1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232
|
# Copyright (C) 2015 Brent Baude <bbaude@redhat.com>
# Copyright (C) 2019 Dominique Blaze <contact@d0m.tech>
#
# This library is free software; you can redistribute it and/or
# modify it under the terms of the GNU Lesser General Public
# License as published by the Free Software Foundation; either
# version 2 of the License, or (at your option) any later version.
#
# This library is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
# Lesser General Public License for more details.
#
# You should have received a copy of the GNU Lesser General Public
# License along with this library; if not, write to the
# Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
# Boston, MA 02110-1301 USA
from __future__ import print_function
import os
import io
from pathlib import Path
from itertools import chain
import tarfile
import tempfile
import shutil
from oscap_docker_python.get_cve_input import getInputCVE
import sys
import docker
import uuid
import collections
from oscap_docker_python.oscap_docker_common import oscap_chroot, get_dist, \
OscapResult, OscapError
class OscapError(Exception):
''' oscap Error'''
pass
OscapResult = collections.namedtuple("OscapResult", ("returncode", "stdout", "stderr"))
class OscapDockerScan(object):
def __init__(self, target, is_image=False, oscap_binary='oscap'):
# init docker high level API (to deal with start/stop/run containers/image)
self.client_api = docker.from_env()
self.is_image = is_image
self.oscap_binary = oscap_binary or 'oscap'
self.container_name = None
self.image_name = None
self.extracted_container = False
# init docker low level api (useful for deep details like container pid)
self.client = self.client_api.api
if self.is_image:
self.image_name, self.config = self._get_image_name_and_config(target)
if "," in self.image_name:
# Fix when a single image has multiple tags
self.image_name = self.image_name.split(",")[0]
if self.image_name:
print("Creating a temporary container for the image...")
try:
tmp_cont = self.client.create_container(
self.image_name, name=self.container_name, command="\x00")
self.container_name = tmp_cont["Id"]
self.config = self.client.inspect_container(self.container_name)
except Exception as e:
sys.stderr.write("Cannot create container for image {0}.\n".format(self.image_name))
raise e
self._extract_container()
else:
raise ValueError("Image {0} not found.\n".format(target))
else:
self.container_name, self.config = \
self._get_container_name_and_config(target)
if not self.container_name:
raise ValueError("Container {0} not found.\n".format(target))
# is the container running ?
if int(self.config["State"]["Pid"]) == 0:
print("Container {0} is stopped"
.format(self.container_name))
self._extract_container()
else:
print("Container {0} is running, using its existing mount..."
.format(self.container_name))
self.mountpoint = "/proc/{0}/root".format(self.config["State"]["Pid"])
if self._check_container_mountpoint():
print("Docker container {0} ready to be scanned."
.format(self.container_name))
else:
self._end()
raise RuntimeError(
"Cannot access mountpoint of container {0}, "
"please RUN WITH ROOT privileges.\n"
.format(self.container_name))
def _end(self):
if self.is_image:
# remove the temporary container
self.client.remove_container(self.container_name)
print("Temporary container {0} cleaned".format(self.container_name))
if self.extracted_container:
print("Cleaning temporary extracted container...")
shutil.rmtree(self.mountpoint)
def _extract_container(self):
'''
Extracts the container and sets mountpoint to the extracted directory
'''
with tempfile.TemporaryFile() as tar:
for chunk in self.client.export(self.container_name):
tar.write(chunk)
tar.seek(0)
self.mountpoint = tempfile.mkdtemp()
self.extracted_container = True
with tarfile.open(fileobj=tar) as tf:
tf.extractall(path=self.mountpoint)
Path(os.path.join(self.mountpoint, '.dockerenv')).touch()
def _get_image_name_and_config(self, target):
'''
Ensure that target is an image.
Returns full image name if exists or image ID otherwise.
For containers returns
container name if exists or container ID otherwise.
'''
try:
image = self.client.inspect_image(target)
if image["RepoTags"]:
name = ", ".join(image["RepoTags"])
else:
name = image["Id"][len("sha256:"):][:10]
return name, image
except docker.errors.NotFound:
return None, {}
def _get_container_name_and_config(self, target):
'''
Ensure that target is a container.
Returns container name if exists or container ID otherwise.
'''
try:
container = self.client.inspect_container(target)
if container["Name"]:
name = container["Name"].lstrip("/")
else:
name = container["Id"][:10]
return name, container
except docker.errors.NotFound:
return None, {}
def _check_container_mountpoint(self):
'''
Ensure that the container fs is well mounted and return its path
'''
return os.access(self.mountpoint, os.R_OK)
def scan_cve(self, scan_args):
'''
Wrapper function for scanning cve of a mounted container
'''
tmp_dir = tempfile.mkdtemp()
# Figure out which RHEL dist is in the chroot
dist = get_dist(self.mountpoint, self.oscap_binary,
self.config["Config"].get("Env", []) or [])
if dist is None:
sys.stderr.write("{0} is not based on RHEL\n"
.format(self.image_name or self.container_name))
return None
# Fetch the CVE input data for the dist
fetch = getInputCVE(tmp_dir)
cve_file = fetch._fetch_single(dist)
print("CVEs downloaded in " + cve_file)
args = ("oval", "eval")
for a in scan_args:
args += (a,)
args += (cve_file,)
scan_result = oscap_chroot(
self.mountpoint, self.oscap_binary, args,
self.image_name or self.container_name,
self.config["Config"].get("Env", []) or [] # because Env can exists but be None
)
print(scan_result.stdout)
print(scan_result.stderr, file=sys.stderr)
# cleanup
print("Cleaning temporary files ...")
shutil.rmtree(tmp_dir)
self._end()
return scan_result.returncode
def scan(self, scan_args):
'''
Wrapper function forwarding oscap args for an offline scan
'''
scan_result = oscap_chroot(
self.mountpoint,
self.oscap_binary, scan_args,
self.image_name or self.container_name,
self.config["Config"].get("Env", []) or [] # because Env can exists but be None
)
print(scan_result.stdout)
print(scan_result.stderr, file=sys.stderr)
self._end()
return scan_result.returncode
|