oci.go 7.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258
  1. /*
  2. Copyright 2020 Docker Compose CLI authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package remote
  14. import (
  15. "context"
  16. "encoding/json"
  17. "fmt"
  18. "os"
  19. "path/filepath"
  20. "strconv"
  21. "strings"
  22. "github.com/compose-spec/compose-go/v2/loader"
  23. "github.com/containerd/containerd/v2/core/images"
  24. "github.com/containerd/containerd/v2/core/remotes"
  25. "github.com/distribution/reference"
  26. "github.com/docker/cli/cli/command"
  27. "github.com/docker/compose/v2/internal/oci"
  28. spec "github.com/opencontainers/image-spec/specs-go/v1"
  29. )
  30. const (
  31. OCI_REMOTE_ENABLED = "COMPOSE_EXPERIMENTAL_OCI_REMOTE"
  32. OciPrefix = "oci://"
  33. )
  34. // validatePathInBase ensures a file path is contained within the base directory,
  35. // as OCI artifacts resources must all live within the same folder.
  36. func validatePathInBase(base, unsafePath string) error {
  37. // Reject paths with path separators regardless of OS
  38. if strings.ContainsAny(unsafePath, "\\/") {
  39. return fmt.Errorf("invalid OCI artifact")
  40. }
  41. // Join the base with the untrusted path
  42. targetPath := filepath.Join(base, unsafePath)
  43. // Get the directory of the target path
  44. targetDir := filepath.Dir(targetPath)
  45. // Clean both paths to resolve any .. or . components
  46. cleanBase := filepath.Clean(base)
  47. cleanTargetDir := filepath.Clean(targetDir)
  48. // Check if the target directory is the same as base directory
  49. if cleanTargetDir != cleanBase {
  50. return fmt.Errorf("invalid OCI artifact")
  51. }
  52. return nil
  53. }
  54. func ociRemoteLoaderEnabled() (bool, error) {
  55. if v := os.Getenv(OCI_REMOTE_ENABLED); v != "" {
  56. enabled, err := strconv.ParseBool(v)
  57. if err != nil {
  58. return false, fmt.Errorf("COMPOSE_EXPERIMENTAL_OCI_REMOTE environment variable expects boolean value: %w", err)
  59. }
  60. return enabled, err
  61. }
  62. return true, nil
  63. }
  64. func NewOCIRemoteLoader(dockerCli command.Cli, offline bool) loader.ResourceLoader {
  65. return ociRemoteLoader{
  66. dockerCli: dockerCli,
  67. offline: offline,
  68. known: map[string]string{},
  69. }
  70. }
  71. type ociRemoteLoader struct {
  72. dockerCli command.Cli
  73. offline bool
  74. known map[string]string
  75. }
  76. func (g ociRemoteLoader) Accept(path string) bool {
  77. return strings.HasPrefix(path, OciPrefix)
  78. }
  79. //nolint:gocyclo
  80. func (g ociRemoteLoader) Load(ctx context.Context, path string) (string, error) {
  81. enabled, err := ociRemoteLoaderEnabled()
  82. if err != nil {
  83. return "", err
  84. }
  85. if !enabled {
  86. return "", fmt.Errorf("OCI remote resource is disabled by %q", OCI_REMOTE_ENABLED)
  87. }
  88. if g.offline {
  89. return "", nil
  90. }
  91. local, ok := g.known[path]
  92. if !ok {
  93. ref, err := reference.ParseDockerRef(path[len(OciPrefix):])
  94. if err != nil {
  95. return "", err
  96. }
  97. resolver := oci.NewResolver(g.dockerCli.ConfigFile())
  98. descriptor, content, err := oci.Get(ctx, resolver, ref)
  99. if err != nil {
  100. return "", fmt.Errorf("failed to pull OCI resource %q: %w", ref, err)
  101. }
  102. cache, err := cacheDir()
  103. if err != nil {
  104. return "", fmt.Errorf("initializing remote resource cache: %w", err)
  105. }
  106. local = filepath.Join(cache, descriptor.Digest.Hex())
  107. if _, err = os.Stat(local); os.IsNotExist(err) {
  108. // a Compose application bundle is published as image index
  109. if images.IsIndexType(descriptor.MediaType) {
  110. var index spec.Index
  111. err = json.Unmarshal(content, &index)
  112. if err != nil {
  113. return "", err
  114. }
  115. found := false
