pkg/util/digest/digest.go (272 lines of code) (raw):
/*
Licensed to the Apache Software Foundation (ASF) under one or more
contributor license agreements. See the NOTICE file distributed with
this work for additional information regarding copyright ownership.
The ASF licenses this file to You under the Apache License, Version 2.0
(the "License"); you may not use this file except in compliance with
the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package digest
import (
// this is needed to generate an SHA1 sum for Jars
// #nosec G505
"crypto/sha1"
"crypto/sha256"
"encoding/base64"
"encoding/json"
"hash"
"io"
"path/filepath"
"sort"
"strconv"
"strings"
v1 "github.com/apache/camel-k/v2/pkg/apis/camel/v1"
"github.com/apache/camel-k/v2/pkg/util"
"github.com/apache/camel-k/v2/pkg/util/defaults"
"fmt"
)
const (
// IntegrationDigestEnvVar -- .
IntegrationDigestEnvVar = "CAMEL_K_DIGEST"
)
// ComputeForIntegration a digest of the fields that are relevant for the deployment
// Produces a digest that can be used as docker image tag.
func ComputeForIntegration(integration *v1.Integration, configmapVersions []string, secretVersions []string) (string, error) {
hash := sha256.New()
// Integration version is relevant
if _, err := hash.Write([]byte(integration.Status.Version)); err != nil {
return "", err
}
// Integration operator id is relevant
if _, err := hash.Write([]byte(v1.GetOperatorIDAnnotation(integration))); err != nil {
return "", err
}
// Integration profile is relevant
if _, err := hash.Write([]byte(v1.GetIntegrationProfileAnnotation(integration))); err != nil {
return "", err
}
if _, err := hash.Write([]byte(v1.GetIntegrationProfileNamespaceAnnotation(integration))); err != nil {
return "", err
}
// Integration Kit is relevant
if integration.Spec.IntegrationKit != nil {
if _, err := hash.Write([]byte(fmt.Sprintf("%s/%s", integration.Spec.IntegrationKit.Namespace, integration.Spec.IntegrationKit.Name))); err != nil {
return "", err
}
}
// Profile is relevant
if _, err := hash.Write([]byte(integration.Spec.Profile)); err != nil {
return "", err
}
// Integration code
for _, s := range integration.Spec.Sources {
if s.Content != "" {
if _, err := hash.Write([]byte(s.Content)); err != nil {
return "", err
}
}
}
// Integration flows
if len(integration.Spec.Flows) > 0 {
flows, err := v1.ToYamlDSL(integration.Spec.Flows)
if err != nil {
return "", err
}
if _, err := hash.Write(flows); err != nil {
return "", err
}
}
// Integration dependencies
for _, item := range integration.Spec.Dependencies {
if _, err := hash.Write([]byte(item)); err != nil {
return "", err
}
}
// Integration configuration
for _, item := range integration.Spec.Configuration {
if _, err := hash.Write([]byte(item.String())); err != nil {
return "", err
}
}
// Git spec
if integration.Spec.Git != nil {
if _, err := hash.Write([]byte(integration.Spec.Git.URL + "/" + integration.Spec.Git.Secret)); err != nil {
return "", err
}
}
// Integration traits
// Calculation logic prior to 1.10.0 (the new Traits API schema) is maintained
// in order to keep consistency in the digest calculated from the same set of
// Trait configurations for backward compatibility.
if err := computeForTraits(hash, integration.Spec.Traits); err != nil {
return "", err
}
// Integration traits as annotations
for _, k := range sortedTraitAnnotationsKeys(integration) {
v := integration.Annotations[k]
if _, err := hash.Write([]byte(fmt.Sprintf("%s=%v,", k, v))); err != nil {
return "", err
}
}
// Configmap versions
for _, cm := range configmapVersions {
if cm != "" {
if _, err := hash.Write([]byte(cm)); err != nil {
return "", err
}
}
}
// Secret versions
for _, s := range secretVersions {
if s != "" {
if _, err := hash.Write([]byte(s)); err != nil {
return "", err
}
}
}
// Add a letter at the beginning and use URL safe encoding
digest := "v" + base64.RawURLEncoding.EncodeToString(hash.Sum(nil))
return digest, nil
}
//nolint:nestif
func computeForTraits(hash hash.Hash, traits v1.Traits) error {
specTraitsMap, err := toMap(traits)
if err != nil {
return err
}
for _, name := range sortedTraitsMapKeys(specTraitsMap) {
if name != "addons" {
if err := computeForTrait(hash, name, specTraitsMap[name]); err != nil {
return err
}
} else {
// Addons
addons := specTraitsMap["addons"]
for _, name := range util.SortedMapKeys(addons) {
if addon, ok := addons[name].(map[string]interface{}); ok {
if err := computeForTrait(hash, name, addon); err != nil {
return err
}
}
}
}
}
return nil
}
func computeForTrait(hash hash.Hash, name string, trait map[string]interface{}) error {
if _, err := hash.Write([]byte(name + "[")); err != nil {
return err
}
// hash legacy configuration first
if trait["configuration"] != nil {
if config, ok := trait["configuration"].(map[string]interface{}); ok {
if err := computeForTraitProps(hash, config); err != nil {
return err
}
}
delete(trait, "configuration")
}
if err := computeForTraitProps(hash, trait); err != nil {
return err
}
if _, err := hash.Write([]byte("]")); err != nil {
return err
}
return nil
}
func computeForTraitProps(hash hash.Hash, props map[string]interface{}) error {
for _, prop := range util.SortedMapKeys(props) {
val := props[prop]
if _, err := hash.Write([]byte(fmt.Sprintf("%s=%v,", prop, val))); err != nil {
return err
}
}
return nil
}
func toMap(traits v1.Traits) (map[string]map[string]interface{}, error) {
data, err := json.Marshal(traits)
if err != nil {
return nil, err
}
traitsMap := make(map[string]map[string]interface{})
if err = json.Unmarshal(data, &traitsMap); err != nil {
return nil, err
}
return traitsMap, nil
}
// ComputeForIntegrationKit a digest of the fields that are relevant for the deployment
// Produces a digest that can be used as docker image tag.
