mirror of
https://github.com/trufflesecurity/trufflehog.git
synced 2024-11-10 07:04:24 +00:00
a43d451c4d
* implement analyzer interface for sourcegraph * created permission for sourcegraph test for sourcegraph. added email in resource metadata. * handling of missing keys in map * linked sourcegraph detector to analyzer * update the fullyqualidied name of resource to make it unique. updated the test. * add current user email in metadata --------- Co-authored-by: Abdul Basit <abasit@folio3.com> |
||
---|---|---|
.. | ||
analyzers | ||
config | ||
generate_permissions | ||
pb/analyzerpb | ||
proto | ||
tui | ||
cli.go | ||
README.md |
Implementing Analyzers
Defining the Permissions
Permissions can be defined in:
- lower snake case as
permission_name:access_level
- kebab case as
permission-name:read
- dot notation as
permission.name:read
The Permissions are initially defined as a yaml file.
At the top of the analyzer implementation you specify the go generate command.
You can install the generator with go install github.com/trufflesecurity/trufflehog/v3/pkg/analyzer/generate_permissions
.
Then you can run go generate ./...
to generate the Permission types for the analyzer.
The generated Permission types are to be used in the AnalyzerResult
struct when defining the Permissions
and in your code.