publish.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534
  1. /*
  2. Copyright 2020 Docker Compose CLI authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package compose
  14. import (
  15. "bytes"
  16. "context"
  17. "crypto/sha256"
  18. "encoding/json"
  19. "errors"
  20. "fmt"
  21. "io"
  22. "os"
  23. "strings"
  24. "github.com/DefangLabs/secret-detector/pkg/scanner"
  25. "github.com/DefangLabs/secret-detector/pkg/secrets"
  26. "github.com/compose-spec/compose-go/v2/loader"
  27. "github.com/compose-spec/compose-go/v2/types"
  28. "github.com/distribution/reference"
  29. "github.com/docker/compose/v2/internal/oci"
  30. "github.com/docker/compose/v2/pkg/api"
  31. "github.com/docker/compose/v2/pkg/compose/transform"
  32. "github.com/docker/compose/v2/pkg/progress"
  33. "github.com/opencontainers/go-digest"
  34. "github.com/opencontainers/image-spec/specs-go"
  35. v1 "github.com/opencontainers/image-spec/specs-go/v1"
  36. "github.com/sirupsen/logrus"
  37. )
  38. func (s *composeService) Publish(ctx context.Context, project *types.Project, repository string, options api.PublishOptions) error {
  39. return progress.RunWithTitle(ctx, func(ctx context.Context) error {
  40. return s.publish(ctx, project, repository, options)
  41. }, s.stdinfo(), "Publishing")
  42. }
  43. //nolint:gocyclo
  44. func (s *composeService) publish(ctx context.Context, project *types.Project, repository string, options api.PublishOptions) error {
  45. project, err := project.WithProfiles([]string{"*"})
  46. if err != nil {
  47. return err
  48. }
  49. accept, err := s.preChecks(project, options)
  50. if err != nil {
  51. return err
  52. }
  53. if !accept {
  54. return nil
  55. }
  56. err = s.Push(ctx, project, api.PushOptions{IgnoreFailures: true, ImageMandatory: true})
  57. if err != nil {
  58. return err
  59. }
  60. layers, err := s.createLayers(ctx, project, options)
  61. if err != nil {
  62. return err
  63. }
  64. w := progress.ContextWriter(ctx)
  65. w.Event(progress.Event{
  66. ID: repository,
  67. Text: "publishing",
  68. Status: progress.Working,
  69. })
  70. if logrus.IsLevelEnabled(logrus.DebugLevel) {
  71. logrus.Debug("publishing layers")
  72. for _, layer := range layers {
  73. indent, _ := json.MarshalIndent(layer, "", " ")
  74. fmt.Println(string(indent))
  75. }
  76. }
  77. if !s.dryRun {
  78. named, err := reference.ParseDockerRef(repository)
  79. if err != nil {
  80. return err
  81. }
  82. config := s.dockerCli.ConfigFile()
  83. resolver := oci.NewResolver(config)
  84. descriptor, err := oci.PushManifest(ctx, resolver, named, layers, options.OCIVersion)
  85. if err != nil {
  86. w.Event(progress.Event{
  87. ID: repository,
  88. Text: "publishing",
  89. Status: progress.Error,
  90. })
  91. return err
  92. }
  93. if options.Application {
  94. manifests := []v1.Descriptor{}
  95. for _, service := range project.Services {
  96. ref, err := reference.ParseDockerRef(service.Image)
  97. if err != nil {
  98. return err
  99. }
  100. manifest, err := oci.Copy(ctx, resolver, ref, named)
  101. if err != nil {
  102. return err
  103. }
  104. manifests = append(manifests, manifest)
  105. }
  106. descriptor.Data = nil
  107. index, err := json.Marshal(v1.Index{
  108. Versioned: specs.Versioned{SchemaVersion: 2},
  109. MediaType: v1.MediaTypeImageIndex,
  110. Manifests: manifests,
  111. Subject: &descriptor,
  112. Annotations: map[string]string{
  113. "com.docker.compose.version": api.ComposeVersion,
  114. },
  115. })
  116. if err != nil {
  117. return err
  118. }
  119. imagesDescriptor := v1.Descriptor{
  120. MediaType: v1.MediaTypeImageIndex,
  121. ArtifactType: oci.ComposeProjectArtifactType,
  122. Digest: digest.FromString(string(index)),
  123. Size: int64(len(index)),
  124. Annotations: map[string]string{
  125. "com.docker.compose.version": api.ComposeVersion,
  126. },
  127. Data: index,
  128. }
  129. err = oci.Push(ctx, resolver, reference.TrimNamed(named), imagesDescriptor)
  130. if err != nil {
  131. return err
  132. }
  133. }
  134. }
  135. w.Event(progress.Event{
  136. ID: repository,
  137. Text: "published",
  138. Status: progress.Done,
  139. })
  140. return nil
  141. }
  142. func (s *composeService) createLayers(ctx context.Context, project *types.Project, options api.PublishOptions) ([]v1.Descriptor, error) {
  143. var layers []v1.Descriptor
  144. extFiles := map[string]string{}
  145. envFiles := map[string]string{}
  146. for _, file := range project.ComposeFiles {
  147. data, err := processFile(ctx, file, project, extFiles, envFiles)
  148. if err != nil {
  149. return nil, err
  150. }
  151. layerDescriptor := oci.DescriptorForComposeFile(file, data)
  152. layers = append(layers, layerDescriptor)
  153. }
  154. extLayers, err := processExtends(ctx, project, extFiles)
  155. if err != nil {
  156. return nil, err
  157. }
  158. layers = append(layers, extLayers...)
