mirror of
https://github.com/aquasecurity/trivy.git
synced 2025-12-22 23:26:39 -08:00
feat(server): add internal --path-prefix flag for client/server mode (#7321)
Signed-off-by: knqyf263 <knqyf263@gmail.com>
This commit is contained in:
@@ -33,9 +33,6 @@ cache:
|
|||||||
# Same as '--cache-backend'
|
# Same as '--cache-backend'
|
||||||
backend: "fs"
|
backend: "fs"
|
||||||
|
|
||||||
# Same as '--clear-cache'
|
|
||||||
clear: false
|
|
||||||
|
|
||||||
redis:
|
redis:
|
||||||
# Same as '--redis-ca'
|
# Same as '--redis-ca'
|
||||||
ca: ""
|
ca: ""
|
||||||
@@ -112,9 +109,6 @@ db:
|
|||||||
# Same as '--skip-java-db-update'
|
# Same as '--skip-java-db-update'
|
||||||
java-skip-update: false
|
java-skip-update: false
|
||||||
|
|
||||||
# Same as '--light'
|
|
||||||
light: false
|
|
||||||
|
|
||||||
# Same as '--no-progress'
|
# Same as '--no-progress'
|
||||||
no-progress: false
|
no-progress: false
|
||||||
|
|
||||||
@@ -124,9 +118,6 @@ db:
|
|||||||
# Same as '--skip-db-update'
|
# Same as '--skip-db-update'
|
||||||
skip-update: false
|
skip-update: false
|
||||||
|
|
||||||
# Same as '--reset'
|
|
||||||
reset: false
|
|
||||||
|
|
||||||
```
|
```
|
||||||
## Image options
|
## Image options
|
||||||
|
|
||||||
@@ -411,9 +402,6 @@ misconfiguration:
|
|||||||
# Same as '--include-non-failures'
|
# Same as '--include-non-failures'
|
||||||
include-non-failures: false
|
include-non-failures: false
|
||||||
|
|
||||||
# Same as '--reset-checks-bundle'
|
|
||||||
reset-checks-bundle: false
|
|
||||||
|
|
||||||
# Same as '--misconfig-scanners'
|
# Same as '--misconfig-scanners'
|
||||||
scanners:
|
scanners:
|
||||||
- azure-arm
|
- azure-arm
|
||||||
@@ -580,9 +568,6 @@ scan:
|
|||||||
# Same as '--skip-files'
|
# Same as '--skip-files'
|
||||||
skip-files: []
|
skip-files: []
|
||||||
|
|
||||||
# Same as '--slow'
|
|
||||||
slow: false
|
|
||||||
|
|
||||||
```
|
```
|
||||||
## Secret options
|
## Secret options
|
||||||
|
|
||||||
|
|||||||
@@ -32,6 +32,7 @@ type csArgs struct {
|
|||||||
Input string
|
Input string
|
||||||
ClientToken string
|
ClientToken string
|
||||||
ClientTokenHeader string
|
ClientTokenHeader string
|
||||||
|
PathPrefix string
|
||||||
ListAllPackages bool
|
ListAllPackages bool
|
||||||
Target string
|
Target string
|
||||||
secretConfig string
|
secretConfig string
|
||||||
@@ -443,7 +444,11 @@ func TestClientServerWithCycloneDX(t *testing.T) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestClientServerWithToken(t *testing.T) {
|
func TestClientServerWithCustomOptions(t *testing.T) {
|
||||||
|
token := "token"
|
||||||
|
tokenHeader := "Trivy-Token"
|
||||||
|
pathPrefix := "prefix"
|
||||||
|
|
||||||
tests := []struct {
|
tests := []struct {
|
||||||
name string
|
name string
|
||||||
args csArgs
|
args csArgs
|
||||||
@@ -451,11 +456,12 @@ func TestClientServerWithToken(t *testing.T) {
|
|||||||
wantErr string
|
wantErr string
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "alpine 3.9 with token",
|
name: "alpine 3.9 with token and prefix",
|
||||||
args: csArgs{
|
args: csArgs{
|
||||||
Input: "testdata/fixtures/images/alpine-39.tar.gz",
|
Input: "testdata/fixtures/images/alpine-39.tar.gz",
|
||||||
ClientToken: "token",
|
ClientToken: token,
|
||||||
ClientTokenHeader: "Trivy-Token",
|
ClientTokenHeader: tokenHeader,
|
||||||
|
PathPrefix: pathPrefix,
|
||||||
},
|
},
|
||||||
golden: "testdata/alpine-39.json.golden",
|
golden: "testdata/alpine-39.json.golden",
|
||||||
},
|
},
|
||||||
@@ -464,7 +470,8 @@ func TestClientServerWithToken(t *testing.T) {
|
|||||||
args: csArgs{
|
args: csArgs{
|
||||||
Input: "testdata/fixtures/images/distroless-base.tar.gz",
|
Input: "testdata/fixtures/images/distroless-base.tar.gz",
