diff options
author | Brent Baude <bbaude@redhat.com> | 2020-04-16 12:25:26 -0500 |
---|---|---|
committer | Brent Baude <bbaude@redhat.com> | 2020-04-16 15:53:58 -0500 |
commit | 241326a9a8c20ad7f2bcf651416b836e7778e090 (patch) | |
tree | 4001e8e47a022bb1b9bfbf2332c42e1aeb802f9e /cmd/podman/sign.go | |
parent | 88c6fd06cd54fb9a8826306dfdf1a77e400de5de (diff) | |
download | podman-241326a9a8c20ad7f2bcf651416b836e7778e090.tar.gz podman-241326a9a8c20ad7f2bcf651416b836e7778e090.tar.bz2 podman-241326a9a8c20ad7f2bcf651416b836e7778e090.zip |
Podman V2 birth
remote podman v1 and replace with podman v2.
Signed-off-by: Brent Baude <bbaude@redhat.com>
Diffstat (limited to 'cmd/podman/sign.go')
-rw-r--r-- | cmd/podman/sign.go | 226 |
1 files changed, 0 insertions, 226 deletions
diff --git a/cmd/podman/sign.go b/cmd/podman/sign.go deleted file mode 100644 index 7da3459cf..000000000 --- a/cmd/podman/sign.go +++ /dev/null @@ -1,226 +0,0 @@ -package main - -import ( - "io/ioutil" - "net/url" - "os" - "path/filepath" - "strconv" - "strings" - - "github.com/containers/image/v5/signature" - "github.com/containers/image/v5/transports" - "github.com/containers/image/v5/transports/alltransports" - "github.com/containers/libpod/cmd/podman/cliconfig" - "github.com/containers/libpod/cmd/podman/libpodruntime" - "github.com/containers/libpod/libpod/image" - "github.com/containers/libpod/pkg/rootless" - "github.com/containers/libpod/pkg/trust" - "github.com/containers/libpod/pkg/util" - "github.com/pkg/errors" - "github.com/sirupsen/logrus" - "github.com/spf13/cobra" -) - -var ( - signCommand cliconfig.SignValues - signDescription = "Create a signature file that can be used later to verify the image." - _signCommand = &cobra.Command{ - Use: "sign [flags] IMAGE [IMAGE...]", - Short: "Sign an image", - Long: signDescription, - RunE: func(cmd *cobra.Command, args []string) error { - signCommand.InputArgs = args - signCommand.GlobalFlags = MainGlobalOpts - signCommand.Remote = remoteclient - return signCmd(&signCommand) - }, - Example: `podman image sign --sign-by mykey imageID - podman image sign --sign-by mykey --directory ./mykeydir imageID`, - } -) - -func init() { - signCommand.Command = _signCommand - signCommand.SetHelpTemplate(HelpTemplate()) - signCommand.SetUsageTemplate(UsageTemplate()) - flags := signCommand.Flags() - flags.StringVarP(&signCommand.Directory, "directory", "d", "", "Define an alternate directory to store signatures") - flags.StringVar(&signCommand.SignBy, "sign-by", "", "Name of the signing key") - flags.StringVar(&signCommand.CertDir, "cert-dir", "", "`Pathname` of a directory containing TLS certificates and keys") -} - -// SignatureStoreDir defines default directory to store signatures -const SignatureStoreDir = "/var/lib/containers/sigstore" - -func signCmd(c *cliconfig.SignValues) error { - args := c.InputArgs - if len(args) < 1 { - return errors.Errorf("at least one image name must be specified") - } - runtime, err := libpodruntime.GetRuntime(getContext(), &c.PodmanCommand) - if err != nil { - return errors.Wrapf(err, "could not create runtime") - } - defer runtime.DeferredShutdown(false) - - signby := c.SignBy - if signby == "" { - return errors.Errorf("please provide an identity") - } - - var sigStoreDir string - if c.Flag("directory").Changed { - sigStoreDir = c.Directory - if _, err := os.Stat(sigStoreDir); err != nil { - return errors.Wrapf(err, "invalid directory %s", sigStoreDir) - } - } - - sc := runtime.SystemContext() - sc.DockerCertPath = c.CertDir - - dockerRegistryOptions := image.DockerRegistryOptions{ - DockerCertPath: c.CertDir, - } - - mech, err := signature.NewGPGSigningMechanism() - if err != nil { - return errors.Wrap(err, "error initializing GPG") - } - defer mech.Close() - if err := mech.SupportsSigning(); err != nil { - return errors.Wrap(err, "signing is not supported") - } - - systemRegistriesDirPath := trust.RegistriesDirPath(sc) - registryConfigs, err := trust.LoadAndMergeConfig(systemRegistriesDirPath) - if err != nil { - return