gitlab-secret_detection 0.19.0 → 0.20.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +15 -14
- data/lib/gitlab/secret_detection/core/ruleset.rb +29 -2
- data/lib/gitlab/secret_detection/core/scanner.rb +178 -22
- data/lib/gitlab/secret_detection/grpc/integrated_error_tracking.rb +64 -0
- data/lib/gitlab/secret_detection/grpc/scanner_service.rb +24 -7
- data/lib/gitlab/secret_detection/grpc.rb +1 -0
- data/lib/gitlab/secret_detection/utils/masker.rb +43 -0
- data/lib/gitlab/secret_detection/utils.rb +1 -0
- data/lib/gitlab/secret_detection/version.rb +1 -1
- metadata +32 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 8cd95dc817999bb641642ef12f37c72cdf877e417caf728752e5d61cbae1bcd2
|
4
|
+
data.tar.gz: 42d9ce659069690870f07310bc35d8e41aab5accc23f2d8a5eac094bac9e6bbe
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: ed2fc3c749afe3be21fe16d1f05fd1d16511dd20a7bd77594b707bd99248ee96ed3c2fafc2e0ade16cbad99f7265ea0b8941d3021547b4c4d9f4363bfad31965
|
7
|
+
data.tar.gz: f2a8d9e25d2ccf3a1f35afa23dffd01a21871d895f9bd0f7a4daffd430391067eabe305db230a575cdda41975eb926fa8c50a84914ab3d26b33d2703e58f597a
|
data/README.md
CHANGED
@@ -62,20 +62,21 @@ the approach:
|
|
62
62
|
|
63
63
|
Usage `make <command>`
|
64
64
|
|
65
|
-
| Command
|
66
|
-
|
67
|
-
| `install_secret_detection_rules` | Downloads secret-detection-rules based on package version defined in RULES_VERSION
|
68
|
-
| `install`
|
69
|
-
| `lint_fix`
|
70
|
-
| `gem_clean`
|
71
|
-
| `gem_build`
|
72
|
-
| `generate_proto`
|
73
|
-
| `grpc_docker_build`
|
74
|
-
| `grpc_docker_serve`
|
75
|
-
| `grpc_serve`
|
76
|
-
| `run_core_tests`
|
77
|
-
| `run_grpc_tests`
|
78
|
-
| `
|
65
|
+
| Command | Description |
|
66
|
+
|----------------------------------|---------------------------------------------------------------------------------------------------------------------------------|
|
67
|
+
| `install_secret_detection_rules` | Downloads secret-detection-rules based on package version defined in RULES_VERSION |
|
68
|
+
| `install` | Installs ruby gems in the project using Ruby bundler |
|
69
|
+
| `lint_fix` | Fixes all the fixable Rubocop lint offenses |
|
70
|
+
| `gem_clean` | Cleans existing gem file(if any) generated through gem build process |
|
71
|
+
| `gem_build` | Builds Ruby gem file wrapping secret detection logic (lib directory) |
|
72
|
+
| `generate_proto` | Generates ruby(.rb) files for the Protobud Service Definition files(.proto) |
|
73
|
+
| `grpc_docker_build` | Builds a docker container image for gRPC server |
|
74
|
+
| `grpc_docker_serve` | Runs gRPC server via docker container listening on port 8080. Run `grpc_docker_build` make command before running this command. |
|
75
|
+
| `grpc_serve` | Runs gRPC server on the CLI listening on port 50001. Run `install` make command before running this command. |
|
76
|
+
| `run_core_tests` | Runs RSpec tests for Secret Detection core logic |
|
77
|
+
| `run_grpc_tests` | Runs RSpec tests for Secret Detection gRPC endpoints |
|
78
|
+
| `run_utils_tests` | Runs RSpec tests for Secret Detection utilities |
|
79
|
+
| `run_all_tests` | Runs all the RSpec tests in the project |
