gitlab-secret_detection 0.19.0 → 0.20.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 24a3afdfa8519bd53576f9fe18ffffc12d9ed32d80e27610d03300666423e8a7
4
- data.tar.gz: f7b000df1c5c6e712e528f388a44506f3cfce79bd6044de44ad106087f59d52f
3
+ metadata.gz: 8cd95dc817999bb641642ef12f37c72cdf877e417caf728752e5d61cbae1bcd2
4
+ data.tar.gz: 42d9ce659069690870f07310bc35d8e41aab5accc23f2d8a5eac094bac9e6bbe
5
5
  SHA512:
6
- metadata.gz: 4ca94bc1d02d099c7f7404b321abbc1bf7be811112e564dc44c1256b42e5aeea6d4ab207280d0ccb88ef2c62f7f17eb3fbb47f6eadc717ef5cd33f4e66cf5e26
7
- data.tar.gz: f8815666aa5ff2f129c40eb42814449d9201755a91ee2b4f3bb33b48bbe3364a9e3d78b36ec8adf2fdd94e51a03d448d9d36fbf12326f4312a14cb31843bdb96
6
+ metadata.gz: ed2fc3c749afe3be21fe16d1f05fd1d16511dd20a7bd77594b707bd99248ee96ed3c2fafc2e0ade16cbad99f7265ea0b8941d3021547b4c4d9f4363bfad31965
7
+ data.tar.gz: f2a8d9e25d2ccf3a1f35afa23dffd01a21871d895f9bd0f7a4daffd430391067eabe305db230a575cdda41975eb926fa8c50a84914ab3d26b33d2703e58f597a
data/README.md CHANGED
@@ -62,20 +62,21 @@ the approach:
62
62
 
63
63
  Usage `make <command>`
64
64
 
65
- | Command | Description |
66
- |---------------------|---------------------------------------------------------------------------------------------------------------------------------|
67
- | `install_secret_detection_rules` | Downloads secret-detection-rules based on package version defined in RULES_VERSION |
68
- | `install` | Installs ruby gems in the project using Ruby bundler |
69
- | `lint_fix` | Fixes all the fixable Rubocop lint offenses |
70
- | `gem_clean` | Cleans existing gem file(if any) generated through gem build process |
71
- | `gem_build` | Builds Ruby gem file wrapping secret detection logic (lib directory) |
72
- | `generate_proto` | Generates ruby(.rb) files for the Protobud Service Definition files(.proto) |
73
- | `grpc_docker_build` | Builds a docker container image for gRPC server |
74
- | `grpc_docker_serve` | Runs gRPC server via docker container listening on port 8080. Run `grpc_docker_build` make command before running this command. |
75
- | `grpc_serve` | Runs gRPC server on the CLI listening on port 50001. Run `install` make command before running this command. |
76
- | `run_core_tests` | Runs RSpec tests for Secret Detection core logic |
77
- | `run_grpc_tests` | Runs RSpec tests for Secret Detection gRPC endpoints |
78
- | `run_all_tests` | Runs all the RSpec tests in the project |
65
+ | Command | Description |
66
+ |----------------------------------|---------------------------------------------------------------------------------------------------------------------------------|
67
+ | `install_secret_detection_rules` | Downloads secret-detection-rules based on package version defined in RULES_VERSION |
68
+ | `install` | Installs ruby gems in the project using Ruby bundler |
69
+ | `lint_fix` | Fixes all the fixable Rubocop lint offenses |
70
+ | `gem_clean` | Cleans existing gem file(if any) generated through gem build process |
71
+ | `gem_build` | Builds Ruby gem file wrapping secret detection logic (lib directory) |
72
+ | `generate_proto` | Generates ruby(.rb) files for the Protobud Service Definition files(.proto) |
73
+ | `grpc_docker_build` | Builds a docker container image for gRPC server |
74
+ | `grpc_docker_serve` | Runs gRPC server via docker container listening on port 8080. Run `grpc_docker_build` make command before running this command. |
75
+ | `grpc_serve` | Runs gRPC server on the CLI listening on port 50001. Run `install` make command before running this command. |
76
+ | `run_core_tests` | Runs RSpec tests for Secret Detection core logic |
77
+ | `run_grpc_tests` | Runs RSpec tests for Secret Detection gRPC endpoints |
78
+ | `run_utils_tests` | Runs RSpec tests for Secret Detection utilities |
79
+ | `run_all_tests` | Runs all the RSpec tests in the project |
79
80
 
