@ministryofjustice/hmpps-precommit-hooks v0.0.2
@ministryofjustice/hmpps-precommit-hooks
This package aims to automatically install and configure husky with gitleaks to help catch potential secrets before committing them to github.
Status
This library is currently: ready to adopt.
Teams are welcome to use this library. Please provide feedback via slack to the #typescript channel.
Migrating existing projects
Automatically installing the library
The package will self install and initialised by running via npx:
npx @ministryofjustice/hmpps-precommit-hooks
Note: The project needs to be initialised before use - solely adding the library will make no difference. Once the project has been initialised, other developers should be able to develop against it without further configuration.
How this works
Initialising will add new precommit scripts and a new prepare script in package.json:
"scripts": {
//...
"prepare": "hmpps-precommit-hooks",
"precommit:secrets": "gitleaks git --pre-commit --redact --staged --verbose",
"precommit:lint": "node_modules/.bin/lint-staged",
"precommit:verify": "npm run typecheck && npm test"
}It will also configure a husky precommit hook using these scripts:
#!/bin/bash
NODE_ENV=dev \
npm run precommit:secrets \
&& npm run precommit:lint \
&& npm run precommit:verifyThe prepare script will trigger on any install and ensure that gitleaks is installed and husky is initiated.
Note: gitleaks is installed by brew, if brew is not available then prepare will currently fail loudly and display a message.
Prevent precommit script initialising on prepare
To disable the tool running on npm install and initialising husky and installing gitleaks, you can pass the SKIP_PRECOMMIT_INIT=true env var.
Dealing with false positives
When a secret is detected, gitleaks will create a fingerprint. If the secret is a false positive then this can be added to the ./gitleaks/.gitleaksignore to exclude from future scans.
Alternatively you can add a gitleaks:allow comment to a line to ignore a secret on it. Eg:
my_secret = 'some-secret' #gitleaks:allowAdding custom rules
HMPPS wide rules can be added to .config.toml in this project so that it can be picked up by teams when they upgrade to the next released version of this library.
Repo specific rules can be added by teams in .gitleaks/config.toml in their individual repos.
See the gitleaks documentation for how to create rules and examples or use the online rule wizard.
Testing that hooks are configured correctly
Secret protection can be tested using the following command:
npx -p @ministryofjustice/hmpps-precommit-hooks -c test-secret-protectionThis should fail similarly to:
> npx -p @ministryofjustice/hmpps-precommit-hooks -c test-secret-protection
Creating test file containing dummy AWS_KEY=AKIA<SOME-VALUE>ASD
Attempting to commit file containing secret
> some-project@0.0.1 precommit:secrets
> gitleaks git --pre-commit --redact --staged --verbose
○
│╲
│ ○
○ ░
░ gitleaks
Finding: fake_aws_key=REDACTED
Secret: REDACTED
RuleID: aws-access-token
Entropy: 3.546439
File: demo-password.txt
Line: 1
Fingerprint: demo-password.txt:aws-access-token:1
12:49PM INF 1 commits scanned.
12:49PM INF scanned ~34 bytes (34 bytes) in 20.7ms
12:49PM WRN leaks found: 1(This will create a ./demo-password.txt file that will need to be deleted separately)
5 months ago
5 months ago
5 months ago
5 months ago
5 months ago
5 months ago