  159. if options.WithEnvironment {
  160. layers = append(layers, envFileLayers(envFiles)...)
  161. }
  162. if options.ResolveImageDigests {
  163. yaml, err := s.generateImageDigestsOverride(ctx, project)
  164. if err != nil {
  165. return nil, err
  166. }
  167. layerDescriptor := oci.DescriptorForComposeFile("image-digests.yaml", yaml)
  168. layers = append(layers, layerDescriptor)
  169. }
  170. return layers, nil
  171. }
  172. func processExtends(ctx context.Context, project *types.Project, extFiles map[string]string) ([]v1.Descriptor, error) {
  173. var layers []v1.Descriptor
  174. moreExtFiles := map[string]string{}
  175. for xf, hash := range extFiles {
  176. data, err := processFile(ctx, xf, project, moreExtFiles, nil)
  177. if err != nil {
  178. return nil, err
  179. }
  180. layerDescriptor := oci.DescriptorForComposeFile(hash, data)
  181. layerDescriptor.Annotations["com.docker.compose.extends"] = "true"
  182. layers = append(layers, layerDescriptor)
  183. }
  184. for f, hash := range moreExtFiles {
  185. if _, ok := extFiles[f]; ok {
  186. delete(moreExtFiles, f)
  187. }
  188. extFiles[f] = hash
  189. }
  190. if len(moreExtFiles) > 0 {
  191. extLayers, err := processExtends(ctx, project, moreExtFiles)
  192. if err != nil {
  193. return nil, err
  194. }
  195. layers = append(layers, extLayers...)
  196. }
  197. return layers, nil
  198. }
  199. func processFile(ctx context.Context, file string, project *types.Project, extFiles map[string]string, envFiles map[string]string) ([]byte, error) {
  200. f, err := os.ReadFile(file)
  201. if err != nil {
  202. return nil, err
  203. }
  204. base, err := loader.LoadWithContext(ctx, types.ConfigDetails{
  205. WorkingDir: project.WorkingDir,
  206. Environment: project.Environment,
  207. ConfigFiles: []types.ConfigFile{
  208. {
  209. Filename: file,
  210. Content: f,
  211. },
  212. },
  213. }, func(options *loader.Options) {
  214. options.SkipValidation = true
  215. options.SkipExtends = true
  216. options.SkipConsistencyCheck = true
  217. options.ResolvePaths = true
  218. options.Profiles = project.Profiles
  219. })
  220. if err != nil {
  221. return nil, err
  222. }
  223. for name, service := range base.Services {
  224. for i, envFile := range service.EnvFiles {
  225. hash := fmt.Sprintf("%x.env", sha256.Sum256([]byte(envFile.Path)))
  226. envFiles[envFile.Path] = hash
  227. f, err = transform.ReplaceEnvFile(f, name, i, hash)
  228. if err != nil {
  229. return nil, err
  230. }
  231. }
  232. if service.Extends == nil {
  233. continue
  234. }
  235. xf := service.Extends.File
  236. if xf == "" {
  237. continue
  238. }
  239. if _, err = os.Stat(service.Extends.File); os.IsNotExist(err) {
  240. // No local file, while we loaded the project successfully: This is actually a remote resource
  241. continue
  242. }
  243. hash := fmt.Sprintf("%x.yaml", sha256.Sum256([]byte(xf)))
  244. extFiles[xf] = hash
  245. f, err = transform.ReplaceExtendsFile(f, name, hash)
  246. if err != nil {
  247. return nil, err
  248. }
  249. }
  250. return f, nil
  251. }
  252. func (s *composeService) generateImageDigestsOverride(ctx context.Context, project *types.Project) ([]byte, error) {
  253. project, err := project.WithImagesResolved(ImageDigestResolver(ctx, s.configFile(), s.apiClient()))
  254. if err != nil {
  255. return nil, err
  256. }
  257. override := types.Project{
  258. Services: types.Services{},
  259. }
  260. for name, service := range project.Services {
  261. override.Services[name] = types.ServiceConfig{
  262. Image: service.Image,
  263. }
  264. }
  265. return override.MarshalYAML()
  266. }
  267. //nolint:gocyclo
  268. func (s *composeService) preChecks(project *types.Project, options api.PublishOptions) (bool, error) {
  269. if ok, err := s.checkOnlyBuildSection(project); !ok || err != nil {
  270. return false, err
  271. }
  272. if options.AssumeYes {
  273. return true, nil
  274. }
  275. bindMounts := s.checkForBindMount(project)
  276. if len(bindMounts) > 0 {
  277. b := strings.Builder{}
  278. b.WriteString("you are about to publish bind mounts declaration within your OCI artifact.\n" +
  279. "only the bind mount declarations will be added to the OCI artifact (not content)\n" +
  280. "please double check that you are not mounting potential user's sensitive directories or data\n")
  281. for key, val := range bindMounts {
  282. b.WriteString(key)
  283. for _, v := range val {
  284. b.WriteString(v.String())
  285. b.WriteRune('\n')
  286. }
  287. }
  288. b.WriteString("Are you ok to publish these bind mount declarations?")
