@ministryofjustice/hmpps-precommit-hooks

0.0.3 • Public • Published

@ministryofjustice/hmpps-precommit-hooks

This package aims to automatically install and configure husky with gitleaks to help catch potential secrets before committing them to github.

Status

This library is currently: ready to adopt. Teams are welcome to use this library. Please provide feedback via slack to the #typescript channel.

Migrating existing projects

Automatically installing the library

The package will self install and initialised by running via npx: npx @ministryofjustice/hmpps-precommit-hooks

Note: The project needs to be initialised before use - solely adding the library will make no difference. Once the project has been initialised, other developers should be able to develop against it without further configuration.

How this works

Initialising will add new precommit scripts and a new prepare script in package.json:

"scripts": {
     //...
    "prepare": "hmpps-precommit-hooks",
    "precommit:secrets": "gitleaks git --pre-commit --redact --staged --verbose",
    "precommit:lint": "node_modules/.bin/lint-staged",
    "precommit:verify": "npm run typecheck && npm test"
}

It will also configure a husky precommit hook using these scripts:

#!/bin/bash
NODE_ENV=dev \
npm run precommit:secrets \
&& npm run precommit:lint \
&& npm run precommit:verify

The prepare script will trigger on any install and ensure that gitleaks is installed and husky is initiated.

Note: gitleaks is installed by brew, if brew is not available then prepare will currently fail loudly and display a message.

Prevent precommit script initialising on prepare

To disable the tool running on npm install and initialising husky and installing gitleaks, you can pass the SKIP_PRECOMMIT_INIT=true env var.

Dealing with false positives

When a secret is detected, gitleaks will create a fingerprint. If the secret is a false positive then this can be added to the ./gitleaks/.gitleaksignore to exclude from future scans.

Alternatively you can add a gitleaks:allow comment to a line to ignore a secret on it. Eg:

my_secret = 'some-secret'  #gitleaks:allow

Adding custom rules

HMPPS wide rules can be added to .config.toml in this project so that it can be picked up by teams when they upgrade to the next released version of this library.

Repo specific rules can be added by teams in .gitleaks/config.toml in their individual repos.

See the gitleaks documentation for how to create rules and examples or use the online rule wizard.

Testing that hooks are configured correctly

Secret protection can be tested using the following command:

npx -p @ministryofjustice/hmpps-precommit-hooks -c test-secret-protection

This should fail similarly to:

> npx -p @ministryofjustice/hmpps-precommit-hooks -c test-secret-protection
Creating test file containing dummy AWS_KEY=AKIA<SOME-VALUE>ASD
Attempting to commit file containing secret

> some-project@0.0.1 precommit:secrets
> gitleaks git --pre-commit --redact --staged --verbose


    ○
    │╲
    │ ○
    ○ ░
    ░    gitleaks

Finding:     fake_aws_key=REDACTED
Secret:      REDACTED
RuleID:      aws-access-token
Entropy:     3.546439
File:        demo-password.txt
Line:        1
Fingerprint: demo-password.txt:aws-access-token:1

12:49PM INF 1 commits scanned.
12:49PM INF scanned ~34 bytes (34 bytes) in 20.7ms
12:49PM WRN leaks found: 1

(This will create a ./demo-password.txt file that will need to be deleted separately)

Readme

Keywords

Package Sidebar

Install

npm i @ministryofjustice/hmpps-precommit-hooks

Weekly Downloads

501

Version

0.0.3

License

MIT

Unpacked Size

9.53 kB

Total Files

8

Last publish

Collaborators

  • paulmassey
  • moj-igor
  • jbrightonmoj
  • andrewrlee
  • paulusp_moj
  • carloveo-moj