Skip to main content

Set up the Semgrep Network Broker

The Semgrep Network Broker facilitates secure access between Semgrep and your private network. It accomplishes this by establishing a WireGuard VPN tunnel with the Semgrep infrastructure, then proxying inbound HTTP requests from Semgrep to your network through this tunnel. This approach allows Semgrep to interact with on-premise resources without exposing them to the public internet.

Examples of inbound traffic include:

  • Pull request (PR) or merge request (MR) comments
  • Webhooks
Tier availability

The Semgrep Network Broker is available to Enterprise tier users.

Prerequisites and feature availability

  • The Semgrep Network Broker is a feature that must be enabled in your Semgrep organization (org) before setup. It is only available to paying customers. Contact the Semgrep support team to discuss having it enabled for your organization.
    • If you will be using the broker with a dedicated Semgrep tenant, please note that in your request.
  • Docker must be installed on the server where you install the network broker.
  • Ensure that you allocate at least 1 CPU and 512 MB RAM for each instance of Semgrep Network Broker that you run.

Configure Semgrep Network Broker

Ensure that you are logged in to the server where you want to run Semgrep Network Broker. Complete the following steps while logged in to that server.

Create the config file

Create a config.yaml file similar to the following snippet, or copy a starting config from the Semgrep AppSec Platform at Settings > Broker. The steps required to generate values for the placeholders SEMGREP_LOCAL_ADDRESS, YOUR_PRIVATE_KEY, and YOUR_BASE_URL are provided in subsequent steps of this guide.

  inbound:
wireguard:
localAddress: SEMGREP_LOCAL_ADDRESS
privateKey: YOUR_PRIVATE_KEY
peers:
- publicKey: 4EqJwDZ8X/qXB5u3Wpo2cxnKlysec93uhRvGWPix0lg=
endpoint: wireguard.semgrep.dev:51820
allowedIps: fdf0:59dc:33cf:9be9:0000:0000:0000:0001/128
heartbeat:
url: http://[fdf0:59dc:33cf:9be9:0000:0000:0000:0001]/ping
allowlist: []
gitlab:
baseUrl: YOUR_BASE_URL
token: GITLAB_PAT

The publicKey value should be entered precisely as shown in the example:

4EqJwDZ8X/qXB5u3Wpo2cxnKlysec93uhRvGWPix0lg=

Multiple configuration files

You can overlay multiple configuration files on top of each other by passing multiple -c arguments:

semgrep-network-broker -c config1.yaml -c config2.yaml -c config3.yaml

Note that arrays are replaced, while maps are merged.

Generate a keypair

The broker requires a WireGuard keypair to establish a secure connection. To generate your private key to replace YOUR_PRIVATE_KEY in the config template:

  1. Determine the network broker version you want to use. The format should be similar to v0.22.0. Most users should use the latest version, especially when setting up the broker for the first time.
  2. Run the following command in the CLI to generate your private key, replacing the placeholder with the network broker version number:
    docker run ghcr.io/semgrep/semgrep-network-broker:VERSION_NUMBER genkey
  3. Run the following command in the CLI to generate your public key, replacing the placeholders with your private key generated in the previous step and the network broker version number:
echo YOUR_PRIVATE_KEY | sudo docker run -i ghcr.io/semgrep/semgrep-network-broker:VERSION_NUMBER pubkey
Key sharing

Your public key is safe to share. Do not share your private key with anyone, including Semgrep.

Update the config with the keypair

  1. Update the config.yaml file by replacing YOUR_PRIVATE_KEY with the value of your private key.
  2. Add your public key to the Semgrep AppSec Platform:
    1. Log in to Semgrep AppSec Platform.
    2. Navigate to Settings > Broker.
    3. Paste your public key and click Add Public Key. Screenshot of Semgrep AppSec Platform's Network Broker page

Update the config with your SCM information

Update the config.yaml by replacing the SCM information containing YOUR_BASE_URL with your SCM and its base URL, for GitHub, GitLab, or Bitbucket Data Center.

github:   baseURL: https://GITHUB_BASE_URL/api/v3   token: GITHUB_PAT

Add your local address to the config

  1. Convert your organization ID to hexadecimal. The organization ID is found in the Identifiers section of the Settings' Deployment page in Semgrep AppSec Platform. You may also hear this called a deployment ID. You can use a tool such as Decimal to Hexadecimal converter to perform the conversion if needed.
  2. Embed the resulting hexadecimal value in the string fdf0:59dc:33cf:9be8:0:ORGANIZATION_ID:0:1, replacing ORGANIZATION_ID with the value.
  3. Update the localAddress field of config.yaml, replacing SEMGREP_LOCAL_ADDRESS with the string you generated in Step 2.
inbound:
wireguard:
localAddress: fdf0:59dc:33cf:9be8:0:ORGANIZATION_ID:0:1

