Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implement index manifest collection for the containerd hostfs image type #133

Merged
merged 7 commits into from
May 10, 2023
Merged
Show file tree
Hide file tree
Changes from 4 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 5 additions & 0 deletions Dockerfile.imgcollector.tilt
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
FROM alpine:3.17

COPY ./bin/castai-imgcollector /usr/local/bin/castai-imgcollector

CMD ["/usr/local/bin/castai-imgcollector"]
4 changes: 3 additions & 1 deletion Dockerfile.mockapi
Original file line number Diff line number Diff line change
@@ -1,3 +1,5 @@
FROM gcr.io/distroless/static-debian11
FROM alpine:3.17

COPY ./bin/mockapi /usr/local/bin/mockapi

CMD ["/usr/local/bin/mockapi"]
4 changes: 2 additions & 2 deletions Tiltfile
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
if config.tilt_subcommand == "down":
fail("consider using `kubectl delete ns castai-sec")
fail("consider using `kubectl delete ns kvisor")

load('ext://restart_process', 'docker_build_with_restart')
load('ext://namespace', 'namespace_create')
Expand Down Expand Up @@ -44,7 +44,7 @@ local_resource(

local_resource(
'imgcollector-docker-build',
'docker build -t localhost:5000/kvisor-imgcollector . -f Dockerfile.imgcollector && docker push localhost:5000/kvisor-imgcollector',
'docker build -t localhost:5000/kvisor-imgcollector . -f Dockerfile.imgcollector.tilt && docker push localhost:5000/kvisor-imgcollector',
deps=[
'./bin/castai-imgcollector'
],
Expand Down
7 changes: 5 additions & 2 deletions castai/imagemeta_types.go
Original file line number Diff line number Diff line change
Expand Up @@ -11,8 +11,11 @@ type ImageMetadata struct {
ResourceIDs []string `json:"resourceIDs,omitempty"`
BlobsInfo []types.BlobInfo `json:"blobsInfo,omitempty"`
ConfigFile *v1.ConfigFile `json:"configFile,omitempty"`
Manifest *v1.Manifest `json:"manifest,omitempty"`
OsInfo *OsInfo `json:"osInfo,omitempty"`
// Manifest specification can be found here: https://github.com/opencontainers/image-spec/blob/main/manifest.md
Manifest *v1.Manifest `json:"manifest,omitempty"`
// Index specification can be found here: https://github.com/opencontainers/image-spec/blob/main/image-index.md
Index *v1.IndexManifest `json:"index,omitempty"`
OsInfo *OsInfo `json:"osInfo,omitempty"`
}

// nolint:musttag
Expand Down
16 changes: 12 additions & 4 deletions cmd/imgcollector/collector/collector.go
Original file line number Diff line number Diff line change
Expand Up @@ -104,13 +104,13 @@ func (c *Collector) Collect(ctx context.Context) error {
if err != nil {
return err
}

manifest, err := img.Manifest()
if err != nil {
return fmt.Errorf("extract manifest: %w", err)
}

if err := c.client.SendImageMetadata(ctx, &castai.ImageMetadata{
metadata := &castai.ImageMetadata{
ImageName: c.cfg.ImageName,
ImageID: c.cfg.ImageID,
ResourceIDs: strings.Split(c.cfg.ResourceIDs, ","),
Expand All @@ -121,14 +121,22 @@ func (c *Collector) Collect(ctx context.Context) error {
ArtifactInfo: arRef.ArtifactInfo,
OS: arRef.OsInfo,
},
}); err != nil {
}

if index, err := img.Index(); err != nil {
c.log.Debugf("extract index: %s", err)
} else {
metadata.Index = index
}

if err := c.client.SendImageMetadata(ctx, metadata); err != nil {
return err
}

return nil
}

func (c *Collector) getImage(ctx context.Context) (image.Image, func(), error) {
func (c *Collector) getImage(ctx context.Context) (image.ImageWithIndex, func(), error) {
imgRef, err := name.ParseReference(c.cfg.ImageName)
if err != nil {
return nil, nil, err
Expand Down
3 changes: 1 addition & 2 deletions cmd/imgcollector/image/blob.go
Original file line number Diff line number Diff line change
@@ -1,11 +1,10 @@
package image

