@@ -33,6 +33,7 @@ import (
33
33
"github.com/google/go-containerregistry/pkg/v1/tarball"
34
34
scalibrImage "github.com/google/osv-scalibr/artifact/image"
35
35
"github.com/google/osv-scalibr/artifact/image/pathtree"
36
+ "github.com/google/osv-scalibr/artifact/image/require"
36
37
"github.com/google/osv-scalibr/artifact/image/symlink"
37
38
"github.com/google/osv-scalibr/artifact/image/whiteout"
38
39
"github.com/google/osv-scalibr/log"
50
51
ErrFileReadLimitExceeded = errors .New ("file exceeds read limit" )
51
52
// ErrSymlinkPointsOutsideRoot is returned when a symlink points outside the root.
52
53
ErrSymlinkPointsOutsideRoot = errors .New ("symlink points outside the root" )
54
+ // ErrInvalidConfig is returned when the image config is invalid.
55
+ ErrInvalidConfig = errors .New ("invalid image config" )
53
56
)
54
57
55
58
// ========================================================
@@ -59,20 +62,32 @@ var (
59
62
// Config contains the configuration to load an Image.
60
63
type Config struct {
61
64
MaxFileBytes int64
65
+ Requirer require.FileRequirer
62
66
}
63
67
64
68
// DefaultConfig returns the default configuration to load an Image.
65
69
func DefaultConfig () * Config {
66
70
return & Config {
67
71
MaxFileBytes : DefaultMaxFileBytes ,
72
+ Requirer : & require.FileRequirerAll {},
68
73
}
69
74
}
70
75
76
+ func validateConfig (config * Config ) error {
77
+ if config .MaxFileBytes <= 0 {
78
+ return fmt .Errorf ("%w: max file bytes must be positive: %d" , ErrInvalidConfig , config .MaxFileBytes )
79
+ }
80
+ if config .Requirer == nil {
81
+ return fmt .Errorf ("%w: requirer must be specified" , ErrInvalidConfig )
82
+ }
83
+ return nil
84
+ }
85
+
71
86
// Image is a container image. It is composed of a set of layers that can be scanned for software
72
87
// inventory. It contains the proper metadata to attribute inventory to layers.
73
88
type Image struct {
74
89
chainLayers []* chainLayer
75
- maxFileBytes int64
90
+ config * Config
76
91
ExtractDir string
77
92
BaseImageIndex int
78
93
}
@@ -113,11 +128,16 @@ func FromTarball(tarPath string, config *Config) (*Image, error) {
113
128
// FromV1Image takes a v1.Image and produces a layer-scannable Image. The steps taken are as
114
129
// follows:
115
130
//
116
- // (1) Retrieves v1.Layers, configFile. Creates tempPath to store the image files.
117
- // (2) Initializes the output image and the chain layers.
118
- // (3) Unpacks the layers by looping through the layers in reverse, while filling in the files
131
+ // (1) Validates the user input image config object.
132
+ // (2) Retrieves v1.Layers, configFile. Creates tempPath to store the image files.
133
+ // (3) Initializes the output image and the chain layers.
134
+ // (4) Unpacks the layers by looping through the layers in reverse, while filling in the files
119
135
// into the appropriate chain layer.
120
136
func FromV1Image (v1Image v1.Image , config * Config ) (* Image , error ) {
137
+ if err := validateConfig (config ); err != nil {
138
+ return nil , fmt .Errorf ("invalid image config: %w" , err )
139
+ }
140
+
121
141
configFile , err := v1Image .ConfigFile ()
122
142
if err != nil {
123
143
return nil , fmt .Errorf ("failed to load config file: %w" , err )
@@ -145,9 +165,9 @@ func FromV1Image(v1Image v1.Image, config *Config) (*Image, error) {
145
165
146
166
outputImage := Image {
147
167
chainLayers : chainLayers ,
168
+ config : config ,
148
169
ExtractDir : tempPath ,
149
170
BaseImageIndex : baseImageIndex ,
150
- maxFileBytes : config .MaxFileBytes ,
151
171
}
152
172
153
173
// Add the root directory to each chain layer. If this is not done, then the virtual paths won't
@@ -291,18 +311,18 @@ func fillChainLayerWithFilesFromTar(img *Image, tarReader *tar.Reader, originLay
291
311
if err != nil {
292
312
return fmt .Errorf ("could not read tar: %w" , err )
293
313
}
294
- // Some tools prepend everything with "./", so if we don't Clean the
295
- // name, we may have duplicate entries, which angers tar-split.
296
- // Using path instead of filepath to keep `/` and deterministic behavior
314
+ // Some tools prepend everything with "./", so if we don't path. Clean the name, we may have
315
+ // duplicate entries, which angers tar-split. Using path instead of filepath to keep `/` and
316
+ // deterministic behavior.
297
317
cleanedFilePath := path .Clean (filepath .ToSlash (header .Name ))
298
318
299
319
// Prevent "Zip Slip"
300
320
if strings .HasPrefix (cleanedFilePath , "../" ) {
301
321
continue
302
322
}
303
323
304
- // Force PAX format to remove Name/Linkname length limit of 100 characters required by USTAR
305
- // and to not depend on internal tar package guess which prefers USTAR over PAX.
324
+ // Force PAX format to remove Name/Linkname length limit of 100 characters required by USTAR and
325
+ // to not depend on internal tar package guess which prefers USTAR over PAX.
306
326
header .Format = tar .FormatPAX
307
327
308
328
// There is a difference between the filepath and path modules. The filepath module will handle
@@ -343,6 +363,11 @@ func fillChainLayerWithFilesFromTar(img *Image, tarReader *tar.Reader, originLay
343
363
// any forward slashes to the appropriate OS specific path separator.
344
364
realFilePath := filepath .Join (dirPath , filepath .FromSlash (cleanedFilePath ))
345
365
366
+ // If the file is not required, then skip it.
367
+ if ! img .config .Requirer .FileRequired (virtualPath , header .FileInfo ()) {
368
+ continue
369
+ }
370
+
346
371
var newNode * fileNode
347
372
switch header .Typeflag {
348
373
case tar .TypeDir :
@@ -437,8 +462,8 @@ func (img *Image) handleFile(realFilePath, virtualPath, originLayerID string, ta
437
462
}
438
463
defer f .Close ()
439
464
440
- numBytes , err := io .Copy (f , io .LimitReader (tarReader , img .maxFileBytes ))
441
- if numBytes >= img .maxFileBytes || errors .Is (err , io .EOF ) {
465
+ numBytes , err := io .Copy (f , io .LimitReader (tarReader , img .config . MaxFileBytes ))
466
+ if numBytes >= img .config . MaxFileBytes || errors .Is (err , io .EOF ) {
442
467
return nil , ErrFileReadLimitExceeded
443
468
}
444
469
0 commit comments