4bc8701fc0
Signed-off-by: Antonio Murdaca <runcom@redhat.com>
198 lines
6.9 KiB
Go
198 lines
6.9 KiB
Go
package docker
|
|
|
|
import (
|
|
"fmt"
|
|
"io/ioutil"
|
|
"net/url"
|
|
"os"
|
|
"path"
|
|
"path/filepath"
|
|
"strings"
|
|
|
|
"github.com/ghodss/yaml"
|
|
|
|
"github.com/Sirupsen/logrus"
|
|
"github.com/containers/image/types"
|
|
)
|
|
|
|
// systemRegistriesDirPath is the path to registries.d, used for locating lookaside Docker signature storage.
|
|
// You can override this at build time with
|
|
// -ldflags '-X github.com/containers/image/docker.systemRegistriesDirPath=$your_path'
|
|
var systemRegistriesDirPath = builtinRegistriesDirPath
|
|
|
|
// builtinRegistriesDirPath is the path to registries.d.
|
|
// DO NOT change this, instead see systemRegistriesDirPath above.
|
|
const builtinRegistriesDirPath = "/etc/containers/registries.d"
|
|
|
|
// registryConfiguration is one of the files in registriesDirPath configuring lookaside locations, or the result of merging them all.
|
|
// NOTE: Keep this in sync with docs/registries.d.md!
|
|
type registryConfiguration struct {
|
|
DefaultDocker *registryNamespace `json:"default-docker"`
|
|
// The key is a namespace, using fully-expanded Docker reference format or parent namespaces (per dockerReference.PolicyConfiguration*),
|
|
Docker map[string]registryNamespace `json:"docker"`
|
|
}
|
|
|
|
// registryNamespace defines lookaside locations for a single namespace.
|
|
type registryNamespace struct {
|
|
SigStore string `json:"sigstore"` // For reading, and if SigStoreStaging is not present, for writing.
|
|
SigStoreStaging string `json:"sigstore-staging"` // For writing only.
|
|
}
|
|
|
|
// signatureStorageBase is an "opaque" type representing a lookaside Docker signature storage.
|
|
// Users outside of this file should use configuredSignatureStorageBase and signatureStorageURL below.
|
|
type signatureStorageBase *url.URL // The only documented value is nil, meaning storage is not supported.
|
|
|
|
// configuredSignatureStorageBase reads configuration to find an appropriate signature storage URL for ref, for write access if “write”.
|
|
func configuredSignatureStorageBase(ctx *types.SystemContext, ref dockerReference, write bool) (signatureStorageBase, error) {
|
|
// FIXME? Loading and parsing the config could be cached across calls.
|
|
dirPath := registriesDirPath(ctx)
|
|
logrus.Debugf(`Using registries.d directory %s for sigstore configuration`, dirPath)
|
|
config, err := loadAndMergeConfig(dirPath)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
topLevel := config.signatureTopLevel(ref, write)
|
|
if topLevel == "" {
|
|
return nil, nil
|
|
}
|
|
|
|
url, err := url.Parse(topLevel)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Invalid signature storage URL %s: %v", topLevel, err)
|
|
}
|
|
// FIXME? Restrict to explicitly supported schemes?
|
|
repo := ref.ref.FullName() // Note that this is without a tag or digest.