80
81
 
81
82
  ## Secret Detection Rules
@@ -7,6 +7,14 @@ module Gitlab
7
7
  module SecretDetection
8
8
  module Core
9
9
  class Ruleset
10
+ # RulesetParseError is thrown when the code fails to parse the
11
+ # ruleset file from the given path
12
+ RulesetParseError = Class.new(StandardError)
13
+
14
+ # RulesetCompilationError is thrown when the code fails to compile
15
+ # the predefined rulesets
16
+ RulesetCompilationError = Class.new(StandardError)
17
+
10
18
  # file path where the secrets ruleset file is located
11
19
  RULESET_FILE_PATH = File.expand_path('secret_push_protection_rules.toml', __dir__)
12
20
 
@@ -21,17 +29,36 @@ module Gitlab
21
29
  @rule_data = parse_ruleset
22
30
  end
23
31
 
32
+ def extract_ruleset_version
33
+ @ruleset_version ||= if File.readable?(RULESET_FILE_PATH)
34
+ first_line = File.open(RULESET_FILE_PATH, &:gets)
35
+ first_line&.split(":")&.[](1)&.strip
36
+ end
37
+ rescue StandardError => e
38
+ logger.error(message: "Failed to extract Secret Detection Ruleset version from ruleset file: #{e.message}")
39
+ end
40
+
24
41
  private
25
42
 
26
43
  attr_reader :path, :logger
27
44
 
28
45
  # parses given ruleset file and returns the parsed rules
29
46
  def parse_ruleset
30
- # rule_file_content = File.read(path)
47
+ logger.info(
48
+ message: "Parsing local ruleset file",
49
+ ruleset_path: RULESET_FILE_PATH
50
+ )
31
51
  rules_data = TomlRB.load_file(path, symbolize_keys: true).freeze
52
+ ruleset_version = extract_ruleset_version
53
+
54
+ logger.info(
55
+ message: "Ruleset details fetched for running Secret Detection scan",
56
+ total_rules: rules_data[:rules]&.length,
57
+ ruleset_version:
58
+ )
32
59
  rules_data[:rules].freeze
33
60
  rescue StandardError => e
34
- logger.error "Failed to parse secret detection ruleset from '#{path}' path: #{e}"
61
+ logger.error(message: "Failed to parse local secret detection ruleset: #{e.message}")
35
62
  raise Core::Scanner::RulesetParseError, e
36
63
  end
37
64
  end
@@ -11,14 +11,6 @@ module Gitlab
11
11
  module Core
12
12
  # Scan is responsible for running Secret Detection scan operation
13
13
  class Scanner
14
- # RulesetParseError is thrown when the code fails to parse the
15
- # ruleset file from the given path
16
- RulesetParseError = Class.new(StandardError)
17
-
18
- # RulesetCompilationError is thrown when the code fails to compile
19
- # the predefined rulesets
20
- RulesetCompilationError = Class.new(StandardError)
21
-
22
14
  # default time limit(in seconds) for running the scan operation per invocation
23
15
  DEFAULT_SCAN_TIMEOUT_SECS = 180 # 3 minutes
24
16
  # default time limit(in seconds) for running the scan operation on a single payload
@@ -91,7 +83,6 @@ module Gitlab
91
83
  tags: DEFAULT_PATTERN_MATCHER_TAGS,
92
84
  subprocess: RUN_IN_SUBPROCESS
93
85
  )
94
-
95
86
  return Core::Response.new(status: Core::Status::INPUT_ERROR) unless validate_scan_input(payloads)
96
87
 
