07ef06dcfa
Google Cloud Storage supports granting access to protected objects via time-restricted URLs that are cryptographically signed. This makes it possible to store private data in buckets and to distribute it to eligible clients without having to make those clients aware of GCS authentication methods. Nixery now uses this feature to sign URLs for GCS buckets when returning layer URLs to clients on image pulls. This means that a private Nixery instance can run a bucket with restricted access just fine. Under the hood Nixery uses a key provided via environment variables to sign the URL with a 5 minute expiration time. This can be set up by adding the following two environment variables: * GCS_SIGNING_KEY: Path to the PEM file containing the signing key. * GCS_SIGNING_ACCOUNT: Account ("e-mail" address) to use for signing. If the variables are not set, the previous behaviour is not modified.
492 lines
14 KiB
Go
492 lines
14 KiB
Go
// Copyright 2019 Google LLC
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License"); you may not
|
|
// use this file except in compliance with the License. You may obtain a copy of
|
|
// the License at
|
|
//
|
|
// https://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
// WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
// License for the specific language governing permissions and limitations under
|
|
// the License.
|
|
|
|
// Package main provides the implementation of a container registry that
|
|
// transparently builds container images based on Nix derivations.
|
|
//
|
|
// The Nix derivation used for image creation is responsible for creating
|
|
// objects that are compatible with the registry API. The targeted registry
|
|
// protocol is currently Docker's.
|
|
//
|
|
// When an image is requested, the required contents are parsed out of the
|
|
// request and a Nix-build is initiated that eventually responds with the
|
|
// manifest as well as information linking each layer digest to a local
|
|
// filesystem path.
|
|
package main
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"log"
|
|
"net/http"
|
|
"os"
|
|
"os/exec"
|
|
"regexp"
|
|
"strings"
|
|
"time"
|
|
|
|
"cloud.google.com/go/storage"
|
|
)
|
|
|
|
// pkgSource represents the source from which the Nix package set used
|
|
// by Nixery is imported. Users configure the source by setting one of
|
|
// the supported environment variables.
|
|
type pkgSource struct {
|
|
srcType string
|
|
args string
|
|
}
|
|
|
|
// Convert the package source into the representation required by Nix.
|
|
func (p *pkgSource) renderSource(tag string) string {
|
|
// The 'git' source requires a tag to be present.
|
|
if p.srcType == "git" {
|
|
if tag == "latest" || tag == "" {
|
|
tag = "master"
|
|
}
|
|
|
|
return fmt.Sprintf("git!%s!%s", p.args, tag)
|
|
}
|
|
|
|
return fmt.Sprintf("%s!%s", p.srcType, p.args)
|
|
}
|
|
|
|
// Retrieve a package source from the environment. If no source is
|
|
// specified, the Nix code will default to a recent NixOS channel.
|
|
func pkgSourceFromEnv() *pkgSource {
|
|
if channel := os.Getenv("NIXERY_CHANNEL"); channel != "" {
|
|
log.Printf("Using Nix package set from Nix channel %q\n", channel)
|
|
return &pkgSource{
|
|
srcType: "nixpkgs",
|
|
args: channel,
|
|
}
|
|
}
|
|
|
|
if git := os.Getenv("NIXERY_PKGS_REPO"); git != "" {
|
|
log.Printf("Using Nix package set from git repository at %q\n", git)
|
|
return &pkgSource{
|
|
srcType: "git",
|
|
args: git,
|
|
}
|
|
}
|
|
|
|
if path := os.Getenv("NIXERY_PKGS_PATH"); path != "" {
|
|
log.Printf("Using Nix package set from path %q\n", path)
|
|
return &pkgSource{
|
|
srcType: "path",
|
|
args: path,
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Load (optional) GCS bucket signing data from the GCS_SIGNING_KEY and
|
|
// GCS_SIGNING_ACCOUNT envvars.
|
|
func signingOptsFromEnv() *storage.SignedURLOptions {
|
|
path := os.Getenv("GCS_SIGNING_KEY")
|
|
id := os.Getenv("GCS_SIGNING_ACCOUNT")
|
|
|
|
if path == "" || id == "" {
|
|
log.Println("GCS URL signing disabled")
|
|
return nil
|
|
}
|
|
|
|
log.Printf("GCS URL signing enabled with account %q\n", id)
|
|
k, err := ioutil.ReadFile(path)
|
|
if err != nil {
|
|
log.Fatalf("Failed to read GCS signing key: %s\n", err)
|
|
}
|
|
|
|
return &storage.SignedURLOptions{
|
|
GoogleAccessID: id,
|
|
PrivateKey: k,
|
|
Method: "GET",
|
|
}
|
|
}
|
|
|
|
// config holds the Nixery configuration options.
