mirror of
https://github.com/SAP/jenkins-library.git
synced 2024-12-14 11:03:09 +02:00
ac5cf17317
* rename interface, types and methods. some type changes and refactor * update dependent methods and variables * fix unit tests * a bit more refactor and fix * concurrent safe singleton * return old Options struct * refactor creating config provider and fix nil pointer derefernce * fix unit test and linter errors * introduce resetting config provider (for unit tests) * fix annoying error message when config provider is not configured --------- Co-authored-by: Gulom Alimov <gulomjon.alimov@sap.com> Co-authored-by: Muhammadali Nazarov <muhammadalinazarov@gmail.com>
250 lines
8.7 KiB
Go
250 lines
8.7 KiB
Go
package cmd
|
|
|
|
import (
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
"strconv"
|
|
|
|
"github.com/SAP/jenkins-library/pkg/command"
|
|
piperhttp "github.com/SAP/jenkins-library/pkg/http"
|
|
"github.com/SAP/jenkins-library/pkg/log"
|
|
"github.com/SAP/jenkins-library/pkg/orchestrator"
|
|
"github.com/SAP/jenkins-library/pkg/piperutils"
|
|
"github.com/SAP/jenkins-library/pkg/telemetry"
|
|
"github.com/pkg/errors"
|
|
)
|
|
|
|
const piperDbName string = "piper_step_db.db"
|
|
const piperReportName string = "findings.csv"
|
|
|
|
type credentialdiggerUtils interface {
|
|
command.ExecRunner
|
|
piperutils.FileUtils
|
|
}
|
|
|
|
type credentialdiggerUtilsBundle struct {
|
|
*command.Command
|
|
*piperutils.Files
|
|
}
|
|
|
|
func newCDUtils() credentialdiggerUtils {
|
|
utils := credentialdiggerUtilsBundle{
|
|
Command: &command.Command{},
|
|
Files: &piperutils.Files{},
|
|
}
|
|
// Reroute command output to logging framework
|
|
utils.Stdout(log.Writer())
|
|
utils.Stderr(log.Writer())
|
|
return &utils
|
|
}
|
|
|
|
func credentialdiggerScan(config credentialdiggerScanOptions, telemetryData *telemetry.CustomData) error {
|
|
utils := newCDUtils()
|
|
// 0: Get attributes from orchestrator
|
|
provider, prov_err := orchestrator.GetOrchestratorConfigProvider(nil)
|
|
if prov_err != nil {
|
|
log.Entry().WithError(prov_err).Error(
|
|
"credentialdiggerScan: unable to load orchestrator specific configuration.")
|
|
}
|
|
if config.Repository == "" {
|
|
// Get current repository from orchestrator
|
|
repoUrlOrchestrator := provider.RepoURL()
|
|
if repoUrlOrchestrator == "n/a" {
|
|
// Jenkins configuration error
|
|
log.Entry().WithError(errors.New(
|
|
fmt.Sprintf("Unknown repository URL %s", repoUrlOrchestrator))).Error(
|
|
"Repository URL n/a. Please verify git plugin is installed.")