97
88
  # assign defaults since grpc passing zero timeout value to `Timeout.timeout(..)` makes it effectively useless.
@@ -111,12 +102,29 @@ module Gitlab
111
102
  payload_timeout:,
112
103
  pattern_matcher: build_pattern_matcher(tags:),
113
104
  exclusions:
114
- }
105
+ }.freeze
106
+
107
+ logger.info(
108
+ message: "Scan input parameters for running Secret Detection scan",
109
+ timeout:,
110
+ payload_timeout:,
111
+ given_total_payloads: payloads.length,
112
+ scannable_payloads_post_keyword_filter: matched_payloads.length,
113
+ tags:,
114
+ run_in_subprocess: subprocess,
115
+ given_exclusions: format_exclusions_hash(exclusions)
116
+ )
115
117
 
116
118
  secrets, applied_exclusions = subprocess ? run_scan_within_subprocess(**scan_args) : run_scan(**scan_args)
117
119
 
118
120
  scan_status = overall_scan_status(secrets)
119
121
 
122
+ logger.info(
123
+ message: "Secret Detection scan completed with #{secrets.length} secrets detected in the given payloads",
124
+ detected_secrets_metadata: format_detected_secrets_metadata(secrets),
125
+ applied_exclusions: format_exclusions_arr(applied_exclusions)
126
+ )
127
+
120
128
  Core::Response.new(status: scan_status, results: secrets, applied_exclusions:)
121
129
  end
122
130
  rescue Timeout::Error => e
@@ -135,7 +143,18 @@ module Gitlab
135
143
  # are same as +DEFAULT_PATTERN_MATCHER_TAGS+ then returns the eagerly loaded default
136
144
  # pattern matcher created during initialization.
137
145
  def build_pattern_matcher(tags:, include_missing_tags: false)
138
- return default_pattern_matcher if tags.eql?(DEFAULT_PATTERN_MATCHER_TAGS) && !default_pattern_matcher.nil?
146
+ if tags.eql?(DEFAULT_PATTERN_MATCHER_TAGS) && !default_pattern_matcher.nil?
147
+ logger.info(
148
+ message: "Given tags input matches default matcher tags, using pre-defined RE2 Pattern Matcher"
149
+ )
150
+ return default_pattern_matcher
151
+ end
152
+
153
+ logger.info(
154
+ message: "Creating a new RE2 Pattern Matcher with given tags",
155
+ tags:,
156
+ include_missing_tags:
157
+ )
139
158
 
140
159
  matcher = RE2::Set.new
141
160
 
@@ -154,9 +173,9 @@ module Gitlab
154
173
  end
155
174
 
156
175
  unless matcher.compile
157
- logger.error "Failed to compile secret detection rulesets in RE::Set"
176
+ logger.error "Failed to compile secret detection ruleset in RE::Set"
158
177
 
159
- raise RulesetCompilationError
178
+ raise Core::Ruleset::RulesetCompilationError
160
179
  end
161
180
 
162
181
  matcher
@@ -174,7 +193,18 @@ module Gitlab
174
193
  end
175
194
 
176
195
  def build_keyword_matcher(tags:, include_missing_tags: false)
177
- return default_keyword_matcher if tags.eql?(DEFAULT_PATTERN_MATCHER_TAGS) && !default_keyword_matcher.nil?
196
+ if tags.eql?(DEFAULT_PATTERN_MATCHER_TAGS) && !default_keyword_matcher.nil?
197
+ logger.info(
198
+ message: "Given tags input matches default tags, using pre-defined RE2 Keyword Matcher"
199
+ )
200
+ return default_keyword_matcher
201
+ end
202
+
203
+ logger.info(
204
+ message: "Creating a new RE2 Keyword Matcher..",
205
+ tags:,
206
+ include_missing_tags:
207
+ )
178
208
 
179
209
  include_keywords = Set.new
180
210
 
@@ -187,15 +217,28 @@ module Gitlab
187
217
  include_keywords.merge(rule[:keywords]) unless rule[:keywords].nil?
188
218
  end
189
219
 
