2016-08-29 14:45:29 -04:00
package image
import (
"encoding/hex"
"encoding/json"
"errors"
"fmt"
"io"
"net"
"net/http"
"net/url"
"os"
"path"
"path/filepath"
"sort"
"time"
"golang.org/x/net/context"
"github.com/Sirupsen/logrus"
"github.com/docker/distribution/digest"
"github.com/docker/distribution/registry/client/auth"
2016-11-10 18:59:02 -05:00
"github.com/docker/distribution/registry/client/auth/challenge"
2016-08-29 14:45:29 -04:00
"github.com/docker/distribution/registry/client/transport"
"github.com/docker/docker/api/types"
registrytypes "github.com/docker/docker/api/types/registry"
"github.com/docker/docker/cli/command"
"github.com/docker/docker/cliconfig"
"github.com/docker/docker/distribution"
"github.com/docker/docker/pkg/jsonmessage"
"github.com/docker/docker/reference"
"github.com/docker/docker/registry"
"github.com/docker/go-connections/tlsconfig"
2016-09-28 15:49:47 -04:00
"github.com/docker/notary"
2016-08-29 14:45:29 -04:00
"github.com/docker/notary/client"
"github.com/docker/notary/passphrase"
2016-09-28 15:49:47 -04:00
"github.com/docker/notary/storage"
2016-08-29 14:45:29 -04:00
"github.com/docker/notary/trustmanager"
"github.com/docker/notary/trustpinning"
"github.com/docker/notary/tuf/data"
"github.com/docker/notary/tuf/signed"
)
var (
releasesRole = path . Join ( data . CanonicalTargetsRole , "releases" )
)
type target struct {
2016-12-06 14:27:27 -05:00
name string
digest digest . Digest
size int64
2016-08-29 14:45:29 -04:00
}
// trustedPush handles content trust pushing of an image
func trustedPush ( ctx context . Context , cli * command . DockerCli , repoInfo * registry . RepositoryInfo , ref reference . Named , authConfig types . AuthConfig , requestPrivilege types . RequestPrivilegeFunc ) error {
responseBody , err := imagePushPrivileged ( ctx , cli , authConfig , ref . String ( ) , requestPrivilege )
if err != nil {
return err
}
defer responseBody . Close ( )
// If it is a trusted push we would like to find the target entry which match the
// tag provided in the function and then do an AddTarget later.
target := & client . Target { }
// Count the times of calling for handleTarget,
// if it is called more that once, that should be considered an error in a trusted push.
cnt := 0
handleTarget := func ( aux * json . RawMessage ) {
cnt ++
if cnt > 1 {
// handleTarget should only be called one. This will be treated as an error.
return
}
var pushResult distribution . PushResult
err := json . Unmarshal ( * aux , & pushResult )
if err == nil && pushResult . Tag != "" && pushResult . Digest . Validate ( ) == nil {
h , err := hex . DecodeString ( pushResult . Digest . Hex ( ) )
if err != nil {
target = nil
return
}
2016-12-06 14:27:27 -05:00
target . Name = pushResult . Tag
2016-08-29 14:45:29 -04:00
target . Hashes = data . Hashes { string ( pushResult . Digest . Algorithm ( ) ) : h }
target . Length = int64 ( pushResult . Size )
}
}
var tag string
switch x := ref . ( type ) {
case reference . Canonical :
return errors . New ( "cannot push a digest reference" )
case reference . NamedTagged :
tag = x . Tag ( )
2016-12-06 14:27:27 -05:00
default :
// We want trust signatures to always take an explicit tag,
// otherwise it will act as an untrusted push.
