1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350
|
#!/usr/bin/python3
import argparse
import logging as log
import os
import shutil
import subprocess
import sys
import tempfile
import time
import uuid
import yaml
DESCRIPTION = '''
A tool for building compliance content for Kubernetes clusters.
This tool supports building ComplianceAsCode content locally or remotely on an
existing kubernetes cluster. This script requires Git, OpenShift CLI,
Kubernetes CLI, Podman CLI, and PyYAML.
'''
parser = argparse.ArgumentParser(
formatter_class=argparse.ArgumentDefaultsHelpFormatter,
description=DESCRIPTION)
parser.add_argument(
'-n', '--namespace',
help='Build image in the given namespace.',
default='openshift-compliance')
parser.add_argument(
'-p', '--create-profile-bundles',
help='Create ProfileBundle objects for the image.',
action='store_true',
default=False)
parser.add_argument(
'-c', '--build-in-cluster',
help=(
'Build content in-cluster. Note that this option ignores the '
'--product and --debug flags.'),
action='store_true',
default=False)
# with upstream prefix option as default
parser.add_argument(
'-np', '--no-upstream-prefix',
help=(
'The prefix for bundle names. The default is "upstream" if not specified. '
'To disable prefix, use --no-upstream-prefix.',
'This option is ignored when building content in the cluster using '
'--build-in-cluster.'),
action='store_true',
default=False)
parser.add_argument(
'-i', '--push-content-image',
help=(
'Do not build any content. Create profile bundles from the referenced k8s content image'),
)
parser.add_argument(
'-d', '--debug',
help=(
'Provide debug output during the build process. This option is '
'ignored when building content in the cluster using '
'--build-in-cluster.'),
action='store_true',
default=False)
parser.add_argument(
'-P', '--product',
help=(
'The product(s) to build. This option can be provided multiple times. '
'This option is ignored when building content in the cluster using '
'--build-in-cluster.'),
default=['ocp4', 'rhcos4'],
dest='products',
nargs='*')
parser.add_argument(
'-r', '--repository',
help=(
'The container image repository to use for images containing built '
'content. Images pushed to this repository must have a tag, which '
'you can specify with the --container-image-tag argument. If you do '
'not supply a tag, one will be generated for you. It is recommended '
'that you properly tag built images for production use. '
'Auto-generated tags are primarily useful for development workflows. '
'This script assumes you have authenticated to the image repository '
'if necessary (e.g, `podman login quay.io`).'))
parser.add_argument(
'-t', '--container-image-tag',
help='A unique tag for the container image.')
args = parser.parse_args()
CAPTURE_OUTPUT = not args.debug
DEBUG_LEVEL = log.INFO
if args.debug:
DEBUG_LEVEL = log.DEBUG
log.basicConfig(
format='%(asctime)s:%(levelname)s: %(message)s', level=DEBUG_LEVEL)
# FIXME(lbragstad): Remove this and replace it with operating system utils if
# possible.
command = ['git', 'rev-parse', '--show-toplevel']
result = subprocess.run(command, capture_output=True, check=True)
# Convert the file path from bytes to unicode since we might manipulate it
# later. Also, strip off any newlines.
REPO_PATH = result.stdout.decode().strip()
def ensure_namespace_exists():
"""Function that ensures there is a namespace for the content."""
if args.namespace == 'openshift-compliance':
namespace_file = os.path.join(
REPO_PATH, 'ocp-resources', 'compliance-operator-ns.yaml')
subprocess.run(
['oc', 'apply', '-f', namespace_file],
capture_output=CAPTURE_OUTPUT)
log.debug(f'Created namespace {args.namespace}')
else:
log.debug(f'Assuming {args.namespace} namespace exists.')
def build_content_locally(products):
"""Build compliance content locally for a list of products.
:param products: list of strings
"""
build_binary_path = os.path.join(REPO_PATH, 'build_product')
command = [build_binary_path] + products
if args.debug:
command.append('--debug')
subprocess.run(command, check=True, capture_output=CAPTURE_OUTPUT)
log.info(f'Successfully built content for {", ".join(products)}')
# NOTE(lbragstad): This could use something like podman-py.
def build_container_image():
"""Use Podman to build a container image for the content."""
dockerfile_path = os.path.join(
REPO_PATH, '/Dockerfiles/compliance_operator_content.Dockerfile')
command = [
'podman', 'build', '-f', dockerfile_path, '-t',
'localcontentbuild:latest', '.']
subprocess.run(command, check=True, capture_output=CAPTURE_OUTPUT)
log.info('Successfully built container image')
# NOTE(lbragstad): This could use something like podman-py.
def push_container_to_repository(repository, tag):
"""Push a container image to an image repository.
:param repository: string representing the location of the repository
:param tag: string representing the container image tag
"""
repository_string = repository + ':' + tag
command = [
'podman', 'push', 'localhost/localcontentbuild:latest',
repository_string]
result = subprocess.run(command, capture_output=True)
if result.returncode == 0:
log.info(f'Pushed image to {repository}:{tag}')
elif result.returncode == 125:
log.error(
'Failed to push container image due to authentication issues. '
'Make sure you have authenticated to the registry before '
'running this script.')
sys.exit(2)
else:
log.error(f'Failed to push container image to {repository_string}')
sys.exit(2)
def setup_remote_build_resources():
"""Create an ImageStream and BuildConfig to build content in cluster.