|
||||||
ClientToken: "invalidtoken",
|
ClientToken: "invalidtoken",
|
||||||
ClientTokenHeader: "Trivy-Token",
|
ClientTokenHeader: tokenHeader,
|
||||||
|
PathPrefix: pathPrefix,
|
||||||
},
|
},
|
||||||
wantErr: "twirp error unauthenticated: invalid token",
|
wantErr: "twirp error unauthenticated: invalid token",
|
||||||
},
|
},
|
||||||
@@ -472,18 +479,28 @@ func TestClientServerWithToken(t *testing.T) {
|
|||||||
name: "invalid token header",
|
name: "invalid token header",
|
||||||
args: csArgs{
|
args: csArgs{
|
||||||
Input: "testdata/fixtures/images/distroless-base.tar.gz",
|
Input: "testdata/fixtures/images/distroless-base.tar.gz",
|
||||||
ClientToken: "token",
|
ClientToken: token,
|
||||||
ClientTokenHeader: "Unknown-Header",
|
ClientTokenHeader: "Unknown-Header",
|
||||||
|
PathPrefix: pathPrefix,
|
||||||
},
|
},
|
||||||
wantErr: "twirp error unauthenticated: invalid token",
|
wantErr: "twirp error unauthenticated: invalid token",
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
name: "wrong path prefix",
|
||||||
|
args: csArgs{
|
||||||
|
Input: "testdata/fixtures/images/distroless-base.tar.gz",
|
||||||
|
ClientToken: token,
|
||||||
|
ClientTokenHeader: tokenHeader,
|
||||||
|
PathPrefix: "wrong",
|
||||||
|
},
|
||||||
|
wantErr: "HTTP status code 404",
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
serverToken := "token"
|
|
||||||
serverTokenHeader := "Trivy-Token"
|
|
||||||
addr, cacheDir := setup(t, setupOptions{
|
addr, cacheDir := setup(t, setupOptions{
|
||||||
token: serverToken,
|
token: token,
|
||||||
tokenHeader: serverTokenHeader,
|
tokenHeader: tokenHeader,
|
||||||
|
pathPrefix: pathPrefix,
|
||||||
})
|
})
|
||||||
|
|
||||||
for _, tt := range tests {
|
for _, tt := range tests {
|
||||||
@@ -539,6 +556,7 @@ func TestClientServerWithRedis(t *testing.T) {
|
|||||||
type setupOptions struct {
|
type setupOptions struct {
|
||||||
token string
|
token string
|
||||||
tokenHeader string
|
tokenHeader string
|
||||||
|
pathPrefix string
|
||||||
cacheBackend string
|
cacheBackend string
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -556,7 +574,7 @@ func setup(t *testing.T, options setupOptions) (string, string) {
|
|||||||
addr := fmt.Sprintf("localhost:%d", port)
|
addr := fmt.Sprintf("localhost:%d", port)
|
||||||
|
|
||||||
go func() {
|
go func() {
|
||||||
osArgs := setupServer(addr, options.token, options.tokenHeader, cacheDir, options.cacheBackend)
|
osArgs := setupServer(addr, options.token, options.tokenHeader, options.pathPrefix, cacheDir, options.cacheBackend)
|
||||||
|
|
||||||
// Run Trivy server
|
// Run Trivy server
|
||||||
require.NoError(t, execute(osArgs))
|
require.NoError(t, execute(osArgs))
|
||||||
@@ -569,22 +587,20 @@ func setup(t *testing.T, options setupOptions) (string, string) {
|
|||||||
return addr, cacheDir
|
return addr, cacheDir
|
||||||
}
|
}
|
||||||
|
|
||||||
func setupServer(addr, token, tokenHeader, cacheDir, cacheBackend string) []string {
|
func setupServer(addr, token, tokenHeader, pathPrefix, cacheDir, cacheBackend string) []string {
|
||||||
osArgs := []string{
|
osArgs := []string{
|
||||||
"--cache-dir",
|
"--cache-dir",
|
||||||
cacheDir,
|
cacheDir,
|
||||||
"server",
|
"server",
|
||||||
"--skip-update",
|
"--skip-db-update",
|
||||||
"--listen",
|
"--listen",
|
||||||
addr,
|
addr,
|
||||||
}
|
}
|
||||||
if token != "" {
|
if token != "" {
|
||||||
osArgs = append(osArgs, []string{
|
osArgs = append(osArgs, "--token", token, "--token-header", tokenHeader)
|
||||||
"--token",
|
}
|
||||||
token,
|
if pathPrefix != "" {
|
||||||
"--token-header",
|
osArgs = append(osArgs, "--path-prefix", pathPrefix)
|
||||||
tokenHeader,
|
|
||||||
}...)