2016-08-29 14:45:29 -04:00
if err = jsonmessage . DisplayJSONMessagesToStream ( responseBody , cli . Out ( ) , nil ) ; err != nil {
return err
}
fmt . Fprintln ( cli . Out ( ) , "No tag specified, skipping trust metadata push" )
return nil
}
if err = jsonmessage . DisplayJSONMessagesToStream ( responseBody , cli . Out ( ) , handleTarget ) ; err != nil {
return err
}
if cnt > 1 {
return fmt . Errorf ( "internal error: only one call to handleTarget expected" )
}
if target == nil {
fmt . Fprintln ( cli . Out ( ) , "No targets found, please provide a specific tag in order to sign it" )
return nil
}
fmt . Fprintln ( cli . Out ( ) , "Signing and pushing trust metadata" )
repo , err := GetNotaryRepository ( cli , repoInfo , authConfig , "push" , "pull" )
if err != nil {
fmt . Fprintf ( cli . Out ( ) , "Error establishing connection to notary repository: %s\n" , err )
return err
}
// get the latest repository metadata so we can figure out which roles to sign
err = repo . Update ( false )
switch err . ( type ) {
case client . ErrRepoNotInitialized , client . ErrRepositoryNotExist :
keys := repo . CryptoService . ListKeys ( data . CanonicalRootRole )
var rootKeyID string
// always select the first root key
if len ( keys ) > 0 {
sort . Strings ( keys )
rootKeyID = keys [ 0 ]
} else {
rootPublicKey , err := repo . CryptoService . Create ( data . CanonicalRootRole , "" , data . ECDSAKey )
if err != nil {
return err
}
rootKeyID = rootPublicKey . ID ( )
}
// Initialize the notary repository with a remotely managed snapshot key
2016-09-28 15:49:47 -04:00
if err := repo . Initialize ( [ ] string { rootKeyID } , data . CanonicalSnapshotRole ) ; err != nil {
2016-08-29 14:45:29 -04:00
return notaryError ( repoInfo . FullName ( ) , err )
}
fmt . Fprintf ( cli . Out ( ) , "Finished initializing %q\n" , repoInfo . FullName ( ) )
err = repo . AddTarget ( target , data . CanonicalTargetsRole )
case nil :
// already initialized and we have successfully downloaded the latest metadata
err = addTargetToAllSignableRoles ( repo , target )
default :
return notaryError ( repoInfo . FullName ( ) , err )
}
if err == nil {
err = repo . Publish ( )
}
if err != nil {
fmt . Fprintf ( cli . Out ( ) , "Failed to sign %q:%s - %s\n" , repoInfo . FullName ( ) , tag , err . Error ( ) )
return notaryError ( repoInfo . FullName ( ) , err )
}
fmt . Fprintf ( cli . Out ( ) , "Successfully signed %q:%s\n" , repoInfo . FullName ( ) , tag )
return nil
}
// Attempt to add the image target to all the top level delegation roles we can
// (based on whether we have the signing key and whether the role's path allows
// us to).
// If there are no delegation roles, we add to the targets role.
func addTargetToAllSignableRoles ( repo * client . NotaryRepository , target * client . Target ) error {
var signableRoles [ ] string
// translate the full key names, which includes the GUN, into just the key IDs
allCanonicalKeyIDs := make ( map [ string ] struct { } )
for fullKeyID := range repo . CryptoService . ListAllKeys ( ) {
allCanonicalKeyIDs [ path . Base ( fullKeyID ) ] = struct { } { }
}
allDelegationRoles , err := repo . GetDelegationRoles ( )
if err != nil {
return err
}
// if there are no delegation roles, then just try to sign it into the targets role
if len ( allDelegationRoles ) == 0 {
return repo . AddTarget ( target , data . CanonicalTargetsRole )
}
// there are delegation roles, find every delegation role we have a key for, and
// attempt to sign into into all those roles.
for _ , delegationRole := range allDelegationRoles {
// We do not support signing any delegation role that isn't a direct child of the targets role.
