/vendor/github.com/docker/distribution/registry/storage/signedmanifesthandler.go

https://bitbucket.org/afawkes/acs-engine · Go · 167 lines · 129 code · 27 blank · 11 comment · 45 complexity · 3837483a57bc0fbe96039037d07ddd95 MD5 · raw file

  1. package storage
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "github.com/docker/distribution"
  6. "github.com/docker/distribution/context"
  7. "github.com/docker/distribution/digest"
  8. "github.com/docker/distribution/manifest/schema1"
  9. "github.com/docker/distribution/reference"
  10. "github.com/docker/libtrust"
  11. )
  12. // signedManifestHandler is a ManifestHandler that covers schema1 manifests. It
  13. // can unmarshal and put schema1 manifests that have been signed by libtrust.
  14. type signedManifestHandler struct {
  15. repository *repository
  16. blobStore *linkedBlobStore
  17. ctx context.Context
  18. signatures *signatureStore
  19. }
  20. var _ ManifestHandler = &signedManifestHandler{}
  21. func (ms *signedManifestHandler) Unmarshal(ctx context.Context, dgst digest.Digest, content []byte) (distribution.Manifest, error) {
  22. context.GetLogger(ms.ctx).Debug("(*signedManifestHandler).Unmarshal")
  23. var (
  24. signatures [][]byte
  25. err error
  26. )
  27. if ms.repository.schema1SignaturesEnabled {
  28. // Fetch the signatures for the manifest
  29. signatures, err = ms.signatures.Get(dgst)
  30. if err != nil {
  31. return nil, err
  32. }
  33. }
  34. jsig, err := libtrust.NewJSONSignature(content, signatures...)
  35. if err != nil {
  36. return nil, err
  37. }
  38. if ms.repository.schema1SigningKey != nil {
  39. if err := jsig.Sign(ms.repository.schema1SigningKey); err != nil {
  40. return nil, err
  41. }
  42. } else if !ms.repository.schema1SignaturesEnabled {
  43. return nil, fmt.Errorf("missing signing key with signature store disabled")
  44. }
  45. // Extract the pretty JWS
  46. raw, err := jsig.PrettySignature("signatures")
  47. if err != nil {
  48. return nil, err
  49. }
  50. var sm schema1.SignedManifest
  51. if err := json.Unmarshal(raw, &sm); err != nil {
  52. return nil, err
  53. }
  54. return &sm, nil
  55. }
  56. func (ms *signedManifestHandler) Put(ctx context.Context, manifest distribution.Manifest, skipDependencyVerification bool) (digest.Digest, error) {
  57. context.GetLogger(ms.ctx).Debug("(*signedManifestHandler).Put")
  58. sm, ok := manifest.(*schema1.SignedManifest)
  59. if !ok {
  60. return "", fmt.Errorf("non-schema1 manifest put to signedManifestHandler: %T", manifest)
  61. }
  62. if err := ms.verifyManifest(ms.ctx, *sm, skipDependencyVerification); err != nil {
  63. return "", err
  64. }
  65. mt := schema1.MediaTypeManifest
  66. payload := sm.Canonical
  67. revision, err := ms.blobStore.Put(ctx, mt, payload)
  68. if err != nil {
  69. context.GetLogger(ctx).Errorf("error putting payload into blobstore: %v", err)
  70. return "", err
  71. }
  72. // Link the revision into the repository.
  73. if err := ms.blobStore.linkBlob(ctx, revision); err != nil {
  74. return "", err
  75. }
  76. if ms.repository.schema1SignaturesEnabled {
  77. // Grab each json signature and store them.
  78. signatures, err := sm.Signatures()
  79. if err != nil {
  80. return "", err
  81. }
  82. if err := ms.signatures.Put(revision.Digest, signatures...); err != nil {
  83. return "", err
  84. }
  85. }
  86. return revision.Digest, nil
  87. }
  88. // verifyManifest ensures that the manifest content is valid from the
  89. // perspective of the registry. It ensures that the signature is valid for the
  90. // enclosed payload. As a policy, the registry only tries to store valid
  91. // content, leaving trust policies of that content up to consumers.
  92. func (ms *signedManifestHandler) verifyManifest(ctx context.Context, mnfst schema1.SignedManifest, skipDependencyVerification bool) error {
  93. var errs distribution.ErrManifestVerification
  94. if len(mnfst.Name) > reference.NameTotalLengthMax {
  95. errs = append(errs,
  96. distribution.ErrManifestNameInvalid{
  97. Name: mnfst.Name,
  98. Reason: fmt.Errorf("manifest name must not be more than %v characters", reference.NameTotalLengthMax),
  99. })
  100. }
  101. if !reference.NameRegexp.MatchString(mnfst.Name) {
  102. errs = append(errs,
  103. distribution.ErrManifestNameInvalid{
  104. Name: mnfst.Name,
  105. Reason: fmt.Errorf("invalid manifest name format"),
  106. })
  107. }
  108. if len(mnfst.History) != len(mnfst.FSLayers) {
  109. errs = append(errs, fmt.Errorf("mismatched history and fslayer cardinality %d != %d",
  110. len(mnfst.History), len(mnfst.FSLayers)))
  111. }
  112. if _, err := schema1.Verify(&mnfst); err != nil {
  113. switch err {
  114. case libtrust.ErrMissingSignatureKey, libtrust.ErrInvalidJSONContent, libtrust.ErrMissingSignatureKey:
  115. errs = append(errs, distribution.ErrManifestUnverified{})
  116. default:
  117. if err.Error() == "invalid signature" { // TODO(stevvooe): This should be exported by libtrust
  118. errs = append(errs, distribution.ErrManifestUnverified{})
  119. } else {
  120. errs = append(errs, err)
  121. }
  122. }
  123. }
  124. if !skipDependencyVerification {
  125. for _, fsLayer := range mnfst.References() {
  126. _, err := ms.repository.Blobs(ctx).Stat(ctx, fsLayer.Digest)
  127. if err != nil {
  128. if err != distribution.ErrBlobUnknown {
  129. errs = append(errs, err)
  130. }
  131. // On error here, we always append unknown blob errors.
  132. errs = append(errs, distribution.ErrManifestBlobUnknown{Digest: fsLayer.Digest})
  133. }
  134. }
  135. }
  136. if len(errs) != 0 {
  137. return errs
  138. }
  139. return nil
  140. }