2017-04-05 14:03:27 +00:00
|
|
|
import logging
|
2017-04-19 17:51:13 +00:00
|
|
|
|
|
|
|
from abc import ABCMeta, abstractmethod
|
|
|
|
from six import add_metaclass
|
2017-04-05 14:03:27 +00:00
|
|
|
from urlparse import urljoin
|
2017-04-12 18:43:19 +00:00
|
|
|
from posixpath import join
|
2017-04-05 14:03:27 +00:00
|
|
|
|
|
|
|
import requests
|
|
|
|
|
|
|
|
from data.database import CloseForLongOperation
|
2017-04-19 17:51:13 +00:00
|
|
|
from util.abchelpers import nooper
|
2017-04-05 14:03:27 +00:00
|
|
|
from util.failover import failover, FailoverException
|
|
|
|
from util.security.instancekeys import InstanceKeys
|
|
|
|
from util.security.registry_jwt import build_context_and_subject, generate_bearer_token, QUAY_TUF_ROOT
|
|
|
|
|
|
|
|
|
|
|
|
DEFAULT_HTTP_HEADERS = {'Connection': 'close'}
|
|
|
|
MITM_CERT_PATH = '/conf/mitm.cert'
|
|
|
|
TOKEN_VALIDITY_LIFETIME_S = 60 * 60 # 1 hour
|
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
|
|
|
class InvalidMetadataException(Exception):
|
|
|
|
""" Exception raised when the upstream API metadata that doesn't parse correctly. """
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
|
|
class Non200ResponseException(Exception):
|
|
|
|
""" Exception raised when the upstream API returns a non-200 HTTP status code. """
|
|
|
|
def __init__(self, response):
|
|
|
|
super(Non200ResponseException, self).__init__()
|
|
|
|
self.response = response
|
|
|
|
|
|
|
|
|
|
|
|
class TUFMetadataAPI(object):
|
2017-04-19 17:51:13 +00:00
|
|
|
""" Helper class for talking to the Security Scan service (usually Clair). """
|
|
|
|
def __init__(self, app, config, client=None):
|
|
|
|
feature_enabled = config.get('FEATURE_SIGNING', False)
|
|
|
|
if feature_enabled:
|
|
|
|
self.state = ImplementedTUFMetadataAPI(app, config, client=client)
|
|
|
|
else:
|
|
|
|
self.state = NoopTUFMetadataAPI()
|
|
|
|
|
|
|
|
def __getattr__(self, name):
|
|
|
|
return getattr(self.state, name, None)
|
|
|
|
|
|
|
|
|
|
|
|
@add_metaclass(ABCMeta)
|
|
|
|
class TUFMetadataAPIInterface(object):
|
2017-04-05 14:03:27 +00:00
|
|
|
""" Helper class for talking to the TUF Metadata service (Apostille). """
|
2017-04-19 17:51:13 +00:00
|
|
|
|
|
|
|
@abstractmethod
|
|
|
|
def get_default_tags_with_expiration(self, namespace, repository, targets_file=None):
|
|
|
|
"""
|
|
|
|
Gets the tag -> sha mappings for a repo, as well as the expiration of the signatures.
|
|
|
|
Does not verify the metadata, this is purely for display purposes.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
namespace: namespace containing the repository
|
|
|
|
repository: the repo to get tags for
|
|
|
|
targets_file: the specific delegation to read from. Default: targets/releases.json
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
targets, expiration or None, None
|
|
|
|
"""
|
|
|
|
pass
|
|
|
|
|
2017-05-15 20:18:30 +00:00
|
|
|
@abstractmethod
|
|
|
|
def get_all_tags_with_expiration(self, namespace, repository, targets_file=None, targets_map=None):
|
|
|
|
"""
|
|
|
|
Gets the tag -> sha mappings of all delegations for a repo, as well as the expiration of the signatures.
