@@ -18,6 +18,7 @@ package controller
18
18
19
19
import (
20
20
"context"
21
+ cryptotls "crypto/tls"
21
22
"errors"
22
23
"fmt"
23
24
"io"
@@ -31,9 +32,9 @@ import (
31
32
"github.com/Masterminds/semver/v3"
32
33
"github.com/google/go-containerregistry/pkg/authn"
33
34
"github.com/google/go-containerregistry/pkg/authn/k8schain"
34
- "github.com/google/go-containerregistry/pkg/crane"
35
35
"github.com/google/go-containerregistry/pkg/name"
36
36
gcrv1 "github.com/google/go-containerregistry/pkg/v1"
37
+ v1 "github.com/google/go-containerregistry/pkg/v1"
37
38
"github.com/google/go-containerregistry/pkg/v1/remote"
38
39
corev1 "k8s.io/api/core/v1"
39
40
"k8s.io/apimachinery/pkg/runtime"
@@ -369,10 +370,10 @@ func (r *OCIRepositoryReconciler) reconcileSource(ctx context.Context, sp *patch
369
370
return sreconcile .ResultEmpty , e
370
371
}
371
372
372
- opts := makeRemoteOptions (ctx , obj , transport , keychain , auth )
373
+ opts := makeRemoteOptions (ctx , transport , keychain , auth )
373
374
374
375
// Determine which artifact revision to pull
375
- url , err := r .getArtifactURL (obj , opts . craneOpts )
376
+ ref , err := r .getArtifactRef (obj , opts )
376
377
if err != nil {
377
378
if _ , ok := err .(invalidOCIURLError ); ok {
378
379
e := serror .NewStalling (
@@ -390,7 +391,8 @@ func (r *OCIRepositoryReconciler) reconcileSource(ctx context.Context, sp *patch
390
391
}
391
392
392
393
// Get the upstream revision from the artifact digest
393
- revision , err := r .getRevision (url , opts .craneOpts )
394
+ // TODO: getRevision resolves the digest, which may change before image is fetched, so it should probaly update ref
395
+ revision , err := r .getRevision (ref , opts )
394
396
if err != nil {
395
397
e := serror .NewGeneric (
396
398
fmt .Errorf ("failed to determine artifact digest: %w" , err ),
@@ -405,7 +407,7 @@ func (r *OCIRepositoryReconciler) reconcileSource(ctx context.Context, sp *patch
405
407
// Mark observations about the revision on the object
406
408
defer func () {
407
409
if ! obj .GetArtifact ().HasRevision (revision ) {
408
- message := fmt .Sprintf ("new revision '%s' for '%s'" , revision , url )
410
+ message := fmt .Sprintf ("new revision '%s' for '%s'" , revision , ref )
409
411
if obj .GetArtifact () != nil {
410
412
conditions .MarkTrue (obj , sourcev1 .ArtifactOutdatedCondition , "NewRevision" , message )
411
413
}
@@ -428,7 +430,7 @@ func (r *OCIRepositoryReconciler) reconcileSource(ctx context.Context, sp *patch
428
430
conditions .GetObservedGeneration (obj , sourcev1 .SourceVerifiedCondition ) != obj .Generation ||
429
431
conditions .IsFalse (obj , sourcev1 .SourceVerifiedCondition ) {
430
432
431
- err := r .verifySignature (ctx , obj , url , opts . verifyOpts ... )
433
+ err := r .verifySignature (ctx , obj , ref , opts ... )
432
434
if err != nil {
433
435
provider := obj .Spec .Verify .Provider
434
436
if obj .Spec .Verify .SecretRef == nil {
@@ -453,7 +455,7 @@ func (r *OCIRepositoryReconciler) reconcileSource(ctx context.Context, sp *patch
453
455
}
454
456
455
457
// Pull artifact from the remote container registry
456
- img , err := crane . Pull ( url , opts . craneOpts ... )
458
+ img , err := remote . Image ( ref , opts ... )
457
459
if err != nil {
458
460
e := serror .NewGeneric (
459
461
fmt .Errorf ("failed to pull artifact from '%s': %w" , obj .Spec .URL , err ),
@@ -573,37 +575,31 @@ func (r *OCIRepositoryReconciler) selectLayer(obj *ociv1.OCIRepository, image gc
573
575
574
576
// getRevision fetches the upstream digest, returning the revision in the
575
577
// format '<tag>@<digest>'.
