-
Notifications
You must be signed in to change notification settings - Fork 0
/
Makefile
218 lines (181 loc) · 8.67 KB
/
Makefile
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
MAKEFLAGS += --warn-undefined-variables
SHELL = /bin/bash
CONTAINER_REGISTRY = icr.io
IBM_CLOUD_REGION = us-east
SKAFFOLD_VERBOSITY ?= info
TEST_DB_CONTAINER_NAME ?= gd_test_postgres
TEST_SECRET_BASE_DIR ?= ./temp
TEST_SECRET_COMMENT ?= unit test
GD_PUB_KEY_FILENAME := $(TEST_SECRET_BASE_DIR)/test.key.pub
GD_PRI_KEY_FILENAME := $(TEST_SECRET_BASE_DIR)/test.key
GD_DC_IV_FILENAME := $(TEST_SECRET_BASE_DIR)/dc_iv_file
GD_DC_KEY_FILENAME := $(TEST_SECRET_BASE_DIR)/dc_key_file
GD_HMAC_KEY_FILENAME := $(TEST_SECRET_BASE_DIR)/test-hmac.key
APP_PRIVATE_KEY_FILENAME := $(TEST_SECRET_BASE_DIR)/test-app.key
GHE_REVOCATION_TOKEN_FILENAME := $(TEST_SECRET_BASE_DIR)/test_ghe_revocation_token
GD_IAM_CONF_FILENAME := $(TEST_SECRET_BASE_DIR)/test_iam.conf
GD_GITHUB_CONF =$(TEST_SECRET_BASE_DIR)/github.conf
GD_REVOKER_URLS_CONF := $(TEST_SECRET_BASE_DIR)/test_revoker_urls.conf
GD_EMAIL_CONF := $(TEST_SECRET_BASE_DIR)/email.conf
APP_ID = 0
DAYS_SINCE_REMEDIATION_TO_DELETE = 7
TEST_ENV_VARS := GD_DC_KEY_FILENAME=$(GD_DC_KEY_FILENAME) \
GD_DC_IV_FILENAME=$(GD_DC_IV_FILENAME) \
GD_PUB_KEY_FILENAME=$(GD_PUB_KEY_FILENAME) \
GD_PRI_KEY_FILENAME=$(GD_PRI_KEY_FILENAME) \
GD_HMAC_KEY_FILENAME=$(GD_HMAC_KEY_FILENAME) \
APP_PRIVATE_KEY_FILENAME=$(APP_PRIVATE_KEY_FILENAME) \
APP_ID=$(APP_ID) \
GHE_REVOCATION_TOKEN_FILENAME=$(GHE_REVOCATION_TOKEN_FILENAME) \
GD_IAM_CONF_FILENAME=$(GD_IAM_CONF_FILENAME) \
DAYS_SINCE_REMEDIATION_TO_DELETE=$(DAYS_SINCE_REMEDIATION_TO_DELETE) \
GD_GITHUB_CONF=${GD_GITHUB_CONF} \
GD_REVOKER_URLS_CONF=$(GD_REVOKER_URLS_CONF) \
GD_EMAIL_CONF=${GD_EMAIL_CONF}
COVERAGE := pipenv run coverage
# Only set if not defined
VERSION ?= dev
# Docker related
DOCKER_REGISTRY_ICR := icr.io
DOCKER_USER_ICR := iamapikey
DOCKER_PASS_ICR := $(IBM_CLOUD_API_KEY)
# Trivy related
TRIVY ?= trivy
TRIVY_VERSION := $(shell curl -s "https://api.github.com/repos/aquasecurity/trivy/releases/latest" | grep '"tag_name":' | sed -E 's/.*"v([^"]+)".*/\1/')
TRIVY_OS := $(shell uname | sed 's/Darwin/macOS/' )
TRIVY_ARCH := $(shell uname -m | cut -d_ -f2 )
# Cosign related
COSIGN ?= /tmp/cosign
COSIGN_VERSION := $(shell curl -s "https://api.github.com/repos/sigstore/cosign/releases/latest" | grep '"tag_name":' | sed -E 's/.*"v([^"]+)".*/\1/')
.PHONY: setup-trivy
setup-trivy:
curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/master/contrib/install.sh | sudo sh -s -- -b /usr/local/bin
ifdef TRAVIS
# Scanning Redhat / centOS images requires rpm
sudo apt update && sudo apt install rpm -y
endif
.PHONY: setup-cosign
setup-cosign:
curl -sSfL https://github.com/sigstore/cosign/releases/download/v$(COSIGN_VERSION)/cosign-linux-amd64 -o $(COSIGN)