errors.Wrapf(err, "error reading registry configuration") - } - - for _, signimage := range args { - srcRef, err := alltransports.ParseImageName(signimage) - if err != nil { - return errors.Wrapf(err, "error parsing image name") - } - rawSource, err := srcRef.NewImageSource(getContext(), sc) - if err != nil { - return errors.Wrapf(err, "error getting image source") - } - err = rawSource.Close() - if err != nil { - logrus.Errorf("unable to close new image source %q", err) - } - manifest, _, err := rawSource.GetManifest(getContext(), nil) - if err != nil { - return errors.Wrapf(err, "error getting manifest") - } - dockerReference := rawSource.Reference().DockerReference() - if dockerReference == nil { - return errors.Errorf("cannot determine canonical Docker reference for destination %s", transports.ImageName(rawSource.Reference())) - } - - // create the signstore file - rtc, err := runtime.GetConfig() - if err != nil { - return err - } - newImage, err := runtime.ImageRuntime().New(getContext(), signimage, rtc.Engine.SignaturePolicyPath, "", os.Stderr, &dockerRegistryOptions, image.SigningOptions{SignBy: signby}, nil, util.PullImageMissing) - if err != nil { - return errors.Wrapf(err, "error pulling image %s", signimage) - } - - if rootless.IsRootless() { - if sigStoreDir == "" { - sigStoreDir = filepath.Join(filepath.Dir(runtime.StorageConfig().GraphRoot), "sigstore") - } - } else { - registryInfo := trust.HaveMatchRegistry(rawSource.Reference().DockerReference().String(), registryConfigs) - if registryInfo != nil { - if sigStoreDir == "" { - sigStoreDir = registryInfo.SigStoreStaging - if sigStoreDir == "" { - sigStoreDir = registryInfo.SigStore - } - } - sigStoreDir, err = isValidSigStoreDir(sigStoreDir) - if err != nil { - return errors.Wrapf(err, "invalid signature storage %s", sigStoreDir) - } - } - if sigStoreDir == "" { - sigStoreDir = SignatureStoreDir - } - } - - repos, err := newImage.RepoDigests() - if err != nil { - return errors.Wrapf(err, "error calculating repo digests for %s", signimage) - } - if len(repos) == 0 { - logrus.Errorf("no repodigests associated with the image %s", signimage) - continue - } - - // create signature - newSig, err := signature.SignDockerManifest(manifest, dockerReference.String(), mech, signby) - if err != nil { - return errors.Wrapf(err, "error creating new signature") - } - - trimmedDigest := strings.TrimPrefix(repos[0], strings.Split(repos[0], "/")[0]) - sigStoreDir = filepath.Join(sigStoreDir, strings.Replace(trimmedDigest, ":", "=", 1)) - if err := os.MkdirAll(sigStoreDir, 0751); err != nil { - // The directory is allowed to exist - if !os.IsExist(err) { - logrus.Errorf("error creating directory %s: %s", sigStoreDir, err) - continue - } - } - sigFilename, err := getSigFilename(sigStoreDir) - if err != nil { - logrus.Errorf("error creating sigstore file: %v", err) - continue - } - err = ioutil.WriteFile(filepath.Join(sigStoreDir, sigFilename), newSig, 0644) - if err != nil { - logrus.Errorf("error storing signature for %s", rawSource.Reference().DockerReference().String()) - continue - } - } - return nil -} - -func getSigFilename(sigStoreDirPath string) (string, error) { - sigFileSuffix := 1 - sigFiles, err := ioutil.ReadDir(sigStoreDirPath) - if err != nil { - return "", err - } - sigFilenames := make(map[string]bool) - for _, file := range sigFiles { - sigFilenames[file.Name()] = true - } - for { - sigFilename := "signature-" + strconv.Itoa(sigFileSuffix) - if _, exists := sigFilenames[sigFilename]; !exists { - return sigFilename, nil - } - sigFileSuffix++ - } -} - -func isValidSigStoreDir(sigStoreDir string) (string, error) { - writeURIs := map[string]bool{"file": true} - url, err := url.Parse(sigStoreDir) - if err != nil { - return sigStoreDir, errors.Wrapf(err, "invalid directory %s", sigStoreDir) - } - _, exists := writeURIs[url.Scheme] - if !exists { - return sigStoreDir, errors.Errorf("writing to %s is not supported. Use a supported scheme", sigStoreDir) - } - sigStoreDir = url.Path - return sigStoreDir, nil -} |