576
- func (r * OCIRepositoryReconciler ) getRevision (url string , options []crane.Option ) (string , error ) {
577
- ref , err := name .ParseReference (url )
578
- if err != nil {
579
- return "" , err
580
- }
581
-
582
- repoTag := ""
583
- repoName := strings .TrimPrefix (url , ref .Context ().RegistryStr ())
584
- if s := strings .Split (repoName , ":" ); len (s ) == 2 && ! strings .Contains (repoName , "@" ) {
585
- repoTag = s [1 ]
586
- }
587
-
588
- if repoTag == "" && ! strings .Contains (repoName , "@" ) {
589
- repoTag = "latest"
590
- }
591
-
592
- digest , err := crane .Digest (url , options ... )
593
- if err != nil {
594
- return "" , err
595
- }
596
-
597
- digestHash , err := gcrv1 .NewHash (digest )
598
- if err != nil {
599
- return "" , err
600
- }
578
+ func (r * OCIRepositoryReconciler ) getRevision (ref name.Reference , options []remote.Option ) (string , error ) {
579
+ switch ref := ref .(type ) {
580
+ case name.Digest :
581
+ digest , err := v1 .NewHash (ref .DigestStr ())
582
+ if err != nil {
583
+ return "" , err
584
+ }
585
+ return digest .String (), nil
586
+ case name.Tag :
587
+ var digest v1.Hash
601
588
602
- revision := digestHash .String ()
603
- if repoTag != "" {
604
- revision = fmt .Sprintf ("%s@%s" , repoTag , revision )
589
+ desc , err := remote .Head (ref , options ... )
590
+ if err == nil {
591
+ digest = desc .Digest
592
+ } else {
593
+ rdesc , err := remote .Get (ref , options ... )
594
+ if err != nil {
595
+ return "" , err
596
+ }
597
+ digest = rdesc .Descriptor .Digest
598
+ }
599
+ return fmt .Sprintf ("%s@%s" , ref .TagStr (), digest .String ()), nil
600
+ default :
601
+ return "" , fmt .Errorf ("unsupported reference type: %T" , ref )
605
602
}
606
- return revision , nil
607
603
}
608
604
609
605
// digestFromRevision extracts the digest from the revision string.
@@ -615,7 +611,7 @@ func (r *OCIRepositoryReconciler) digestFromRevision(revision string) string {
615
611
// verifySignature verifies the authenticity of the given image reference URL.
616
612
// First, it tries to use a key if a Secret with a valid public key is provided.
617
613
// If not, it falls back to a keyless approach for verification.