This method is only intended to run on OpenShift clusters since it relies
on ImageStreams and BuildConfigs, which are not available in vanilla
Kubernetes deployments.
"""
remote_resources_file = os.path.join(
REPO_PATH, 'ocp-resources', 'ds-build-remote.yaml')
command = ['oc', 'apply', '-n', args.namespace, '-f', remote_resources_file]
subprocess.run(command, check=True, capture_output=CAPTURE_OUTPUT)
def setup_local_build_resources():
"""Create an ImageStream and BuildConfig to use locally built content.
This method is only intended to run on OpenShift clusters since it relies
on ImageStreams and BuildConfigs, which are not available in vanilla
Kubernetes deployments.
"""
local_resources_file = os.path.join(
REPO_PATH, 'ocp-resources', 'ds-from-local-build.yaml')
command = ['oc', 'apply', '-n', args.namespace, '-f', local_resources_file]
subprocess.run(command, check=True, capture_output=CAPTURE_OUTPUT)
def copy_build_files_to_output_directory(output_directory):
"""Copy build resources to a dedicated directory.
:param output_directory: string representing the directory path
"""
build_directory = os.path.join(REPO_PATH, 'build')
for f in os.listdir(build_directory):
filepath = os.path.join(build_directory, f)
if os.path.isfile(filepath) and filepath.endswith('-ds.xml'):
shutil.copy(filepath, output_directory)
def start_build(output_directory):
"""Start an OpenShift build for OpenSCAP content.
:param output_directory: string representing the directory path
"""
command = [
'oc', 'start-build', '-n', args.namespace, 'openscap-ocp4-ds',
'--from-dir=%s' % output_directory]
subprocess.run(command, check=True, capture_output=CAPTURE_OUTPUT)
def create_profile_bundles(products, content_image=None):
"""Create ProfileBundle custom resources for built content.
:param products: a list of strings
:param content_image: a string representing the repository and tag for
content (optional)
"""
for product in products:
content_file = 'ssg-' + product + '-ds.xml'
if args.no_upstream_prefix:
product_name = product
else:
product_name = 'upstream-' + product
profile_bundle_update = {
'apiVersion': 'compliance.openshift.io/v1alpha1',
'kind': 'ProfileBundle',
'metadata': {'name': product_name},
'spec': {
'contentImage': content_image or 'openscap-ocp4-ds:latest',
'contentFile': content_file}}
with tempfile.NamedTemporaryFile() as f:
yaml.dump(profile_bundle_update, f, encoding='utf-8')
command = ['kubectl', 'apply', '-n', args.namespace, '-f', f.name]
subprocess.run(command, check=True, capture_output=CAPTURE_OUTPUT)
log.info(f'Created profile bundles for {", ".join(products)}')
def get_latest_build():
"""Return the latest version of a build.
:returns: a string representing the latest version of the build, typically
an integer
"""
command = [
'oc', 'get', 'buildconfigs', '-n', args.namespace, '--no-headers',
'openscap-ocp4-ds', '-o', 'custom-columns=status:.status.lastVersion']
build = subprocess.run(command, check=True, capture_output=True).stdout
return build.decode().strip()
def get_build_status(build):
"""Return the status of a build.
:param build: a string representing the build version
:returns: a string representing the build status
"""
command = [
'oc', 'get', '-n', args.namespace, 'builds',
'openscap-ocp4-ds-' + build, '--no-headers', '-o',
'custom-columns=status:.status.phase']
status = subprocess.run(command, check=True, capture_output=True).stdout
return status.decode().strip()
def get_image_repository():
"""Return the image repository for an ImageStream containing content.
:returns: a string representing the image repository and tag
"""
command = [
'oc', 'get', '-n', args.namespace, 'imagestreams', 'openscap-ocp4-ds',
'--no-headers', '-o', 'custom-columns=repo:.status.dockerImageRepository']
image_repo = subprocess.run(command, check=True, capture_output=True).stdout
return image_repo.decode().strip()
if args.push_content_image:
create_profile_bundles(args.products, args.push_content_image)
sys.exit(0)
log.info(f'Building content for {", ".join(args.products)}')
ensure_namespace_exists()
if args.repository:
build_content_locally(args.products)
build_container_image()
# generate a container image tag if the user didn't supply one
if args.container_image_tag:
tag = args.container_image_tag
else:
tag = uuid.uuid4().hex[:16]
push_container_to_repository(args.repository, tag)
content_image = args.repository + ':' + tag
if args.create_profile_bundles:
create_profile_bundles(args.products, content_image=content_image)
sys.exit(0)
elif args.build_in_cluster:
setup_remote_build_resources()
output_directory = REPO_PATH
else:
build_content_locally(args.products)
setup_local_build_resources()
output_directory = tempfile.mkdtemp()
copy_build_files_to_output_directory(output_directory)
start_build(output_directory)
# clean up output directory for local builds
if not args.build_in_cluster:
shutil.rmtree(output_directory)
# wait some time before asking for build status
time.sleep(5)
BUILD = get_latest_build()
while True:
status = get_build_status(BUILD)
if status == 'Complete':
image = get_image_repository()
log.info(f'Your image is available at {image}')
break
elif status == 'Error':
log.error(f'Build openscap-ocp-ds-{BUILD} failed. Check the log for more information')
sys.exit(1)
log.info('Build status: %s', status)
polling_interval_second = 3
# allow at least a little time before we fetch the status
time.sleep(polling_interval_second)
if args.create_profile_bundles:
create_profile_bundles(args.products)
|