|
79
80
|
|
80
81
|
|
81
82
|
## Secret Detection Rules
|
@@ -7,6 +7,14 @@ module Gitlab
|
|
7
7
|
module SecretDetection
|
8
8
|
module Core
|
9
9
|
class Ruleset
|
10
|
+
# RulesetParseError is thrown when the code fails to parse the
|
11
|
+
# ruleset file from the given path
|
12
|
+
RulesetParseError = Class.new(StandardError)
|
13
|
+
|
14
|
+
# RulesetCompilationError is thrown when the code fails to compile
|
15
|
+
# the predefined rulesets
|
16
|
+
RulesetCompilationError = Class.new(StandardError)
|
17
|
+
|
10
18
|
# file path where the secrets ruleset file is located
|
11
19
|
RULESET_FILE_PATH = File.expand_path('secret_push_protection_rules.toml', __dir__)
|
12
20
|
|
@@ -21,17 +29,36 @@ module Gitlab
|
|
21
29
|
@rule_data = parse_ruleset
|
22
30
|
end
|
23
31
|
|
32
|
+
def extract_ruleset_version
|
33
|
+
@ruleset_version ||= if File.readable?(RULESET_FILE_PATH)
|
34
|
+
first_line = File.open(RULESET_FILE_PATH, &:gets)
|
35
|
+
first_line&.split(":")&.[](1)&.strip
|
36
|
+
end
|
37
|
+
rescue StandardError => e
|
38
|
+
logger.error(message: "Failed to extract Secret Detection Ruleset version from ruleset file: #{e.message}")
|
39
|
+
end
|
40
|
+
|
24
41
|
private
|
25
42
|
|
26
43
|
attr_reader :path, :logger
|
27
44
|
|
28
45
|
# parses given ruleset file and returns the parsed rules
|
29
46
|
def parse_ruleset
|
30
|
-
|
47
|
+
logger.info(
|
48
|
+
message: "Parsing local ruleset file",
|
49
|
+
ruleset_path: RULESET_FILE_PATH
|
50
|
+
)
|
31
51
|
rules_data = TomlRB.load_file(path, symbolize_keys: true).freeze
|
52
|
+
ruleset_version = extract_ruleset_version
|
53
|
+
|
54
|
+
logger.info(
|
55
|
+
message: "Ruleset details fetched for running Secret Detection scan",
|
56
|
+
total_rules: rules_data[:rules]&.length,
|
57
|
+
ruleset_version:
|
58
|
+
)
|
32
59
|
rules_data[:rules].freeze
|
33
60
|
rescue StandardError => e
|
34
|
-
logger.error "Failed to parse secret detection ruleset
|
61
|
+
logger.error(message: "Failed to parse local secret detection ruleset: #{e.message}")
|
35
62
|
raise Core::Scanner::RulesetParseError, e
|
36
63
|
end
|
37
64
|
end
|
@@ -11,14 +11,6 @@ module Gitlab
|
|
11
11
|
module Core
|
12
12
|
# Scan is responsible for running Secret Detection scan operation
|
13
13
|
class Scanner
|
14
|
-
# RulesetParseError is thrown when the code fails to parse the
|
15
|
-
# ruleset file from the given path
|
16
|
-
RulesetParseError = Class.new(StandardError)
|
17
|
-
|
18
|
-
# RulesetCompilationError is thrown when the code fails to compile
|
19
|
-
# the predefined rulesets
|
20
|
-
RulesetCompilationError = Class.new(StandardError)
|
21
|
-
|
22
14
|
# default time limit(in seconds) for running the scan operation per invocation
|
23
15
|
DEFAULT_SCAN_TIMEOUT_SECS = 180 # 3 minutes
|
24
16
|
# default time limit(in seconds) for running the scan operation on a single payload
|
@@ -91,7 +83,6 @@ module Gitlab
|
|
91
83
|
tags: DEFAULT_PATTERN_MATCHER_TAGS,
|
92
84
|
subprocess: RUN_IN_SUBPROCESS
|
93
85
|
)
|
94
|
-
|
95
86
|
return Core::Response.new(status: Core::Status::INPUT_ERROR) unless validate_scan_input(payloads)
