Skip to content

Commit acf7d4f

Browse files
author
Abdullah Khawer
committed
feat: Add GitHub workflow template to easily enable the tool in any GitHub repository and update the existing GitLab CI template which is used to easily enable the tool in any GitLab repository to changes its path, Docker image used and variables location.
1 parent 26f0722 commit acf7d4f

File tree

4 files changed

+171
-23
lines changed

4 files changed

+171
-23
lines changed
+77
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
# This job finds secrets in a git repository using Gitleaks, generates a JSON report based on the findings from Gitleaks
2+
# by extracting only the relevant information, finds the commit id and commit author for each finding, updates an Atlassian
3+
# Confluence page with the secrets found based on that generated report and finally sends an alert on Slack.
4+
5+
on:
6+
workflow_call:
7+
inputs:
8+
CONFLUENCE_ENABLED:
9+
description: "Whether to enable reporting on Atlassian Confluence or not"
10+
required: true
11+
type: string
12+
CONFLUENCE_PAGE_TITLE:
13+
description: "Atlassian Confluence page title (e.g., 'Secrets Detected in the Git Repositories')"
14+
required: true
15+
type: string
16+
CONFLUENCE_PAGE_SPACE:
17+
description: "Atlassian Confluence page space (e.g., docs)"
18+
required: true
19+
type: string
20+
SLACK_ENABLED:
21+
description: "Whether to enable notifications on Slack or not"
22+
required: true
23+
type: string
24+
secrets:
25+
CONFLUENCE_SITE:
26+
description: "Atlassian Confluence host link (e.g., https://mydomain.atlassian.net)"
27+
required: true
28+
CONFLUENCE_USER_EMAIL_ID:
29+
description: "Atlassian Confluence user email ID (e.g., [email protected])"
30+
required: true
31+
CONFLUENCE_USER_TOKEN:
32+
description: "Atlassian Confluence user token"
33+
required: true
34+
SLACK_WEBHOOK_URL:
35+
description: "Slack Webhook URL (e.g., https://hooks.slack.com/services/__REDACTED__/__REDACTED__/__REDACTED__)"
36+
required: true
37+
38+
jobs:
39+
find-and-report-secrets-in-code:
40+
runs-on: ubuntu-latest
41+
container:
42+
image: abdullahkhawer/find-and-report-secrets-in-code:1.3.0
43+
env:
44+
CONFLUENCE_ENABLED: ${{ inputs.CONFLUENCE_ENABLED }}
45+
CONFLUENCE_SITE: ${{ secrets.CONFLUENCE_SITE }}
46+
CONFLUENCE_USER_EMAIL_ID: ${{ secrets.CONFLUENCE_USER_EMAIL_ID }}
47+
CONFLUENCE_USER_TOKEN: ${{ secrets.CONFLUENCE_USER_TOKEN }}
48+
CONFLUENCE_PAGE_TITLE: ${{ inputs.CONFLUENCE_PAGE_TITLE }}
49+
CONFLUENCE_PAGE_SPACE: ${{ inputs.CONFLUENCE_PAGE_SPACE }}
50+
SLACK_ENABLED: ${{ inputs.SLACK_ENABLED }}
51+
SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK_URL }}
52+
REMOTE_PATH_TO_GIT_REPO: ${{ github.server_url }}/${{ github.repository }}
53+
BRANCH_NAME: ${{ github.ref_name }}
54+
REPO_NAME: ${{ github.repository }}
55+
steps:
56+
- name: Checkout code
57+
uses: actions/checkout@v4
58+
with:
59+
set-safe-directory: true
60+
- name: Find secrets and generate custom report
61+
run: |
62+
export LOCAL_PATH_TO_GIT_REPO=$(pwd)
63+
export PATH=$PATH:/usr/local/gitleaks
64+
cd /find-and-report-secrets-in-code/
65+
bash ./gitleaks.sh
66+
cp ./gitleaks-report.json $LOCAL_PATH_TO_GIT_REPO/gitleaks-report.json
67+
- name: Upload generated custom report as artifact
68+
id: artifact-upload-step
69+
uses: actions/upload-artifact@v4
70+
with:
71+
name: gitleaks-report.json
72+
path: gitleaks-report.json
73+
- name: Update Confluence page and/or send alert on Slack
74+
if: ${{ inputs.SLACK_ENABLED == '1' || inputs.CONFLUENCE_ENABLED == '1' }}
75+
run: |
76+
cd /find-and-report-secrets-in-code/
77+
python3 main.py "Europe/Amsterdam" $REPO_NAME $BRANCH_NAME ${{ steps.artifact-upload-step.outputs.artifact-url }}