|
|
if path.Clean(repo) != repo { // Coverage: This should not be reachable because /./ and /../ components are not valid in docker references
|
|
return nil, fmt.Errorf("Unexpected path elements in Docker reference %s for signature storage", ref.ref.String())
|
|
}
|
|
url.Path = url.Path + "/" + repo
|
|
return url, nil
|
|
}
|
|
|
|
// registriesDirPath returns a path to registries.d
|
|
func registriesDirPath(ctx *types.SystemContext) string {
|
|
if ctx != nil {
|
|
if ctx.RegistriesDirPath != "" {
|
|
return ctx.RegistriesDirPath
|
|
}
|
|
if ctx.RootForImplicitAbsolutePaths != "" {
|
|
return filepath.Join(ctx.RootForImplicitAbsolutePaths, systemRegistriesDirPath)
|
|
}
|
|
}
|
|
return systemRegistriesDirPath
|
|
}
|
|
|
|
// loadAndMergeConfig loads configuration files in dirPath
|
|
func loadAndMergeConfig(dirPath string) (*registryConfiguration, error) {
|
|
mergedConfig := registryConfiguration{Docker: map[string]registryNamespace{}}
|
|
dockerDefaultMergedFrom := ""
|
|
nsMergedFrom := map[string]string{}
|
|
|
|
dir, err := os.Open(dirPath)
|
|
if err != nil {
|
|
if os.IsNotExist(err) {
|
|
return &mergedConfig, nil
|
|
}
|
|
return nil, err
|
|
}
|
|
configNames, err := dir.Readdirnames(0)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
for _, configName := range configNames {
|
|
if !strings.HasSuffix(configName, ".yaml") {
|
|
continue
|
|
}
|
|
configPath := filepath.Join(dirPath, configName)
|
|
configBytes, err := ioutil.ReadFile(configPath)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
var config registryConfiguration
|
|
err = yaml.Unmarshal(configBytes, &config)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Error parsing %s: %v", configPath, err)
|
|
}
|
|
|
|
if config.DefaultDocker != nil {
|
|
if mergedConfig.DefaultDocker != nil {
|
|
return nil, fmt.Errorf(`Error parsing signature storage configuration: "default-docker" defined both in "%s" and "%s"`,
|
|
dockerDefaultMergedFrom, configPath)
|
|
}
|
|
mergedConfig.DefaultDocker = config.DefaultDocker
|
|
dockerDefaultMergedFrom = configPath
|
|
}
|
|
|
|
for nsName, nsConfig := range config.Docker { // includes config.Docker == nil
|
|
if _, ok := mergedConfig.Docker[nsName]; ok {
|
|
return nil, fmt.Errorf(`Error parsing signature storage configuration: "docker" namespace "%s" defined both in "%s" and "%s"`,
|
|
nsName, nsMergedFrom[nsName], configPath)
|
|
}
|
|
mergedConfig.Docker[nsName] = nsConfig
|
|
nsMergedFrom[nsName] = configPath
|
|
}
|
|
}
|
|
|
|
return &mergedConfig, nil
|
|
}
|
|
|
|
// config.signatureTopLevel returns an URL string configured in config for ref, for write access if “write”.
|
|
// (the top level of the storage, namespaced by repo.FullName etc.), or "" if no signature storage should be used.
|
|
func (config *registryConfiguration) signatureTopLevel(ref dockerReference, write bool) string {
|
|
if config.Docker != nil {
|
|
// Look for a full match.
|
|
identity := ref.PolicyConfigurationIdentity()
|
|
if ns, ok := config.Docker[identity]; ok {
|
|
logrus.Debugf(` Using "docker" namespace %s`, identity)
|
|
if url := ns.signatureTopLevel(write); url != "" {
|
|
return url
|
|
}
|
|
}
|
|
|
|
// Look for a match of the possible parent namespaces.
|
|
for _, name := range ref.PolicyConfigurationNamespaces() {
|
|
if ns, ok := config.Docker[name]; ok {
|
|
logrus.Debugf(` Using "docker" namespace %s`, name)
|
|
if url := ns.signatureTopLevel(write); url != "" {
|
|
return url
|
|
}
|
|
}
|
|
}
|
|
}
|
|
// Look for a default location
|
|
if config.DefaultDocker != nil {
|
|
logrus.Debugf(` Using "default-docker" configuration`)
|
|
if url := config.DefaultDocker.signatureTopLevel(write); url != "" {
|
|
return url
|
|
}
|
|
}
|
|
logrus.Debugf(" No signature storage configuration found for %s", ref.PolicyConfigurationIdentity())
|
|
return ""
|
|
}
|
|
|
|
// ns.signatureTopLevel returns an URL string configured in ns for ref, for write access if “write”.
|
|
// or "" if nothing has been configured.
|
|
func (ns registryNamespace) signatureTopLevel(write bool) string {
|
|
if write && ns.SigStoreStaging != "" {
|
|
logrus.Debugf(` Using %s`, ns.SigStoreStaging)
|
|
return ns.SigStoreStaging
|
|
}
|
|
if ns.SigStore != "" {
|
|
logrus.Debugf(` Using %s`, ns.SigStore)
|
|
return ns.SigStore
|
|
}
|
|
return ""
|
|
}
|
|
|
|
// signatureStorageURL returns an URL usable for acessing signature index in base with known manifestDigest, or nil if not applicable.
|
|
// Returns nil iff base == nil.
|
|
func signatureStorageURL(base signatureStorageBase, manifestDigest string, index int) *url.URL {
|
|
if base == nil {
|
|
return nil
|
|
}
|
|
url := *base
|
|
url.Path = fmt.Sprintf("%s@%s/signature-%d", url.Path, manifestDigest, index+1)
|
|
return &url
|
|
}
|