|
96
87
|
|
97
88
|
# assign defaults since grpc passing zero timeout value to `Timeout.timeout(..)` makes it effectively useless.
|
@@ -111,12 +102,29 @@ module Gitlab
|
|
111
102
|
payload_timeout:,
|
112
103
|
pattern_matcher: build_pattern_matcher(tags:),
|
113
104
|
exclusions:
|
114
|
-
}
|
105
|
+
}.freeze
|
106
|
+
|
107
|
+
logger.info(
|
108
|
+
message: "Scan input parameters for running Secret Detection scan",
|
109
|
+
timeout:,
|
110
|
+
payload_timeout:,
|
111
|
+
given_total_payloads: payloads.length,
|
112
|
+
scannable_payloads_post_keyword_filter: matched_payloads.length,
|
113
|
+
tags:,
|
114
|
+
run_in_subprocess: subprocess,
|
115
|
+
given_exclusions: format_exclusions_hash(exclusions)
|
116
|
+
)
|
115
117
|
|
116
118
|
secrets, applied_exclusions = subprocess ? run_scan_within_subprocess(**scan_args) : run_scan(**scan_args)
|
117
119
|
|
118
120
|
scan_status = overall_scan_status(secrets)
|
119
121
|
|
122
|
+
logger.info(
|
123
|
+
message: "Secret Detection scan completed with #{secrets.length} secrets detected in the given payloads",
|
124
|
+
detected_secrets_metadata: format_detected_secrets_metadata(secrets),
|
125
|
+
applied_exclusions: format_exclusions_arr(applied_exclusions)
|
126
|
+
)
|
127
|
+
|
120
128
|
Core::Response.new(status: scan_status, results: secrets, applied_exclusions:)
|
121
129
|
end
|
122
130
|
rescue Timeout::Error => e
|
@@ -135,7 +143,18 @@ module Gitlab
|
|
135
143
|
# are same as +DEFAULT_PATTERN_MATCHER_TAGS+ then returns the eagerly loaded default
|
136
144
|
# pattern matcher created during initialization.
|
137
145
|
def build_pattern_matcher(tags:, include_missing_tags: false)
|
138
|
-
|
146
|
+
if tags.eql?(DEFAULT_PATTERN_MATCHER_TAGS) && !default_pattern_matcher.nil?
|
147
|
+
logger.info(
|
148
|
+
message: "Given tags input matches default matcher tags, using pre-defined RE2 Pattern Matcher"
|
149
|
+
)
|
150
|
+
return default_pattern_matcher
|
151
|
+
end
|
152
|
+
|
153
|
+
logger.info(
|
154
|
+
message: "Creating a new RE2 Pattern Matcher with given tags",
|
155
|
+
tags:,
|
156
|
+
include_missing_tags:
|
157
|
+
)
|
139
158
|
|
140
159
|
matcher = RE2::Set.new
|
141
160
|
|
@@ -154,9 +173,9 @@ module Gitlab
|
|
154
173
|
end
|
155
174
|
|
156
175
|
unless matcher.compile
|
157
|
-
logger.error "Failed to compile secret detection
|
176
|
+
logger.error "Failed to compile secret detection ruleset in RE::Set"
|
158
177
|
|
159
|
-
raise RulesetCompilationError
|
178
|
+
raise Core::Ruleset::RulesetCompilationError
|
160
179
|
end
|
161
180
|
|
162
181
|
matcher
|
@@ -174,7 +193,18 @@ module Gitlab
|
|
174
193
|
end
|
175
194
|
|
176
195
|
def build_keyword_matcher(tags:, include_missing_tags: false)
|
177
|
-
|
196
|
+
if tags.eql?(DEFAULT_PATTERN_MATCHER_TAGS) && !default_keyword_matcher.nil?
|
197
|
+
logger.info(
|
198
|
+
message: "Given tags input matches default tags, using pre-defined RE2 Keyword Matcher"
|
199
|
+
)
|
200
|
+
return default_keyword_matcher
|
201
|
+
end
|
202
|
+
|
203
|
+
logger.info(
|
204
|
+
message: "Creating a new RE2 Keyword Matcher..",
|
205
|
+
tags:,
|
206
|
+
include_missing_tags:
|
207
|
+
)
|
178
208
|
|
179
209
|
include_keywords = Set.new
|
180
210
|
|
@@ -187,15 +217,28 @@ module Gitlab
|
|
187
217
|
include_keywords.merge(rule[:keywords]) unless rule[:keywords].nil?
|
188
218
|
end
|
189
219
|
|
190
|
-
|
220
|
+
if include_keywords.empty?
|
221
|
+
logger.error(
|
222
|
+
message: "No rule keywords found a match with given rule tags, returning empty RE2 Keyword Matcher"
|
223
|
+
)
|
224
|
+
return nil
|
225
|
+
end
|
191
226
|
|
192
227
|
keywords_regex = include_keywords.join('|')
|
193
228
|
|
229
|
+
logger.debug(
|
230
|
+
message: "Creating RE2 Keyword Matcher with set of rule keywords",
|
231
|
+
keywords: include_keywords.to_a
|
232
|
+
)
|
233
|
+
|
194
234
|
RE2("\\b(#{keywords_regex})")
|
195
235
|
end
|
196
236
|
|
197
237
|
def filter_by_keywords(keyword_matcher, payloads)
|
198
|
-
|
238
|
+
if keyword_matcher.nil?