|
|
||||||
}
|
}
|
||||||
if cacheBackend != "" {
|
if cacheBackend != "" {
|
||||||
osArgs = append(osArgs, "--cache-backend", cacheBackend)
|
osArgs = append(osArgs, "--cache-backend", cacheBackend)
|
||||||
@@ -593,13 +609,13 @@ func setupServer(addr, token, tokenHeader, cacheDir, cacheBackend string) []stri
|
|||||||
}
|
}
|
||||||
|
|
||||||
func setupClient(t *testing.T, c csArgs, addr string, cacheDir string) []string {
|
func setupClient(t *testing.T, c csArgs, addr string, cacheDir string) []string {
|
||||||
|
t.Helper()
|
||||||
if c.Command == "" {
|
if c.Command == "" {
|
||||||
c.Command = "image"
|
c.Command = "image"
|
||||||
}
|
}
|
||||||
if c.RemoteAddrOption == "" {
|
if c.RemoteAddrOption == "" {
|
||||||
c.RemoteAddrOption = "--server"
|
c.RemoteAddrOption = "--server"
|
||||||
}
|
}
|
||||||
t.Helper()
|
|
||||||
osArgs := []string{
|
osArgs := []string{
|
||||||
"--cache-dir",
|
"--cache-dir",
|
||||||
cacheDir,
|
cacheDir,
|
||||||
@@ -639,6 +655,9 @@ func setupClient(t *testing.T, c csArgs, addr string, cacheDir string) []string
|
|||||||
if c.ClientToken != "" {
|
if c.ClientToken != "" {
|
||||||
osArgs = append(osArgs, "--token", c.ClientToken, "--token-header", c.ClientTokenHeader)
|
osArgs = append(osArgs, "--token", c.ClientToken, "--token-header", c.ClientTokenHeader)
|
||||||
}
|
}
|
||||||
|
if c.PathPrefix != "" {
|
||||||
|
osArgs = append(osArgs, "--path-prefix", c.PathPrefix)
|
||||||
|
}
|
||||||
if c.Input != "" {
|
if c.Input != "" {
|
||||||
osArgs = append(osArgs, "--input", c.Input)
|
osArgs = append(osArgs, "--input", c.Input)
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -105,7 +105,7 @@ func writeFlags(group flag.FlagGroup, w *os.File) {
|
|||||||
|
|
||||||
var lastParts []string
|
var lastParts []string
|
||||||
for _, flg := range flags {
|
for _, flg := range flags {
|
||||||
if flg.GetConfigName() == "" {
|
if flg.GetConfigName() == "" || flg.Hidden() {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
// We need to split the config name on `.` to make the indentations needed in yaml.
|
// We need to split the config name on `.` to make the indentations needed in yaml.
|
||||||
|
|||||||
9
pkg/cache/remote.go
vendored
9
pkg/cache/remote.go
vendored
@@ -5,6 +5,7 @@ import (
|
|||||||
"crypto/tls"
|
"crypto/tls"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
|
||||||
|
"github.com/twitchtv/twirp"
|
||||||
"golang.org/x/xerrors"
|
"golang.org/x/xerrors"
|
||||||
|
|
||||||
"github.com/aquasecurity/trivy/pkg/fanal/types"
|
"github.com/aquasecurity/trivy/pkg/fanal/types"
|
||||||
@@ -19,6 +20,7 @@ type RemoteOptions struct {
|
|||||||
ServerAddr string
|
ServerAddr string
|
||||||
CustomHeaders http.Header
|
CustomHeaders http.Header
|
||||||
Insecure bool
|
Insecure bool
|
||||||
|
PathPrefix string
|
||||||
}
|
}
|
||||||
|
|
||||||
// RemoteCache implements remote cache
|
// RemoteCache implements remote cache
|
||||||
@@ -39,7 +41,12 @@ func NewRemoteCache(opts RemoteOptions) *RemoteCache {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
c := rpcCache.NewCacheProtobufClient(opts.ServerAddr, httpClient)
|
|
||||||
|
var twirpOpts []twirp.ClientOption
|
||||||
|
if opts.PathPrefix != "" {
|
||||||
|
twirpOpts = append(twirpOpts, twirp.WithClientPathPrefix(opts.PathPrefix))
|
||||||
|
}
|
||||||
|
c := rpcCache.NewCacheProtobufClient(opts.ServerAddr, httpClient, twirpOpts...)