chmod +x $(COSIGN)
.PHONY: setup-deploy-tools
setup-deploy-tools:
curl -Lo container-structure-test https://storage.googleapis.com/container-structure-test/latest/container-structure-test-$(shell uname | tr '[:upper:]' '[:lower:]')-amd64 && sudo install container-structure-test /usr/local/bin/
container-structure-test version
curl -Lo skaffold https://storage.googleapis.com/skaffold/releases/latest/skaffold-linux-amd64 && sudo install skaffold /usr/local/bin/
skaffold version
curl -s "https://raw.githubusercontent.com/kubernetes-sigs/kustomize/master/hack/install_kustomize.sh" | bash
sudo install kustomize /usr/local/bin/
kustomize version
.PHONY: setup
setup: setup-trivy setup-cosign setup-deploy-tools
pip install --upgrade pip
pip install "setuptools>=65.5.1" pipenv
PIP_IGNORE_INSTALLED=1 pipenv install --dev --deploy --ignore-pipfile
# download and install a few ibm cloud cli tools
curl -fsSL https://clis.cloud.ibm.com/install/linux | sh
ibmcloud -v
ibmcloud plugin install container-service -f
ibmcloud plugin install container-registry
.PHONY: start-local-test-db
start-local-test-db: stop-local-test-db
docker run -p 54320:5432 -d --name $(TEST_DB_CONTAINER_NAME) -e POSTGRES_HOST_AUTH_METHOD=trust postgres:10
@echo "username/password: postgres/postgres"
.PHONY: stop-local-test-db
stop-local-test-db:
docker ps | grep $(TEST_DB_CONTAINER_NAME) && docker stop $(TEST_DB_CONTAINER_NAME) || true
docker ps -a | grep $(TEST_DB_CONTAINER_NAME) && docker rm -f $(TEST_DB_CONTAINER_NAME) || true
.PHONY: create-unit-test-secrets
create-unit-test-secrets: create-common-test-secrets
yes | ssh-keygen -q -t rsa -f "$(APP_PRIVATE_KEY_FILENAME)" -N "" -C "$(TEST_SECRET_COMMENT)" -m pem
echo "test-token-12345" > "$(GHE_REVOCATION_TOKEN_FILENAME)"
printf "[iam]\nadmin_apikey = testnotarealtoken123456789" >> "$(GD_IAM_CONF_FILENAME)"
printf "[github]\ntokens = someRandomTestToken1,someRandomTestToken2,someRandomTestToken3\nhost = github.company.com\nadmin_config = https://%%(host)s/api/v3/repos/admin-org/admin-repo/contents/org_set_config" >> "$(GD_GITHUB_CONF)"
printf "[revoker-urls]\nartifactory-revocation = http://test\nartifactory-owner-resolution = http://test\ngithub-revocation = http://test\ngithub-owner-resolution = http://test" >> "$(GD_REVOKER_URLS_CONF)"
printf "[email]\ninternal_email_regex = [A-Z0-9.\-_]+@([A-Z0-9]+\.)*(test.test)$$" >> $(GD_EMAIL_CONF)
.PHONY: create-common-test-secrets
create-common-test-secrets:
rm -rf $(TEST_SECRET_BASE_DIR)
mkdir -p $(TEST_SECRET_BASE_DIR)
yes | ssh-keygen -q -t rsa -f "$(GD_PRI_KEY_FILENAME)" -N "" -C "$(TEST_SECRET_COMMENT)" -m pem
ssh-keygen -f "$(GD_PRI_KEY_FILENAME)" -e -m pem > "$(GD_PUB_KEY_FILENAME)"
cat /dev/random | head -n 256 > "$(GD_HMAC_KEY_FILENAME)"
dd if=/dev/urandom of=$(GD_DC_KEY_FILENAME) bs=1 count=32
