mirror of
https://github.com/anchore/syft.git
synced 2025-11-21 18:33:18 +01:00
* migrate location structs to file package Signed-off-by: Alex Goodman <alex.goodman@anchore.com> * replace source.Location refs with file package call Signed-off-by: Alex Goodman <alex.goodman@anchore.com> * fix linting Signed-off-by: Alex Goodman <alex.goodman@anchore.com> * remove hardlink test for file based catalogers Signed-off-by: Alex Goodman <alex.goodman@anchore.com> * remove hardlink test for all-regular-files testing Signed-off-by: Alex Goodman <alex.goodman@anchore.com> * migrate file resolver implementations to separate package Signed-off-by: Alex Goodman <alex.goodman@anchore.com> * fix linting Signed-off-by: Alex Goodman <alex.goodman@anchore.com> * [wip] migrate resolvers to internal Signed-off-by: Alex Goodman <alex.goodman@anchore.com> * migrate resolvers to syft/internal Signed-off-by: Alex Goodman <alex.goodman@anchore.com> --------- Signed-off-by: Alex Goodman <alex.goodman@anchore.com> Signed-off-by: <>
256 lines
7.2 KiB
Go
256 lines
7.2 KiB
Go
package binary
|
|
|
|
import (
|
|
"bytes"
|
|
"debug/elf"
|
|
"debug/macho"
|
|
"debug/pe"
|
|
"fmt"
|
|
"io"
|
|
"regexp"
|
|
"strings"
|
|
"text/template"
|
|
|
|
"github.com/anchore/packageurl-go"
|
|
"github.com/anchore/syft/internal"
|
|
"github.com/anchore/syft/internal/log"
|
|
"github.com/anchore/syft/syft/cpe"
|
|
"github.com/anchore/syft/syft/file"
|
|
"github.com/anchore/syft/syft/pkg"
|
|
"github.com/anchore/syft/syft/pkg/cataloger/internal/unionreader"
|
|
)
|
|
|
|
var emptyPURL = packageurl.PackageURL{}
|
|
|
|
// classifier is a generic package classifier that can be used to match a package definition
|
|
// to a file that meets the given content criteria of the evidenceMatcher.
|
|
type classifier struct {
|
|
Class string
|
|
|
|
// FileGlob is a selector to narrow down file inspection using the **/glob* syntax
|
|
FileGlob string
|
|
|
|
// EvidenceMatcher is what will be used to match against the file in the source
|
|
// location. If the matcher returns a package, the file will be considered a candidate.
|
|
EvidenceMatcher evidenceMatcher
|
|
|
|
// Information below is used to specify the Package information when returned
|
|
|
|
// Package is the name to use for the package
|
|
Package string
|
|
|
|
// Language is the language to classify this package as
|
|
Language pkg.Language
|
|
|
|
// Type is the package type to use for the package
|
|
Type pkg.Type
|
|
|
|
// PURL is the Package URL to use when generating a package
|
|
PURL packageurl.PackageURL
|
|
|
|
// CPEs are the specific CPEs we want to include for this binary with updated version information
|
|
CPEs []cpe.CPE
|
|
}
|
|
|
|
// evidenceMatcher is a function called to catalog Packages that match some sort of evidence
|
|
type evidenceMatcher func(resolver file.Resolver, classifier classifier, location file.Location) ([]pkg.Package, error)
|
|
|
|
func evidenceMatchers(matchers ...evidenceMatcher) evidenceMatcher {
|
|
return func(resolver file.Resolver, classifier classifier, location file.Location) ([]pkg.Package, error) {
|
|
for _, matcher := range matchers {
|
|
match, err := matcher(resolver, classifier, location)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if match != nil {
|
|
return match, nil
|
|
}
|
|
}
|
|
return nil, nil
|
|
}
|
|
}
|
|
|
|
func fileNameTemplateVersionMatcher(fileNamePattern string, contentTemplate string) evidenceMatcher {
|
|
pat := regexp.MustCompile(fileNamePattern)
|
|
return func(resolver file.Resolver, classifier classifier, location file.Location) ([]pkg.Package, error) {
|
|
if !pat.MatchString(location.RealPath) {
|
|
return nil, nil
|
|
}
|
|
|
|
filepathNamedGroupValues := internal.MatchNamedCaptureGroups(pat, location.RealPath)
|
|
|
|
// versions like 3.5 should not match any character, but explicit dot
|
|
for k, v := range filepathNamedGroupValues {
|
|
filepathNamedGroupValues[k] = strings.ReplaceAll(v, ".", "\\.")
