release/cli/pkg/signature/manifest.go (149 lines of code) (raw):
// Copyright Amazon.com Inc. or its affiliates. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package signature
import (
"bytes"
"context"
"crypto/sha256"
"encoding/base64"
"encoding/json"
"errors"
"fmt"
"strings"
"text/template"
"github.com/aws/aws-sdk-go-v2/service/kms"
"github.com/aws/aws-sdk-go-v2/service/kms/types"
"github.com/itchyny/gojq"
"sigs.k8s.io/yaml"
anywhereconstants "github.com/aws/eks-anywhere/pkg/constants"
anywherev1alpha1 "github.com/aws/eks-anywhere/release/api/v1alpha1"
"github.com/aws/eks-anywhere/release/cli/pkg/clients"
"github.com/aws/eks-anywhere/release/cli/pkg/filereader"
eksdv1alpha1 "github.com/aws/eks-distro-build-tooling/release/api/v1alpha1"
)
// GojqTemplate is used to build a gojq filter expression that deletes the desired fields.
var GojqTemplate = template.Must(template.New("gojq_query").Funcs(
template.FuncMap{
"StringsJoin": strings.Join,
"Escape": func(in string) string {
// We need to escape '.' for certain gojq path usage
// to avoid ambiguities in the path expressions.
return strings.ReplaceAll(in, ".", "\\\\.")
},
},
).Parse(`
del({{ StringsJoin .Excludes ", " }})
`))
// GetBundleSignature calls KMS and retrieves a signature, then base64-encodes it
// to store in the Bundles manifest annotation.
func GetBundleSignature(ctx context.Context, bundle *anywherev1alpha1.Bundles, key string) (string, error) {
// Compute the digest from the Bundles manifest, excluding certain fields.
digest, _, err := getBundleDigest(bundle)
if err != nil {
return "", fmt.Errorf("computing digest: %v", err)
}
// Create KMS Client for bundle manifest signing
kmsClient, err := clients.CreateKMSClient(ctx)
if err != nil {
return "", fmt.Errorf("creating kms client: %v", err)
}
// The KMS Sign API requires the raw hash as the Message when MessageType is DIGEST.
input := &kms.SignInput{
KeyId: &key,
Message: digest[:],
MessageType: types.MessageTypeDigest,
SigningAlgorithm: types.SigningAlgorithmSpecEcdsaSha256,
}
out, err := kmsClient.Sign(ctx, input)
if err != nil {
return "", fmt.Errorf("signing bundle with KMS Sign API: %v", err)
}
// Return the base64-encoded signature.
return base64.StdEncoding.EncodeToString(out.Signature), nil
}
// GetEKSDistroManifestSignature calls KMS and retrieves a signature, then base64-encodes it
// to store in the Bundles manifest annotation.
func GetEKSDistroManifestSignature(ctx context.Context, bundle *anywherev1alpha1.Bundles, key, releaseUrl string) (string, error) {
// Retrieve the eks-distro release from the release URL.
eksdRelease, err := filereader.GetEksdRelease(releaseUrl)
if err != nil {
return "", fmt.Errorf("getting eks distro release from the %s eksd manifest release url: %v", releaseUrl, err)
}
// Compute the digest for the eks-distro release, excluding certain fields.
digest, _, err := getEKSDistroReleaseDigest(eksdRelease)
if err != nil {
return "", fmt.Errorf("computing digest for eks distro manifest: %v", err)
}
// Create KMS Client for eks distro manifest signing
kmsClient, err := clients.CreateKMSClient(ctx)
if err != nil {
return "", fmt.Errorf("creating kms client: %v", err)
}
// The KMS Sign API requires the raw hash as the Message when MessageType is DIGEST.
input := &kms.SignInput{
KeyId: &key,
Message: digest[:],
MessageType: types.MessageTypeDigest,
SigningAlgorithm: types.SigningAlgorithmSpecEcdsaSha256,
}
out, err := kmsClient.Sign(ctx, input)
if err != nil {
return "", fmt.Errorf("signing eks distro manifest with KMS Sign API: %v", err)
}
// Return the base64-encoded signature.
return base64.StdEncoding.EncodeToString(out.Signature), nil
}
// getEksdDigest computes the SHA256 digest for an EKS Distro release object.