|
|
|
|
Does not verify the metadata, this is purely for display purposes.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
namespace: namespace containing the repository
|
|
|
|
repository: the repo to get tags for
|
|
|
|
targets_file: the specific target or delegation to read from. Default: targets.json
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
targets
|
|
|
|
"""
|
|
|
|
pass
|
|
|
|
|
2017-04-19 17:51:13 +00:00
|
|
|
@abstractmethod
|
|
|
|
def delete_metadata(self, namespace, repository):
|
|
|
|
"""
|
|
|
|
Deletes the TUF metadata for a repo
|
|
|
|
|
|
|
|
Args:
|
|
|
|
namespace: namespace containing the repository
|
|
|
|
repository: the repo to delete metadata for
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
True if successful, False otherwise
|
|
|
|
"""
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
|
|
@nooper
|
|
|
|
class NoopTUFMetadataAPI(TUFMetadataAPIInterface):
|
|
|
|
""" No-op version of the TUF API. """
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
|
|
class ImplementedTUFMetadataAPI(TUFMetadataAPIInterface):
|
2017-04-05 14:03:27 +00:00
|
|
|
def __init__(self, app, config, client=None):
|
|
|
|
self._app = app
|
|
|
|
self._instance_keys = InstanceKeys(app)
|
|
|
|
self._config = config
|
|
|
|
self._client = client or config['HTTPCLIENT']
|
2017-04-11 18:43:32 +00:00
|
|
|
self._gun_prefix = config['TUF_GUN_PREFIX'] or config['SERVER_HOSTNAME']
|
2017-04-05 14:03:27 +00:00
|
|
|
|
2017-04-07 20:12:28 +00:00
|
|
|
def get_default_tags_with_expiration(self, namespace, repository, targets_file=None):
|
2017-04-05 14:03:27 +00:00
|
|
|
"""
|
2017-04-11 18:43:32 +00:00
|
|
|
Gets the tag -> sha mappings for a repo, as well as the expiration of the signatures.
|
|
|
|
Does not verify the metadata, this is purely for display purposes.
|
2017-04-19 17:51:13 +00:00
|
|
|
|
2017-04-11 18:43:32 +00:00
|
|
|
Args:
|
|
|
|
namespace: namespace containing the repository
|
|
|
|
repository: the repo to get tags for
|
|
|
|
targets_file: the specific delegation to read from. Default: targets/releases.json
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
targets, expiration or None, None
|
|
|
|
"""
|
2017-04-19 17:51:13 +00:00
|
|
|
|
2017-04-07 20:12:28 +00:00
|
|
|
if not targets_file:
|
|
|
|
targets_file = 'targets/releases.json'
|
2017-04-19 17:51:13 +00:00
|
|
|
|
2017-05-15 20:18:30 +00:00
|
|
|
signed = self._get_signed(namespace, repository, targets_file)
|
|
|
|
if not signed:
|
2017-04-19 17:51:13 +00:00
|
|
|
return None, None
|
|
|
|
|
2017-05-15 20:18:30 +00:00
|
|
|
return signed.get('targets'), signed.get('expires')
|
|
|
|
|
|
|
|
def get_all_tags_with_expiration(self, namespace, repository, targets_file=None, targets_map=None):
|
|
|
|
"""
|
|
|
|
Gets the tag -> sha mappings of all delegations for a repo, as well as the expiration of the signatures.