Start the broker

Run the following command to start Semgrep Network Broker with your completed configuration file:

sudo docker run -d -it --rm -v $(pwd):/emt ghcr.io/semgrep/semgrep-network-broker:VERSION_NUMBER -c /emt/config.yaml

Check Semgrep Network Broker logs

You can check the logs for Semgrep Network Broker by running:

sudo docker logs CONTAINER_ID

Adjusting log verbosity

The Semgrep Network broker can log details of the proxied requests and responses for troubleshooting. Normally, these should only be collected when working to identify an issue. If requests and responses are large, they can occupy significant memory in the tunnel.

To log additional details, add this snippet to your broker configuration:

inbound:
logging:
logRequestBody: true
logResponseBody: true

In the logs, this leads to entries for proxy.request and proxy.response.

These values can also be set on a per-allowlist basis:

inbound:
allowlist:
- url: https://httpbin.org/*
methods: [GET, POST]
logRequestBody: true
logResponseBody: true

This provides additional flexibility when troubleshooting. See the broker README for more details.

Enable verbose WireGuard logging

To troubleshoot connection issues potentially related to the WireGuard configuration, you can enable verbose logging by adding the following snippet to the broker configuration:

inbound:
wireguard:
verbose: true

Use Semgrep Network Broker with Managed Scans

Semgrep Managed Scans uses Semgrep Network Broker to connect to your internal source code management instance.

To enable Managed Scans when using Network Broker, ensure that you've updated your SCM information to allow code access:

github:   baseURL: https://GITHUB_BASE_URL/api/v3   token: GITHUB_PAT   allowCodeAccess: true

To clone repositories for scanning from any organization or group, the URL allowlist must include the base URL of your instance. For example, if your source code manager is at https://git.example.com/, the following allowlist will permit cloning repositories:

inbound:
allowlist:
# allow GET requests from https://git.example.com/*
- url: https://git.example.com/*
methods: [GET, POST]

Semgrep also creates and updates GitHub Checks when performing Managed Scans on pull requests. To ensure checks can be both created and updated, add the PATCH method to the preceding allowlist example, or add a separate entry to allowlist check updates:

inbound:
allowlist:
# allow PATCH requests to update checks
- url: https://git.example.com/api/v3/repos/:owner/:repo/check-runs/:id
methods: [GET, POST, PATCH]

Run multiple instances of the Semgrep Network Broker

You can run multiple instances of the Semgrep Network Broker to manage availability. Semgrep handles multiple requests accordingly, preventing issues like duplicate PR or MR comments.

Each Semgrep deployment requires and accepts exactly one configuration file. If you run multiple instances of the Semgrep Network Broker, each associated with the same deployment uses the same configuration file.

You can define multiple source code managers (SCM) within a single configuration file. One entry for a given SCM uses the SCM-specific key provided in the configuration file, as shown in the following example for a GitHub connection:

github:   baseURL: https://GITHUB_BASE_URL/api/v3   token: GITHUB_PAT

Subsequent entries for the same SCM require you to modify allowlist and add specific information needed for the HTTP requests. The following is a sample allowlist for additional GitHub entries:

allowlist:  - url: https://GITHUB_BASE_URL/api/v3/repos/:owner/:repo    methods: [GET]    setRequestHeaders:     Authorization: "Bearer GITHUB_PAT"  - url: https://GITHUB_BASE_URL/api/v3/repos/:owner/:repo/pulls    methods: [GET]    setRequestHeaders:     Authorization: "Bearer GITHUB_PAT"  - url: https://GITHUB_BASE_URL/api/v3/repos/:owner/:repo/pulls/:number/comments    methods: [POST]    setRequestHeaders:     Authorization: "Bearer GITHUB_PAT"  - url: https://GITHUB_BASE_URL/api/v3/:owner/:repo/issues/:number/comments    methods: [POST]    setRequestHeaders:     Authorization: "Bearer GITHUB_PAT"  ...

You may see some noise in your logs when using multiple Network Broker instances since the Broker hasn't been architected yet for this specific configuration.


Not finding what you need in this doc? Ask questions in our Community Slack group, or see Support for other ways to get help.