import (
"github.com/aquasecurity/trivy/pkg/fanal/types"
"github.com/castai/kvisor/cmd/imgcollector/image/hostfs"
)

func NewFromContainerdHostFS(imageID string, config hostfs.ContainerdHostFSConfig) (types.Image, func(), error) {
func NewFromContainerdHostFS(imageID string, config hostfs.ContainerdHostFSConfig) (ImageWithIndex, func(), error) {
hash, err := hostfs.NewImageHash(imageID)
if err != nil {
return nil, nil, err
Expand Down
9 changes: 3 additions & 6 deletions cmd/imgcollector/image/daemon.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,15 +3,12 @@ package image
import (
"context"

"github.com/aquasecurity/trivy/pkg/fanal/types"
"github.com/google/go-containerregistry/pkg/name"

"github.com/castai/kvisor/cmd/imgcollector/image/daemon"
)

type Image = types.Image

func NewFromContainerdDaemon(ctx context.Context, imageName string) (types.Image, func(), error) {
func NewFromContainerdDaemon(ctx context.Context, imageName string) (ImageWithIndex, func(), error) {
img, cleanup, err := daemon.ContainerdImage(ctx, imageName)
if err != nil {
return nil, nil, err
Expand All @@ -22,7 +19,7 @@ func NewFromContainerdDaemon(ctx context.Context, imageName string) (types.Image
}, cleanup, nil
}

func NewFromDockerDaemon(imageName string, ref name.Reference) (types.Image, func(), error) {
func NewFromDockerDaemon(imageName string, ref name.Reference) (ImageWithIndex, func(), error) {
img, cleanup, err := daemon.DockerImage(ref)
if err != nil {
return nil, nil, err
Expand All @@ -33,7 +30,7 @@ func NewFromDockerDaemon(imageName string, ref name.Reference) (types.Image, fun
}, cleanup, nil
}

func NewFromDockerDaemonTarFile(imageName, localTarPath string, ref name.Reference) (types.Image, func(), error) {
func NewFromDockerDaemonTarFile(imageName, localTarPath string, ref name.Reference) (ImageWithIndex, func(), error) {
img, cleanup, err := daemon.DockerTarImage(ref, localTarPath)
if err != nil {
return nil, nil, err
Expand Down
8 changes: 8 additions & 0 deletions cmd/imgcollector/image/daemon/image.go
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@ package daemon

import (
"context"
"errors"
"fmt"
"io"
"os"
Expand All @@ -22,10 +23,13 @@ import (
"github.com/google/go-containerregistry/pkg/v1/tarball"
)

var errNotImplemented = errors.New("not implemented")

type Image interface {
v1.Image
RepoTags() []string
RepoDigests() []string
Index() (*v1.IndexManifest, error)
}

var mu sync.Mutex
Expand Down Expand Up @@ -99,6 +103,10 @@ func (img *image) Manifest() (*v1.Manifest, error) {
return img.Image.Manifest()
}

func (img *image) Index() (*v1.IndexManifest, error) {
return nil, errNotImplemented
}

func (img *image) ConfigFile() (*v1.ConfigFile, error) {
if len(img.inspect.RootFS.Layers) == 0 {
// Podman doesn't return RootFS...
Expand Down
72 changes: 55 additions & 17 deletions cmd/imgcollector/image/hostfs/containerd_image.go
Original file line number Diff line number Diff line change
Expand Up @@ -42,6 +42,16 @@ func NewContainerdImage(hash v1.Hash, cfg ContainerdHostFSConfig) (Image, error)
configBytes: configBytes,
contentDir: cfg.ContentDir,
}

mi, err := manifestReader.resolveDigest()
domust marked this conversation as resolved.
Show resolved Hide resolved
if err != nil {
return nil, fmt.Errorf("resolving digest: %w", err)
}

index, err := manifestReader.resolveIndex(mi)
if err == nil {
domust marked this conversation as resolved.
Show resolved Hide resolved
img.index = index
}
return img, nil
}