|
|
}
|
|
|
|
tmpl, err := template.New("").Parse(contentTemplate)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to parse classifier template=%q : %w", contentTemplate, err)
|
|
}
|
|
|
|
patternBuf := &bytes.Buffer{}
|
|
err = tmpl.Execute(patternBuf, filepathNamedGroupValues)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to render template: %w", err)
|
|
}
|
|
|
|
tmplPattern, err := regexp.Compile(patternBuf.String())
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to compile rendered regex=%q: %w", patternBuf.String(), err)
|
|
}
|
|
|
|
contents, err := getContents(resolver, location)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to get read contents for file: %w", err)
|
|
}
|
|
|
|
matchMetadata := internal.MatchNamedCaptureGroups(tmplPattern, string(contents))
|
|
|
|
p := newPackage(classifier, location, matchMetadata)
|
|
if p == nil {
|
|
return nil, nil
|
|
}
|
|
|
|
return []pkg.Package{*p}, nil
|
|
}
|
|
}
|
|
|
|
func fileContentsVersionMatcher(pattern string) evidenceMatcher {
|
|
pat := regexp.MustCompile(pattern)
|
|
return func(resolver file.Resolver, classifier classifier, location file.Location) ([]pkg.Package, error) {
|
|
contents, err := getContents(resolver, location)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to get read contents for file: %w", err)
|
|
}
|
|
|
|
matchMetadata := internal.MatchNamedCaptureGroups(pat, string(contents))
|
|
|
|
p := newPackage(classifier, location, matchMetadata)
|
|
if p == nil {
|
|
return nil, nil
|
|
}
|
|
|
|
return []pkg.Package{*p}, nil
|
|
}
|
|
}
|
|
|
|
//nolint:gocognit
|
|
func sharedLibraryLookup(sharedLibraryPattern string, sharedLibraryMatcher evidenceMatcher) evidenceMatcher {
|
|
pat := regexp.MustCompile(sharedLibraryPattern)
|
|
return func(resolver file.Resolver, classifier classifier, location file.Location) (packages []pkg.Package, _ error) {
|
|
libs, err := sharedLibraries(resolver, location)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
for _, lib := range libs {
|
|
if !pat.MatchString(lib) {
|
|
continue
|
|
}
|
|
|
|
locations, err := resolver.FilesByGlob("**/" + lib)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
for _, libraryLocation := range locations {
|
|
pkgs, err := sharedLibraryMatcher(resolver, classifier, libraryLocation)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
for _, p := range pkgs {
|
|
// set the source binary as the first location
|
|
locationSet := file.NewLocationSet(location)
|
|
locationSet.Add(p.Locations.ToSlice()...)
|
|
p.Locations = locationSet
|
|
meta, _ := p.Metadata.(pkg.BinaryMetadata)
|
|
p.Metadata = pkg.BinaryMetadata{
|
|
Matches: append([]pkg.ClassifierMatch{
|
|
{
|
|
Classifier: classifier.Class,
|
|
Location: location,
|
|
},
|
|
}, meta.Matches...),
|
|
}
|
|
packages = append(packages, p)
|
|
}
|
|
}
|
|
}
|
|
return packages, nil
|
|
}
|
|
}
|
|
|
|
func mustPURL(purl string) packageurl.PackageURL {
|
|
p, err := packageurl.FromString(purl)
|
|
if err != nil {
|
|
panic(fmt.Sprintf("invalid PURL: %s", p))
|
|
}
|
|
return p
|
|
}
|
|
|
|
func getContents(resolver file.Resolver, location file.Location) ([]byte, error) {
|
|
reader, err := resolver.FileContentsByLocation(location)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
unionReader, err := unionreader.GetUnionReader(reader)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to get union reader for file: %w", err)
|
|
}
|
|
|
|
// TODO: there may be room for improvement here, as this may use an excessive amount of memory. Alternate approach is to leverage a RuneReader.
|
|
contents, err := io.ReadAll(unionReader)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to get contents for file: %w", err)
|
|
}
|
|
|
|
return contents, nil
|
|
}
|
|
|
|
// singleCPE returns a []pkg.CPE based on the cpe string or panics if the CPE is invalid
|
|
func singleCPE(cpeString string) []cpe.CPE {
|
|
return []cpe.CPE{
|
|
cpe.Must(cpeString),
|
|
}
|
|
}
|
|
|
|
// sharedLibraries returns a list of all shared libraries found within a binary, currently
|
|
// supporting: elf, macho, and windows pe
|
|
func sharedLibraries(resolver file.Resolver, location file.Location) ([]string, error) {
|
|
contents, err := getContents(resolver, location)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
r := bytes.NewReader(contents)
|
|
|
|
e, _ := elf.NewFile(r)
|
|
if e != nil {
|
|
symbols, err := e.ImportedLibraries()
|
|
if err != nil {
|
|
log.Debugf("unable to read elf binary at: %s -- %s", location.RealPath, err)
|
|
}
|
|
return symbols, nil
|
|
}
|
|
|
|
m, _ := macho.NewFile(r)
|
|
if m != nil {
|
|
symbols, err := m.ImportedLibraries()
|
|
if err != nil {
|
|
log.Debugf("unable to read macho binary at: %s -- %s", location.RealPath, err)
|
|
}
|
|
return symbols, nil
|
|
}
|
|
|
|
p, _ := pe.NewFile(r)
|
|
if p != nil {
|
|
symbols, err := p.ImportedLibraries()
|
|
if err != nil {
|
|
log.Debugf("unable to read pe binary at: %s -- %s", location.RealPath, err)
|
|
}
|
|
return symbols, nil
|
|
}
|
|
|
|
return nil, nil
|
|
}
|