|
|
type config struct {
|
|
bucket string // GCS bucket to cache & serve layers
|
|
signing *storage.SignedURLOptions // Signing options to use for GCS URLs
|
|
builder string // Nix derivation for building images
|
|
port string // Port on which to launch HTTP server
|
|
pkgs *pkgSource // Source for Nix package set
|
|
}
|
|
|
|
// ManifestMediaType is the Content-Type used for the manifest itself. This
|
|
// corresponds to the "Image Manifest V2, Schema 2" described on this page:
|
|
//
|
|
// https://docs.docker.com/registry/spec/manifest-v2-2/
|
|
const manifestMediaType string = "application/vnd.docker.distribution.manifest.v2+json"
|
|
|
|
// Image represents the information necessary for building a container image.
|
|
// This can be either a list of package names (corresponding to keys in the
|
|
// nixpkgs set) or a Nix expression that results in a *list* of derivations.
|
|
type image struct {
|
|
name string
|
|
tag string
|
|
|
|
// Names of packages to include in the image. These must correspond
|
|
// directly to top-level names of Nix packages in the nixpkgs tree.
|
|
packages []string
|
|
}
|
|
|
|
// BuildResult represents the output of calling the Nix derivation responsible
|
|
// for building registry images.
|
|
//
|
|
// The `layerLocations` field contains the local filesystem paths to each
|
|
// individual image layer that will need to be served, while the `manifest`
|
|
// field contains the JSON-representation of the manifest that needs to be
|
|
// served to the client.
|
|
//
|
|
// The later field is simply treated as opaque JSON and passed through.
|
|
type BuildResult struct {
|
|
Error string `json:"error"`
|
|
Pkgs []string `json:"pkgs"`
|
|
|
|
Manifest json.RawMessage `json:"manifest"`
|
|
LayerLocations map[string]struct {
|
|
Path string `json:"path"`
|
|
Md5 []byte `json:"md5"`
|
|
} `json:"layerLocations"`
|
|
}
|
|
|
|
// imageFromName parses an image name into the corresponding structure which can
|
|
// be used to invoke Nix.
|
|
//
|
|
// It will expand convenience names under the hood (see the `convenienceNames`
|
|
// function below).
|
|
func imageFromName(name string, tag string) image {
|
|
packages := strings.Split(name, "/")
|
|
return image{
|
|
name: name,
|
|
tag: tag,
|
|
packages: convenienceNames(packages),
|
|
}
|
|
}
|
|
|
|
// convenienceNames expands convenience package names defined by Nixery which
|
|
// let users include commonly required sets of tools in a container quickly.
|
|
//
|
|
// Convenience names must be specified as the first package in an image.
|
|
//
|
|
// Currently defined convenience names are:
|
|
//
|
|
// * `shell`: Includes bash, coreutils and other common command-line tools
|
|
// * `builder`: All of the above and the standard build environment
|
|
func convenienceNames(packages []string) []string {
|
|
shellPackages := []string{"bashInteractive", "coreutils", "moreutils", "nano"}
|
|
|
|
if packages[0] == "shell" {
|
|
return append(packages[1:], shellPackages...)
|
|
}
|
|
|
|
return packages
|
|
}
|
|
|
|
// Call out to Nix and request that an image be built. Nix will, upon success,
|
|
// return a manifest for the container image.
|
|
func buildImage(ctx *context.Context, cfg *config, image *image, bucket *storage.BucketHandle) (*BuildResult, error) {
|
|
packages, err := json.Marshal(image.packages)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
args := []string{
|
|
"--no-out-link",
|
|
"--show-trace",
|
|
"--argstr", "name", image.name,
|
|
"--argstr", "packages", string(packages), cfg.builder,
|
|
}
|
|
|
|
if cfg.pkgs != nil {
|
|
args = append(args, "--argstr", "pkgSource", cfg.pkgs.renderSource(image.tag))
|
|
}
|
|
cmd := exec.Command("nix-build", args...)
|
|
|
|
outpipe, err := cmd.StdoutPipe()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
errpipe, err := cmd.StderrPipe()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if err = cmd.Start(); err != nil {
|
|
log.Println("Error starting nix-build:", err)
|
|
return nil, err
|
|
}
|
|
log.Printf("Started Nix image build for '%s'", image.name)
|
|
|
|
stdout, _ := ioutil.ReadAll(outpipe)
|
|
stderr, _ := ioutil.ReadAll(errpipe)
|
|
|
|
if err = cmd.Wait(); err != nil {
|
|
// TODO(tazjin): Propagate errors upwards in a usable format.
|
|
log.Printf("nix-build execution error: %s\nstdout: %s\nstderr: %s\n", err, stdout, stderr)
|
|
return nil, err
|
|
}
|
|
|
|
log.Println("Finished Nix image build")
|
|
|
|
buildOutput, err := ioutil.ReadFile(strings.TrimSpace(string(stdout)))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// The build output returned by Nix is deserialised to add all
|
|
// contained layers to the bucket. Only the manifest itself is
|
|
// re-serialised to JSON and returned.
