package store import ( "archive/tar" "archive/zip" "bufio" "bytes" _ "crypto/sha256" // ensure ids can be computed "encoding/json" "fmt" "io" "io/ioutil" "net/http" "path" "path/filepath" "regexp" "strings" "github.com/docker/docker/errdefs" digest "github.com/opencontainers/go-digest" "github.com/pkg/errors" ) const restrictedNamePattern = "^[a-zA-Z0-9][a-zA-Z0-9_.+-]+$" var restrictedNameRegEx = regexp.MustCompile(restrictedNamePattern) // Store provides a context store for easily remembering endpoints configuration type Store interface { Reader Lister Writer StorageInfoProvider } // Reader provides read-only (without list) access to context data type Reader interface { GetMetadata(name string) (Metadata, error) ListTLSFiles(name string) (map[string]EndpointFiles, error) GetTLSData(contextName, endpointName, fileName string) ([]byte, error) } // Lister provides listing of contexts type Lister interface { List() ([]Metadata, error) } // ReaderLister combines Reader and Lister interfaces type ReaderLister interface { Reader Lister } // StorageInfoProvider provides more information about storage details of contexts type StorageInfoProvider interface { GetStorageInfo(contextName string) StorageInfo } // Writer provides write access to context data type Writer interface { CreateOrUpdate(meta Metadata) error Remove(name string) error ResetTLSMaterial(name string, data *ContextTLSData) error ResetEndpointTLSMaterial(contextName string, endpointName string, data *EndpointTLSData) error } // ReaderWriter combines Reader and Writer interfaces type ReaderWriter interface { Reader Writer } // Metadata contains metadata about a context and its endpoints type Metadata struct { Name string `json:",omitempty"` Metadata interface{} `json:",omitempty"` Endpoints map[string]interface{} `json:",omitempty"` } // StorageInfo contains data about where a given context is stored type StorageInfo struct { MetadataPath string TLSPath string } // EndpointTLSData represents tls data for a given endpoint type EndpointTLSData struct { Files map[string][]byte } // ContextTLSData represents tls data for a whole context type ContextTLSData struct { Endpoints map[string]EndpointTLSData } // New creates a store from a given directory. // If the directory does not exist or is empty, initialize it func New(dir string, cfg Config) Store { metaRoot := filepath.Join(dir, metadataDir) tlsRoot := filepath.Join(dir, tlsDir) return &store{ meta: &metadataStore{ root: metaRoot, config: cfg, }, tls: &tlsStore{ root: tlsRoot, }, } } type store struct { meta *metadataStore tls *tlsStore } func (s *store) List() ([]Metadata, error) { return s.meta.list() } func (s *store) CreateOrUpdate(meta Metadata) error { return s.meta.createOrUpdate(meta) } func (s *store) Remove(name string) error { id := contextdirOf(name) if err := s.meta.remove(id); err != nil { return patchErrContextName(err, name) } return patchErrContextName(s.tls.removeAllContextData(id), name) } func (s *store) GetMetadata(name string) (Metadata, error) { res, err := s.meta.get(contextdirOf(name)) patchErrContextName(err, name) return res, err } func (s *store) ResetTLSMaterial(name string, data *ContextTLSData) error { id := contextdirOf(name) if err := s.tls.removeAllContextData(id); err != nil { return patchErrContextName(err, name) } if data == nil { return nil } for ep, files := range data.Endpoints { for fileName, data := range files.Files { if err := s.tls.createOrUpdate(id, ep, fileName, data); err != nil { return patchErrContextName(err, name) } } } return nil } func (s *store) ResetEndpointTLSMaterial(contextName string, endpointName string, data *EndpointTLSData) error { id := contextdirOf(contextName) if err := s.tls.removeAllEndpointData(id, endpointName); err != nil { return patchErrContextName(err, contextName) } if data == nil { return nil } for fileName, data := range data.Files { if err := s.tls.createOrUpdate(id, endpointName, fileName, data); err != nil { return patchErrContextName(err, contextName) } } return nil } func (s *store) ListTLSFiles(name string) (map[string]EndpointFiles, error) { res, err := s.tls.listContextData(contextdirOf(name)) return res, patchErrContextName(err, name) } func (s *store) GetTLSData(contextName, endpointName, fileName