publish.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506
  1. /*
  2. Copyright 2020 Docker Compose CLI authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package compose
  14. import (
  15. "bytes"
  16. "context"
  17. "crypto/sha256"
  18. "encoding/json"
  19. "errors"
  20. "fmt"
  21. "io"
  22. "os"
  23. "strings"
  24. "github.com/DefangLabs/secret-detector/pkg/scanner"
  25. "github.com/DefangLabs/secret-detector/pkg/secrets"
  26. "github.com/compose-spec/compose-go/v2/loader"
  27. "github.com/compose-spec/compose-go/v2/types"
  28. "github.com/distribution/reference"
  29. "github.com/opencontainers/go-digest"
  30. "github.com/opencontainers/image-spec/specs-go"
  31. v1 "github.com/opencontainers/image-spec/specs-go/v1"
  32. "github.com/sirupsen/logrus"
  33. "github.com/docker/compose/v5/internal/oci"
  34. "github.com/docker/compose/v5/pkg/api"
  35. "github.com/docker/compose/v5/pkg/compose/transform"
  36. )
  37. func (s *composeService) Publish(ctx context.Context, project *types.Project, repository string, options api.PublishOptions) error {
  38. return Run(ctx, func(ctx context.Context) error {
  39. return s.publish(ctx, project, repository, options)
  40. }, "publish", s.events)
  41. }
  42. //nolint:gocyclo
  43. func (s *composeService) publish(ctx context.Context, project *types.Project, repository string, options api.PublishOptions) error {
  44. project, err := project.WithProfiles([]string{"*"})
  45. if err != nil {
  46. return err
  47. }
  48. accept, err := s.preChecks(ctx, project, options)
  49. if err != nil {
  50. return err
  51. }
  52. if !accept {
  53. return api.ErrCanceled
  54. }
  55. err = s.Push(ctx, project, api.PushOptions{IgnoreFailures: true, ImageMandatory: true})
  56. if err != nil {
  57. return err
  58. }
  59. layers, err := s.createLayers(ctx, project, options)
  60. if err != nil {
  61. return err
  62. }
  63. s.events.On(api.Resource{
  64. ID: repository,
  65. Text: "publishing",
  66. Status: api.Working,
  67. })
  68. if logrus.IsLevelEnabled(logrus.DebugLevel) {
  69. logrus.Debug("publishing layers")
  70. for _, layer := range layers {
  71. indent, _ := json.MarshalIndent(layer, "", " ")
  72. fmt.Println(string(indent))
  73. }
  74. }
  75. if !s.dryRun {
  76. named, err := reference.ParseDockerRef(repository)
  77. if err != nil {
  78. return err
  79. }
  80. var insecureRegistries []string
  81. if options.InsecureRegistry {
  82. insecureRegistries = append(insecureRegistries, reference.Domain(named))
  83. }
  84. resolver := oci.NewResolver(s.configFile(), insecureRegistries...)
  85. descriptor, err := oci.PushManifest(ctx, resolver, named, layers, options.OCIVersion)
  86. if err != nil {
  87. s.events.On(api.Resource{
  88. ID: repository,
  89. Text: "publishing",
  90. Status: api.Error,
  91. })
  92. return err
  93. }
  94. if options.Application {
  95. manifests := []v1.Descriptor{}
  96. for _, service := range project.Services {
  97. ref, err := reference.ParseDockerRef(service.Image)
  98. if err != nil {
  99. return err
  100. }
  101. manifest, err := oci.Copy(ctx, resolver, ref, named)
  102. if err != nil {
  103. return err
  104. }
  105. manifests = append(manifests, manifest)
  106. }
  107. descriptor.Data = nil
  108. index, err := json.Marshal(v1.Index{
  109. Versioned: specs.Versioned{SchemaVersion: 2},
  110. MediaType: v1.MediaTypeImageIndex,
  111. Manifests: manifests,
  112. Subject: &descriptor,
  113. Annotations: map[string]string{
  114. "com.docker.compose.version": api.ComposeVersion,
  115. },
  116. })
  117. if err != nil {
  118. return err
  119. }
  120. imagesDescriptor := v1.Descriptor{
  121. MediaType: v1.MediaTypeImageIndex,
  122. ArtifactType: oci.ComposeProjectArtifactType,
  123. Digest: digest.FromString(string(index)),
  124. Size: int64(len(index)),
  125. Annotations: map[string]string{
  126. "com.docker.compose.version": api.ComposeVersion,
  127. },
  128. Data: index,
  129. }
  130. err = oci.Push(ctx, resolver, reference.TrimNamed(named), imagesDescriptor)
  131. if err != nil {
  132. return err
  133. }
  134. }
  135. }
  136. s.events.On(api.Resource{
  137. ID: repository,
  138. Text: "published",
  139. Status: api.Done,
  140. })
  141. return nil
  142. }
  143. func (s *composeService) createLayers(ctx context.Context, project *types.Project, options api.PublishOptions) ([]v1.Descriptor, error) {
  144. var layers []v1.Descriptor
  145. extFiles := map[string]string{}
  146. envFiles := map[string]string{}
  147. for _, file := range project.ComposeFiles {
  148. data, err := processFile(ctx, file, project, extFiles, envFiles)
  149. if err != nil {
  150. return nil, err
  151. }
  152. layerDescriptor := oci.DescriptorForComposeFile(file, data)
  153. layers = append(layers, layerDescriptor)
  154. }
  155. extLayers, err := processExtends(ctx, project, extFiles)
  156. if err != nil {
  157. return nil, err
  158. }
  159. layers = append(layers, extLayers...)