|
|
var result BuildResult
|
|
err = json.Unmarshal(buildOutput, &result)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
for layer, meta := range result.LayerLocations {
|
|
err = uploadLayer(ctx, bucket, layer, meta.Path, meta.Md5)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
return &result, nil
|
|
}
|
|
|
|
// uploadLayer uploads a single layer to Cloud Storage bucket. Before writing
|
|
// any data the bucket is probed to see if the file already exists.
|
|
//
|
|
// If the file does exist, its MD5 hash is verified to ensure that the stored
|
|
// file is not - for example - a fragment of a previous, incomplete upload.
|
|
func uploadLayer(ctx *context.Context, bucket *storage.BucketHandle, layer string, path string, md5 []byte) error {
|
|
layerKey := fmt.Sprintf("layers/%s", layer)
|
|
obj := bucket.Object(layerKey)
|
|
|
|
// Before uploading a layer to the bucket, probe whether it already
|
|
// exists.
|
|
//
|
|
// If it does and the MD5 checksum matches the expected one, the layer
|
|
// upload can be skipped.
|
|
attrs, err := obj.Attrs(*ctx)
|
|
|
|
if err == nil && bytes.Equal(attrs.MD5, md5) {
|
|
log.Printf("Layer sha256:%s already exists in bucket, skipping upload", layer)
|
|
} else {
|
|
writer := obj.NewWriter(*ctx)
|
|
file, err := os.Open(path)
|
|
|
|
if err != nil {
|
|
return fmt.Errorf("failed to open layer %s from path %s: %v", layer, path, err)
|
|
}
|
|
|
|
size, err := io.Copy(writer, file)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to write layer %s to Cloud Storage: %v", layer, err)
|
|
}
|
|
|
|
if err = writer.Close(); err != nil {
|
|
return fmt.Errorf("failed to write layer %s to Cloud Storage: %v", layer, err)
|
|
}
|
|
|
|
log.Printf("Uploaded layer sha256:%s (%v bytes written)\n", layer, size)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// layerRedirect constructs the public URL of the layer object in the Cloud
|
|
// Storage bucket, signs it and redirects the user there.
|
|
//
|
|
// Signing the URL allows unauthenticated clients to retrieve objects from the
|
|
// bucket.
|
|
//
|
|
// The Docker client is known to follow redirects, but this might not be true
|
|
// for all other registry clients.
|
|
func constructLayerUrl(cfg *config, digest string) (string, error) {
|
|
log.Printf("Redirecting layer '%s' request to bucket '%s'\n", digest, cfg.bucket)
|
|
object := "layers/" + digest
|
|
|
|
if cfg.signing != nil {
|
|
opts := *cfg.signing
|
|
opts.Expires = time.Now().Add(5 * time.Minute)
|
|
return storage.SignedURL(cfg.bucket, object, &opts)
|
|
} else {
|
|
return ("https://storage.googleapis.com" + cfg.bucket + "/" + object), nil
|
|
}
|
|
}
|
|
|
|
// prepareBucket configures the handle to a Cloud Storage bucket in which
|
|
// individual layers will be stored after Nix builds. Nixery does not directly
|
|
// serve layers to registry clients, instead it redirects them to the public
|
|
// URLs of the Cloud Storage bucket.
|
|
//
|
|
// The bucket is required for Nixery to function correctly, hence fatal errors
|
|
// are generated in case it fails to be set up correctly.
|
|
func prepareBucket(ctx *context.Context, cfg *config) *storage.BucketHandle {
|
|
client, err := storage.NewClient(*ctx)
|
|
if err != nil {
|
|
log.Fatalln("Failed to set up Cloud Storage client:", err)
|
|
}
|
|
|
|
bkt := client.Bucket(cfg.bucket)
|
|
|
|
if _, err := bkt.Attrs(*ctx); err != nil {
|
|
log.Fatalln("Could not access configured bucket", err)
|
|
}
|
|
|
|
return bkt
|
|
}
|
|
|
|
// Regexes matching the V2 Registry API routes. This only includes the
|
|
// routes required for serving images, since pushing and other such
|
|
// functionality is not available.
|
|
var (
|
|
manifestRegex = regexp.MustCompile(`^/v2/([\w|\-|\.|\_|\/]+)/manifests/([\w|\-|\.|\_]+)$`)
|
|
layerRegex = regexp.MustCompile(`^/v2/([\w|\-|\.|\_|\/]+)/blobs/sha256:(\w+)$`)
|
|
)
|
|
|
|
// Error format corresponding to the registry protocol V2 specification. This
|
|
// allows feeding back errors to clients in a way that can be presented to
|
|
// users.