string) ([]byte, error) { res, err := s.tls.getData(contextdirOf(contextName), endpointName, fileName) return res, patchErrContextName(err, contextName) } func (s *store) GetStorageInfo(contextName string) StorageInfo { dir := contextdirOf(contextName) return StorageInfo{ MetadataPath: s.meta.contextDir(dir), TLSPath: s.tls.contextDir(dir), } } // ValidateContextName checks a context name is valid. func ValidateContextName(name string) error { if name == "" { return errors.New("context name cannot be empty") } if name == "default" { return errors.New(`"default" is a reserved context name`) } if !restrictedNameRegEx.MatchString(name) { return fmt.Errorf("context name %q is invalid, names are validated against regexp %q", name, restrictedNamePattern) } return nil } // Export exports an existing namespace into an opaque data stream // This stream is actually a tarball containing context metadata and TLS materials, but it does // not map 1:1 the layout of the context store (don't try to restore it manually without calling store.Import) func Export(name string, s Reader) io.ReadCloser { reader, writer := io.Pipe() go func() { tw := tar.NewWriter(writer) defer tw.Close() defer writer.Close() meta, err := s.GetMetadata(name) if err != nil { writer.CloseWithError(err) return } metaBytes, err := json.Marshal(&meta) if err != nil { writer.CloseWithError(err) return } if err = tw.WriteHeader(&tar.Header{ Name: metaFile, Mode: 0644, Size: int64(len(metaBytes)), }); err != nil { writer.CloseWithError(err) return } if _, err = tw.Write(metaBytes); err != nil { writer.CloseWithError(err) return } tlsFiles, err := s.ListTLSFiles(name) if err != nil { writer.CloseWithError(err) return } if err = tw.WriteHeader(&tar.Header{ Name: "tls", Mode: 0700, Size: 0, Typeflag: tar.TypeDir, }); err != nil { writer.CloseWithError(err) return } for endpointName, endpointFiles := range tlsFiles { if err = tw.WriteHeader(&tar.Header{ Name: path.Join("tls", endpointName), Mode: 0700, Size: 0, Typeflag: tar.TypeDir, }); err != nil { writer.CloseWithError(err) return } for _, fileName := range endpointFiles { data, err := s.GetTLSData(name, endpointName, fileName) if err != nil { writer.CloseWithError(err) return } if err = tw.WriteHeader(&tar.Header{ Name: path.Join("tls", endpointName, fileName), Mode: 0600, Size: int64(len(data)), }); err != nil { writer.CloseWithError(err) return } if _, err = tw.Write(data); err != nil { writer.CloseWithError(err) return } } } }() return reader } const ( maxAllowedFileSizeToImport int64 = 10 << 20 zipType string = "application/zip" ) func getImportContentType(r *bufio.Reader) (string, error) { head, err := r.Peek(512) if err != nil && err != io.EOF { return "", err } return http.DetectContentType(head), nil } // Import imports an exported context into a store func Import(name string, s Writer, reader io.Reader) error { // Buffered reader will not advance the buffer, needed to determine content type r := bufio.NewReader(reader) importContentType, err := getImportContentType(r) if err != nil { return err } switch importContentType { case zipType: return importZip(name, s, r) default: // Assume it's a TAR (TAR does not have a "magic number") return importTar(name, s, r) } } func isValidFilePath(p string) error { if p != metaFile && !strings.HasPrefix(p, "tls/") { return errors.New("unexpected context file") } if path.Clean(p) != p { return errors.New("unexpected path format") } if strings.Contains(p, `\`) { return errors.New(`unexpected '\' in path`) } return nil } func importTar(name string, s Writer, reader io.Reader) error { tr := tar.NewReader(&LimitedReader{R: reader, N: maxAllowedFileSizeToImport}) tlsData := ContextTLSData{ Endpoints: map[string]EndpointTLSData{}, } var importedMetaFile bool for { hdr, err := tr.Next() if err == io.EOF { break } if err != nil { return err } if hdr.Typeflag != tar.TypeReg { // skip this entry, only taking files into account continue } if err := isValidFilePath(hdr.Name); err != nil { return errors.Wrap(err, hdr.Name) } if hdr.Name == metaFile { data, err := ioutil.ReadAll(tr) if err != nil { return err } meta, err := parseMetadata(data, name) if err != nil { return err } if err := s.CreateOrUpdate(meta); err != nil { return err } importedMetaFile = true } else if strings.HasPrefix(hdr.Name, "tls/") { data, err := ioutil.ReadAll(tr) if err != nil { return err } if err := importEndpointTLS(&tlsData, hdr.Name, data); err != nil { return err } } } if !importedMetaFile { return errdefs.InvalidParameter(errors.New("invalid context: no metadata found")) } return s.ResetTLSMaterial(name, &tlsData) } func importZip(name string, s Writer, reader io.Reader) error { body, err := ioutil.ReadAll(&LimitedReader{R: reader, N: maxAllowedFileSizeToImport}) if err != nil { return err } zr, err := zip.NewReader(bytes.NewReader(body), int64(len(body))) if err != nil { return err } tlsData := ContextTLSData{ Endpoints: map[string]EndpointTLSData{}, } var importedMetaFile bool for _, zf := range zr.File { fi := zf.FileInfo() if !fi.Mode().IsRegular() { // skip this entry, only taking regular files into account continue } if err := isValidFilePath(zf.Name); err != nil { return errors.Wrap(err, zf.Name) } if zf.Name == metaFile { f, err := zf.Open() if err != nil { return err } data, err := ioutil.ReadAll(&LimitedReader{R: f, N: maxAllowedFileSizeToImport}) defer f.Close() if err != nil { return err } meta, err := parseMetadata(data, name) if err != nil { return err } if err := s.CreateOrUpdate(meta); err != nil { return err } importedMetaFile = true } else if strings.HasPrefix(zf.Name, "tls/") { f, err := zf.Open() if err != nil { return err } data, err := ioutil.ReadAll(f) defer f.Close() if err != nil { return err } err = importEndpointTLS(&tlsData, zf.Name, data) if err != nil { return err } } } if !importedMetaFile { return errdefs.InvalidParameter(errors.New("invalid context: no metadata found")) } return s.ResetTLSMaterial(name, &tlsData) } func parseMetadata(data []byte, name string) (Metadata, error) { var meta Metadata if err := json.Unmarshal(data, &meta); err != nil { return meta, err } if err := ValidateContextName(name); err != nil { return Metadata{}, err } meta.Name = name return meta, nil } func importEndpointTLS(tlsData *ContextTLSData, path string, data []byte) error { parts := strings.SplitN(strings.TrimPrefix(path, "tls/"), "/", 2) if len(parts) != 2 { // TLS endpoints require archived file directory with 2 layers // i.e. tls/{endpointName}/{fileName} return errors.New("archive format is invalid") } epName := parts[0] fileName := parts[1] if _, ok := tlsData.Endpoints[epName]; !ok { tlsData.Endpoints[epName] = EndpointTLSData{ Files: map[string][]byte{}, } } tlsData.Endpoints[epName].Files[fileName] = data return nil } type setContextName interface { setContext(name string) } type contextDoesNotExistError struct { name string } func (e *contextDoesNotExistError) Error() string { return fmt.Sprintf("context %q does not exist", e.name) } func (e *contextDoesNotExistError) setContext(name string) { e.name = name } // NotFound satisfies interface github.com/docker/docker/errdefs.ErrNotFound func (e *contextDoesNotExistError) NotFound() {} type tlsDataDoesNotExist interface { errdefs.ErrNotFound IsTLSDataDoesNotExist() } type tlsDataDoesNotExistError struct { context, endpoint, file string } func (e *tlsDataDoesNotExistError) Error() string { return fmt.Sprintf("tls data for %s/%s/%s does not exist", e.context, e.endpoint, e.file) } func (e *tlsDataDoesNotExistError) setContext(name string) { e.context = name } // NotFound satisfies interface github.com/docker/docker/errdefs.ErrNotFound func (e *tlsDataDoesNotExistError) NotFound() {} // IsTLSDataDoesNotExist satisfies tlsDataDoesNotExist func (e *tlsDataDoesNotExistError) IsTLSDataDoesNotExist() {} // IsErrContextDoesNotExist checks if the given error is a "context does not exist" condition func IsErrContextDoesNotExist(err error) bool { _, ok := err.(*contextDoesNotExistError) return ok } // IsErrTLSDataDoesNotExist checks if the given error is a "context does not exist" condition func IsErrTLSDataDoesNotExist(err error) bool { _, ok := err.(tlsDataDoesNotExist) return ok } type contextdir string func contextdirOf(name string) contextdir { return contextdir(digest.FromString(name).Encoded()) } func patchErrContextName(err error, name string) error { if typed, ok := err.(setContextName); ok { typed.setContext(name) } return err }