|
|
}
|
|
config.Repository = repoUrlOrchestrator
|
|
log.Entry().Debug("Use current repository: ", repoUrlOrchestrator)
|
|
}
|
|
if provider.IsPullRequest() {
|
|
// set the pr number
|
|
config.PrNumber, _ = strconv.Atoi(provider.PullRequestConfig().Key)
|
|
log.Entry().Debug("Scan the current pull request: number ", config.PrNumber)
|
|
}
|
|
|
|
// 1: Add rules
|
|
log.Entry().Info("Load rules")
|
|
err := credentialdiggerAddRules(&config, telemetryData, utils)
|
|
if err != nil {
|
|
log.Entry().Error("credentialdiggerScan: Failed running credentialdigger add_rules")
|
|
return err
|
|
}
|
|
log.Entry().Info("Rules added")
|
|
|
|
// 2: Scan the repository
|
|
// Choose between scan-pr, scan-snapshot, and full-scan (with this priority
|
|
// order)
|
|
switch {
|
|
case config.PrNumber != 0: // int type is not nillable in golang
|
|
log.Entry().Debug("Scan PR")
|
|
// if a PrNumber is declared, run scan_pr
|
|
err = credentialdiggerScanPR(&config, telemetryData, utils) // scan PR with CD
|
|
case config.Snapshot != "":
|
|
log.Entry().Debug("Scan snapshot")
|
|
// if a Snapshot is declared, run scan_snapshot
|
|
err = credentialdiggerScanSnapshot(&config, telemetryData, utils) // scan Snapshot with CD
|
|
default:
|
|
// The default case is the normal full scan
|
|
log.Entry().Debug("Full scan repo")
|
|
err = credentialdiggerFullScan(&config, telemetryData, utils) // full scan with CD
|
|
}
|
|
// err is an error exit number when there are findings
|
|
if err == nil {
|
|
log.Entry().Info("No discoveries found in this repo")
|
|
// If there are no findings, there is no need to export an empty report
|
|
return nil
|
|
}
|
|
|
|
// 3: Get discoveries
|
|
err = credentialdiggerGetDiscoveries(&config, telemetryData, utils)
|
|
if err != nil {
|
|
// The exit number is the number of discoveries
|
|
// Therefore, this error is not relevant, if raised
|
|
log.Entry().Warn("There are findings to review")
|
|
}
|
|
|
|
// 4: Export report in workspace
|
|
reports := []piperutils.Path{}
|
|
reports = append(reports, piperutils.Path{Target: fmt.Sprintf("%v", piperReportName)})
|
|
piperutils.PersistReportsAndLinks("credentialdiggerScan", "./", utils, reports, nil)
|
|
|
|
return nil
|
|
}
|
|
|
|
func executeCredentialDiggerProcess(utils credentialdiggerUtils, args []string) error {
|
|
return utils.RunExecutable("credentialdigger", args...)
|
|
}
|
|
|
|
// hasConfigurationFile checks if the given file exists
|
|
func hasRulesFile(file string, utils credentialdiggerUtils) bool {
|
|
exists, err := utils.FileExists(file)
|
|
if err != nil {
|
|
log.Entry().WithError(err).Error()
|
|
}
|
|
return exists
|
|
}
|
|
|
|
func credentialdiggerAddRules(config *credentialdiggerScanOptions, telemetryData *telemetry.CustomData, service credentialdiggerUtils) error {
|
|
// Credentialdigger home can be changed with local forks (e.g., for local piper runs)
|
|
cdHome := "/credential-digger-ui" // cdHome path as in docker container
|
|
if cdh := os.Getenv("CREDENTIALDIGGER_HOME"); cdh != "" {
|
|
cdHome = cdh
|
|
}
|
|
log.Entry().Debug("Use credentialdigger home ", cdHome)
|
|
// Set the rule file to the standard ruleset shipped within credential
|
|
// digger container
|
|
ruleFile := filepath.Join(cdHome, "backend", "rules.yml")
|
|
|
|
if config.RulesDownloadURL != "" {
|
|
// Download custom rule file from this URL
|
|
log.Entry().Debugf("Download custom ruleset from %v", config.RulesDownloadURL)
|
|
dlClient := piperhttp.Client{}
|
|
ruleFile := filepath.Join(cdHome, "backend", "custom-rules.yml")
|
|
dlClient.DownloadFile(config.RulesDownloadURL, ruleFile, nil, nil)
|
|
log.Entry().Info("Download and use remote rules")
|
|
} else {
|
|
log.Entry().Debug("Use a local ruleset")
|
|
// Use rules defined in stashed file
|
|
if hasRulesFile(config.RulesFile, service) {
|
|
log.Entry().WithField("file", config.RulesFile).Info("Use stashed rules file from repository")