ci/.gitlab-ci.yml .gitlab/.gitlab-ci.yml

+4-4
Original file line numberDiff line numberDiff line change
@@ -20,12 +20,15 @@
2020
SLACK_ENABLED: "0"
2121
# Slack Webhook URL (e.g., https://hooks.slack.com/services/__REDACTED__/__REDACTED__/__REDACTED__)
2222
SLACK_WEBHOOK_URL: ""
23+
REMOTE_PATH_TO_GIT_REPO: "${CI_PROJECT_URL}"
24+
BRANCH_NAME: "${CI_COMMIT_BRANCH}"
25+
REPO_NAME: "${CI_PROJECT_PATH}"
2326

2427
.find-secrets:scan:
2528
stage: scan
2629
extends:
2730
- .find-secrets:variables
28-
image: abdullahkhawer/find-and-report-secrets-in-code:1.2.0
31+
image: abdullahkhawer/find-and-report-secrets-in-code:1.3.0
2932
before_script:
3033
- |
3134
if [ -n "$CONFLUENCE_ENABLED" ] && [ "$CONFLUENCE_ENABLED" -eq 1 ]; then
@@ -64,9 +67,6 @@
6467
- git fetch origin $CI_COMMIT_BRANCH
6568
script:
6669
- export LOCAL_PATH_TO_GIT_REPO=$(pwd)
67-
- export REMOTE_PATH_TO_GIT_REPO=$CI_PROJECT_URL
68-
- export BRANCH_NAME=$CI_COMMIT_BRANCH
69-
- export REPO_NAME=$CI_PROJECT_PATH
7070
- export PATH=$PATH:/usr/local/gitleaks
7171
- cd /find-and-report-secrets-in-code/
7272
- bash ./gitleaks.sh

README.md

+46-9
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ A security solution that finds secrets in a git repository using Gitleaks, gener
88

99
❓ Where I can run this?
1010

11-
👉🏻 This solution can be executed on any macOS or Linux system either locally or on a remote server. It can also be executed on a CI/CD pipeline.
11+
This solution can be executed on any macOS or Linux system either locally or on a remote server. It can also be executed on a CI/CD tool like on GitHub Actions, GitLab CI, etc, in a pipeline.
1212

1313
Below you can find an example of the JSON report generated:
1414

@@ -139,20 +139,51 @@ And then simply run the following 2 commands:
139139
- Example: `python3 main.py Europe/Amsterdam my-projects/my-repo master`
140140
- Note: Details about supported time zones and their constant names can be found here: [pypi.org > project > pytz > Helpers](https://pypi.org/project/pytz/#:~:text=through%20multiple%20timezones.-,Helpers,-There%20are%20two)
141141

142-
## Automatically via CI/CD Pipeline
142+
## Automatically via a CI/CD Pipeline
143143