618
- func (r * OCIRepositoryReconciler ) verifySignature (ctx context.Context , obj * ociv1.OCIRepository , url string , opt ... remote.Option ) error {
614
+ func (r * OCIRepositoryReconciler ) verifySignature (ctx context.Context , obj * ociv1.OCIRepository , ref name. Reference , opt ... remote.Option ) error {
619
615
ctxTimeout , cancel := context .WithTimeout (ctx , obj .Spec .Timeout .Duration )
620
616
defer cancel ()
621
617
@@ -626,15 +622,6 @@ func (r *OCIRepositoryReconciler) verifySignature(ctx context.Context, obj *ociv
626
622
soci .WithRemoteOptions (opt ... ),
627
623
}
628
624
629
- var nameOpts []name.Option
630
- if obj .Spec .Insecure {
631
- nameOpts = append (nameOpts , name .Insecure )
632
- }
633
- ref , err := name .ParseReference (url , nameOpts ... )
634
- if err != nil {
635
- return err
636
- }
637
-
638
625
// get the public keys from the given secret
639
626
if secretRef := obj .Spec .Verify .SecretRef ; secretRef != nil {
640
627
certSecretName := types.NamespacedName {
@@ -669,7 +656,7 @@ func (r *OCIRepositoryReconciler) verifySignature(ctx context.Context, obj *ociv
669
656
}
670
657
671
658
if ! signatureVerified {
672
- return fmt .Errorf ("no matching signatures were found for '%s'" , url )
659
+ return fmt .Errorf ("no matching signatures were found for '%s'" , ref )
673
660
}
674
661
675
662
return nil
@@ -691,71 +678,72 @@ func (r *OCIRepositoryReconciler) verifySignature(ctx context.Context, obj *ociv
691
678
return nil
692
679
}
693
680
694
- return fmt .Errorf ("no matching signatures were found for '%s'" , url )
681
+ return fmt .Errorf ("no matching signatures were found for '%s'" , ref )
695
682
}
696
683
697
684
return nil
698
685
}
699
686
700
- // parseRepositoryURL validates and extracts the repository URL.
701
- func (r * OCIRepositoryReconciler ) parseRepositoryURL (obj * ociv1.OCIRepository ) (string , error ) {
687
+ // parseRepository validates and extracts the repository URL.
688
+ func (r * OCIRepositoryReconciler ) parseRepository (obj * ociv1.OCIRepository ) (name. Repository , error ) {
702
689
if ! strings .HasPrefix (obj .Spec .URL , ociv1 .OCIRepositoryPrefix ) {
703
- return "" , fmt .Errorf ("URL must be in format 'oci://<domain>/<org>/<repo>'" )
690
+ return name. Repository {} , fmt .Errorf ("URL must be in format 'oci://<domain>/<org>/<repo>'" )
704
691
}
705
692
706
693
url := strings .TrimPrefix (obj .Spec .URL , ociv1 .OCIRepositoryPrefix )
707
- ref , err := name .ParseReference (url )
694
+
695
+ options := []name.Option {}
696
+ if obj .Spec .Insecure {
697
+ options = append (options , name .Insecure )
698
+ }
699
+ repo , err := name .NewRepository (url , options ... )
708
700
if err != nil {
709
- return "" , err
701
+ return name. Repository {} , err
710
702
}
711
703
712
- imageName := strings .TrimPrefix (url , ref . Context () .RegistryStr ())
704
+ imageName := strings .TrimPrefix (url , repo .RegistryStr ())
713
705
if s := strings .Split (imageName , ":" ); len (s ) > 1 {
714
- return "" , fmt .Errorf ("URL must not contain a tag; remove ':%s'" , s [1 ])
706
+ return name. Repository {} , fmt .Errorf ("URL must not contain a tag; remove ':%s'" , s [1 ])
715
707
}
716
708
717
- return ref . Context (). Name () , nil
709
+ return repo , nil
718
710
}
719
711
720
- // getArtifactURL determines which tag or revision should be used and returns the OCI artifact FQN.
721
- func (r * OCIRepositoryReconciler ) getArtifactURL (obj * ociv1.OCIRepository , options []crane .Option ) (string , error ) {
722
- url , err := r .parseRepositoryURL (obj )
712
+ // getArtifactRef determines which tag or revision should be used and returns the OCI artifact FQN.