|
||||||
return &RemoteCache{
|
return &RemoteCache{
|
||||||
ctx: ctx,
|
ctx: ctx,
|
||||||
client: c,
|
client: c,
|
||||||
|
|||||||
@@ -545,11 +545,7 @@ func (r *runner) initScannerConfig(opts flag.Options) (ScannerConfig, types.Scan
|
|||||||
Target: target,
|
Target: target,
|
||||||
CacheOptions: opts.CacheOpts(),
|
CacheOptions: opts.CacheOpts(),
|
||||||
RemoteCacheOptions: opts.RemoteCacheOpts(),
|
RemoteCacheOptions: opts.RemoteCacheOpts(),
|
||||||
ServerOption: client.ScannerOption{
|
ServerOption: opts.ClientScannerOpts(),
|
||||||
RemoteURL: opts.ServerAddr,
|
|
||||||
CustomHeaders: opts.CustomHeaders,
|
|
||||||
Insecure: opts.Insecure,
|
|
||||||
},
|
|
||||||
ArtifactOption: artifact.Option{
|
ArtifactOption: artifact.Option{
|
||||||
DisabledAnalyzers: disabledAnalyzers(opts),
|
DisabledAnalyzers: disabledAnalyzers(opts),
|
||||||
DisabledHandlers: disabledHandlers,
|
DisabledHandlers: disabledHandlers,
|
||||||
|
|||||||
@@ -50,6 +50,6 @@ func Run(ctx context.Context, opts flag.Options) (err error) {
|
|||||||
m.Register()
|
m.Register()
|
||||||
|
|
||||||
server := rpcServer.NewServer(opts.AppVersion, opts.Listen, opts.CacheDir, opts.Token, opts.TokenHeader,
|
server := rpcServer.NewServer(opts.AppVersion, opts.Listen, opts.CacheDir, opts.Token, opts.TokenHeader,
|
||||||
opts.DBRepository, opts.RegistryOpts())
|
opts.PathPrefix, opts.DBRepository, opts.RegistryOpts())
|
||||||
return server.ListenAndServe(ctx, cacheClient, opts.SkipDBUpdate)
|
return server.ListenAndServe(ctx, cacheClient, opts.SkipDBUpdate)
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -23,6 +23,7 @@ import (
|
|||||||
"github.com/aquasecurity/trivy/pkg/log"
|
"github.com/aquasecurity/trivy/pkg/log"
|
||||||
"github.com/aquasecurity/trivy/pkg/plugin"
|
"github.com/aquasecurity/trivy/pkg/plugin"
|
||||||
"github.com/aquasecurity/trivy/pkg/result"
|
"github.com/aquasecurity/trivy/pkg/result"
|
||||||
|
"github.com/aquasecurity/trivy/pkg/rpc/client"
|
||||||
"github.com/aquasecurity/trivy/pkg/types"
|
"github.com/aquasecurity/trivy/pkg/types"
|
||||||
"github.com/aquasecurity/trivy/pkg/version/app"
|
"github.com/aquasecurity/trivy/pkg/version/app"
|
||||||
)
|
)
|
||||||
@@ -56,15 +57,21 @@ type Flag[T FlagType] struct {
|
|||||||
// Usage explains how to use the flag.
|
// Usage explains how to use the flag.
|
||||||
Usage string
|
Usage string
|
||||||
|
|
||||||
// Persistent represents if the flag is persistent
|
// Persistent represents if the flag is persistent.
|
||||||
Persistent bool
|
Persistent bool
|
||||||
|
|
||||||
// Deprecated represents if the flag is deprecated
|
// Deprecated represents if the flag is deprecated.
|
||||||
|
// It shows a warning message when the flag is used.
|
||||||
Deprecated string
|
Deprecated string
|
||||||
|
|
||||||
// Removed represents if the flag is removed and no longer works
|
// Removed represents if the flag is removed and no longer works.
|
||||||
|
// It shows an error message when the flag is used.
|
||||||
Removed string
|
Removed string
|
||||||
|
|
||||||
|
// Internal represents if the flag is for internal use only.
|
||||||
|
// It is not shown in the usage message.