Expand Down Expand Up @@ -74,6 +84,16 @@ type manifestOrIndex struct {
Manifests []v1.Descriptor `json:"manifests"`
}

func readManifest(atPath string, into *manifestOrIndex) error {
fileBytes, err := os.ReadFile(atPath)
if err != nil {
return err
}

return json.Unmarshal(fileBytes, into)
}

// manifest part of the sum type
func (mi *manifestOrIndex) manifest() *v1.Manifest {
return &v1.Manifest{
SchemaVersion: mi.SchemaVersion,
Expand All @@ -84,22 +104,35 @@ func (mi *manifestOrIndex) manifest() *v1.Manifest {
}
}

func (h *containerdManifestReader) resolveManifest() (*v1.Manifest, error) {
// Try to find manifest file. In most cases image id digest will point to manifest or index.
// index part of the sum type
func (mi *manifestOrIndex) index() *v1.IndexManifest {
return &v1.IndexManifest{
SchemaVersion: mi.SchemaVersion,
MediaType: mi.MediaType,
Manifests: mi.Manifests,
Annotations: mi.Annotations,
}
}

func (h *containerdManifestReader) resolveDigest() (*manifestOrIndex, error) {
var mi manifestOrIndex
readManifest := func(manifestPath string) error {
var err error
fileBytes, err := os.ReadFile(manifestPath)
if err != nil {
return err
}
err = json.Unmarshal(fileBytes, &mi)
if err != nil {
return err
}
return nil
if err := readManifest(path.Join(h.cfg.ContentDir, blobs, h.imgHash.Algorithm, h.imgHash.Hex), &mi); err != nil {
return nil, err
}
if err := readManifest(path.Join(h.cfg.ContentDir, blobs, h.imgHash.Algorithm, h.imgHash.Hex)); err != nil {
return &mi, nil
}

func (h *containerdManifestReader) resolveIndex(from *manifestOrIndex) (*v1.IndexManifest, error) {
if len(from.Manifests) == 0 {
return nil, fmt.Errorf("not an index manifest")
}

return from.index(), nil
}

func (h *containerdManifestReader) resolveManifest() (*v1.Manifest, error) {
mi, err := h.resolveDigest()
if err != nil {
return nil, err
}

Expand All @@ -111,7 +144,7 @@ func (h *containerdManifestReader) resolveManifest() (*v1.Manifest, error) {
if err != nil {
return nil, fmt.Errorf("searching manifest path: %w", err)
}
if err := readManifest(manifestPath); err != nil {
if err := readManifest(manifestPath, mi); err != nil {
return nil, err
}
}
Expand All @@ -124,7 +157,7 @@ func (h *containerdManifestReader) resolveManifest() (*v1.Manifest, error) {
if len(mi.Manifests) > 0 {
for _, m := range mi.Manifests {
if matchingPlatform(h.cfg.Platform, *m.Platform) {
if err := readManifest(path.Join(h.cfg.ContentDir, blobs, m.Digest.Algorithm, m.Digest.Hex)); err != nil {
if err := readManifest(path.Join(h.cfg.ContentDir, blobs, m.Digest.Algorithm, m.Digest.Hex), mi); err != nil {
return nil, err
}
if len(mi.Layers) == 0 {
Expand Down Expand Up @@ -184,13 +217,14 @@ func (h *containerdManifestReader) searchManifestPath() (string, error) {
return "", err
}
if manifestPath == "" {
return "", errors.New("manifest not find by searching in blobs content")
return "", errors.New("manifest not found by searching in blobs content")
}
return manifestPath, nil
}

type containerdBlobImage struct {
manifest *v1.Manifest
index *v1.IndexManifest
config *v1.ConfigFile
configBytes []byte
imgHash v1.Hash
Expand Down Expand Up @@ -223,6 +257,10 @@ func (b *containerdBlobImage) Manifest() (*v1.Manifest, error) {
return b.manifest, nil
}

