-
Notifications
You must be signed in to change notification settings - Fork 7
Expand file tree
/
Copy pathdocker.go
More file actions
378 lines (362 loc) · 8.54 KB
/
docker.go
File metadata and controls
378 lines (362 loc) · 8.54 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
package main
import (
"bytes"
"encoding/json"
"fmt"
"io/ioutil"
"net/http"
"net/url"
"os/exec"
"strings"
"text/template"
)
type dockerImage struct {
Repository string
Name string
Tag string
}
func (i *dockerImage) Validate() error {
if i.Repository == "" {
return fmt.Errorf("Image repository cannot be blank")
}
if strings.Contains(i.Repository, "/") {
return fmt.Errorf("Image repository cannot contain forward slashes")
}
if i.Name == "" {
return fmt.Errorf("Image name cannot be blank")
}
if i.Name[0:1] == "/" {
return fmt.Errorf("Image name cannot start with forward slash")
}
if i.Name[len(i.Name)-1:] == "/" {
return fmt.Errorf("Image name cannot end with forward slash")
}
if i.Tag == "" {
return fmt.Errorf("Image tag cannot be blank")
}
if strings.Contains(i.Tag, ":") {
return fmt.Errorf("Image tag cannot contain colon")
}
return nil
}
func (i *dockerImage) String() string {
return i.Repository + "/" + i.Name + ":" + i.Tag
}
var dockerTagVars struct {
GitBranch string
GitRevCount string
GitRevShort string
}
// dockerTag renders a tag template
func dockerTag(tagTemplate string) (string, error) {
// Lazy load git vars
var err error
var out []byte
if strings.Contains(tagTemplate, ".GitBranch") && dockerTagVars.GitBranch == "" {
/* #nosec */
out, err = exec.Command("git", "symbolic-ref", "--short", "HEAD").Output()
if err != nil {
return "", err
}
dockerTagVars.GitBranch = strings.TrimSpace(string(out))
}
if strings.Contains(tagTemplate, ".GitRevCount") && dockerTagVars.GitRevCount == "" {
/* #nosec */
out, err = exec.Command("git", "rev-list", "--count", "HEAD").Output()
if err != nil {
return "", err
}
dockerTagVars.GitRevCount = strings.TrimSpace(string(out))
}
if strings.Contains(tagTemplate, ".GitRevShort") && dockerTagVars.GitRevShort == "" {
/* #nosec */
out, err = exec.Command("git", "rev-parse", "--short", "HEAD").Output()
if err != nil {
return "", err
}
dockerTagVars.GitRevShort = strings.TrimSpace(string(out))
}
// Render template
t := template.Must(template.New("tagTemplate").Parse(tagTemplate))
var buf bytes.Buffer
err = t.Execute(&buf, dockerTagVars)
if err != nil {
return "", err
}
return buf.String(), nil
}
// dockerImageList compiles a list of dockerImage's from a given config struct
func dockerImageList(c config, e string) (images map[string]dockerImage, err error) {
images = map[string]dockerImage{}
for imageKey, envImage := range c.Environments[e].Images {
image := dockerImage{}
// Add repository
if envImage.Repository != "" {
image.Repository = envImage.Repository
} else if c.Image.Repository != "" {
image.Repository = c.Image.Repository
} else {
err = fmt.Errorf(
"Could not find image repository in config for %s",
imageKey,
)
return
}
// Add name
if envImage.Name != "" {
image.Name = envImage.Name
} else if c.Image.Name != "" {
image.Name = c.Image.Name
} else {
err = fmt.Errorf(
"Could not find image name in config for %s",
imageKey,
)
return
}
// Add tag
if envImage.TagTemplate != "" {
image.Tag, err = dockerTag(envImage.TagTemplate)
} else if c.Image.TagTemplate != "" {
image.Tag, err = dockerTag(c.Image.TagTemplate)
} else {
err = fmt.Errorf(
"Could not find image tag in config for %s",
imageKey,
)
}
if err != nil {
return
}
// Append image
images[imageKey] = image
}
return
}
func dockerCheckImage(image dockerImage) error {
// Validate image fields
err := image.Validate()
if err != nil {
return err
}
// Attempt to verify image exists without auth
authHeader, err := dockerGetImage(image.Repository, image.Name, image.Tag, "")
if err != nil {
return err
}
// Return if auth not required
if authHeader == "" {
return nil
}
// Auth required, so get a signed token (with grant)
var authToken string
authToken, err = dockerGetToken(authHeader)
if err != nil {
return err
}
// Verify image exists with auth
_, err = dockerGetImage(image.Repository, image.Name, image.Tag, authToken)
return err
}
// dockerGetImage will query the image manifest to verify an image exists.
// if the response is a 401 and contains a Www-Authenticate header,
// it will be returned in authHeader. if an error occurs, err will be returned.