|
||||||
|
Internal bool
|
||||||
|
|
||||||
// Aliases represents aliases
|
// Aliases represents aliases
|
||||||
Aliases []Alias
|
Aliases []Alias
|
||||||
|
|
||||||
@@ -208,6 +215,10 @@ func (f *Flag[T]) GetAliases() []Alias {
|
|||||||
return f.Aliases
|
return f.Aliases
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (f *Flag[T]) Hidden() bool {
|
||||||
|
return f.Deprecated != "" || f.Removed != "" || f.Internal
|
||||||
|
}
|
||||||
|
|
||||||
func (f *Flag[T]) Value() (t T) {
|
func (f *Flag[T]) Value() (t T) {
|
||||||
if f == nil {
|
if f == nil {
|
||||||
return t
|
return t
|
||||||
@@ -249,7 +260,7 @@ func (f *Flag[T]) Add(cmd *cobra.Command) {
|
|||||||
flags.Float64P(f.Name, f.Shorthand, v, f.Usage)
|
flags.Float64P(f.Name, f.Shorthand, v, f.Usage)
|
||||||
}
|
}
|
||||||
|
|
||||||
if f.Deprecated != "" || f.Removed != "" {
|
if f.Hidden() {
|
||||||
_ = flags.MarkHidden(f.Name)
|
_ = flags.MarkHidden(f.Name)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -313,6 +324,7 @@ type Flagger interface {
|
|||||||
GetConfigName() string
|
GetConfigName() string
|
||||||
GetDefaultValue() any
|
GetDefaultValue() any
|
||||||
GetAliases() []Alias
|
GetAliases() []Alias
|
||||||
|
Hidden() bool
|
||||||
|
|
||||||
Parse() error
|
Parse() error
|
||||||
Add(cmd *cobra.Command)
|
Add(cmd *cobra.Command)
|
||||||
@@ -480,6 +492,16 @@ func (o *Options) RemoteCacheOpts() cache.RemoteOptions {
|
|||||||
ServerAddr: o.ServerAddr,
|
ServerAddr: o.ServerAddr,
|
||||||
CustomHeaders: o.CustomHeaders,
|
CustomHeaders: o.CustomHeaders,
|
||||||
Insecure: o.Insecure,
|
Insecure: o.Insecure,
|
||||||
|
PathPrefix: o.PathPrefix,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (o *Options) ClientScannerOpts() client.ScannerOption {
|
||||||
|
return client.ScannerOption{
|
||||||
|
RemoteURL: o.ServerAddr,
|
||||||
|
CustomHeaders: o.CustomHeaders,
|
||||||
|
Insecure: o.Insecure,
|
||||||
|
PathPrefix: o.PathPrefix,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -39,6 +39,12 @@ var (
|
|||||||
Default: "localhost:4954",
|
Default: "localhost:4954",
|
||||||
Usage: "listen address in server mode",
|
Usage: "listen address in server mode",
|
||||||
}
|
}
|
||||||
|
ServerPathPrefixFlag = Flag[string]{
|
||||||
|
Name: "path-prefix",
|
||||||
|
ConfigName: "server.path-prefix",
|
||||||
|
Usage: "prefix for the server endpoint",
|
||||||
|
Internal: true, // Internal use
|
||||||
|
}
|
||||||
)
|
)
|
||||||
|
|
||||||
// RemoteFlagGroup composes common printer flag structs
|
// RemoteFlagGroup composes common printer flag structs
|
||||||
@@ -47,6 +53,7 @@ type RemoteFlagGroup struct {
|
|||||||
// for client/server
|
// for client/server
|
||||||
Token *Flag[string]
|
Token *Flag[string]
|
||||||
TokenHeader *Flag[string]
|
TokenHeader *Flag[string]
|
||||||
|
PathPrefix *Flag[string]
|
||||||
|
|
||||||
// for client
|
// for client
|
||||||
ServerAddr *Flag[string]
|
ServerAddr *Flag[string]
|
||||||
@@ -63,12 +70,17 @@ type RemoteOptions struct {
|
|||||||
ServerAddr string
|
ServerAddr string
|
||||||
Listen string
|
Listen string
|
||||||
CustomHeaders http.Header
|
CustomHeaders http.Header
|
||||||
|
|
||||||
|
// Server endpoint: <baseURL>[<prefix>]/<package>.<Service>/<Method> (default prefix: /twirp)
|
||||||
|
// e.g., http://localhost:4954/twirp/trivy.scanner.v1.Scanner/Scan
|
||||||
|
PathPrefix string
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewClientFlags() *RemoteFlagGroup {
|
func NewClientFlags() *RemoteFlagGroup {
|
||||||
return &RemoteFlagGroup{
|
return &RemoteFlagGroup{
|
||||||
Token: ServerTokenFlag.Clone(),