144-
### Setup Instructions
144+
### GitHub Actions - Setup Instructions
145145

146-
In order to run it on any GitLab repository, add the following in the `.gitlab-ci.yml` file that is in the repository:
146+
In order to run it on any GitHub repository, add the following in the `.github-workflow.yml` file under the `.github/workflows/` directory in the repository:
147+
148+
```
149+
name: find-and-report-secrets-in-code
150+
151+
on:
152+
push:
153+
branches:
154+
- master
155+
156+
jobs:
157+
find-and-report-secrets-in-code:
158+
uses: abdullahkhawer/find-and-report-secrets-in-code/.github/workflows/.github-workflow.yml@master
159+
with:
160+
CONFLUENCE_ENABLED: "1"
161+
CONFLUENCE_PAGE_TITLE: ${{ vars.CONFLUENCE_PAGE_TITLE }}
162+
CONFLUENCE_PAGE_SPACE: ${{ vars.CONFLUENCE_PAGE_SPACE }}
163+
SLACK_ENABLED: "1"
164+
secrets:
165+
CONFLUENCE_SITE: ${{ secrets.CONFLUENCE_SITE }}
166+
CONFLUENCE_USER_EMAIL_ID: ${{ secrets.CONFLUENCE_USER_EMAIL_ID }}
167+
CONFLUENCE_USER_TOKEN: ${{ secrets.CONFLUENCE_USER_TOKEN }}
168+
SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK_URL }}
169+
```
170+
171+
In the `on` section, you specify events can cause the workflow to run. In the above example, the job is only allowed to execute if something is pushed to the `master` branch.
172+
173+
The variables referred using `$` are supposed to be created on the repository under `Repository secrets` and `Repository variables` depending on the type of variable from here: `Settings > Security > Secrets and variables > Actions`.
174+
175+
### GitLab CI - Setup Instructions
176+
177+
In order to run it on any GitLab repository, add the following in the `.gitlab-ci.yml` file on root level in the repository:
147178

148179
```
149180
include:
150-
- remote: 'https://raw.githubusercontent.com/abdullahkhawer/find-and-report-secrets-in-code/master/ci/.gitlab-ci.yml'
181+
- remote: 'https://raw.githubusercontent.com/abdullahkhawer/find-and-report-secrets-in-code/master/.gitlab/.gitlab-ci.yml'
151182
152183
stages:
153184
- scan
154185
155-
secrets_detection:
186+
find-and-report-secrets-in-code:
156187
stage: scan
157188
extends:
158189
- .find-secrets:scan
@@ -175,11 +206,17 @@ secrets_detection:
175206

176207
In the `rules` section, you specify rules for execution as `if` conditions. In the above example, the job is only allowed to execute if it is a scheduled job for the `master` branch.
177208

178-
The variables referred using `$` are supposed to be created on the repository under `CI/CD Settings` page.
209+
The variables referred using `$` are supposed to be created on the repository under `CI/CD Variables` from here: `Settings > CI/CD > Variables`.
210+
211+
## Docker Image Details
212+
213+
The Docker image used is built using the Dockerfile that is present in this repository here: [Dockerfile](https://github.com/abdullahkhawer/find-and-report-secrets-in-code/tree/master/docker)
214+
215+
Following build command is used on the root level in the GitHub repository: `docker buildx build --platform linux/amd64 -t "abdullahkhawer/find-and-report-secrets-in-code:latest" --no-cache -f ./docker/Dockerfile .`
179216

180-
The image used in this GitLab CI job is built using the Dockerfile that is present in this repository here: https://github.com/abdullahkhawer/find-and-report-secrets-in-code/tree/master/docker
217+
The image used is publicly available here: [Docker - find-and-report-secrets-in-code](https://hub.docker.com/r/abdullahkhawer/find-and-report-secrets-in-code/)
181218

182-
The image used is publicly available here: https://hub.docker.com/r/abdullahkhawer/find-and-report-secrets-in-code/
219+
For more details, check out its [README](https://github.com/abdullahkhawer/find-and-report-secrets-in-code/blob/master/docker/README.md).
183220

184221
## Notes
185222

docker/README.md

+44-10
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111

1212
# Supported tags and respective `Dockerfile` links
1313

14-
- [`1.2.0`, `latest`](https://github.com/abdullahkhawer/find-and-report-secrets-in-code/blob/v1.2.0/docker/Dockerfile)
14+
- [`1.3.0`, `latest`](https://github.com/abdullahkhawer/find-and-report-secrets-in-code/blob/v1.3.0/docker/Dockerfile)
1515

1616
# Find and Report Secrets in Code
1717

@@ -21,7 +21,7 @@ This repository has a Docker image that finds secrets in a git repository using
2121

2222