  160. if options.WithEnvironment {
  161. layers = append(layers, envFileLayers(envFiles)...)
  162. }
  163. if options.ResolveImageDigests {
  164. yaml, err := s.generateImageDigestsOverride(ctx, project)
  165. if err != nil {
  166. return nil, err
  167. }
  168. layerDescriptor := oci.DescriptorForComposeFile("image-digests.yaml", yaml)
  169. layers = append(layers, layerDescriptor)
  170. }
  171. return layers, nil
  172. }
  173. func processExtends(ctx context.Context, project *types.Project, extFiles map[string]string) ([]v1.Descriptor, error) {
  174. var layers []v1.Descriptor
  175. moreExtFiles := map[string]string{}
  176. envFiles := map[string]string{}
  177. for xf, hash := range extFiles {
  178. data, err := processFile(ctx, xf, project, moreExtFiles, envFiles)
  179. if err != nil {
  180. return nil, err
  181. }
  182. layerDescriptor := oci.DescriptorForComposeFile(hash, data)
  183. layerDescriptor.Annotations["com.docker.compose.extends"] = "true"
  184. layers = append(layers, layerDescriptor)
  185. }
  186. for f, hash := range moreExtFiles {
  187. if _, ok := extFiles[f]; ok {
  188. delete(moreExtFiles, f)
  189. }
  190. extFiles[f] = hash
  191. }
  192. if len(moreExtFiles) > 0 {
  193. extLayers, err := processExtends(ctx, project, moreExtFiles)
  194. if err != nil {
  195. return nil, err
  196. }
  197. layers = append(layers, extLayers...)
  198. }
  199. return layers, nil
  200. }
  201. func processFile(ctx context.Context, file string, project *types.Project, extFiles map[string]string, envFiles map[string]string) ([]byte, error) {
  202. f, err := os.ReadFile(file)
  203. if err != nil {
  204. return nil, err
  205. }
  206. base, err := loader.LoadWithContext(ctx, types.ConfigDetails{
  207. WorkingDir: project.WorkingDir,
  208. Environment: project.Environment,
  209. ConfigFiles: []types.ConfigFile{
  210. {
  211. Filename: file,
  212. Content: f,
  213. },
  214. },
  215. }, func(options *loader.Options) {
  216. options.SkipValidation = true
  217. options.SkipExtends = true
  218. options.SkipConsistencyCheck = true
  219. options.ResolvePaths = true
  220. options.SkipInclude = true
  221. options.Profiles = project.Profiles
  222. })
  223. if err != nil {
  224. return nil, err
  225. }
  226. for name, service := range base.Services {
  227. for i, envFile := range service.EnvFiles {
  228. hash := fmt.Sprintf("%x.env", sha256.Sum256([]byte(envFile.Path)))
  229. envFiles[envFile.Path] = hash
  230. f, err = transform.ReplaceEnvFile(f, name, i, hash)
  231. if err != nil {
  232. return nil, err
  233. }
  234. }
  235. if service.Extends == nil {
  236. continue
  237. }
  238. xf := service.Extends.File
  239. if xf == "" {
  240. continue
  241. }
  242. if _, err = os.Stat(service.Extends.File); os.IsNotExist(err) {
  243. // No local file, while we loaded the project successfully: This is actually a remote resource
  244. continue
  245. }
  246. hash := fmt.Sprintf("%x.yaml", sha256.Sum256([]byte(xf)))
  247. extFiles[xf] = hash
  248. f, err = transform.ReplaceExtendsFile(f, name, hash)
  249. if err != nil {
  250. return nil, err
  251. }
  252. }
  253. return f, nil
  254. }
  255. func (s *composeService) generateImageDigestsOverride(ctx context.Context, project *types.Project) ([]byte, error) {
  256. project, err := project.WithImagesResolved(ImageDigestResolver(ctx, s.configFile(), s.apiClient()))
  257. if err != nil {
  258. return nil, err
  259. }
  260. override := types.Project{
  261. Services: types.Services{},
  262. }
  263. for name, service := range project.Services {
  264. override.Services[name] = types.ServiceConfig{
  265. Image: service.Image,
  266. }