func (b *containerdBlobImage) Index() (*v1.IndexManifest, error) {
return b.index, nil
}

func (b *containerdBlobImage) RawConfigFile() ([]byte, error) {
return b.configBytes, nil
}
Expand Down
20 changes: 20 additions & 0 deletions cmd/imgcollector/image/hostfs/containerd_image_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -59,3 +59,23 @@ func TestContainerdImage(t *testing.T) {
})
}
}

func TestContainerdImageWithIndex(t *testing.T) {
r := require.New(t)
img, err := NewContainerdImage(v1.Hash{
Algorithm: "sha256",
Hex: "211a3be9e15e1e4ccd75220aa776d92e06235552351464db2daf043bd30a0ac0",
},
ContainerdHostFSConfig{
Platform: v1.Platform{
Architecture: "amd64",
OS: "linux",
},
ContentDir: "./testdata/containerd_content",
},
)
r.NoError(err)
index, err := img.Index()
domust marked this conversation as resolved.
Show resolved Hide resolved
r.NoError(err)
r.Len(index.Manifests, 2)
}
1 change: 1 addition & 0 deletions cmd/imgcollector/image/hostfs/image.go
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ type Image interface {
v1.Image
RepoTags() []string
RepoDigests() []string
Index() (*v1.IndexManifest, error)
}

// NewImageHash returns image hash from string in format:
Expand Down
11 changes: 11 additions & 0 deletions cmd/imgcollector/image/image.go
Original file line number Diff line number Diff line change
@@ -1,11 +1,22 @@
package image

import (
"errors"
"fmt"

"github.com/aquasecurity/trivy/pkg/fanal/types"
v1 "github.com/google/go-containerregistry/pkg/v1"
)

type Image = types.Image

type ImageWithIndex interface {
Image
Index() (*v1.IndexManifest, error)
}

var ErrNotImplemented = errors.New("not implemented")

func ID(img v1.Image) (string, error) {
h, err := img.ConfigName()
if err != nil {
Expand Down
11 changes: 9 additions & 2 deletions cmd/imgcollector/image/remote.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,7 @@ package image
import (
"context"
"crypto/tls"
"errors"
"fmt"
"net/http"
"strings"
Expand All @@ -15,6 +16,8 @@ import (
"github.com/google/go-containerregistry/pkg/v1/remote"
)

var errNotImplemented = errors.New("not implemented")

type DockerOption struct {
// Auth
UserName string `yaml:"user_name"`
Expand All @@ -37,7 +40,7 @@ type DockerOption struct {
NonSSL bool `yaml:"non_ssl"`
}

func NewFromRemote(ctx context.Context, imageName string, option DockerOption) (types.Image, error) {
func NewFromRemote(ctx context.Context, imageName string, option DockerOption) (ImageWithIndex, error) {
var nameOpts []name.Option
if option.NonSSL {
nameOpts = append(nameOpts, name.Insecure)
Expand Down Expand Up @@ -65,7 +68,7 @@ func NewFromRemote(ctx context.Context, imageName string, option DockerOption) (
return img, nil
}

func tryRemote(ctx context.Context, imageName string, ref name.Reference, option types.DockerOption) (types.Image, error) {
func tryRemote(ctx context.Context, imageName string, ref name.Reference, option types.DockerOption) (ImageWithIndex, error) {
var remoteOpts []remote.Option
if option.InsecureSkipTLSVerify {
t := &http.Transport{
Expand Down Expand Up @@ -138,6 +141,10 @@ func (img remoteImage) RepoDigests() []string {
return []string{repoDigest}
}

func (img remoteImage) Index() (*v1.IndexManifest, error) {
return nil, errNotImplemented
domust marked this conversation as resolved.
Show resolved Hide resolved
}

type implicitReference struct {
ref name.Reference
}
Expand Down
Loading