-
Notifications
You must be signed in to change notification settings - Fork 2.4k
/
Copy pathsecret.go
74 lines (59 loc) · 1.66 KB
/
secret.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
package secret
import (
"context"
"encoding/json"
"golang.org/x/xerrors"
"github.com/aquasecurity/trivy/pkg/fanal/analyzer"
"github.com/aquasecurity/trivy/pkg/fanal/secret"
"github.com/aquasecurity/trivy/pkg/fanal/types"
"github.com/aquasecurity/trivy/pkg/log"
)
const analyzerVersion = 1
func init() {
analyzer.RegisterConfigAnalyzer(analyzer.TypeImageConfigSecret, newSecretAnalyzer)
}
// secretAnalyzer detects secrets in container image config.
type secretAnalyzer struct {
scanner secret.Scanner
}
func newSecretAnalyzer(opts analyzer.ConfigAnalyzerOptions) (analyzer.ConfigAnalyzer, error) {
configPath := opts.SecretScannerOption.ConfigPath
c, err := secret.ParseConfig(configPath)
if err != nil {
return nil, xerrors.Errorf("secret config error: %w", err)
}
scanner := secret.NewScanner(c)
return &secretAnalyzer{
scanner: scanner,
}, nil
}
func (a *secretAnalyzer) Analyze(_ context.Context, input analyzer.ConfigAnalysisInput) (*analyzer.
ConfigAnalysisResult, error) {
if input.Config == nil {
return nil, nil
}
b, err := json.MarshalIndent(input.Config, " ", "")
if err != nil {
return nil, xerrors.Errorf("json marshal error: %w", err)
}
result := a.scanner.Scan(secret.ScanArgs{
FilePath: "config.json",
Content: b,
})
if len(result.Findings) == 0 {
log.Logger.Debug("No secrets found in container image config")
return nil, nil
}
return &analyzer.ConfigAnalysisResult{
Secret: &result,
}, nil
}
func (a *secretAnalyzer) Required(_ types.OS) bool {
return true
}
func (a *secretAnalyzer) Type() analyzer.Type {
return analyzer.TypeImageConfigSecret
}
func (a *secretAnalyzer) Version() int {
return analyzerVersion
}