|
|
|
|
Does not verify the metadata, this is purely for display purposes.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
namespace: namespace containing the repository
|
|
|
|
repository: the repo to get tags for
|
|
|
|
targets_file: the specific target or delegation to read from. Default: targets.json
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
targets
|
|
|
|
"""
|
|
|
|
|
|
|
|
if not targets_file:
|
|
|
|
targets_file = 'targets.json'
|
|
|
|
|
|
|
|
if not targets_map:
|
|
|
|
targets_map = {}
|
|
|
|
|
|
|
|
signed = self._get_signed(namespace, repository, targets_file)
|
|
|
|
if not signed:
|
|
|
|
return None
|
|
|
|
|
|
|
|
if signed.get('targets'):
|
|
|
|
targets_map[targets_file] = {
|
|
|
|
'targets': signed.get('targets'),
|
|
|
|
'expiration': signed.get('expires'),
|
|
|
|
}
|
|
|
|
|
|
|
|
delegation_names = [role.get('name') for role in signed.get('delegations').get('roles')]
|
|
|
|
|
|
|
|
for delegation in delegation_names:
|
|
|
|
targets_map = self.get_all_tags_with_expiration(namespace, repository, targets_file=delegation, targets_map=targets_map)
|
|
|
|
|
|
|
|
return targets_map
|
2017-04-19 17:51:13 +00:00
|
|
|
|
2017-04-11 18:43:32 +00:00
|
|
|
def delete_metadata(self, namespace, repository):
|
|
|
|
"""
|
|
|
|
Deletes the TUF metadata for a repo
|
2017-04-19 17:51:13 +00:00
|
|
|
|
2017-04-11 18:43:32 +00:00
|
|
|
Args:
|
|
|
|
namespace: namespace containing the repository
|
2017-04-12 18:30:22 +00:00
|
|
|
repository: the repo to delete metadata for
|
2017-04-11 18:43:32 +00:00
|
|
|
|
|
|
|
Returns:
|
|
|
|
True if successful, False otherwise
|
|
|
|
"""
|
|
|
|
gun = self._gun(namespace, repository)
|
|
|
|
try:
|
2017-04-19 17:51:13 +00:00
|
|
|
self._delete(gun)
|
2017-04-11 18:43:32 +00:00
|
|
|
except requests.exceptions.Timeout:
|
|
|
|
logger.exception('Timeout when trying to delete metadata for %s', gun)
|
|
|
|
return False
|
|
|
|
except requests.exceptions.ConnectionError:
|
|
|
|
logger.exception('Connection error when trying to delete metadata for %s', gun)
|
|
|
|
return False
|
|
|
|
except (requests.exceptions.RequestException, ValueError):
|
|
|
|
logger.exception('Failed to delete metadata for %s', gun)
|
|
|
|
return False
|
|
|
|
except Non200ResponseException as ex:
|
|
|
|
logger.exception('Failed request for %s: %s', gun, str(ex))
|
|
|
|
return False
|
|
|
|
return True
|
2017-04-19 17:51:13 +00:00
|
|
|
|
2017-04-11 18:43:32 +00:00
|
|
|
def _gun(self, namespace, repository):
|
2017-04-12 18:43:19 +00:00
|
|
|
return join(self._gun_prefix, namespace, repository)
|
2017-05-15 20:18:30 +00:00
|
|
|
|
|
|
|
def _get_signed(self, namespace, repository, targets_file):
|
|
|
|
gun = self._gun(namespace, repository)
|
|
|
|
|
|
|
|
try:
|
|
|
|
response = self._get(gun, targets_file)
|
|
|
|
signed = self._parse_signed(response.json())
|
|
|
|
return signed
|
|
|
|
except requests.exceptions.Timeout:
|
|
|
|
logger.exception('Timeout when trying to get metadata for %s', gun)
|
|
|
|
except requests.exceptions.ConnectionError:
|
|
|
|
logger.exception('Connection error when trying to get metadata for %s', gun)
|
|
|
|
except (requests.exceptions.RequestException, ValueError):
|
|
|
|
logger.exception('Failed to get metadata for %s', gun)
|
|
|
|
except Non200ResponseException as ex:
|
|
|
|
logger.exception('Failed request for %s: %s', gun, str(ex))
|
|
|
|
except InvalidMetadataException as ex:
|
|
|
|
logger.exception('Failed to parse targets from metadata', str(ex))
|
|
|
|
return None