190
- return nil if include_keywords.empty?
220
+ if include_keywords.empty?
221
+ logger.error(
222
+ message: "No rule keywords found a match with given rule tags, returning empty RE2 Keyword Matcher"
223
+ )
224
+ return nil
225
+ end
191
226
 
192
227
  keywords_regex = include_keywords.join('|')
193
228
 
229
+ logger.debug(
230
+ message: "Creating RE2 Keyword Matcher with set of rule keywords",
231
+ keywords: include_keywords.to_a
232
+ )
233
+
194
234
  RE2("\\b(#{keywords_regex})")
195
235
  end
196
236
 
197
237
  def filter_by_keywords(keyword_matcher, payloads)
198
- return [] if keyword_matcher.nil?
238
+ if keyword_matcher.nil?
239
+ logger.warn "No RE2 Keyword Matcher instance available, skipping payload filter by rule keywords step.."
240
+ return payloads
241
+ end
199
242
 
200
243
  matched_payloads = []
201
244
  payloads.each do |payload|
@@ -204,6 +247,20 @@ module Gitlab
204
247
  matched_payloads << payload
205
248
  end
206
249
 
250
+ total_payloads_retained = matched_payloads.length == payloads.length ? 'all' : matched_payloads.length
251
+ log_message = if matched_payloads.empty?
252
+ "No payloads available to scan further after keyword-matching, exiting Secret Detection scan"
253
+ else
254
+ "Retained #{total_payloads_retained} payloads to scan further after keyword-matching step"
255
+ end
256
+
257
+ logger.info(
258
+ message: log_message,
259
+ given_total_payloads: payloads.length,
260
+ matched_payloads: matched_payloads.length,
261
+ payloads_to_scan_further: matched_payloads.map(&:id)
262
+ )
263
+
207
264
  matched_payloads
208
265
  end
209
266
 
@@ -218,6 +275,11 @@ module Gitlab
218
275
  )
219
276
  all_applied_exclusions = Set.new
220
277
 
278
+ logger.info(
279
+ message: "Running Secret Detection scan sequentially",
280
+ payload_timeout:
281
+ )
282
+
221
283
  all_findings = payloads.flat_map do |payload|
222
284
  Timeout.timeout(payload_timeout) do
223
285
  findings, applied_exclusions = find_secrets_in_payload(
@@ -229,7 +291,7 @@ module Gitlab
229
291
  findings
230
292
  end
231
293
  rescue Timeout::Error => e
232
- logger.error "Secret Detection scan timed out on the payload(id:#{payload.id}): #{e}"
294
+ logger.warn "Secret Detection scan timed out on the payload(id:#{payload.id}): #{e}"
233
295
 
234
296
  Core::Finding.new(payload.id,
235
297
  Core::Status::PAYLOAD_TIMEOUT)
@@ -249,6 +311,12 @@ module Gitlab
249
311
 
250
312
  grouped_payloads = grouped_payload_indices.map { |idx_arr| idx_arr.map { |i| payloads[i] } }
251
313
 
314
+ logger.info(
315
+ message: "Running Secret Detection scan within a subprocess",
316
+ grouped_payloads: grouped_payloads.length,
317
+ payload_timeout:
318
+ )
319
+
252
320
  found_secrets = Parallel.flat_map(
253
321
  grouped_payloads,
254
322
  in_processes: MAX_PROCS_PER_REQUEST,
@@ -265,7 +333,7 @@ module Gitlab
265
333
  findings
266
334
  end
267
335
  rescue Timeout::Error => e
268
- logger.error "Secret Detection scan timed out on the payload(id:#{payload.id}): #{e}"
336
+ logger.warn "Secret Detection scan timed out on the payload(id:#{payload.id}): #{e}"
269
337
 