|
Token: ServerTokenFlag.Clone(),
|
||||||
TokenHeader: ServerTokenHeaderFlag.Clone(),
|
TokenHeader: ServerTokenHeaderFlag.Clone(),
|
||||||
|
PathPrefix: ServerPathPrefixFlag.Clone(),
|
||||||
ServerAddr: ServerAddrFlag.Clone(),
|
ServerAddr: ServerAddrFlag.Clone(),
|
||||||
CustomHeaders: ServerCustomHeadersFlag.Clone(),
|
CustomHeaders: ServerCustomHeadersFlag.Clone(),
|
||||||
}
|
}
|
||||||
@@ -76,9 +88,10 @@ func NewClientFlags() *RemoteFlagGroup {
|
|||||||
|
|
||||||
func NewServerFlags() *RemoteFlagGroup {
|
func NewServerFlags() *RemoteFlagGroup {
|
||||||
return &RemoteFlagGroup{
|
return &RemoteFlagGroup{
|
||||||
Token: &ServerTokenFlag,
|
Token: ServerTokenFlag.Clone(),
|
||||||
TokenHeader: &ServerTokenHeaderFlag,
|
TokenHeader: ServerTokenHeaderFlag.Clone(),
|
||||||
Listen: &ServerListenFlag,
|
PathPrefix: ServerPathPrefixFlag.Clone(),
|
||||||
|
Listen: ServerListenFlag.Clone(),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -90,6 +103,7 @@ func (f *RemoteFlagGroup) Flags() []Flagger {
|
|||||||
return []Flagger{
|
return []Flagger{
|
||||||
f.Token,
|
f.Token,
|
||||||
f.TokenHeader,
|
f.TokenHeader,
|
||||||
|
f.PathPrefix,
|
||||||
f.ServerAddr,
|
f.ServerAddr,
|
||||||
f.CustomHeaders,
|
f.CustomHeaders,
|
||||||
f.Listen,
|
f.Listen,
|
||||||
@@ -129,6 +143,7 @@ func (f *RemoteFlagGroup) ToOptions() (RemoteOptions, error) {
|
|||||||
return RemoteOptions{
|
return RemoteOptions{
|
||||||
Token: token,
|
Token: token,
|
||||||
TokenHeader: tokenHeader,
|
TokenHeader: tokenHeader,
|
||||||
|
PathPrefix: f.PathPrefix.Value(),
|
||||||
ServerAddr: serverAddr,
|
ServerAddr: serverAddr,
|
||||||
CustomHeaders: customHeaders,
|
CustomHeaders: customHeaders,
|
||||||
Listen: listen,
|
Listen: listen,
|
||||||
|
|||||||
@@ -5,6 +5,7 @@ import (
|
|||||||
"crypto/tls"
|
"crypto/tls"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
|
||||||
|
"github.com/twitchtv/twirp"
|
||||||
"golang.org/x/xerrors"
|
"golang.org/x/xerrors"
|
||||||
|
|
||||||
ftypes "github.com/aquasecurity/trivy/pkg/fanal/types"
|
ftypes "github.com/aquasecurity/trivy/pkg/fanal/types"
|
||||||
@@ -32,6 +33,7 @@ type ScannerOption struct {
|
|||||||
RemoteURL string
|
RemoteURL string
|
||||||
Insecure bool
|
Insecure bool
|
||||||
CustomHeaders http.Header
|
CustomHeaders http.Header
|
||||||
|
PathPrefix string
|
||||||
}
|
}
|
||||||
|
|
||||||
// Scanner implements the RPC scanner
|
// Scanner implements the RPC scanner
|
||||||
@@ -42,16 +44,15 @@ type Scanner struct {
|
|||||||
|
|
||||||
// NewScanner is the factory method to return RPC Scanner
|
// NewScanner is the factory method to return RPC Scanner
|
||||||
func NewScanner(scannerOptions ScannerOption, opts ...Option) Scanner {
|
func NewScanner(scannerOptions ScannerOption, opts ...Option) Scanner {
|
||||||
httpClient := &http.Client{
|
tr := http.DefaultTransport.(*http.Transport).Clone()
|
||||||
Transport: &http.Transport{
|
tr.TLSClientConfig = &tls.Config{InsecureSkipVerify: scannerOptions.Insecure}
|
||||||
Proxy: http.ProxyFromEnvironment,
|
httpClient := &http.Client{Transport: tr}
|
||||||
TLSClientConfig: &tls.Config{
|
|
||||||
InsecureSkipVerify: scannerOptions.Insecure,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
c := rpc.NewScannerProtobufClient(scannerOptions.RemoteURL, httpClient)
|
var twirpOpts []twirp.ClientOption
|
||||||
|
if scannerOptions.PathPrefix != "" {
|
||||||
|
twirpOpts = append(twirpOpts, twirp.WithClientPathPrefix(scannerOptions.PathPrefix))
|
||||||
|
}
|
||||||
|
c := rpc.NewScannerProtobufClient(scannerOptions.RemoteURL, httpClient, twirpOpts...)
