred %q from %q", reportFormat, ext)
  324. }
  325. switch strings.TrimSpace(strings.ToLower(reportFormat)) {
  326. case "csv":
  327. reporter = &report.CsvReporter{}
  328. case "json":
  329. reporter = &report.JsonReporter{}
  330. case "junit":
  331. reporter = &report.JunitReporter{}
  332. case "sarif":
  333. reporter = &report.SarifReporter{
  334. OrderedRules: cfg.GetOrderedRules(),
  335. }
  336. case "template":
  337. if reporter, err = report.NewTemplateReporter(reportTemplate); err != nil {
  338. logging.Fatal().Err(err).Msg("Invalid report template")
  339. }
  340. default:
  341. logging.Fatal().Msgf("unknown report format %s", reportFormat)
  342. }
  343. // Sanity check.
  344. if reportTemplate != "" && reportFormat != "template" {
  345. logging.Fatal().Msgf("Report format must be 'template' if --report-template is specified")
  346. }
  347. detector.ReportPath = reportPath
  348. detector.Reporter = reporter
  349. }
  350. return detector
  351. }
  352. func bytesConvert(bytes uint64) string {
  353. unit := ""
  354. value := float32(bytes)
  355. switch {
  356. case bytes >= GIGABYTE:
  357. unit = "GB"
  358. value = value / GIGABYTE
  359. case bytes >= MEGABYTE:
  360. unit = "MB"
  361. value = value / MEGABYTE
  362. case bytes >= KILOBYTE:
  363. unit = "KB"
  364. value = value / KILOBYTE
  365. case bytes >= BYTE:
  366. unit = "bytes"
  367. case bytes == 0:
  368. return "0"
  369. }
  370. stringValue := strings.TrimSuffix(
  371. fmt.Sprintf("%.2f", value), ".00",
  372. )
  373. return fmt.Sprintf("%s %s", stringValue, unit)
  374. }
  375. func findingSummaryAndExit(detector *detect.Detector, findings []report.Finding, exitCode int, start time.Time, err error) {
  376. if diagnosticsManager.Enabled {
  377. logging.Debug().Msg("Finalizing diagnostics...")
  378. diagnosticsManager.StopDiagnostics()
  379. }
  380. totalBytes := detector.TotalBytes.Load()
  381. bytesMsg := fmt.Sprintf("scanned ~%d bytes (%s)", totalBytes, bytesConvert(totalBytes))
  382. if err == nil {
  383. logging.Info().Msgf("%s in %s", bytesMsg, FormatDuration(time.Since(start)))
  384. if len(findings) != 0 {
  385. logging.Warn().Msgf("leaks found: %d", len(findings))
  386. } else {
  387. logging.Info().Msg("no leaks found")
  388. }
  389. } else {
  390. logging.Warn().Msg(bytesMsg)
  391. logging.Warn().Msgf("partial scan completed in %s", FormatDuration(time.Since(start)))
  392. if len(findings) != 0 {
  393. logging.Warn().Msgf("%d leaks found in partial scan", len(findings))
  394. } else {
  395. logging.Warn().Msg("no leaks found in partial scan")
  396. }
  397. }
  398. // write report if desired
  399. if detector.Reporter != nil {
  400. var (
  401. file io.WriteCloser
  402. reportErr error
  403. )
  404. if detector.ReportPath == report.StdoutReportPath {
  405. file = os.Stdout
  406. } else {
  407. // Open the file.
  408. if file, reportErr = os.Create(detector.ReportPath); reportErr != nil {
  409. goto ReportEnd
  410. }
  411. defer func() {
  412. _ = file.Close()
  413. }()
  414. }
  415. // Write to the file.
  416. if reportErr = detector.Reporter.Write(file, findings); reportErr != nil {
  417. goto ReportEnd
  418. }
  419. ReportEnd:
  420. if reportErr != nil {
  421. logging.Fatal().Err(reportErr).Msg("failed to write report")
  422. }
  423. }
  424. if err != nil {
  425. os.Exit(1)
  426. }
  427. if len(findings) != 0 {
  428. os.Exit(exitCode)
  429. }
  430. }
  431. func fileExists(fileName string) bool {
  432. // check for a .gitleaksignore file
  433. info, err := os.Stat(fileName)
  434. if err != nil && !os.IsNotExist(err) {
  435. return false
  436. }
  437. if info != nil && err == nil {
  438. if !info.IsDir() {
  439. return true
  440. }
  441. }
  442. return false
  443. }
  444. func FormatDuration(d time.Duration) string {
  445. scale := 100 * time.Second
  446. // look for the max scale that is smaller than d
  447. for scale > d {
  448. scale = scale / 10
  449. }
  450. return d.Round(scale / 100).String()
  451. }
  452. func mustGetBoolFlag(cmd *cobra.Command, name string) bool {
  453. value, err := cmd.Flags().GetBool(name)
  454. if err != nil {
  455. logging.Fatal().Err(err).Msgf("could not get flag: %s", name)
  456. }
  457. return value
  458. }
  459. func mustGetIntFlag(cmd *cobra.Command, name string) int {
  460. value, err := cmd.Flags().GetInt(name)
  461. if err != nil {
  462. logging.Fatal().Err(err).Msgf("could not get flag: %s", name)
  463. }
  464. return value
  465. }
  466. func mustGetStringFlag(cmd *cobra.Command, name string) string {
  467. value, err := cmd.Flags().GetString(name)
  468. if err != nil {
  469. logging.Fatal().Err(err).Msgf("could not get flag: %s", name)
  470. }
  471. return value
  472. }