270
338
  Core::Finding.new(payload.id, Core::Status::PAYLOAD_TIMEOUT)
271
339
  end
@@ -291,8 +359,10 @@ module Gitlab
291
359
  .each_with_index do |line, index|
292
360
  unless raw_value_exclusions.empty?
293
361
  raw_value_exclusions.each do |exclusion|
294
- line.gsub!(exclusion.value, '') # replace input that doesn't contain allowed value in it
295
- applied_exclusions << exclusion
362
+ # replace input that doesn't contain allowed value in it
363
+ # replace exclusion value, `.gsub!` returns 'self' if replaced otherwise 'nil'
364
+ excl_replaced = !!line.gsub!(exclusion.value, '')
365
+ applied_exclusions << exclusion if excl_replaced
296
366
  end
297
367
  end
298
368
 
@@ -323,6 +393,13 @@ module Gitlab
323
393
  end
324
394
  end
325
395
 
396
+ logger.info(
397
+ message: "Secret Detection scan found #{findings.length} secret leaks in the payload(id:#{payload.id})",
398
+ payload_id: payload.id,
399
+ detected_rules: findings.map { |f| "#{f.type}:#{f.line_number}" },
400
+ applied_exclusions: format_exclusions_arr(applied_exclusions)
401
+ )
402
+
326
403
  [findings, applied_exclusions]
327
404
  rescue StandardError => e
328
405
  logger.error "Secret Detection scan failed on the payload(id:#{payload.id}): #{e}"
@@ -338,10 +415,20 @@ module Gitlab
338
415
  # Validates the given payloads by verifying the type and
339
416
  # presence of `id` and `data` fields necessary for the scan
340
417
  def validate_scan_input(payloads)
341
- return false if payloads.nil? || !payloads.instance_of?(Array)
418
+ if payloads.nil? || !payloads.instance_of?(Array)
419
+ logger.debug(message: "Scan input validation error: payloads arg is empty or not instance of array")
420
+ return false
421
+ end
342
422
 
343
423
  payloads.all? do |payload|
344
- payload.respond_to?(:id) && payload.respond_to?(:data)
424
+ has_valid_fields = payload.respond_to?(:id) && payload.respond_to?(:data)
425
+ unless has_valid_fields
426
+ logger.debug(
427
+ message: "Scan input validation error: one of the payloads does not respond to `id` or `data`"
428
+ )
429
+ end
430
+
431
+ has_valid_fields
345
432
  end
346
433
  end
347
434
 