// Also don't bother checking the keys if we can't add the target
// to this role due to path restrictions
if path . Dir ( delegationRole . Name ) != data . CanonicalTargetsRole || ! delegationRole . CheckPaths ( target . Name ) {
continue
}
for _ , canonicalKeyID := range delegationRole . KeyIDs {
if _ , ok := allCanonicalKeyIDs [ canonicalKeyID ] ; ok {
signableRoles = append ( signableRoles , delegationRole . Name )
break
}
}
}
if len ( signableRoles ) == 0 {
return fmt . Errorf ( "no valid signing keys for delegation roles" )
}
return repo . AddTarget ( target , signableRoles ... )
}
// imagePushPrivileged push the image
func imagePushPrivileged ( ctx context . Context , cli * command . DockerCli , authConfig types . AuthConfig , ref string , requestPrivilege types . RequestPrivilegeFunc ) ( io . ReadCloser , error ) {
encodedAuth , err := command . EncodeAuthToBase64 ( authConfig )
if err != nil {
return nil , err
}
options := types . ImagePushOptions {
RegistryAuth : encodedAuth ,
PrivilegeFunc : requestPrivilege ,
}
return cli . Client ( ) . ImagePush ( ctx , ref , options )
}
// trustedPull handles content trust pulling of an image
2016-12-06 14:27:27 -05:00
func trustedPull ( ctx context . Context , cli * command . DockerCli , repoInfo * registry . RepositoryInfo , ref reference . Named , authConfig types . AuthConfig , requestPrivilege types . RequestPrivilegeFunc ) error {
2016-08-29 14:45:29 -04:00
var refs [ ] target
notaryRepo , err := GetNotaryRepository ( cli , repoInfo , authConfig , "pull" )
if err != nil {
fmt . Fprintf ( cli . Out ( ) , "Error establishing connection to trust repository: %s\n" , err )
return err
}
2016-12-06 14:27:27 -05:00
if tagged , isTagged := ref . ( reference . NamedTagged ) ; ! isTagged {
2016-08-29 14:45:29 -04:00
// List all targets
targets , err := notaryRepo . ListTargets ( releasesRole , data . CanonicalTargetsRole )
if err != nil {
return notaryError ( repoInfo . FullName ( ) , err )
}
for _ , tgt := range targets {
t , err := convertTarget ( tgt . Target )
if err != nil {
fmt . Fprintf ( cli . Out ( ) , "Skipping target for %q\n" , repoInfo . Name ( ) )
continue
}
// Only list tags in the top level targets role or the releases delegation role - ignore
// all other delegation roles
if tgt . Role != releasesRole && tgt . Role != data . CanonicalTargetsRole {
continue
}
refs = append ( refs , t )
}
if len ( refs ) == 0 {
return notaryError ( repoInfo . FullName ( ) , fmt . Errorf ( "No trusted tags for %s" , repoInfo . FullName ( ) ) )
}
} else {
2016-12-06 14:27:27 -05:00
t , err := notaryRepo . GetTargetByName ( tagged . Tag ( ) , releasesRole , data . CanonicalTargetsRole )
2016-08-29 14:45:29 -04:00
if err != nil {
return notaryError ( repoInfo . FullName ( ) , err )
}
// Only get the tag if it's in the top level targets role or the releases delegation role
// ignore it if it's in any other delegation roles
if t . Role != releasesRole && t . Role != data . CanonicalTargetsRole {
2016-12-06 14:27:27 -05:00
return notaryError ( repoInfo . FullName ( ) , fmt . Errorf ( "No trust data for %s" , tagged . Tag ( ) ) )
2016-08-29 14:45:29 -04:00
}
logrus . Debugf ( "retrieving target for %s role\n" , t . Role )
r , err := convertTarget ( t . Target )