  267. }
  268. return override.MarshalYAML()
  269. }
  270. func (s *composeService) preChecks(ctx context.Context, project *types.Project, options api.PublishOptions) (bool, error) {
  271. if ok, err := s.checkOnlyBuildSection(project); !ok || err != nil {
  272. return false, err
  273. }
  274. bindMounts := s.checkForBindMount(project)
  275. if len(bindMounts) > 0 {
  276. b := strings.Builder{}
  277. b.WriteString("you are about to publish bind mounts declaration within your OCI artifact.\n" +
  278. "only the bind mount declarations will be added to the OCI artifact (not content)\n" +
  279. "please double check that you are not mounting potential user's sensitive directories or data\n")
  280. for key, val := range bindMounts {
  281. b.WriteString(key)
  282. for _, v := range val {
  283. b.WriteString(v.String())
  284. b.WriteRune('\n')
  285. }
  286. }
  287. b.WriteString("Are you ok to publish these bind mount declarations?")
  288. confirm, err := s.prompt(b.String(), false)
  289. if err != nil || !confirm {
  290. return false, err
  291. }
  292. }
  293. detectedSecrets, err := s.checkForSensitiveData(ctx, project)
  294. if err != nil {
  295. return false, err
  296. }
  297. if len(detectedSecrets) > 0 {
  298. b := strings.Builder{}
  299. b.WriteString("you are about to publish sensitive data within your OCI artifact.\n" +
  300. "please double check that you are not leaking sensitive data\n")
  301. for _, val := range detectedSecrets {
  302. b.WriteString(val.Type)
  303. b.WriteRune('\n')
  304. fmt.Fprintf(&b, "%q: %s\n", val.Key, val.Value)
  305. }
  306. b.WriteString("Are you ok to publish these sensitive data?")
  307. confirm, err := s.prompt(b.String(), false)
  308. if err != nil || !confirm {
  309. return false, err
  310. }
  311. }
  312. err = s.checkEnvironmentVariables(project, options)
  313. if err != nil {
  314. return false, err
  315. }
  316. return true, nil
  317. }
  318. func (s *composeService) checkEnvironmentVariables(project *types.Project, options api.PublishOptions) error {
  319. errorList := map[string][]string{}
  320. for _, service := range project.Services {
  321. if len(service.EnvFiles) > 0 {
  322. errorList[service.Name] = append(errorList[service.Name], fmt.Sprintf("service %q has env_file declared.", service.Name))
  323. }
  324. }
  325. if !options.WithEnvironment && len(errorList) > 0 {
  326. errorMsgSuffix := "To avoid leaking sensitive data, you must either explicitly allow the sending of environment variables by using the --with-env flag,\n" +
  327. "or remove sensitive data from your Compose configuration"
  328. var errorMsg strings.Builder
  329. for _, errors := range errorList {
  330. for _, err := range errors {
  331. fmt.Fprintf(&errorMsg, "%s\n", err)
  332. }
  333. }
  334. return fmt.Errorf("%s%s", errorMsg.String(), errorMsgSuffix)
  335. }
  336. return nil
  337. }
  338. func envFileLayers(files map[string]string) []v1.Descriptor {
  339. var layers []v1.Descriptor
  340. for file, hash := range files {
  341. f, err := os.ReadFile(file)
  342. if err != nil {
  343. // if we can't read the file, skip to the next one
  344. continue
  345. }
  346. layerDescriptor := oci.DescriptorForEnvFile(hash, f)
  347. layers = append(layers, layerDescriptor)
  348. }
  349. return layers
  350. }
  351. func (s *composeService) checkOnlyBuildSection(project *types.Project) (bool, error) {
  352. errorList := []string{}
  353. for _, service := range project.Services {
  354. if service.Image == "" && service.Build != nil {
  355. errorList = append(errorList, service.Name)
  356. }
  357. }
  358. if len(errorList) > 0 {
  359. var errMsg strings.Builder