713
+ func (r * OCIRepositoryReconciler ) getArtifactRef (obj * ociv1.OCIRepository , options []remote .Option ) (name. Reference , error ) {
714
+ repo , err := r .parseRepository (obj )
723
715
if err != nil {
724
- return "" , invalidOCIURLError {err }
716
+ return nil , invalidOCIURLError {err }
725
717
}
726
718
727
719
if obj .Spec .Reference != nil {
728
720
if obj .Spec .Reference .Digest != "" {
729
- return fmt . Sprintf ( "%s@%s" , url , obj .Spec .Reference .Digest ), nil
721
+ return repo . Digest ( obj .Spec .Reference .Digest ), nil
730
722
}
731
723
732
724
if obj .Spec .Reference .SemVer != "" {
733
- tag , err := r .getTagBySemver (url , obj .Spec .Reference .SemVer , options )
734
- if err != nil {
735
- return "" , err
736
- }
737
- return fmt .Sprintf ("%s:%s" , url , tag ), nil
725
+ return r .getTagBySemver (repo , obj .Spec .Reference .SemVer , options )
738
726
}
739
727
740
728
if obj .Spec .Reference .Tag != "" {
741
- return fmt . Sprintf ( "%s:%s" , url , obj .Spec .Reference .Tag ), nil
729
+ return repo . Tag ( obj .Spec .Reference .Tag ), nil
742
730
}
743
731
}
744
732
745
- return url , nil
733
+ return repo . Tag ( name . DefaultTag ) , nil
746
734
}
747
735
748
736
// getTagBySemver call the remote container registry, fetches all the tags from the repository,
749
737
// and returns the latest tag according to the semver expression.
750
- func (r * OCIRepositoryReconciler ) getTagBySemver (url , exp string , options []crane .Option ) (string , error ) {
751
- tags , err := crane . ListTags ( url , options ... )
738
+ func (r * OCIRepositoryReconciler ) getTagBySemver (repo name. Repository , exp string , options []remote .Option ) (name. Reference , error ) {
739
+ tags , err := remote . List ( repo , options ... )
752
740
if err != nil {
753
- return "" , err
741
+ return nil , err
754
742
}
755
743
756
744
constraint , err := semver .NewConstraint (exp )
757
745
if err != nil {
758
- return "" , fmt .Errorf ("semver '%s' parse error: %w" , exp , err )
746
+ return nil , fmt .Errorf ("semver '%s' parse error: %w" , exp , err )
759
747
}
760
748
761
749
var matchingVersions []* semver.Version
@@ -771,11 +759,11 @@ func (r *OCIRepositoryReconciler) getTagBySemver(url, exp string, options []cran
771
759
}
772
760
773
761
if len (matchingVersions ) == 0 {
774
- return "" , fmt .Errorf ("no match found for semver: %s" , exp )
762
+ return nil , fmt .Errorf ("no match found for semver: %s" , exp )
775
763
}
776
764
777
765
sort .Sort (sort .Reverse (semver .Collection (matchingVersions )))
778
- return matchingVersions [0 ].Original (), nil
766
+ return repo . Tag ( matchingVersions [0 ].Original () ), nil
779
767
}
780
768
781
769
// keychain generates the credential keychain based on the resource
@@ -825,9 +813,16 @@ func (r *OCIRepositoryReconciler) keychain(ctx context.Context, obj *ociv1.OCIRe
825
813
826
814
// transport clones the default transport from remote and when a certSecretRef is specified,
827
815
// the returned transport will include the TLS client and/or CA certificates.