|
||||||
|
|
||||||
o := &options{rpcClient: c}
|
o := &options{rpcClient: c}
|
||||||
for _, opt := range opts {
|
for _, opt := range opts {
|
||||||
|
|||||||
@@ -5,6 +5,7 @@ import (
|
|||||||
"encoding/json"
|
"encoding/json"
|
||||||
"net/http"
|
"net/http"
|
||||||
"os"
|
"os"
|
||||||
|
"strings"
|
||||||
"sync"
|
"sync"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
@@ -30,9 +31,11 @@ const updateInterval = 1 * time.Hour
|
|||||||
type Server struct {
|
type Server struct {
|
||||||
appVersion string
|
appVersion string
|
||||||
addr string
|
addr string
|
||||||
|
cacheDir string
|
||||||
dbDir string
|
dbDir string
|
||||||
token string
|
token string
|
||||||
tokenHeader string
|
tokenHeader string
|
||||||
|
pathPrefix string
|
||||||
dbRepository name.Reference
|
dbRepository name.Reference
|
||||||
|
|
||||||
// For OCI registries
|
// For OCI registries
|
||||||
@@ -40,13 +43,15 @@ type Server struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// NewServer returns an instance of Server
|
// NewServer returns an instance of Server
|
||||||
func NewServer(appVersion, addr, cacheDir, token, tokenHeader string, dbRepository name.Reference, opt types.RegistryOptions) Server {
|
func NewServer(appVersion, addr, cacheDir, token, tokenHeader, pathPrefix string, dbRepository name.Reference, opt types.RegistryOptions) Server {
|
||||||
return Server{
|
return Server{
|
||||||
appVersion: appVersion,
|
appVersion: appVersion,
|
||||||
addr: addr,
|
addr: addr,
|
||||||
|
cacheDir: cacheDir,
|
||||||
dbDir: db.Dir(cacheDir),
|
dbDir: db.Dir(cacheDir),
|
||||||
token: token,
|
token: token,
|
||||||
tokenHeader: tokenHeader,
|
tokenHeader: tokenHeader,
|
||||||
|
pathPrefix: pathPrefix,
|
||||||
dbRepository: dbRepository,
|
dbRepository: dbRepository,
|
||||||
RegistryOptions: opt,
|
RegistryOptions: opt,
|
||||||
}
|
}
|
||||||
@@ -67,14 +72,13 @@ func (s Server) ListenAndServe(ctx context.Context, serverCache cache.Cache, ski
|
|||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
mux := newServeMux(ctx, serverCache, dbUpdateWg, requestWg, s.token, s.tokenHeader, s.dbDir)
|
mux := s.newServeMux(ctx, serverCache, dbUpdateWg, requestWg)
|
||||||
log.Infof("Listening %s...", s.addr)
|
log.Infof("Listening %s...", s.addr)
|
||||||
|
|
||||||
return http.ListenAndServe(s.addr, mux)
|
return http.ListenAndServe(s.addr, mux)
|
||||||
}
|
}
|
||||||
|
|
||||||
func newServeMux(ctx context.Context, serverCache cache.Cache, dbUpdateWg, requestWg *sync.WaitGroup,
|
func (s Server) newServeMux(ctx context.Context, serverCache cache.Cache, dbUpdateWg, requestWg *sync.WaitGroup) *http.ServeMux {
|
||||||
token, tokenHeader, cacheDir string) *http.ServeMux {
|
|
||||||
withWaitGroup := func(base http.Handler) http.Handler {
|
withWaitGroup := func(base http.Handler) http.Handler {
|
||||||
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
// Stop processing requests during DB update
|
// Stop processing requests during DB update
|
||||||
@@ -91,13 +95,19 @@ func newServeMux(ctx context.Context, serverCache cache.Cache, dbUpdateWg, reque
|
|||||||
|
|
||||||
mux := http.NewServeMux()
|
mux := http.NewServeMux()
|
||||||
|
|
||||||
scanServer := rpcScanner.NewScannerServer(initializeScanServer(serverCache), nil)
|
var twirpOpts []any
|
||||||
scanHandler := withToken(withWaitGroup(scanServer), token, tokenHeader)
|
if s.pathPrefix != "" {
|
||||||
mux.Handle(rpcScanner.ScannerPathPrefix, gziphandler.GzipHandler(scanHandler))
|
pathPrefix := "/" + strings.TrimPrefix(s.pathPrefix, "/") // Twirp requires the leading slash
|
||||||
|
twirpOpts = append(twirpOpts, twirp.WithServerPathPrefix(pathPrefix))
|
||||||
|
}
|
||||||
|
|
||||||
layerServer := rpcCache.NewCacheServer(NewCacheServer(serverCache), nil)
|
scanServer := rpcScanner.NewScannerServer(initializeScanServer(serverCache), twirpOpts...)