if err != nil {
return err
}
refs = append ( refs , r )
}
for i , r := range refs {
2016-12-06 14:27:27 -05:00
displayTag := r . name
2016-08-29 14:45:29 -04:00
if displayTag != "" {
displayTag = ":" + displayTag
}
fmt . Fprintf ( cli . Out ( ) , "Pull (%d of %d): %s%s@%s\n" , i + 1 , len ( refs ) , repoInfo . Name ( ) , displayTag , r . digest )
2016-11-10 18:59:02 -05:00
ref , err := reference . WithDigest ( reference . TrimNamed ( repoInfo ) , r . digest )
2016-08-29 14:45:29 -04:00
if err != nil {
return err
}
if err := imagePullPrivileged ( ctx , cli , authConfig , ref . String ( ) , requestPrivilege , false ) ; err != nil {
return err
}
2016-12-06 14:27:27 -05:00
tagged , err := reference . WithTag ( repoInfo , r . name )
if err != nil {
return err
}
trustedRef , err := reference . WithDigest ( reference . TrimNamed ( repoInfo ) , r . digest )
if err != nil {
return err
}
if err := TagTrusted ( ctx , cli , trustedRef , tagged ) ; err != nil {
return err
2016-08-29 14:45:29 -04:00
}
}
return nil
}
// imagePullPrivileged pulls the image and displays it to the output
func imagePullPrivileged ( ctx context . Context , cli * command . DockerCli , authConfig types . AuthConfig , ref string , requestPrivilege types . RequestPrivilegeFunc , all bool ) error {
encodedAuth , err := command . EncodeAuthToBase64 ( authConfig )
if err != nil {
return err
}
options := types . ImagePullOptions {
RegistryAuth : encodedAuth ,
PrivilegeFunc : requestPrivilege ,
All : all ,
}
responseBody , err := cli . Client ( ) . ImagePull ( ctx , ref , options )
if err != nil {
return err
}
defer responseBody . Close ( )
return jsonmessage . DisplayJSONMessagesToStream ( responseBody , cli . Out ( ) , nil )
}
func trustDirectory ( ) string {
return filepath . Join ( cliconfig . ConfigDir ( ) , "trust" )
}
// certificateDirectory returns the directory containing
// TLS certificates for the given server. An error is
// returned if there was an error parsing the server string.
func certificateDirectory ( server string ) ( string , error ) {
u , err := url . Parse ( server )
if err != nil {
return "" , err
}
return filepath . Join ( cliconfig . ConfigDir ( ) , "tls" , u . Host ) , nil
}
func trustServer ( index * registrytypes . IndexInfo ) ( string , error ) {
if s := os . Getenv ( "DOCKER_CONTENT_TRUST_SERVER" ) ; s != "" {
urlObj , err := url . Parse ( s )
if err != nil || urlObj . Scheme != "https" {
return "" , fmt . Errorf ( "valid https URL required for trust server, got %s" , s )
}
return s , nil
}
if index . Official {
return registry . NotaryServer , nil
}
return "https://" + index . Name , nil
}
type simpleCredentialStore struct {
auth types . AuthConfig
}
func ( scs simpleCredentialStore ) Basic ( u * url . URL ) ( string , string ) {
return scs . auth . Username , scs . auth . Password
}
func ( scs simpleCredentialStore ) RefreshToken ( u * url . URL , service string ) string {
return scs . auth . IdentityToken
}
func ( scs simpleCredentialStore ) SetRefreshToken ( * url . URL , string , string ) {
}
// GetNotaryRepository returns a NotaryRepository which stores all the
// information needed to operate on a notary repository.
// It creates an HTTP transport providing authentication support.