  289. confirm, err := s.prompt(b.String(), false)
  290. if err != nil || !confirm {
  291. return false, err
  292. }
  293. }
  294. detectedSecrets, err := s.checkForSensitiveData(project)
  295. if err != nil {
  296. return false, err
  297. }
  298. if len(detectedSecrets) > 0 {
  299. b := strings.Builder{}
  300. b.WriteString("you are about to publish sensitive data within your OCI artifact.\n" +
  301. "please double check that you are not leaking sensitive data\n")
  302. for _, val := range detectedSecrets {
  303. b.WriteString(val.Type)
  304. b.WriteRune('\n')
  305. b.WriteString(fmt.Sprintf("%q: %s\n", val.Key, val.Value))
  306. }
  307. b.WriteString("Are you ok to publish these sensitive data?")
  308. confirm, err := s.prompt(b.String(), false)
  309. if err != nil || !confirm {
  310. return false, err
  311. }
  312. }
  313. envVariables, err := s.checkEnvironmentVariables(project, options)
  314. if err != nil {
  315. return false, err
  316. }
  317. if len(envVariables) > 0 {
  318. b := strings.Builder{}
  319. b.WriteString("you are about to publish environment variables within your OCI artifact.\n" +
  320. "please double check that you are not leaking sensitive data\n")
  321. for key, val := range envVariables {
  322. b.WriteString("Service/Config ")
  323. b.WriteString(key)
  324. b.WriteRune('\n')
  325. for k, v := range val {
  326. b.WriteString(fmt.Sprintf("%s=%v\n", k, *v))
  327. }
  328. }
  329. b.WriteString("Are you ok to publish these environment variables?")
  330. confirm, err := s.prompt(b.String(), false)
  331. if err != nil || !confirm {
  332. return false, err
  333. }
  334. }
  335. return true, nil
  336. }
  337. func (s *composeService) checkEnvironmentVariables(project *types.Project, options api.PublishOptions) (map[string]types.MappingWithEquals, error) {
  338. envVarList := map[string]types.MappingWithEquals{}
  339. errorList := map[string][]string{}
  340. for _, service := range project.Services {
  341. if len(service.EnvFiles) > 0 {
  342. errorList[service.Name] = append(errorList[service.Name], fmt.Sprintf("service %q has env_file declared.", service.Name))
  343. }
  344. if len(service.Environment) > 0 {
  345. errorList[service.Name] = append(errorList[service.Name], fmt.Sprintf("service %q has environment variable(s) declared.", service.Name))
  346. envVarList[service.Name] = service.Environment
  347. }
  348. }
  349. for _, config := range project.Configs {
  350. if config.Environment != "" {
  351. errorList[config.Name] = append(errorList[config.Name], fmt.Sprintf("config %q is declare as an environment variable.", config.Name))
  352. envVarList[config.Name] = types.NewMappingWithEquals([]string{fmt.Sprintf("%s=%s", config.Name, config.Environment)})
  353. }
  354. }
  355. if !options.WithEnvironment && len(errorList) > 0 {
  356. errorMsgSuffix := "To avoid leaking sensitive data, you must either explicitly allow the sending of environment variables by using the --with-env flag,\n" +
  357. "or remove sensitive data from your Compose configuration"
  358. errorMsg := ""
  359. for _, errors := range errorList {
  360. for _, err := range errors {
  361. errorMsg += fmt.Sprintf("%s\n", err)
  362. }
  363. }
  364. return nil, fmt.Errorf("%s%s", errorMsg, errorMsgSuffix)
  365. }
  366. return envVarList, nil
  367. }
  368. func envFileLayers(files map[string]string) []v1.Descriptor {
  369. var layers []v1.Descriptor
  370. for file, hash := range files {
  371. f, err := os.ReadFile(file)
  372. if err != nil {
  373. // if we can't read the file, skip to the next one
  374. continue
  375. }
  376. layerDescriptor := oci.DescriptorForEnvFile(hash, f)
  377. layers = append(layers, layerDescriptor)
  378. }
  379. return layers
  380. }
  381. func (s *composeService) checkOnlyBuildSection(project *types.Project) (bool, error) {