func ComputeForIntegrationKit(kit *v1.IntegrationKit) (string, error) {
hash := sha256.New()
// Kit version is relevant
if _, err := hash.Write([]byte(kit.Status.Version)); err != nil {
return "", err
}
if _, err := hash.Write([]byte(kit.Spec.Image)); err != nil {
return "", err
}
for _, item := range kit.Spec.Dependencies {
if _, err := hash.Write([]byte(item)); err != nil {
return "", err
}
}
for _, item := range kit.Spec.Configuration {
if _, err := hash.Write([]byte(item.String())); err != nil {
return "", err
}
}
// Add a letter at the beginning and use URL safe encoding
digest := "v" + base64.RawURLEncoding.EncodeToString(hash.Sum(nil))
return digest, nil
}
// ComputeForResource returns a digest for the specific resource.
func ComputeForResource(res v1.DataSpec) (string, error) {
hash := sha256.New()
// Operator version is relevant
if _, err := hash.Write([]byte(defaults.Version)); err != nil {
return "", err
}
if _, err := hash.Write([]byte(res.Content)); err != nil {
return "", err
}
if _, err := hash.Write([]byte(res.Name)); err != nil {
return "", err
}
if _, err := hash.Write([]byte(res.ContentKey)); err != nil {
return "", err
}
if _, err := hash.Write([]byte(res.ContentRef)); err != nil {
return "", err
}
if _, err := hash.Write([]byte(strconv.FormatBool(res.Compression))); err != nil {
return "", err
}
// Add a letter at the beginning and use URL safe encoding
digest := "v" + base64.RawURLEncoding.EncodeToString(hash.Sum(nil))
return digest, nil
}
// ComputeForSource returns a digest for the specific source.
func ComputeForSource(s v1.SourceSpec) (string, error) {
hash := sha256.New()
// Operator version is relevant
if _, err := hash.Write([]byte(defaults.Version)); err != nil {
return "", err
}
if _, err := hash.Write([]byte(s.Content)); err != nil {
return "", err
}
if _, err := hash.Write([]byte(s.Name)); err != nil {
return "", err
}
if _, err := hash.Write([]byte(s.Type)); err != nil {
return "", err
}
if _, err := hash.Write([]byte(s.Language)); err != nil {
return "", err
}
if _, err := hash.Write([]byte(s.ContentKey)); err != nil {
return "", err
}
if _, err := hash.Write([]byte(s.ContentRef)); err != nil {
return "", err
}
if _, err := hash.Write([]byte(s.Loader)); err != nil {
return "", err
}
if _, err := hash.Write([]byte(strconv.FormatBool(s.Compression))); err != nil {
return "", err
}
// Add a letter at the beginning and use URL safe encoding
digest := "v" + base64.RawURLEncoding.EncodeToString(hash.Sum(nil))
return digest, nil
}
func sortedTraitsMapKeys(m map[string]map[string]interface{}) []string {
res := make([]string, len(m))
i := 0
for k := range m {
res[i] = k
i++
}
sort.Strings(res)
return res
}
// Deprecated: to be removed in future versions.
func sortedTraitAnnotationsKeys(it *v1.Integration) []string {
res := make([]string, 0, len(it.Annotations))
for k := range it.Annotations {
if strings.HasPrefix(k, v1.TraitAnnotationPrefix) {
res = append(res, k)
}
}
sort.Strings(res)
return res
}
func ComputeSHA1(elem ...string) (string, error) {
file := filepath.Join(elem...)
// #nosec G401
h := sha1.New()
err := util.WithFileReader(file, func(file io.Reader) error {
if _, err := io.Copy(h, file); err != nil {
return err
}
return nil
})
if err != nil {
return "", err
}
return base64.StdEncoding.EncodeToString(h.Sum(nil)), nil
}