  116. for _, manifest := range index.Manifests {
  117. if manifest.ArtifactType != oci.ComposeProjectArtifactType {
  118. continue
  119. }
  120. found = true
  121. digested, err := reference.WithDigest(ref, manifest.Digest)
  122. if err != nil {
  123. return "", err
  124. }
  125. descriptor, content, err = oci.Get(ctx, resolver, digested)
  126. if err != nil {
  127. return "", fmt.Errorf("failed to pull OCI resource %q: %w", ref, err)
  128. }
  129. }
  130. if !found {
  131. return "", fmt.Errorf("OCI index %s doesn't refer to compose artifacts", ref)
  132. }
  133. }
  134. var manifest spec.Manifest
  135. err = json.Unmarshal(content, &manifest)
  136. if err != nil {
  137. return "", err
  138. }
  139. err = g.pullComposeFiles(ctx, local, manifest, ref, resolver)
  140. if err != nil {
  141. // we need to clean up the directory to be sure we won't let empty files present
  142. _ = os.RemoveAll(local)
  143. return "", err
  144. }
  145. }
  146. g.known[path] = local
  147. }
  148. return filepath.Join(local, "compose.yaml"), nil
  149. }
  150. func (g ociRemoteLoader) Dir(path string) string {
  151. return g.known[path]
  152. }
  153. func (g ociRemoteLoader) pullComposeFiles(ctx context.Context, local string, manifest spec.Manifest, ref reference.Named, resolver remotes.Resolver) error { //nolint:gocyclo
  154. err := os.MkdirAll(local, 0o700)
  155. if err != nil {
  156. return err
  157. }
  158. if (manifest.ArtifactType != "" && manifest.ArtifactType != oci.ComposeProjectArtifactType) ||
  159. (manifest.ArtifactType == "" && manifest.Config.MediaType != oci.ComposeEmptyConfigMediaType) {
  160. return fmt.Errorf("%s is not a compose project OCI artifact, but %s", ref.String(), manifest.ArtifactType)
  161. }
  162. for i, layer := range manifest.Layers {
  163. digested, err := reference.WithDigest(ref, layer.Digest)
  164. if err != nil {
  165. return err
  166. }
  167. _, content, err := oci.Get(ctx, resolver, digested)
  168. if err != nil {
  169. return err
  170. }
  171. switch layer.MediaType {
  172. case oci.ComposeYAMLMediaType:
  173. if err := writeComposeFile(layer, i, local, content); err != nil {
  174. return err
  175. }
  176. case oci.ComposeEnvFileMediaType:
  177. if err := writeEnvFile(layer, local, content); err != nil {
  178. return err
  179. }
  180. case oci.ComposeEmptyConfigMediaType:
  181. }
  182. }
  183. return nil
  184. }
  185. func writeComposeFile(layer spec.Descriptor, i int, local string, content []byte) error {
  186. file := "compose.yaml"
  187. if _, ok := layer.Annotations["com.docker.compose.extends"]; ok {
  188. file = layer.Annotations["com.docker.compose.file"]
  189. if err := validatePathInBase(local, file); err != nil {
  190. return err
  191. }
  192. }
  193. f, err := os.Create(filepath.Join(local, file))
  194. if err != nil {
  195. return err
  196. }
  197. defer func() { _ = f.Close() }()
  198. if _, ok := layer.Annotations["com.docker.compose.file"]; i > 0 && ok {
  199. _, err := f.Write([]byte("\n---\n"))
  200. if err != nil {
  201. return err
  202. }
  203. }
  204. _, err = f.Write(content)
  205. return err
  206. }
  207. func writeEnvFile(layer spec.Descriptor, local string, content []byte) error {
  208. envfilePath, ok := layer.Annotations["com.docker.compose.envfile"]
  209. if !ok {
  210. return fmt.Errorf("missing annotation com.docker.compose.envfile in layer %q", layer.Digest)
  211. }
  212. if err := validatePathInBase(local, envfilePath); err != nil {
  213. return err
  214. }
  215. otherFile, err := os.Create(filepath.Join(local, envfilePath))
  216. if err != nil {
  217. return err
  218. }
  219. defer func() { _ = otherFile.Close() }()
  220. _, err = otherFile.Write(content)
  221. return err
  222. }
  223. var _ loader.ResourceLoader = ociRemoteLoader{}