|
239
|
+
logger.warn "No RE2 Keyword Matcher instance available, skipping payload filter by rule keywords step.."
|
240
|
+
return payloads
|
241
|
+
end
|
199
242
|
|
200
243
|
matched_payloads = []
|
201
244
|
payloads.each do |payload|
|
@@ -204,6 +247,20 @@ module Gitlab
|
|
204
247
|
matched_payloads << payload
|
205
248
|
end
|
206
249
|
|
250
|
+
total_payloads_retained = matched_payloads.length == payloads.length ? 'all' : matched_payloads.length
|
251
|
+
log_message = if matched_payloads.empty?
|
252
|
+
"No payloads available to scan further after keyword-matching, exiting Secret Detection scan"
|
253
|
+
else
|
254
|
+
"Retained #{total_payloads_retained} payloads to scan further after keyword-matching step"
|
255
|
+
end
|
256
|
+
|
257
|
+
logger.info(
|
258
|
+
message: log_message,
|
259
|
+
given_total_payloads: payloads.length,
|
260
|
+
matched_payloads: matched_payloads.length,
|
261
|
+
payloads_to_scan_further: matched_payloads.map(&:id)
|
262
|
+
)
|
263
|
+
|
207
264
|
matched_payloads
|
208
265
|
end
|
209
266
|
|
@@ -218,6 +275,11 @@ module Gitlab
|
|
218
275
|
)
|
219
276
|
all_applied_exclusions = Set.new
|
220
277
|
|
278
|
+
logger.info(
|
279
|
+
message: "Running Secret Detection scan sequentially",
|
280
|
+
payload_timeout:
|
281
|
+
)
|
282
|
+
|
221
283
|
all_findings = payloads.flat_map do |payload|
|
222
284
|
Timeout.timeout(payload_timeout) do
|
223
285
|
findings, applied_exclusions = find_secrets_in_payload(
|
@@ -229,7 +291,7 @@ module Gitlab
|
|
229
291
|
findings
|
230
292
|
end
|
231
293
|
rescue Timeout::Error => e
|
232
|
-
logger.
|
294
|
+
logger.warn "Secret Detection scan timed out on the payload(id:#{payload.id}): #{e}"
|
233
295
|
|
234
296
|
Core::Finding.new(payload.id,
|
235
297
|
Core::Status::PAYLOAD_TIMEOUT)
|
@@ -249,6 +311,12 @@ module Gitlab
|
|
249
311
|
|
250
312
|
grouped_payloads = grouped_payload_indices.map { |idx_arr| idx_arr.map { |i| payloads[i] } }
|
251
313
|
|
314
|
+
logger.info(
|
315
|
+
message: "Running Secret Detection scan within a subprocess",
|
316
|
+
grouped_payloads: grouped_payloads.length,
|
317
|
+
payload_timeout:
|
318
|
+
)
|
319
|
+
|
252
320
|
found_secrets = Parallel.flat_map(
|
253
321
|
grouped_payloads,
|
254
322
|
in_processes: MAX_PROCS_PER_REQUEST,
|
@@ -265,7 +333,7 @@ module Gitlab
|
|
265
333
|
findings
|
266
334
|
end
|
267
335
|
rescue Timeout::Error => e
|
268
|
-
logger.
|
336
|
+
logger.warn "Secret Detection scan timed out on the payload(id:#{payload.id}): #{e}"
|
269
337
|
|
270
338
|
Core::Finding.new(payload.id, Core::Status::PAYLOAD_TIMEOUT)
|
271
339
|
end
|
@@ -291,8 +359,10 @@ module Gitlab
|
|
291
359
|
.each_with_index do |line, index|
|
292
360
|
unless raw_value_exclusions.empty?