dd if=/dev/urandom of=$(GD_DC_IV_FILENAME) bs=1 count=16
.PHONY: test-unit-%
# test-unit-<folder_name_under_detect_secrets_stream> to test just the code under specific folder
test-unit-%: create-unit-test-secrets
$(TEST_ENV_VARS) $(COVERAGE) run -m pytest detect_secrets_stream/$*
$(COVERAGE) report --include=detect_secrets_stream/$*/* --show-missing
.PHONY: test-unit
test-unit: create-unit-test-secrets start-local-test-db
@$(TEST_ENV_VARS) $(COVERAGE) run -a -m pytest detect_secrets_stream
.PHONY: coverage-cleanup
coverage-cleanup:
$(COVERAGE) erase
.PHONY: coverage-report
coverage-report:
$(COVERAGE) report --include='detect_secrets_stream/*' --show-missing --fail-under 90
.PHONY: test
test: coverage-cleanup test-unit coverage-report
.PHONY: cleanup-test
cleanup-test: stop-local-test-db
.PHONY: quality
quality:
ifdef TRAVIS
pipenv clean --dry-run
pipenv clean
endif
# ignore 41002: coverage <6.0b1 resolved (5.5 installed)! it's part of pytest-cov
# which does not have a version containing the fix.
pipenv check --ignore 41002 --ignore 51499
pre-commit run --all-files --show-diff-on-failure
.PHONY: start-db_metrics
start-db_metrics:
@pipenv run python -m detect_secrets_stream.sql_exporter.db_metrics
.PHONY: start-scan_worker
start-scan_worker:
@pipenv run python -m detect_secrets_stream.scan_worker.app
.PHONY: login
login:
ifndef IBM_CLOUD_API_KEY
$(error env var IBM_CLOUD_API_KEY is not set)
endif
# login to ibm cloud
@ibmcloud login --apikey $(IBM_CLOUD_API_KEY) -a https://cloud.ibm.com -r $(IBM_CLOUD_REGION)
# login to the docker registry
@echo $(IBM_CLOUD_API_KEY) | docker login -u iamapikey --password-stdin $(CONTAINER_REGISTRY)
# login to cr and set region
@ibmcloud cr region-set global
@ibmcloud cr login
# login to cosign
@echo $(DOCKER_PASS_ICR) | $(COSIGN) login -u $(DOCKER_USER_ICR) --password-stdin $(DOCKER_REGISTRY_ICR)
.PHONY: build-images
build-images:
# Skaffold also invokes container image test with container-structure-test
skaffold build -p build-no-push
.PHONY: quality-images
quality-images:
# Aggregate return code to allow scan all images before existing
rc=0; \
for image in $(shell skaffold build -q --dry-run | jq -r .builds[].tag); do \
$(TRIVY) image --exit-code 1 --ignore-unfixed $${image}; \
rc=$$((rc+$$?)); \
done; \
exit $${rc}
.PHONY: deploy
deploy:
skaffold build
for image in $(shell skaffold build -q --dry-run | jq -r .builds[].tag); do \
@echo "Signing image $${image}"; \
$(COSIGN) sign --key env://COSIGN_PRIVATE_KEY --yes $${image}; \
@echo "Verifying image $${image}; \
$(COSIGN) verify --key env://COSIGN_PUBLIC_KEY $${image}; \
done;
.PHONY: clean
clean:
skaffold delete -p prod
.PHONY: travis-test
travis-test: test quality cleanup-test build-images quality-images
.PHONY: travis-deploy
travis-deploy: login deploy