828
- func (r * OCIRepositoryReconciler ) transport (ctx context.Context , obj * ociv1.OCIRepository ) (http.RoundTripper , error ) {
816
+ func (r * OCIRepositoryReconciler ) transport (ctx context.Context , obj * ociv1.OCIRepository ) (* http.Transport , error ) {
817
+ transport := remote .DefaultTransport .(* http.Transport ).Clone ()
818
+
829
819
if obj .Spec .CertSecretRef == nil || obj .Spec .CertSecretRef .Name == "" {
830
- return nil , nil
820
+ if obj .Spec .Insecure {
821
+ transport .TLSClientConfig = & cryptotls.Config {
822
+ InsecureSkipVerify : true ,
823
+ }
824
+ }
825
+ return transport , nil
831
826
}
832
827
833
828
certSecretName := types.NamespacedName {
@@ -839,7 +834,6 @@ func (r *OCIRepositoryReconciler) transport(ctx context.Context, obj *ociv1.OCIR
839
834
return nil , err
840
835
}
841
836
842
- transport := remote .DefaultTransport .(* http.Transport ).Clone ()
843
837
tlsConfig , _ , err := tls .KubeTLSClientConfigFromSecret (certSecret , "" )
844
838
if err != nil {
845
839
return nil , err
@@ -1155,55 +1149,28 @@ func (r *OCIRepositoryReconciler) notify(ctx context.Context, oldObj, newObj *oc
1155
1149
}
1156
1150
}
1157
1151
1158
- // craneOptions sets the auth headers, timeout and user agent
1159
- // for all operations against remote container registries.
1160
- func craneOptions (ctx context.Context , insecure bool ) []crane.Option {
1161
- options := []crane.Option {
1162
- crane .WithContext (ctx ),
1163
- crane .WithUserAgent (oci .UserAgent ),
1164
- }
1165
-
1166
- if insecure {
1167
- options = append (options , crane .Insecure )
1168
- }
1169
-
1170
- return options
1171
- }
1172
-
1173
1152
// makeRemoteOptions returns a remoteOptions struct with the authentication and transport options set.
1174
1153
// The returned struct can be used to interact with a remote registry using go-containerregistry based libraries.
1175
- func makeRemoteOptions (ctxTimeout context.Context , obj * ociv1. OCIRepository , transport http.RoundTripper ,
1154
+ func makeRemoteOptions (ctxTimeout context.Context , transport http.RoundTripper ,
1176
1155
keychain authn.Keychain , auth authn.Authenticator ) remoteOptions {
1177
- o := remoteOptions {
1178
- craneOpts : craneOptions (ctxTimeout , obj .Spec .Insecure ),
1179
- verifyOpts : []remote.Option {},
1180
- }
1181
-
1182
- if transport != nil {
1183
- o .craneOpts = append (o .craneOpts , crane .WithTransport (transport ))
1184
- o .verifyOpts = append (o .verifyOpts , remote .WithTransport (transport ))
1185
- }
1186
1156
1157
+ authOption := remote .WithAuthFromKeychain (keychain )
1187
1158
if auth != nil {
1188
1159
// auth take precedence over keychain here as we expect the caller to set
1189
1160
// the auth only if it is required.
1190
- o .verifyOpts = append (o .verifyOpts , remote .WithAuth (auth ))
1191
- o .craneOpts = append (o .craneOpts , crane .WithAuth (auth ))
1192
- return o
1161
+ authOption = remote .WithAuth (auth )
1162
+ }
1163
+ return remoteOptions {
1164
+ remote .WithContext (ctxTimeout ),
1165
+ remote .WithUserAgent (oci .UserAgent ),
1166
+ remote .WithTransport (transport ),
1167
+ authOption ,
1193
1168
}
1194
-
1195
- o .verifyOpts = append (o .verifyOpts , remote .WithAuthFromKeychain (keychain ))
1196
- o .craneOpts = append (o .craneOpts , crane .WithAuthFromKeychain (keychain ))
1197
-
1198
- return o
1199
1169
}
1200
1170
1201
1171
// remoteOptions contains the options to interact with a remote registry.
1202
1172
// It can be used to pass options to go-containerregistry based libraries.
1203
- type remoteOptions struct {
1204
- craneOpts []crane.Option
1205
- verifyOpts []remote.Option
1206
- }
1173
+ type remoteOptions []remote.Option
1207
1174
1208
1175
// ociContentConfigChanged evaluates the current spec with the observations
1209
1176
// of the artifact in the status to determine if artifact content configuration
0 commit comments