|
293
361
|
raw_value_exclusions.each do |exclusion|
|
294
|
-
|
295
|
-
|
362
|
+
# replace input that doesn't contain allowed value in it
|
363
|
+
# replace exclusion value, `.gsub!` returns 'self' if replaced otherwise 'nil'
|
364
|
+
excl_replaced = !!line.gsub!(exclusion.value, '')
|
365
|
+
applied_exclusions << exclusion if excl_replaced
|
296
366
|
end
|
297
367
|
end
|
298
368
|
|
@@ -323,6 +393,13 @@ module Gitlab
|
|
323
393
|
end
|
324
394
|
end
|
325
395
|
|
396
|
+
logger.info(
|
397
|
+
message: "Secret Detection scan found #{findings.length} secret leaks in the payload(id:#{payload.id})",
|
398
|
+
payload_id: payload.id,
|
399
|
+
detected_rules: findings.map { |f| "#{f.type}:#{f.line_number}" },
|
400
|
+
applied_exclusions: format_exclusions_arr(applied_exclusions)
|
401
|
+
)
|
402
|
+
|
326
403
|
[findings, applied_exclusions]
|
327
404
|
rescue StandardError => e
|
328
405
|
logger.error "Secret Detection scan failed on the payload(id:#{payload.id}): #{e}"
|
@@ -338,10 +415,20 @@ module Gitlab
|
|
338
415
|
# Validates the given payloads by verifying the type and
|
339
416
|
# presence of `id` and `data` fields necessary for the scan
|
340
417
|
def validate_scan_input(payloads)
|
341
|
-
|
418
|
+
if payloads.nil? || !payloads.instance_of?(Array)
|
419
|
+
logger.debug(message: "Scan input validation error: payloads arg is empty or not instance of array")
|
420
|
+
return false
|
421
|
+
end
|
342
422
|
|
343
423
|
payloads.all? do |payload|
|
344
|
-
payload.respond_to?(:id) && payload.respond_to?(:data)
|
424
|
+
has_valid_fields = payload.respond_to?(:id) && payload.respond_to?(:data)
|
425
|
+
unless has_valid_fields
|
426
|
+
logger.debug(
|
427
|
+
message: "Scan input validation error: one of the payloads does not respond to `id` or `data`"
|
428
|
+
)
|
429
|
+
end
|
430
|
+
|
431
|
+
has_valid_fields
|
345
432
|
end
|
346
433
|
end
|
347
434
|
|
@@ -390,6 +477,75 @@ module Gitlab
|
|
390
477
|
|
391
478
|
chunk_indexes
|
392
479
|
end
|
480
|
+
|
481
|
+
# Returns array of strings with each representing a masked exclusion
|
482
|
+
#
|
483
|
+
# Example: For given arg exclusions = {
|
484
|
+
# rule: ["gitlab_personal_access_token", "aws_key"],
|
485
|
+
# path: ["test.py"],
|
486
|
+
# raw_value: ["ABC123XYZ"]
|
487
|
+
# }
|
488
|
+
#
|
489
|
+
# The output will look like the following:
|
490
|
+
# [
|
491
|
+
# "rule=gitlab_personal_access_token,aws_key",
|
492
|
+
# "raw_value=AB*****YZ",
|
493
|
+
# "paths=test.py"
|
494
|
+
# ]
|
495
|
+
def format_exclusions_hash(exclusions = {})
|
496
|
+
masked_raw_values = exclusions.fetch(:raw_value, []).map do |exclusion|
|
497
|
+
Gitlab::SecretDetection::Utils::Masker.mask_secret(exclusion.value)
|
498
|
+
end.join(", ")
|
499
|
+
paths = exclusions.fetch(:path, []).map(&:value).join(", ")
|
500
|
+
rules = exclusions.fetch(:rule, []).map(&:value).join(", ")
|
501
|
+
|
502
|
+
out = []
|
503
|
+
|
504
|
+
out << "rules=#{rules}" unless rules.empty?
|
505
|
+
out << "raw_values=#{masked_raw_values}" unless masked_raw_values.empty?
|
506
|
+
out << "paths=#{paths}" unless paths.empty?
|
507
|
+
|
508
|
+
out
|
509
|
+
end
|
510
|
+
|
511
|
+
def format_exclusions_arr(exclusions = [])
|
512
|
+
return [] if exclusions.empty?
|
513
|
+
|
514
|
+
masked_raw_values = Set.new
|
515
|
+
paths = Set.new
|
516
|
+
rules = Set.new
|
517
|
+
|
518
|
+
exclusions.each do |exclusion|
|
519
|
+
case exclusion.exclusion_type
|
520
|
+
when :EXCLUSION_TYPE_RAW_VALUE
|
521
|
+
masked_raw_values << Gitlab::SecretDetection::Utils::Masker.mask_secret(exclusion.value)
|
522
|
+
when :EXCLUSION_TYPE_RULE
|
523
|
+
rules << exclusion.value
|
524
|
+
when :EXCLUSION_TYPE_PATH
|
525
|
+
paths << exclusion.value
|
526
|
+
else
|
527
|
+
logger.warn("Unknown exclusion type #{exclusion.exclusion_type}")
|
528
|
+
end
|
529
|
+
end
|
530
|
+
|
531
|
+
out = []
|
532
|
+
|
533
|
+
out << "rules=#{rules.join(',')}" unless rules.empty?