|
|
ruleFile = config.RulesFile
|
|
} else {
|
|
log.Entry().Info("Use standard pre-defined rules")
|
|
}
|
|
|
|
}
|
|
cmd_list := []string{"add_rules", "--sqlite", piperDbName, ruleFile}
|
|
return executeCredentialDiggerProcess(service, cmd_list)
|
|
}
|
|
|
|
func credentialdiggerGetDiscoveries(config *credentialdiggerScanOptions, telemetryData *telemetry.CustomData, service credentialdiggerUtils) error {
|
|
log.Entry().Info("Get discoveries")
|
|
cmd_list := []string{"get_discoveries", config.Repository, "--sqlite", piperDbName,
|
|
"--save", piperReportName}
|
|
// Export all the discoveries or export only new ones
|
|
if !config.ExportAll {
|
|
cmd_list = append(cmd_list, "--state", "new")
|
|
}
|
|
err := executeCredentialDiggerProcess(service, cmd_list)
|
|
if err != nil {
|
|
log.Entry().Error("credentialdiggerScan: Failed running credentialdigger get_discoveries")
|
|
log.Entry().Error(err)
|
|
return err
|
|
}
|
|
log.Entry().Info("Scan complete")
|
|
return nil
|
|
}
|
|
|
|
func credentialdiggerBuildCommonArgs(config *credentialdiggerScanOptions) []string {
|
|
/*Some arguments are the same for all the scan flavors. Build them here
|
|
* not to duplicate code.*/
|
|
scan_args := []string{}
|
|
// Repository url and sqlite db (always mandatory)
|
|
scan_args = append(scan_args, config.Repository, "--sqlite", piperDbName)
|
|
//git token is not mandatory for base credential digger tool, but in
|
|
//piper it is
|
|
scan_args = append(scan_args, "--git_token", config.Token)
|
|
//debug
|
|
if config.Debug {
|
|
log.Entry().Debug("Run the scan in debug mode")
|
|
scan_args = append(scan_args, "--debug")
|
|
}
|
|
//models
|
|
if len(config.Models) > 0 {
|
|
log.Entry().Debugf("Enable models %v", config.Models)
|
|
scan_args = append(scan_args, "--models")
|
|
scan_args = append(scan_args, config.Models...)
|
|
}
|
|
|
|
return scan_args
|
|
}
|
|
|
|
func credentialdiggerScanSnapshot(config *credentialdiggerScanOptions, telemetryData *telemetry.CustomData, service credentialdiggerUtils) error {
|
|
log.Entry().Infof("Scan Snapshot %v from repo %v", config.Snapshot, config.Repository)
|
|
cmd_list := []string{"scan_snapshot",
|
|
"--snapshot", config.Snapshot}
|
|
cmd_list = append(cmd_list, credentialdiggerBuildCommonArgs(config)...)
|
|
leaks := executeCredentialDiggerProcess(service, cmd_list)
|
|
if leaks != nil {
|
|
log.Entry().Warn("The scan found potential leaks in this Snapshot")
|
|
return leaks
|
|
} else {
|
|
log.Entry().Info("No leaks found")
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func credentialdiggerScanPR(config *credentialdiggerScanOptions, telemetryData *telemetry.CustomData, service credentialdiggerUtils) error {
|
|
log.Entry().Infof("Scan PR %v from repo %v", config.PrNumber, config.Repository)
|
|
cmd_list := []string{"scan_pr",
|
|
"--pr", strconv.Itoa(config.PrNumber),
|
|
"--api_endpoint", config.APIURL}
|
|
cmd_list = append(cmd_list, credentialdiggerBuildCommonArgs(config)...)
|
|
leaks := executeCredentialDiggerProcess(service, cmd_list)
|
|
if leaks != nil {
|
|
log.Entry().Warn("The scan found potential leaks in this PR")
|
|
return leaks
|
|
} else {
|
|
log.Entry().Info("No leaks found")
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func credentialdiggerFullScan(config *credentialdiggerScanOptions, telemetryData *telemetry.CustomData, service credentialdiggerUtils) error {
|
|
log.Entry().Infof("Full scan of repository %v", config.Repository)
|
|
cmd_list := []string{"scan"}
|
|
cmd_list = append(cmd_list, credentialdiggerBuildCommonArgs(config)...)
|
|
leaks := executeCredentialDiggerProcess(service, cmd_list)
|
|
if leaks != nil {
|
|
log.Entry().Warn("The scan found potential leaks")
|
|
log.Entry().Warnf("%v potential leaks found", leaks)
|
|
return leaks
|
|
} else {
|
|
log.Entry().Info("No leaks found")
|
|
return nil
|
|
}
|
|
}
|