// TODO: move this too
func GetNotaryRepository ( streams command . Streams , repoInfo * registry . RepositoryInfo , authConfig types . AuthConfig , actions ... string ) ( * client . NotaryRepository , error ) {
server , err := trustServer ( repoInfo . Index )
if err != nil {
return nil , err
}
var cfg = tlsconfig . ClientDefault ( )
cfg . InsecureSkipVerify = ! repoInfo . Index . Secure
// Get certificate base directory
certDir , err := certificateDirectory ( server )
if err != nil {
return nil , err
}
logrus . Debugf ( "reading certificate directory: %s" , certDir )
if err := registry . ReadCertsDirectory ( cfg , certDir ) ; err != nil {
return nil , err
}
base := & http . Transport {
Proxy : http . ProxyFromEnvironment ,
Dial : ( & net . Dialer {
Timeout : 30 * time . Second ,
KeepAlive : 30 * time . Second ,
DualStack : true ,
} ) . Dial ,
TLSHandshakeTimeout : 10 * time . Second ,
TLSClientConfig : cfg ,
DisableKeepAlives : true ,
}
// Skip configuration headers since request is not going to Docker daemon
modifiers := registry . DockerHeaders ( command . UserAgent ( ) , http . Header { } )
authTransport := transport . NewTransport ( base , modifiers ... )
pingClient := & http . Client {
Transport : authTransport ,
Timeout : 5 * time . Second ,
}
endpointStr := server + "/v2/"
req , err := http . NewRequest ( "GET" , endpointStr , nil )
if err != nil {
return nil , err
}
2016-11-10 18:59:02 -05:00
challengeManager := challenge . NewSimpleManager ( )
2016-08-29 14:45:29 -04:00
resp , err := pingClient . Do ( req )
if err != nil {
// Ignore error on ping to operate in offline mode
logrus . Debugf ( "Error pinging notary server %q: %s" , endpointStr , err )
} else {
defer resp . Body . Close ( )
// Add response to the challenge manager to parse out
// authentication header and register authentication method
if err := challengeManager . AddResponse ( resp ) ; err != nil {
return nil , err
}
}
creds := simpleCredentialStore { auth : authConfig }
tokenHandler := auth . NewTokenHandler ( authTransport , creds , repoInfo . FullName ( ) , actions ... )
basicHandler := auth . NewBasicHandler ( creds )
modifiers = append ( modifiers , transport . RequestModifier ( auth . NewAuthorizer ( challengeManager , tokenHandler , basicHandler ) ) )
tr := transport . NewTransport ( base , modifiers ... )
return client . NewNotaryRepository (
trustDirectory ( ) ,
repoInfo . FullName ( ) ,
server ,
tr ,
getPassphraseRetriever ( streams ) ,
trustpinning . TrustPinConfig { } )
}
2016-09-28 15:49:47 -04:00
func getPassphraseRetriever ( streams command . Streams ) notary . PassRetriever {
2016-08-29 14:45:29 -04:00
aliasMap := map [ string ] string {
"root" : "root" ,
"snapshot" : "repository" ,
"targets" : "repository" ,
"default" : "repository" ,
}
baseRetriever := passphrase . PromptRetrieverWithInOut ( streams . In ( ) , streams . Out ( ) , aliasMap )
env := map [ string ] string {
"root" : os . Getenv ( "DOCKER_CONTENT_TRUST_ROOT_PASSPHRASE" ) ,
"snapshot" : os . Getenv ( "DOCKER_CONTENT_TRUST_REPOSITORY_PASSPHRASE" ) ,
"targets" : os . Getenv ( "DOCKER_CONTENT_TRUST_REPOSITORY_PASSPHRASE" ) ,
"default" : os . Getenv ( "DOCKER_CONTENT_TRUST_REPOSITORY_PASSPHRASE" ) ,
}
return func ( keyName string , alias string , createNew bool , numAttempts int ) ( string , bool , error ) {
if v := env [ alias ] ; v != "" {
return v , numAttempts > 1 , nil
}
// For non-root roles, we can also try the "default" alias if it is specified
if v := env [ "default" ] ; v != "" && alias != data . CanonicalRootRole {
return v , numAttempts > 1 , nil
}
return baseRetriever ( keyName , alias , createNew , numAttempts )
}
}
// TrustedReference returns the canonical trusted reference for an image reference
func TrustedReference ( ctx context . Context , cli * command . DockerCli , ref reference . NamedTagged ) ( reference . Canonical , error ) {
repoInfo , err := registry . ParseRepositoryInfo ( ref )
if err != nil {
return nil , err
}