// It follows similar steps as getBundleDigest() for Bundles by marshalling the object,
// converting it to JSON, filtering out undesired fields, and then computing the hash.
func getEKSDistroReleaseDigest(release *eksdv1alpha1.Release) ([32]byte, []byte, error) {
var zero [32]byte
// Marshal the eks-distro release object to YAML.
yamlBytes, err := yaml.Marshal(release)
if err != nil {
return zero, nil, fmt.Errorf("marshalling eks distro release to YAML: %v", err)
}
// Convert the YAML to JSON for easier gojq processing.
jsonBytes, err := yaml.YAMLToJSON(yamlBytes)
if err != nil {
return zero, nil, fmt.Errorf("converting eks distro release YAML to JSON: %v", err)
}
// Build and execute the gojq filter that deletes excluded fields.
filtered, err := filterExcludes(jsonBytes, anywhereconstants.EKSDistroExcludes)
if err != nil {
return zero, nil, fmt.Errorf("filtering excluded fields: %v", err)
}
// Compute the SHA256 digest of the filtered JSON.
digest := sha256.Sum256(filtered)
return digest, filtered, nil
}
// getBundleDigest converts the Bundles manifest to JSON, excludes certain fields, then
// computes the SHA256 hash of the filtered manifest. It returns the digest and
// the final bytes used to produce that digest.
func getBundleDigest(bundle *anywherev1alpha1.Bundles) ([32]byte, []byte, error) {
var zero [32]byte
// Marshal Bundles object to YAML.
yamlBytes, err := yaml.Marshal(bundle)
if err != nil {
return zero, nil, fmt.Errorf("marshalling bundle to YAML: %v", err)
}
// Convert YAML to JSON for easier gojq processing.
jsonBytes, err := yaml.YAMLToJSON(yamlBytes)
if err != nil {
return zero, nil, fmt.Errorf("converting YAML to JSON: %v", err)
}
// Build and execute the gojq filter that deletes excluded fields.
filtered, err := filterExcludes(jsonBytes, anywhereconstants.Excludes)
if err != nil {
return zero, nil, fmt.Errorf("filtering excluded fields: %v", err)
}
// Compute the SHA256 digest of the filtered JSON.
digest := sha256.Sum256(filtered)
return digest, filtered, nil
}
// filterExcludes applies the default and user-specified excludes to the JSON
// representation of the Bundles object using gojq.
func filterExcludes(jsonBytes []byte, excludes string) ([]byte, error) {
// Decode the base64-encoded excludes
exclBytes, err := base64.StdEncoding.DecodeString(excludes)
if err != nil {
return nil, fmt.Errorf("decoding Excludes: %v", err)
}
// Convert them into slice of strings
userExcludes := strings.Split(string(exclBytes), "\n")
// Combine AlwaysExcluded with userExcludes
allExcludes := anywhereconstants.AlwaysExcludedFields
if userExcludes[0] != "" {
allExcludes = append(allExcludes, userExcludes...)
}
// Build the argument to the gojq template
var tmplBuf bytes.Buffer
if err := GojqTemplate.Execute(&tmplBuf, map[string]interface{}{
"Excludes": allExcludes,
}); err != nil {
return nil, fmt.Errorf("executing gojq template: %v", err)
}
// Parse the final gojq query
query, err := gojq.Parse(tmplBuf.String())
if err != nil {
return nil, fmt.Errorf("gojq parse error: %v", err)
}
// Unmarshal the JSON into a generic interface so gojq can operate
var input interface{}
if err := json.Unmarshal(jsonBytes, &input); err != nil {
return nil, fmt.Errorf("unmarshalling JSON: %v", err)
}
// Run the query
iter := query.Run(input)
finalVal, ok := iter.Next()
if !ok {
return nil, errors.New("gojq produced no result")
}
if errVal, ok := finalVal.(error); ok {
return nil, fmt.Errorf("gojq execution error: %v", errVal)
}
// Marshal the filtered result back to JSON
filtered, err := json.Marshal(finalVal)
if err != nil {
return nil, fmt.Errorf("marshalling final result to JSON: %v", err)
}
return filtered, nil
}