|
534
|
+
out << "raw_values=#{masked_raw_values.join(',')}" unless masked_raw_values.empty?
|
535
|
+
out << "paths=#{paths.join(',')}" unless paths.empty?
|
536
|
+
|
537
|
+
out
|
538
|
+
end
|
539
|
+
|
540
|
+
def format_detected_secrets_metadata(findings = [])
|
541
|
+
return [] if findings.empty?
|
542
|
+
|
543
|
+
found_secrets = findings.filter do |f|
|
544
|
+
f.status == Core::Status::FOUND
|
545
|
+
end
|
546
|
+
|
547
|
+
found_secrets.map { |f| "#{f.payload_id}=>#{f.type}:#{f.line_number}" }
|
548
|
+
end
|
393
549
|
end
|
394
550
|
end
|
395
551
|
end
|
@@ -0,0 +1,64 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require 'sentry-ruby'
|
4
|
+
|
5
|
+
require_relative '../../../../lib/gitlab/secret_detection/core/ruleset'
|
6
|
+
|
7
|
+
module Gitlab
|
8
|
+
module SecretDetection
|
9
|
+
module GRPC
|
10
|
+
module IntegratedErrorTracking
|
11
|
+
extend self
|
12
|
+
|
13
|
+
def track_exception(exception, args = {})
|
14
|
+
unless Sentry.initialized?
|
15
|
+
logger.warn(message: "Cannot track exception in Error Tracking as Sentry is not initialized")
|
16
|
+
return
|
17
|
+
end
|
18
|
+
|
19
|
+
args[:ruleset_version] = ruleset_version
|
20
|
+
|
21
|
+
Sentry.capture_exception(exception, **args)
|
22
|
+
end
|
23
|
+
|
24
|
+
def setup(logger: Logger.new($stdout))
|
25
|
+
if Sentry.initialized?
|
26
|
+
logger.warn(message: "Sentry is already initialized, skipping re-setup")
|
27
|
+
return
|
28
|
+
end
|
29
|
+
|
30
|
+
logger.info(message: "Initializing Sentry SDK for Integrated Error Tracking..")
|
31
|
+
|
32
|
+
unless can_setup_sentry?
|
33
|
+
logger.warn(message: "Integrated Error Tracking not available, skipping Sentry SDK initialization")
|
34
|
+
return false
|
35
|
+
end
|
36
|
+
|
37
|
+
Sentry.init do |config|
|
38
|
+
config.dsn = ENV.fetch('SD_TRACKING_DSN')
|
39
|
+
config.environment = ENV.fetch('SD_ENV')
|
40
|
+
config.release = Gitlab::SecretDetection::Gem::VERSION
|
41
|
+
config.send_default_pii = true
|
42
|
+
config.send_modules = false
|
43
|
+
config.traces_sample_rate = 0.2 if ENV.fetch('ENABLE_SENTRY_PERFORMANCE_MONITORING', 'false') == 'true'
|
44
|
+
end
|
45
|
+
|
46
|
+
Sentry.set_context('ruleset', { version: ruleset_version })
|
47
|
+
|
48
|
+
true
|
49
|
+
rescue StandardError => e
|
50
|
+
logger.error(message: "Failed to initialize Sentry SDK for Integrated Error Tracking: #{e}")
|
51
|
+
raise e
|
52
|
+
end
|
53
|
+
|
54
|
+
def ruleset_version
|
55
|
+
@ruleset_version ||= Gitlab::SecretDetection::Core::Ruleset.new.extract_ruleset_version || 'unknown'
|
56
|
+
end
|
57
|
+
|
58
|
+
def can_setup_sentry?