// if the image is found, authHeader and err will be empty.
func dockerGetImage(imageRepo, imageName, imageTag, token string) (authHeader string, err error) {
// Build registry URL for image/tag
url := fmt.Sprintf(
"https://%s/v2/%s/manifests/%s",
imageRepo,
imageName,
imageTag,
)
// Build request
req, err := http.NewRequest("GET", url, nil)
if err != nil {
err = fmt.Errorf("Error building request: %s", err)
return
}
req.Header = http.Header{
"Content-Type": []string{
"application/json; charset=utf-8",
},
}
if token != "" {
req.Header.Add("Authorization", fmt.Sprintf("Bearer %s", token))
}
// Make request
client := http.Client{}
resp, err := client.Do(req)
if err != nil {
return "", err
}
// Check if auth is required
if resp.StatusCode == 401 {
if token != "" {
err = fmt.Errorf(
"HTTP response should not be 401 when token is provided",
)
return
}
// Get WWW-Authenticate header
authHeader = resp.Header.Get("Www-Authenticate")
if authHeader == "" {
err = fmt.Errorf(
"Expected 401 response to contain Www-Authenticate error",
)
}
return
}
// Check if image/tag not found
if resp.StatusCode == 404 {
err = fmt.Errorf(
"Docker image/tag (%s/%s:%s) not found",
imageRepo,
imageName,
imageTag,
)
return
}
// Check request was valid
if resp.StatusCode != 200 {
err = fmt.Errorf(
"Response code not 200, got: %d",
resp.StatusCode,
)
return
}
// Get response
respBody, err := ioutil.ReadAll(resp.Body)
resp.Body.Close() // #nosec G104
if err != nil {
err = fmt.Errorf(
"Error reading response: %s",
err,
)
return
}
// Parse response
var searchResult struct {
Name string
Tag string
Error struct {
Code string
Message string
Detail struct {
Type string
Name string
Action string
}
}
}
err = json.Unmarshal(respBody, &searchResult)
if err != nil {
err = fmt.Errorf("Error parsing response json: %s", err)
return
}
// Check response values
if searchResult.Error.Code != "" {
err = fmt.Errorf(
"GET %s\nRegistry search error (%s): %s",
url,
searchResult.Error.Code,
searchResult.Error.Message,
)
return
}
if searchResult.Name == "" || searchResult.Tag == "" {
err = fmt.Errorf(
"GET %s\nImage name/tag invalid: %+v",
url,
searchResult,
)
}
return
}
// dockerGetToken will get a secure Docker registry token
func dockerGetToken(authHeader string) (string, error) {
// Extract auth realm/service/scope from auth header
var realm, service, scope string
wwwAuthTrimmed := strings.TrimPrefix(authHeader, "Bearer ")
wwwAuthSplit := strings.Split(string(wwwAuthTrimmed), ",")
for _, wwwAuthPart := range wwwAuthSplit {
wwwAuth := strings.Trim(wwwAuthPart, " ")
if wwwAuth == "" {
continue
}
wwwAuthSplit := strings.Split(wwwAuth, "=")
if len(wwwAuthSplit) != 2 {
continue
}
value := strings.TrimSpace(strings.Trim(wwwAuthSplit[1], "\""))
switch wwwAuthSplit[0] {
case "realm":
realm = value
case "service":
service = value
case "scope":
scope = value
}
}
if realm == "" || service == "" || scope == "" {
return "", fmt.Errorf(
"Realm, service or scope empty (realm: '%s', service: '%s', scope '%s')",
realm,
service,
scope,
)
}
// Build auth URL
reqURL, err := url.Parse(realm)
if err != nil {
return "", fmt.Errorf(
"Error parsing realm URL: %s",
err,
)
}
reqQuery := url.Values{}
reqQuery.Add("service", service)
reqQuery.Add("scope", scope)
reqURL.RawQuery = reqQuery.Encode()
authURL := reqURL.String()
// Request auth token
resp, err := http.Get(authURL) // #nosec G107
if err != nil {
return "", fmt.Errorf(
"GET %s\n%s",
authURL,
err,
)
}
// Get response
respBody, err := ioutil.ReadAll(resp.Body)
resp.Body.Close() // #nosec G104
if err != nil {
return "", fmt.Errorf(
"GET %s\nError reading response: %s",
authURL,
err,
)
}
// Parse response
var respObject struct {
Token string
}
err = json.Unmarshal(respBody, &respObject)
if err != nil {
return "", fmt.Errorf(
"GET %s\nError parsing json: %s",
authURL,
err,
)
}
// Check token valid
if respObject.Token == "" {
return "", fmt.Errorf(
"GET %s\nAuth token invalid. Response: %+v",
authURL,
respObject,
)
}
return respObject.Token, nil
}