|
2017-04-19 17:51:13 +00:00
|
|
|
|
2017-04-07 20:12:28 +00:00
|
|
|
def _parse_signed(self, json_response):
|
2017-04-05 14:03:27 +00:00
|
|
|
""" Attempts to parse the targets from a metadata response """
|
|
|
|
signed = json_response.get('signed')
|
|
|
|
if not signed:
|
|
|
|
raise InvalidMetadataException("Could not find `signed` in metadata: %s" % json_response)
|
2017-04-19 17:51:13 +00:00
|
|
|
return signed
|
|
|
|
|
2017-04-11 18:43:32 +00:00
|
|
|
def _auth_header(self, gun, actions):
|
2017-04-05 14:03:27 +00:00
|
|
|
""" Generate a registry auth token for apostille"""
|
|
|
|
access = [{
|
|
|
|
'type': 'repository',
|
2017-04-11 18:43:32 +00:00
|
|
|
'name': gun,
|
|
|
|
'actions': actions,
|
2017-04-05 14:03:27 +00:00
|
|
|
}]
|
|
|
|
context, subject = build_context_and_subject(user=None, token=None, oauthtoken=None, tuf_root=QUAY_TUF_ROOT)
|
2017-04-11 18:43:32 +00:00
|
|
|
token = generate_bearer_token(self._config["SERVER_HOSTNAME"], subject, context, access,
|
2017-04-05 14:03:27 +00:00
|
|
|
TOKEN_VALIDITY_LIFETIME_S, self._instance_keys)
|
|
|
|
return {'Authorization': 'Bearer %s' % token}
|
2017-04-19 17:51:13 +00:00
|
|
|
|
2017-04-05 14:03:27 +00:00
|
|
|
def _get(self, gun, metadata_file):
|
2017-04-11 18:43:32 +00:00
|
|
|
return self._call('GET', '/v2/%s/_trust/tuf/%s' % (gun, metadata_file), headers=self._auth_header(gun, ['pull']))
|
|
|
|
|
|
|
|
def _delete(self, gun):
|
|
|
|
return self._call('DELETE', '/v2/%s/_trust/tuf/' % (gun), headers=self._auth_header(gun, ['*']))
|
2017-04-19 17:51:13 +00:00
|
|
|
|
2017-04-05 14:03:27 +00:00
|
|
|
def _request(self, method, endpoint, path, body, headers, params, timeout):
|
|
|
|
""" Issues an HTTP request to the signing endpoint. """
|
|
|
|
url = urljoin(endpoint, path)
|
|
|
|
logger.debug('%sing signing URL %s', method.upper(), url)
|
|
|
|
|
2017-04-19 17:51:13 +00:00
|
|
|
headers.update(DEFAULT_HTTP_HEADERS)
|
2017-04-05 14:03:27 +00:00
|
|
|
resp = self._client.request(method, url, json=body, params=params, timeout=timeout,
|
2017-05-01 19:51:54 +00:00
|
|
|
verify=True, headers=headers)
|
2017-04-05 14:03:27 +00:00
|
|
|
if resp.status_code // 100 != 2:
|
|
|
|
raise Non200ResponseException(resp)
|
|
|
|
return resp
|
|
|
|
|
|
|
|
def _call(self, method, path, params=None, body=None, headers=None):
|
|
|
|
""" Issues an HTTP request to signing service and handles failover for GET requests.
|
|
|
|
"""
|
|
|
|
timeout = self._config.get('TUF_API_TIMEOUT_SECONDS', 1)
|
|
|
|
endpoint = self._config['TUF_SERVER']
|
|
|
|
|
|
|
|
with CloseForLongOperation(self._config):
|
|
|
|
# If the request isn't a read do not fail over.
|
|
|
|
if method != 'GET':
|
|
|
|
return self._request(method, endpoint, path, body, headers, params, timeout)
|
|
|
|
|
|
|
|
# The request is read-only and can failover.
|
|
|
|
all_endpoints = [endpoint] + self._config.get('TUF_READONLY_FAILOVER_ENDPOINTS', [])
|
|
|
|
return _failover_read_request(*[((self._request, endpoint, path, body, headers, params, timeout), {})
|
|
|
|
for endpoint in all_endpoints])
|
|
|
|
|
|
|
|
|
|
|
|
@failover
|
|
|
|
def _failover_read_request(request_fn, endpoint, path, body, headers, params, timeout):
|
|
|
|
""" This function auto-retries read-only requests until they return a 2xx status code. """
|
|
|
|
try:
|
|
|
|
return request_fn('GET', endpoint, path, body, headers, params, timeout)
|
|
|
|
except (requests.exceptions.RequestException, Non200ResponseException) as ex:
|
|
|
|
raise FailoverException(ex)
|