❓ Where I can run this?
2323

24-
👉🏻 This Docker image can be executed on any Windows, macOS or Linux system either locally or on a remote server. It can also be executed on a CI/CD pipeline.
24+
This solution can be executed on any macOS or Linux system either locally or on a remote server. It can also be executed on a CI/CD tool like on GitHub Actions, GitLab CI, etc, in a pipeline.
2525

2626
Below you can find an example of the JSON report generated:
2727

@@ -118,20 +118,51 @@ And then simply run the following 4 commands:
118118
- Example: `python3 /find-and-report-secrets-in-code/main.py Europe/Amsterdam my-projects/my-repo master`
119119
- Note: Details about supported time zones and their constant names can be found here: [pypi.org > project > pytz > Helpers](https://pypi.org/project/pytz/#:~:text=through%20multiple%20timezones.-,Helpers,-There%20are%20two)
120120

121-
## Automatically via CI/CD Pipeline
121+
## Automatically via a CI/CD Pipeline
122122

123-
### Setup Instructions
123+
### GitHub Actions - Setup Instructions
124124

125-
In order to run it on any GitLab repository, add the following in the `.gitlab-ci.yml` file that is in the repository:
125+
In order to run it on any GitHub repository, add the following in the `.github-workflow.yml` file under the `.github/workflows/` directory in the repository:
126+
127+
```
128+
name: find-and-report-secrets-in-code
129+
130+
on:
131+
push:
132+
branches:
133+
- master
134+
135+
jobs:
136+
find-and-report-secrets-in-code:
137+
uses: abdullahkhawer/find-and-report-secrets-in-code/.github/workflows/.github-workflow.yml@master
138+
with:
139+
CONFLUENCE_ENABLED: "1"
140+
CONFLUENCE_PAGE_TITLE: ${{ vars.CONFLUENCE_PAGE_TITLE }}
141+
CONFLUENCE_PAGE_SPACE: ${{ vars.CONFLUENCE_PAGE_SPACE }}
142+
SLACK_ENABLED: "1"
143+
secrets:
144+
CONFLUENCE_SITE: ${{ secrets.CONFLUENCE_SITE }}
145+
CONFLUENCE_USER_EMAIL_ID: ${{ secrets.CONFLUENCE_USER_EMAIL_ID }}
146+
CONFLUENCE_USER_TOKEN: ${{ secrets.CONFLUENCE_USER_TOKEN }}
147+
SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK_URL }}
148+
```
149+
150+
In the `on` section, you specify events can cause the workflow to run. In the above example, the job is only allowed to execute if something is pushed to the `master` branch.
151+
152+
The variables referred using `$` are supposed to be created on the repository under `Repository secrets` and `Repository variables` depending on the type of variable from here: `Settings > Security > Secrets and variables > Actions`.
153+
154+
### GitLab CI - Setup Instructions
155+
156+
In order to run it on any GitLab repository, add the following in the `.gitlab-ci.yml` file on root level in the repository:
126157

127158
```
128159
include:
129-
- remote: 'https://raw.githubusercontent.com/abdullahkhawer/find-and-report-secrets-in-code/master/ci/.gitlab-ci.yml'
160+
- remote: 'https://raw.githubusercontent.com/abdullahkhawer/find-and-report-secrets-in-code/master/.gitlab/.gitlab-ci.yml'
130161
131162
stages:
132163
- scan
133164
134-
secrets_detection:
165+
find-and-report-secrets-in-code:
135166
stage: scan
136167
extends:
137168
- .find-secrets:scan
@@ -154,10 +185,13 @@ secrets_detection:
154185

155186
In the `rules` section, you specify rules for execution as `if` conditions. In the above example, the job is only allowed to execute if it is a scheduled job for the `master` branch.
156187

157-
The variables referred using `$` are supposed to be created on the repository under `CI/CD Settings` page.
188+
The variables referred using `$` are supposed to be created on the repository under `CI/CD Variables` from here: `Settings > CI/CD > Variables`.
189+
190+
## Docker Image Details
191+
192+
The Docker image used is built using the Dockerfile that is present in this repository here: [Dockerfile](https://github.com/abdullahkhawer/find-and-report-secrets-in-code/tree/master/docker)
158193

159-
An example of build command is below:
160-
`docker buildx build --platform linux/amd64 -t "abdullahkhawer/find-and-report-secrets-in-code:latest" --no-cache -f ./docker/Dockerfile .`
194+
Following build command is used on the root level in the GitHub repository: `docker buildx build --platform linux/amd64 -t "abdullahkhawer/find-and-report-secrets-in-code:latest" --no-cache -f ./docker/Dockerfile .`
161195

162196
## Notes
163197

0 commit comments

Comments
 (0)