|
59
|
+
ENV.fetch('SD_ENV', '') == 'production' && ENV.fetch('SD_TRACKING_DSN', '') != ''
|
60
|
+
end
|
61
|
+
end
|
62
|
+
end
|
63
|
+
end
|
64
|
+
end
|
@@ -32,6 +32,7 @@ module Gitlab
|
|
32
32
|
module GRPC
|
33
33
|
class ScannerService < Scanner::Service
|
34
34
|
include SDLogger
|
35
|
+
include IntegratedErrorTracking
|
35
36
|
|
36
37
|
# Maximum timeout value that can be given as the input. This guards
|
37
38
|
# against the misuse of timeouts.
|
@@ -45,19 +46,34 @@ module Gitlab
|
|
45
46
|
}.freeze
|
46
47
|
|
47
48
|
# Implementation for /Scan RPC method
|
48
|
-
def scan(request,
|
49
|
-
scan_request_action(request)
|
49
|
+
def scan(request, call)
|
50
|
+
scan_request_action(request, call)
|
50
51
|
end
|
51
52
|
|
52
53
|
# Implementation for /ScanStream RPC method
|
53
|
-
def scan_stream(requests,
|
54
|
-
request_action = ->(r) { scan_request_action(r) }
|
54
|
+
def scan_stream(requests, call)
|
55
|
+
request_action = ->(r) { scan_request_action(r, call) }
|
55
56
|
StreamEnumerator.new(requests, request_action).each_item
|
56
57
|
end
|
57
58
|
|
58
59
|
private
|
59
60
|
|
60
|
-
def scan_request_action(request)
|
61
|
+
def scan_request_action(request, call)
|
62
|
+
if request.nil?
|
63
|
+
logger.error(
|
64
|
+
message: "FATAL: Secret Detection gRPC scan request is `nil`",
|
65
|
+
deadline: call.deadline,
|
66
|
+
cancelled: call.cancelled?
|
67
|
+
)
|
68
|
+
return Gitlab::SecretDetection::GRPC::ScanResponse.new(
|
69
|
+
results: [],
|
70
|
+
status: Gitlab::SecretDetection::GRPC::ScanResponse::Status::STATUS_INPUT_ERROR,
|
71
|
+
applied_exclusions: []
|
72
|
+
)
|
73
|
+
end
|
74
|
+
|
75
|
+
logger.info(message: "Secret Detection gRPC scan request received")
|
76
|
+
|
61
77
|
validate_request(request)
|
62
78
|
|
63
79
|
payloads = request.payloads.to_a
|
@@ -66,7 +82,7 @@ module Gitlab
|
|
66
82
|
request.exclusions.each do |exclusion|
|
67
83
|
case exclusion.exclusion_type
|
68
84
|
when :EXCLUSION_TYPE_RAW_VALUE
|
69
|
-
exclusions[:
|
85
|
+
exclusions[:raw_value] << exclusion
|
70
86
|
when :EXCLUSION_TYPE_RULE
|
71
87
|
exclusions[:rule] << exclusion
|
72
88
|
when :EXCLUSION_TYPE_PATH
|
@@ -85,7 +101,8 @@ module Gitlab
|
|
85
101
|
payload_timeout: request.payload_timeout_secs
|
86
102
|
)
|
87
103
|
rescue StandardError => e
|
88
|
-
logger.error("Failed to run the scan:
|
104
|
+
logger.error(message: "Failed to run the secret detection scan", exception: e.message)
|
105
|
+
track_exception(e)
|
89
106
|
raise ::GRPC::Unknown, e.message
|
90
107
|
end
|
91
108
|
|
@@ -0,0 +1,43 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module Gitlab
|
4
|
+
module SecretDetection
|
5
|
+
module Utils
|
6
|
+
class Masker
|
7
|
+
DEFAULT_VISIBLE_CHAR_COUNT = 3
|
8
|
+
DEFAULT_MASK_CHAR_COUNT = 5
|
9
|
+
DEFAULT_MASK_CHAR = '*'
|
10
|
+
|
11
|
+
class << self
|
12
|
+
def mask_secret(
|
13
|
+
raw_secret_value,
|
14
|
+
mask_char: DEFAULT_MASK_CHAR,
|
15
|
+
visible_chars_count: DEFAULT_VISIBLE_CHAR_COUNT,
|
16
|
+
mask_chars_count: DEFAULT_MASK_CHAR_COUNT
|
17
|
+
)
|
18
|
+
return '' if raw_secret_value.nil? || raw_secret_value.empty?