  360. errMsg.WriteString("your Compose stack cannot be published as it only contains a build section for service(s):\n")
  361. for _, serviceInError := range errorList {
  362. fmt.Fprintf(&errMsg, "- %q\n", serviceInError)
  363. }
  364. return false, errors.New(errMsg.String())
  365. }
  366. return true, nil
  367. }
  368. func (s *composeService) checkForBindMount(project *types.Project) map[string][]types.ServiceVolumeConfig {
  369. allFindings := map[string][]types.ServiceVolumeConfig{}
  370. for serviceName, config := range project.Services {
  371. bindMounts := []types.ServiceVolumeConfig{}
  372. for _, volume := range config.Volumes {
  373. if volume.Type == types.VolumeTypeBind {
  374. bindMounts = append(bindMounts, volume)
  375. }
  376. }
  377. if len(bindMounts) > 0 {
  378. allFindings[serviceName] = bindMounts
  379. }
  380. }
  381. return allFindings
  382. }
  383. func (s *composeService) checkForSensitiveData(ctx context.Context, project *types.Project) ([]secrets.DetectedSecret, error) {
  384. var allFindings []secrets.DetectedSecret
  385. scan := scanner.NewDefaultScanner()
  386. // Check all compose files
  387. for _, file := range project.ComposeFiles {
  388. in, err := composeFileAsByteReader(ctx, file, project)
  389. if err != nil {
  390. return nil, err
  391. }
  392. findings, err := scan.ScanReader(in)
  393. if err != nil {
  394. return nil, fmt.Errorf("failed to scan compose file %s: %w", file, err)
  395. }
  396. allFindings = append(allFindings, findings...)
  397. }
  398. for _, service := range project.Services {
  399. // Check env files
  400. for _, envFile := range service.EnvFiles {
  401. findings, err := scan.ScanFile(envFile.Path)
  402. if err != nil {
  403. return nil, fmt.Errorf("failed to scan env file %s: %w", envFile.Path, err)
  404. }
  405. allFindings = append(allFindings, findings...)
  406. }
  407. }
  408. // Check configs defined by files
  409. for _, config := range project.Configs {
  410. if config.File != "" {
  411. findings, err := scan.ScanFile(config.File)
  412. if err != nil {
  413. return nil, fmt.Errorf("failed to scan config file %s: %w", config.File, err)
  414. }
  415. allFindings = append(allFindings, findings...)
  416. }
  417. }
  418. // Check secrets defined by files
  419. for _, secret := range project.Secrets {
  420. if secret.File != "" {
  421. findings, err := scan.ScanFile(secret.File)
  422. if err != nil {
  423. return nil, fmt.Errorf("failed to scan secret file %s: %w", secret.File, err)
  424. }
  425. allFindings = append(allFindings, findings...)
  426. }
  427. }
  428. return allFindings, nil
  429. }
  430. func composeFileAsByteReader(ctx context.Context, filePath string, project *types.Project) (io.Reader, error) {
  431. composeFile, err := os.ReadFile(filePath)
  432. if err != nil {
  433. return nil, fmt.Errorf("failed to open compose file %s: %w", filePath, err)
  434. }
  435. base, err := loader.LoadWithContext(ctx, types.ConfigDetails{
  436. WorkingDir: project.WorkingDir,
  437. Environment: project.Environment,
  438. ConfigFiles: []types.ConfigFile{
  439. {
  440. Filename: filePath,
  441. Content: composeFile,
  442. },
  443. },
  444. }, func(options *loader.Options) {
  445. options.SkipValidation = true
  446. options.SkipExtends = true
  447. options.SkipConsistencyCheck = true
  448. options.ResolvePaths = true
  449. options.SkipInterpolation = true
  450. options.SkipResolveEnvironment = true
  451. })
  452. if err != nil {
  453. return nil, err
  454. }
  455. in, err := base.MarshalYAML()
  456. if err != nil {
  457. return nil, err
  458. }
  459. return bytes.NewBuffer(in), nil
  460. }