@@ -390,6 +477,75 @@ module Gitlab
390
477
 
391
478
  chunk_indexes
392
479
  end
480
+
481
+ # Returns array of strings with each representing a masked exclusion
482
+ #
483
+ # Example: For given arg exclusions = {
484
+ # rule: ["gitlab_personal_access_token", "aws_key"],
485
+ # path: ["test.py"],
486
+ # raw_value: ["ABC123XYZ"]
487
+ # }
488
+ #
489
+ # The output will look like the following:
490
+ # [
491
+ # "rule=gitlab_personal_access_token,aws_key",
492
+ # "raw_value=AB*****YZ",
493
+ # "paths=test.py"
494
+ # ]
495
+ def format_exclusions_hash(exclusions = {})
496
+ masked_raw_values = exclusions.fetch(:raw_value, []).map do |exclusion|
497
+ Gitlab::SecretDetection::Utils::Masker.mask_secret(exclusion.value)
498
+ end.join(", ")
499
+ paths = exclusions.fetch(:path, []).map(&:value).join(", ")
500
+ rules = exclusions.fetch(:rule, []).map(&:value).join(", ")
501
+
502
+ out = []
503
+
504
+ out << "rules=#{rules}" unless rules.empty?
505
+ out << "raw_values=#{masked_raw_values}" unless masked_raw_values.empty?
506
+ out << "paths=#{paths}" unless paths.empty?
507
+
508
+ out
509
+ end
510
+
511
+ def format_exclusions_arr(exclusions = [])
512
+ return [] if exclusions.empty?
513
+
514
+ masked_raw_values = Set.new
515
+ paths = Set.new
516
+ rules = Set.new
517
+
518
+ exclusions.each do |exclusion|
519
+ case exclusion.exclusion_type
520
+ when :EXCLUSION_TYPE_RAW_VALUE
521
+ masked_raw_values << Gitlab::SecretDetection::Utils::Masker.mask_secret(exclusion.value)
522
+ when :EXCLUSION_TYPE_RULE
523
+ rules << exclusion.value
524
+ when :EXCLUSION_TYPE_PATH
525
+ paths << exclusion.value
526
+ else
527
+ logger.warn("Unknown exclusion type #{exclusion.exclusion_type}")
528
+ end
529
+ end
530
+
531
+ out = []
532
+
533
+ out << "rules=#{rules.join(',')}" unless rules.empty?
534
+ out << "raw_values=#{masked_raw_values.join(',')}" unless masked_raw_values.empty?
535
+ out << "paths=#{paths.join(',')}" unless paths.empty?
536
+
537
+ out
538
+ end
539
+
540
+ def format_detected_secrets_metadata(findings = [])
541
+ return [] if findings.empty?
542
+
543
+ found_secrets = findings.filter do |f|
544
+ f.status == Core::Status::FOUND
545
+ end
546
+
547
+ found_secrets.map { |f| "#{f.payload_id}=>#{f.type}:#{f.line_number}" }
548
+ end
393
549
  end
394
550
  end
395
551
  end
@@ -0,0 +1,64 @@
1
+ # frozen_string_literal: true
2
+
3
+ require 'sentry-ruby'
4
+
5
+ require_relative '../../../../lib/gitlab/secret_detection/core/ruleset'
6
+
7
+ module Gitlab
8
+ module SecretDetection
9
+ module GRPC
10
+ module IntegratedErrorTracking
11
+ extend self
12
+
13
+ def track_exception(exception, args = {})
14
+ unless Sentry.initialized?
15
+ logger.warn(message: "Cannot track exception in Error Tracking as Sentry is not initialized")
16
+ return
17
+ end
18
+
19
+ args[:ruleset_version] = ruleset_version
20
+
21
+ Sentry.capture_exception(exception, **args)
22
+ end
23
+
24
+ def setup(logger: Logger.new($stdout))
25
+ if Sentry.initialized?
26
+ logger.warn(message: "Sentry is already initialized, skipping re-setup")
27
+ return
28
+ end
29
+
30
+ logger.info(message: "Initializing Sentry SDK for Integrated Error Tracking..")
31
+
32
+ unless can_setup_sentry?
33
+ logger.warn(message: "Integrated Error Tracking not available, skipping Sentry SDK initialization")
34
+ return false
35
+ end
36
+
37
+ Sentry.init do |config|
38
+ config.dsn = ENV.fetch('SD_TRACKING_DSN')
39
+ config.environment = ENV.fetch('SD_ENV')
40
+ config.release = Gitlab::SecretDetection::Gem::VERSION
41
+ config.send_default_pii = true
42
+ config.send_modules = false
43
+ config.traces_sample_rate = 0.2 if ENV.fetch('ENABLE_SENTRY_PERFORMANCE_MONITORING', 'false') == 'true'
44
+ end
45
+
46
+ Sentry.set_context('ruleset', { version: ruleset_version })
47
+
48
+ true
49
+ rescue StandardError => e
50
+ logger.error(message: "Failed to initialize Sentry SDK for Integrated Error Tracking: #{e}")
51
+ raise e
52
+ end
53
+
54
+ def ruleset_version
55
+ @ruleset_version ||= Gitlab::SecretDetection::Core::Ruleset.new.extract_ruleset_version || 'unknown'
56
+ end
57
+
58
+ def can_setup_sentry?
59
+ ENV.fetch('SD_ENV', '') == 'production' && ENV.fetch('SD_TRACKING_DSN', '') != ''
60
+ end
61
+ end
62
+ end
63
+ end
64
+ end
@@ -32,6 +32,7 @@ module Gitlab
32
32
  module GRPC
33
33
  class ScannerService < Scanner::Service
34
34
  include SDLogger
35
+ include IntegratedErrorTracking
35
36
 