|
19
|
+
return raw_secret_value if raw_secret_value.length <= visible_chars_count # Too short to mask
|
20
|
+
|
21
|
+
chars = raw_secret_value.chars
|
22
|
+
position = 0
|
23
|
+
|
24
|
+
while position < chars.length
|
25
|
+
# Show 'visible_chars_count' characters
|
26
|
+
position += visible_chars_count
|
27
|
+
|
28
|
+
# Mask next 'mask_chars' characters if available
|
29
|
+
mask_chars_count.times do
|
30
|
+
break if position >= chars.length
|
31
|
+
|
32
|
+
chars[position] = mask_char
|
33
|
+
position += 1
|
34
|
+
end
|
35
|
+
end
|
36
|
+
|
37
|
+
chars.join
|
38
|
+
end
|
39
|
+
end
|
40
|
+
end
|
41
|
+
end
|
42
|
+
end
|
43
|
+
end
|
@@ -8,7 +8,7 @@ module Gitlab
|
|
8
8
|
# https://gitlab.com/gitlab-org/gitlab/-/issues/514015
|
9
9
|
#
|
10
10
|
# Ensure to maintain the same version in CHANGELOG file.
|
11
|
-
VERSION = "0.
|
11
|
+
VERSION = "0.20.0"
|
12
12
|
|
13
13
|
# SD_ENV env var is used to determine which environment the
|
14
14
|
# server is running. This var is defined in `.runway/env-<env>.yml` files.
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: gitlab-secret_detection
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.20.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- group::secret detection
|
@@ -10,7 +10,7 @@ authors:
|
|
10
10
|
autorequire:
|
11
11
|
bindir: bin
|
12
12
|
cert_chain: []
|
13
|
-
date: 2025-02-
|
13
|
+
date: 2025-02-25 00:00:00.000000000 Z
|
14
14
|
dependencies:
|
15
15
|
- !ruby/object:Gem::Dependency
|
16
16
|
name: grpc
|
@@ -82,6 +82,34 @@ dependencies:
|
|
82
82
|
- - "~>"
|
83
83
|
- !ruby/object:Gem::Version
|
84
84
|
version: '2.7'
|
85
|
+
- !ruby/object:Gem::Dependency
|
86
|
+
name: sentry-ruby
|
87
|
+
requirement: !ruby/object:Gem::Requirement
|
88
|
+
requirements:
|
89
|
+
- - "~>"
|
90
|
+
- !ruby/object:Gem::Version
|
91
|
+
version: '5.22'
|
92
|
+
type: :runtime
|
93
|
+
prerelease: false
|
94
|
+
version_requirements: !ruby/object:Gem::Requirement
|
95
|
+
requirements:
|
96
|
+
- - "~>"
|
97
|
+
- !ruby/object:Gem::Version
|
98
|
+
version: '5.22'
|
99
|
+
- !ruby/object:Gem::Dependency
|
100
|
+
name: stackprof
|
101
|
+
requirement: !ruby/object:Gem::Requirement
|
102
|
+
requirements:
|
103
|
+
- - "~>"
|
104
|
+
- !ruby/object:Gem::Version
|
105
|
+
version: 0.2.27
|
106
|
+
type: :runtime
|
107
|
+
prerelease: false
|
108
|
+
version_requirements: !ruby/object:Gem::Requirement
|
109
|
+
requirements:
|
110
|
+
- - "~>"
|
111
|
+
- !ruby/object:Gem::Version
|
112
|
+
version: 0.2.27
|
85
113
|
- !ruby/object:Gem::Dependency
|
86
114
|
name: toml-rb
|
87
115
|
requirement: !ruby/object:Gem::Requirement
|
@@ -124,9 +152,11 @@ files:
|
|
124
152
|
- lib/gitlab/secret_detection/grpc/generated/.gitkeep
|
125
153
|
- lib/gitlab/secret_detection/grpc/generated/secret_detection_pb.rb
|
126
154
|
- lib/gitlab/secret_detection/grpc/generated/secret_detection_services_pb.rb
|
155
|
+
- lib/gitlab/secret_detection/grpc/integrated_error_tracking.rb
|
127
156
|
- lib/gitlab/secret_detection/grpc/scanner_service.rb
|
128
157
|
- lib/gitlab/secret_detection/utils.rb
|
129
158
|
- lib/gitlab/secret_detection/utils/certificate.rb
|
159
|
+
- lib/gitlab/secret_detection/utils/masker.rb
|
130
160
|
- lib/gitlab/secret_detection/utils/memoize.rb
|
131
161
|
- lib/gitlab/secret_detection/version.rb
|
132
162
|
- proto/secret_detection.proto
|