// Resolve the Auth config relevant for this server
2016-09-09 15:38:00 -04:00
authConfig := command . ResolveAuthConfig ( ctx , cli , repoInfo . Index )
2016-08-29 14:45:29 -04:00
notaryRepo , err := GetNotaryRepository ( cli , repoInfo , authConfig , "pull" )
if err != nil {
fmt . Fprintf ( cli . Out ( ) , "Error establishing connection to trust repository: %s\n" , err )
return nil , err
}
t , err := notaryRepo . GetTargetByName ( ref . Tag ( ) , releasesRole , data . CanonicalTargetsRole )
if err != nil {
return nil , err
}
// Only list tags in the top level targets role or the releases delegation role - ignore
// all other delegation roles
if t . Role != releasesRole && t . Role != data . CanonicalTargetsRole {
return nil , notaryError ( repoInfo . FullName ( ) , fmt . Errorf ( "No trust data for %s" , ref . Tag ( ) ) )
}
r , err := convertTarget ( t . Target )
if err != nil {
return nil , err
}
2016-11-10 18:59:02 -05:00
return reference . WithDigest ( reference . TrimNamed ( ref ) , r . digest )
2016-08-29 14:45:29 -04:00
}
func convertTarget ( t client . Target ) ( target , error ) {
h , ok := t . Hashes [ "sha256" ]
if ! ok {
return target { } , errors . New ( "no valid hash, expecting sha256" )
}
return target {
2016-12-06 14:27:27 -05:00
name : t . Name ,
digest : digest . NewDigestFromHex ( "sha256" , hex . EncodeToString ( h ) ) ,
size : t . Length ,
2016-08-29 14:45:29 -04:00
} , nil
}
// TagTrusted tags a trusted ref
func TagTrusted ( ctx context . Context , cli * command . DockerCli , trustedRef reference . Canonical , ref reference . NamedTagged ) error {
fmt . Fprintf ( cli . Out ( ) , "Tagging %s as %s\n" , trustedRef . String ( ) , ref . String ( ) )
return cli . Client ( ) . ImageTag ( ctx , trustedRef . String ( ) , ref . String ( ) )
}
// notaryError formats an error message received from the notary service
func notaryError ( repoName string , err error ) error {
switch err . ( type ) {
case * json . SyntaxError :
logrus . Debugf ( "Notary syntax error: %s" , err )
return fmt . Errorf ( "Error: no trust data available for remote repository %s. Try running notary server and setting DOCKER_CONTENT_TRUST_SERVER to its HTTPS address?" , repoName )
case signed . ErrExpired :
return fmt . Errorf ( "Error: remote repository %s out-of-date: %v" , repoName , err )
case trustmanager . ErrKeyNotFound :
return fmt . Errorf ( "Error: signing keys for remote repository %s not found: %v" , repoName , err )
2016-09-28 15:49:47 -04:00
case storage . NetworkError :
2016-08-29 14:45:29 -04:00
return fmt . Errorf ( "Error: error contacting notary server: %v" , err )
2016-09-28 15:49:47 -04:00
case storage . ErrMetaNotFound :
2016-08-29 14:45:29 -04:00
return fmt . Errorf ( "Error: trust data missing for remote repository %s or remote repository not found: %v" , repoName , err )
2016-09-28 15:49:47 -04:00
case trustpinning . ErrRootRotationFail , trustpinning . ErrValidationFail , signed . ErrInvalidKeyType :
2016-08-29 14:45:29 -04:00
return fmt . Errorf ( "Warning: potential malicious behavior - trust data mismatch for remote repository %s: %v" , repoName , err )
case signed . ErrNoKeys :
return fmt . Errorf ( "Error: could not find signing keys for remote repository %s, or could not decrypt signing key: %v" , repoName , err )
case signed . ErrLowVersion :
return fmt . Errorf ( "Warning: potential malicious behavior - trust data version is lower than expected for remote repository %s: %v" , repoName , err )
case signed . ErrRoleThreshold :
return fmt . Errorf ( "Warning: potential malicious behavior - trust data has insufficient signatures for remote repository %s: %v" , repoName , err )
case client . ErrRepositoryNotExist :
return fmt . Errorf ( "Error: remote trust data does not exist for %s: %v" , repoName , err )
case signed . ErrInsufficientSignatures :
return fmt . Errorf ( "Error: could not produce valid signature for %s. If Yubikey was used, was touch input provided?: %v" , repoName , err )
}
return err
}