|
|
type registryError struct {
|
|
Code string `json:"code"`
|
|
Message string `json:"message"`
|
|
}
|
|
|
|
type registryErrors struct {
|
|
Errors []registryError `json:"errors"`
|
|
}
|
|
|
|
func writeError(w http.ResponseWriter, status int, code, message string) {
|
|
err := registryErrors{
|
|
Errors: []registryError{
|
|
{code, message},
|
|
},
|
|
}
|
|
json, _ := json.Marshal(err)
|
|
|
|
w.WriteHeader(status)
|
|
w.Header().Add("Content-Type", "application/json")
|
|
w.Write(json)
|
|
}
|
|
|
|
type registryHandler struct {
|
|
cfg *config
|
|
ctx *context.Context
|
|
bucket *storage.BucketHandle
|
|
}
|
|
|
|
func (h *registryHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
// Acknowledge that we speak V2 with an empty response
|
|
if r.RequestURI == "/v2/" {
|
|
return
|
|
}
|
|
|
|
// Serve the manifest (straight from Nix)
|
|
manifestMatches := manifestRegex.FindStringSubmatch(r.RequestURI)
|
|
if len(manifestMatches) == 3 {
|
|
imageName := manifestMatches[1]
|
|
imageTag := manifestMatches[2]
|
|
log.Printf("Requesting manifest for image %q at tag %q", imageName, imageTag)
|
|
image := imageFromName(imageName, imageTag)
|
|
buildResult, err := buildImage(h.ctx, h.cfg, &image, h.bucket)
|
|
|
|
if err != nil {
|
|
writeError(w, 500, "UNKNOWN", "image build failure")
|
|
log.Println("Failed to build image manifest", err)
|
|
return
|
|
}
|
|
|
|
// Some error types have special handling, which is applied
|
|
// here.
|
|
if buildResult.Error == "not_found" {
|
|
s := fmt.Sprintf("Could not find Nix packages: %v", buildResult.Pkgs)
|
|
writeError(w, 404, "MANIFEST_UNKNOWN", s)
|
|
log.Println(s)
|
|
return
|
|
}
|
|
|
|
// This marshaling error is ignored because we know that this
|
|
// field represents valid JSON data.
|
|
manifest, _ := json.Marshal(buildResult.Manifest)
|
|
w.Header().Add("Content-Type", manifestMediaType)
|
|
w.Write(manifest)
|
|
return
|
|
}
|
|
|
|
// Serve an image layer. For this we need to first ask Nix for
|
|
// the manifest, then proceed to extract the correct layer from
|
|
// it.
|
|
layerMatches := layerRegex.FindStringSubmatch(r.RequestURI)
|
|
if len(layerMatches) == 3 {
|
|
digest := layerMatches[2]
|
|
url, err := constructLayerUrl(h.cfg, digest)
|
|
|
|
if err != nil {
|
|
log.Printf("Failed to sign GCS URL: %s\n", err)
|
|
writeError(w, 500, "UNKNOWN", "could not serve layer")
|
|
return
|
|
}
|
|
|
|
w.Header().Set("Location", url)
|
|
w.WriteHeader(303)
|
|
return
|
|
}
|
|
|
|
log.Printf("Unsupported registry route: %s\n", r.RequestURI)
|
|
w.WriteHeader(404)
|
|
}
|
|
|
|
func getConfig(key, desc string) string {
|
|
value := os.Getenv(key)
|
|
if value == "" {
|
|
log.Fatalln(desc + " must be specified")
|
|
}
|
|
|
|
return value
|
|
}
|
|
|
|
func main() {
|
|
cfg := &config{
|
|
bucket: getConfig("BUCKET", "GCS bucket for layer storage"),
|
|
builder: getConfig("NIX_BUILDER", "Nix image builder code"),
|
|
port: getConfig("PORT", "HTTP port"),
|
|
pkgs: pkgSourceFromEnv(),
|
|
signing: signingOptsFromEnv(),
|
|
}
|
|
|
|
ctx := context.Background()
|
|
bucket := prepareBucket(&ctx, cfg)
|
|
|
|
log.Printf("Starting Kubernetes Nix controller on port %s\n", cfg.port)
|
|
|
|
// All /v2/ requests belong to the registry handler.
|
|
http.Handle("/v2/", ®istryHandler{
|
|
cfg: cfg,
|
|
ctx: &ctx,
|
|
bucket: bucket,
|
|
})
|
|
|
|
// All other roots are served by the static file server.
|
|
webDir := http.Dir(getConfig("WEB_DIR", "Static web file dir"))
|
|
http.Handle("/", http.FileServer(webDir))
|
|
|
|
log.Fatal(http.ListenAndServe(":"+cfg.port, nil))
|
|
}
|