|
||||||
layerHandler := withToken(withWaitGroup(layerServer), token, tokenHeader)
|
scanHandler := withToken(withWaitGroup(scanServer), s.token, s.tokenHeader)
|
||||||
mux.Handle(rpcCache.CachePathPrefix, gziphandler.GzipHandler(layerHandler))
|
mux.Handle(scanServer.PathPrefix(), gziphandler.GzipHandler(scanHandler))
|
||||||
|
|
||||||
|
cacheServer := rpcCache.NewCacheServer(NewCacheServer(serverCache), twirpOpts...)
|
||||||
|
layerHandler := withToken(withWaitGroup(cacheServer), s.token, s.tokenHeader)
|
||||||
|
mux.Handle(cacheServer.PathPrefix(), gziphandler.GzipHandler(layerHandler))
|
||||||
|
|
||||||
mux.HandleFunc("/healthz", func(rw http.ResponseWriter, r *http.Request) {
|
mux.HandleFunc("/healthz", func(rw http.ResponseWriter, r *http.Request) {
|
||||||
if _, err := rw.Write([]byte("ok")); err != nil {
|
if _, err := rw.Write([]byte("ok")); err != nil {
|
||||||
@@ -108,7 +118,7 @@ func newServeMux(ctx context.Context, serverCache cache.Cache, dbUpdateWg, reque
|
|||||||
mux.HandleFunc("/version", func(w http.ResponseWriter, r *http.Request) {
|
mux.HandleFunc("/version", func(w http.ResponseWriter, r *http.Request) {
|
||||||
w.Header().Add("Content-Type", "application/json")
|
w.Header().Add("Content-Type", "application/json")
|
||||||
|
|
||||||
if err := json.NewEncoder(w).Encode(version.NewVersionInfo(cacheDir)); err != nil {
|
if err := json.NewEncoder(w).Encode(version.NewVersionInfo(s.cacheDir)); err != nil {
|
||||||
log.Error("Version error", log.Err(err))
|
log.Error("Version error", log.Err(err))
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
|||||||
@@ -115,7 +115,7 @@ func Test_dbWorker_update(t *testing.T) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func Test_newServeMux(t *testing.T) {
|
func TestServer_newServeMux(t *testing.T) {
|
||||||
type args struct {
|
type args struct {
|
||||||
token string
|
token string
|
||||||
tokenHeader string
|
tokenHeader string
|
||||||
@@ -182,9 +182,8 @@ func Test_newServeMux(t *testing.T) {
|
|||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
defer func() { _ = c.Close() }()
|
defer func() { _ = c.Close() }()
|
||||||
|
|
||||||
ts := httptest.NewServer(newServeMux(context.Background(), c, dbUpdateWg, requestWg, tt.args.token,
|
s := NewServer("", "", "", tt.args.token, tt.args.tokenHeader, "", nil, ftypes.RegistryOptions{})
|
||||||
tt.args.tokenHeader, ""),
|
ts := httptest.NewServer(s.newServeMux(context.Background(), c, dbUpdateWg, requestWg))
|
||||||
)
|
|
||||||
defer ts.Close()
|
defer ts.Close()
|
||||||
|
|
||||||
var resp *http.Response
|
var resp *http.Response
|
||||||
@@ -214,9 +213,8 @@ func Test_VersionEndpoint(t *testing.T) {
|
|||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
defer func() { _ = c.Close() }()
|
defer func() { _ = c.Close() }()
|
||||||
|
|
||||||
ts := httptest.NewServer(newServeMux(context.Background(), c, dbUpdateWg, requestWg, "", "",
|
s := NewServer("", "", "testdata/testcache", "", "", "", nil, ftypes.RegistryOptions{})
|
||||||
"testdata/testcache"),
|
ts := httptest.NewServer(s.newServeMux(context.Background(), c, dbUpdateWg, requestWg))
|
||||||
)
|
|
||||||
defer ts.Close()
|
defer ts.Close()
|
||||||
|
|
||||||
resp, err := http.Get(ts.URL + "/version")
|
resp, err := http.Get(ts.URL + "/version")
|
||||||
|
|||||||
Reference in New Issue
Block a user