36
37
  # Maximum timeout value that can be given as the input. This guards
37
38
  # against the misuse of timeouts.
@@ -45,19 +46,34 @@ module Gitlab
45
46
  }.freeze
46
47
 
47
48
  # Implementation for /Scan RPC method
48
- def scan(request, _call)
49
- scan_request_action(request)
49
+ def scan(request, call)
50
+ scan_request_action(request, call)
50
51
  end
51
52
 
52
53
  # Implementation for /ScanStream RPC method
53
- def scan_stream(requests, _call)
54
- request_action = ->(r) { scan_request_action(r) }
54
+ def scan_stream(requests, call)
55
+ request_action = ->(r) { scan_request_action(r, call) }
55
56
  StreamEnumerator.new(requests, request_action).each_item
56
57
  end
57
58
 
58
59
  private
59
60
 
60
- def scan_request_action(request)
61
+ def scan_request_action(request, call)
62
+ if request.nil?
63
+ logger.error(
64
+ message: "FATAL: Secret Detection gRPC scan request is `nil`",
65
+ deadline: call.deadline,
66
+ cancelled: call.cancelled?
67
+ )
68
+ return Gitlab::SecretDetection::GRPC::ScanResponse.new(
69
+ results: [],
70
+ status: Gitlab::SecretDetection::GRPC::ScanResponse::Status::STATUS_INPUT_ERROR,
71
+ applied_exclusions: []
72
+ )
73
+ end
74
+
75
+ logger.info(message: "Secret Detection gRPC scan request received")
76
+
61
77
  validate_request(request)
62
78
 
63
79
  payloads = request.payloads.to_a
@@ -66,7 +82,7 @@ module Gitlab
66
82
  request.exclusions.each do |exclusion|
67
83
  case exclusion.exclusion_type
68
84
  when :EXCLUSION_TYPE_RAW_VALUE
69
- exclusions[:raw] << exclusion
85
+ exclusions[:raw_value] << exclusion
70
86
  when :EXCLUSION_TYPE_RULE
71
87
  exclusions[:rule] << exclusion
72
88
  when :EXCLUSION_TYPE_PATH
@@ -85,7 +101,8 @@ module Gitlab
85
101
  payload_timeout: request.payload_timeout_secs
86
102
  )
87
103
  rescue StandardError => e
88
- logger.error("Failed to run the scan: #{e}")
104
+ logger.error(message: "Failed to run the secret detection scan", exception: e.message)
105
+ track_exception(e)
89
106
  raise ::GRPC::Unknown, e.message
90
107
  end
91
108
 
@@ -1,5 +1,6 @@
1
1
  # frozen_string_literal: true
2
2
 
3
+ require_relative 'grpc/integrated_error_tracking'
3
4
  require_relative 'grpc/scanner_service'
4
5
  require_relative 'grpc/client/stream_request_enumerator'
5
6
  require_relative 'grpc/client/grpc_client'
@@ -0,0 +1,43 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Gitlab
4
+ module SecretDetection
5
+ module Utils
6
+ class Masker
7
+ DEFAULT_VISIBLE_CHAR_COUNT = 3
8
+ DEFAULT_MASK_CHAR_COUNT = 5
9
+ DEFAULT_MASK_CHAR = '*'
10
+
11
+ class << self
12
+ def mask_secret(
13
+ raw_secret_value,
14
+ mask_char: DEFAULT_MASK_CHAR,
15
+ visible_chars_count: DEFAULT_VISIBLE_CHAR_COUNT,
16
+ mask_chars_count: DEFAULT_MASK_CHAR_COUNT
17
+ )
18
+ return '' if raw_secret_value.nil? || raw_secret_value.empty?
19
+ return raw_secret_value if raw_secret_value.length <= visible_chars_count # Too short to mask
20
+
21
+ chars = raw_secret_value.chars
22
+ position = 0
23
+
24
+ while position < chars.length
25
+ # Show 'visible_chars_count' characters
26
+ position += visible_chars_count
27
+
28
+ # Mask next 'mask_chars' characters if available
29
+ mask_chars_count.times do
30
+ break if position >= chars.length
31
+
32
+ chars[position] = mask_char
33
+ position += 1
34
+ end
35
+ end
36
+
37
+ chars.join
38
+ end
39
+ end
40
+ end
41
+ end
42
+ end
43
+ end
@@ -2,6 +2,7 @@
2
2
 