  382. errorList := []string{}
  383. for _, service := range project.Services {
  384. if service.Image == "" && service.Build != nil {
  385. errorList = append(errorList, service.Name)
  386. }
  387. }
  388. if len(errorList) > 0 {
  389. errMsg := "your Compose stack cannot be published as it only contains a build section for service(s):\n"
  390. for _, serviceInError := range errorList {
  391. errMsg += fmt.Sprintf("- %q\n", serviceInError)
  392. }
  393. return false, errors.New(errMsg)
  394. }
  395. return true, nil
  396. }
  397. func (s *composeService) checkForBindMount(project *types.Project) map[string][]types.ServiceVolumeConfig {
  398. allFindings := map[string][]types.ServiceVolumeConfig{}
  399. for serviceName, config := range project.Services {
  400. bindMounts := []types.ServiceVolumeConfig{}
  401. for _, volume := range config.Volumes {
  402. if volume.Type == types.VolumeTypeBind {
  403. bindMounts = append(bindMounts, volume)
  404. }
  405. }
  406. if len(bindMounts) > 0 {
  407. allFindings[serviceName] = bindMounts
  408. }
  409. }
  410. return allFindings
  411. }
  412. func (s *composeService) checkForSensitiveData(project *types.Project) ([]secrets.DetectedSecret, error) {
  413. var allFindings []secrets.DetectedSecret
  414. scan := scanner.NewDefaultScanner()
  415. // Check all compose files
  416. for _, file := range project.ComposeFiles {
  417. in, err := composeFileAsByteReader(file, project)
  418. if err != nil {
  419. return nil, err
  420. }
  421. findings, err := scan.ScanReader(in)
  422. if err != nil {
  423. return nil, fmt.Errorf("failed to scan compose file %s: %w", file, err)
  424. }
  425. allFindings = append(allFindings, findings...)
  426. }
  427. for _, service := range project.Services {
  428. // Check env files
  429. for _, envFile := range service.EnvFiles {
  430. findings, err := scan.ScanFile(envFile.Path)
  431. if err != nil {
  432. return nil, fmt.Errorf("failed to scan env file %s: %w", envFile.Path, err)
  433. }
  434. allFindings = append(allFindings, findings...)
  435. }
  436. }
  437. // Check configs defined by files
  438. for _, config := range project.Configs {
  439. if config.File != "" {
  440. findings, err := scan.ScanFile(config.File)
  441. if err != nil {
  442. return nil, fmt.Errorf("failed to scan config file %s: %w", config.File, err)
  443. }
  444. allFindings = append(allFindings, findings...)
  445. }
  446. }
  447. // Check secrets defined by files
  448. for _, secret := range project.Secrets {
  449. if secret.File != "" {
  450. findings, err := scan.ScanFile(secret.File)
  451. if err != nil {
  452. return nil, fmt.Errorf("failed to scan secret file %s: %w", secret.File, err)
  453. }
  454. allFindings = append(allFindings, findings...)
  455. }
  456. }
  457. return allFindings, nil
  458. }
  459. func composeFileAsByteReader(filePath string, project *types.Project) (io.Reader, error) {
  460. composeFile, err := os.ReadFile(filePath)
  461. if err != nil {
  462. return nil, fmt.Errorf("failed to open compose file %s: %w", filePath, err)
  463. }
  464. base, err := loader.LoadWithContext(context.TODO(), types.ConfigDetails{
  465. WorkingDir: project.WorkingDir,
  466. Environment: project.Environment,
  467. ConfigFiles: []types.ConfigFile{
  468. {
  469. Filename: filePath,
  470. Content: composeFile,
  471. },
  472. },
  473. }, func(options *loader.Options) {
  474. options.SkipValidation = true
  475. options.SkipExtends = true
  476. options.SkipConsistencyCheck = true
  477. options.ResolvePaths = true
  478. options.SkipInterpolation = true
  479. options.SkipResolveEnvironment = true
  480. })
  481. if err != nil {
  482. return nil, err
  483. }
  484. in, err := base.MarshalYAML()
  485. if err != nil {
  486. return nil, err
  487. }
  488. return bytes.NewBuffer(in), nil
  489. }