3
3
  require_relative 'utils/certificate'
4
4
  require_relative 'utils/memoize'
5
+ require_relative 'utils/masker'
5
6
 
6
7
  module Gitlab
7
8
  module SecretDetection
@@ -8,7 +8,7 @@ module Gitlab
8
8
  # https://gitlab.com/gitlab-org/gitlab/-/issues/514015
9
9
  #
10
10
  # Ensure to maintain the same version in CHANGELOG file.
11
- VERSION = "0.19.0"
11
+ VERSION = "0.20.0"
12
12
 
13
13
  # SD_ENV env var is used to determine which environment the
14
14
  # server is running. This var is defined in `.runway/env-<env>.yml` files.
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: gitlab-secret_detection
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.19.0
4
+ version: 0.20.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - group::secret detection
@@ -10,7 +10,7 @@ authors:
10
10
  autorequire:
11
11
  bindir: bin
12
12
  cert_chain: []
13
- date: 2025-02-13 00:00:00.000000000 Z
13
+ date: 2025-02-25 00:00:00.000000000 Z
14
14
  dependencies:
15
15
  - !ruby/object:Gem::Dependency
16
16
  name: grpc
@@ -82,6 +82,34 @@ dependencies:
82
82
  - - "~>"
83
83
  - !ruby/object:Gem::Version
84
84
  version: '2.7'
85
+ - !ruby/object:Gem::Dependency
86
+ name: sentry-ruby
87
+ requirement: !ruby/object:Gem::Requirement
88
+ requirements:
89
+ - - "~>"
90
+ - !ruby/object:Gem::Version
91
+ version: '5.22'
92
+ type: :runtime
93
+ prerelease: false
94
+ version_requirements: !ruby/object:Gem::Requirement
95
+ requirements:
96
+ - - "~>"
97
+ - !ruby/object:Gem::Version
98
+ version: '5.22'
99
+ - !ruby/object:Gem::Dependency
100
+ name: stackprof
101
+ requirement: !ruby/object:Gem::Requirement
102
+ requirements:
103
+ - - "~>"
104
+ - !ruby/object:Gem::Version
105
+ version: 0.2.27
106
+ type: :runtime
107
+ prerelease: false
108
+ version_requirements: !ruby/object:Gem::Requirement
109
+ requirements:
110
+ - - "~>"
111
+ - !ruby/object:Gem::Version
112
+ version: 0.2.27
85
113
  - !ruby/object:Gem::Dependency
86
114
  name: toml-rb
87
115
  requirement: !ruby/object:Gem::Requirement
@@ -124,9 +152,11 @@ files:
124
152
  - lib/gitlab/secret_detection/grpc/generated/.gitkeep
125
153
  - lib/gitlab/secret_detection/grpc/generated/secret_detection_pb.rb
126
154
  - lib/gitlab/secret_detection/grpc/generated/secret_detection_services_pb.rb
155
+ - lib/gitlab/secret_detection/grpc/integrated_error_tracking.rb
127
156
  - lib/gitlab/secret_detection/grpc/scanner_service.rb
128
157
  - lib/gitlab/secret_detection/utils.rb
129
158
  - lib/gitlab/secret_detection/utils/certificate.rb
159
+ - lib/gitlab/secret_detection/utils/masker.rb
130
160
  - lib/gitlab/secret_detection/utils/memoize.rb
131
161
  - lib/gitlab/secret_detection/version.rb
132
162
  - proto/secret_detection.proto