argo-cd/util/sourceintegrity/source_integrity.go
Oliver Gondža 87a4268e6a
fix(source-integrity): Handle eventual unexpected git output
Signed-off-by: Oliver Gondža <ogondza@gmail.com>
2026-04-01 13:44:54 +02:00

235 lines
7.8 KiB
Go

package sourceintegrity
import (
"errors"
"fmt"
"os"
"strings"
log "github.com/sirupsen/logrus"
"github.com/argoproj/argo-cd/v3/pkg/apis/application/v1alpha1"
"github.com/argoproj/argo-cd/v3/util/git"
"github.com/argoproj/argo-cd/v3/util/glob"
)
type gitFunc func(gitClient git.Client, verifiedRevision string) (result *v1alpha1.SourceIntegrityCheckResult, legacyDescription string, err error)
var _gpgDisabledLoggedAlready bool
// HasCriteria determines if any of the sources have some criteria declared
func HasCriteria(si *v1alpha1.SourceIntegrity, sources ...v1alpha1.ApplicationSource) bool {
if si == nil || si.Git == nil {
return false
}
for _, source := range sources {
if !source.IsZero() && !source.IsOCI() && !source.IsHelm() {
if lookupGit(si, source.RepoURL) != nil {
return true
}
}
}
return false
}
// VerifyGit makes sure the git repository satisfies the criteria declared.
// It returns nil in case there were no relevant criteria, a check result if there were.
// The verifiedRevision is expected to be either an annotated tag to a resolved commit sha - the revision, its signature is being verified.
func VerifyGit(si *v1alpha1.SourceIntegrity, gitClient git.Client, verifiedRevision string) (*v1alpha1.SourceIntegrityCheckResult, string, error) {
if si == nil || si.Git == nil {
return nil, "", nil
}
check := lookupGit(si, gitClient.RepoURL())
if check != nil {
return check(gitClient, verifiedRevision)
}
return nil, "", nil
}
func lookupGit(si *v1alpha1.SourceIntegrity, repoURL string) gitFunc {
policies := findMatchingGitPolicies(si.Git, repoURL)
nPolicies := len(policies)
if nPolicies == 0 {
log.Infof("No git source integrity policies found for repo URL: %s", repoURL)
return nil
}
if nPolicies > 1 {
// Multiple matching policies is an error. BUT, it has to return a check that fails for every repo.
// This is to make sure that a mistake in argo cd configuration does not disable verification until fixed.
msg := fmt.Sprintf("multiple (%d) git source integrity policies found for repo URL: %s", nPolicies, repoURL)
log.Warn(msg)
return func(_ git.Client, _ string) (*v1alpha1.SourceIntegrityCheckResult, string, error) {
return nil, "", errors.New(msg)
}
}
policy := policies[0]
if policy.GPG != nil {
if policy.GPG.Mode == v1alpha1.SourceIntegrityGitPolicyGPGModeNone {
// Declare missing check because there is no verification performed
return nil
}
if !_gpgDisabledLoggedAlready && !IsGPGEnabled() {
log.Warnf("SourceIntegrity criteria for git+gpg declared, but it is turned off by ARGOCD_GPG_ENABLED")
_gpgDisabledLoggedAlready = true
return nil
}
return func(gitClient git.Client, verifiedRevision string) (*v1alpha1.SourceIntegrityCheckResult, string, error) {
return verify(policy.GPG, gitClient, verifiedRevision)
}
}
log.Warnf("No verification configured for SourceIntegrity policy for %+v", policy.Repos)
return nil
}
func findMatchingGitPolicies(si *v1alpha1.SourceIntegrityGit, repoURL string) (policies []*v1alpha1.SourceIntegrityGitPolicy) {
for _, p := range si.Policies {
include := false
for _, r := range p.Repos {
m := repoMatches(r.URL, repoURL)
if m == -1 {
include = false
break
} else if m == 1 {
include = true
}
}
if include {
policies = append(policies, p)
}
}
return policies
}
func repoMatches(urlGlob string, repoURL string) int {
if strings.HasPrefix(urlGlob, "!") {
if glob.Match(urlGlob[1:], repoURL) {
return -1
}
} else {
if glob.Match(urlGlob, repoURL) {
return 1
}
}
return 0
}
func verify(g *v1alpha1.SourceIntegrityGitPolicyGPG, gitClient git.Client, verifiedRevision string) (*v1alpha1.SourceIntegrityCheckResult, string, error) {
const checkName = "GIT/GPG"
var deep bool
switch g.Mode {
// verify tag if on tag, latest revision otherwise
case v1alpha1.SourceIntegrityGitPolicyGPGModeHead:
deep = false
// verify history from the current commit
case v1alpha1.SourceIntegrityGitPolicyGPGModeStrict:
deep = true
default:
return nil, "", fmt.Errorf("unknown GPG mode %q configured for GIT source integrity", g.Mode)
}
signatures, err := gitClient.LsSignatures(verifiedRevision, deep)
if err != nil {
return nil, "", err
}
if len(signatures) == 0 {
panic("no signatures found for " + verifiedRevision)
}
problems, legacyDescription := describeProblems(g, signatures)
result := &v1alpha1.SourceIntegrityCheckResult{Checks: []v1alpha1.SourceIntegrityCheckResultItem{{
Name: checkName,
Problems: problems,
}}}
return result, legacyDescription, nil
}
// describeProblems reports 10 most recent problematic signatures or unsigned commits.
// The number is limited not to flood the UI and logs with too many problems. Problems related to the same signing key are squashed.
func describeProblems(g *v1alpha1.SourceIntegrityGitPolicyGPG, signatureInfos []git.RevisionSignatureInfo) (problems []string, legacyDescription string) {
reportedKeys := make(map[string]any)
for _, signatureInfo := range signatureInfos {
// TODO: Delete with next major version. Backward compatibility only
if legacyDescription == "" {
if signatureInfo.VerificationResult == git.GPGVerificationResultUnsigned {
legacyDescription = "Revision is not signed."
} else {
legacyResult := map[git.GPGVerificationResult]string{
git.GPGVerificationResultGood: "Good",
git.GPGVerificationResultBad: "Bad",
git.GPGVerificationResultUntrusted: "Invalid",
git.GPGVerificationResultExpiredSignature: "Invalid",
git.GPGVerificationResultExpiredKey: "Invalid",
git.GPGVerificationResultRevokedKey: "Invalid",
git.GPGVerificationResultMissingKey: "Invalid",
}[signatureInfo.VerificationResult]
legacyDescription = fmt.Sprintf("%s signature from %s key %s", legacyResult, signatureInfo.AuthorIdentity, signatureInfo.SignatureKeyID)
}
}
// Do not report the same key twice unless:
// - the revision is unsigned (unsigned commits can have different authors, so they are all worth reporting)
// - the revision is a tag (tags are signed separately from commits)
if signatureInfo.SignatureKeyID != "" && git.IsCommitSHA(signatureInfo.Revision) {
if _, exists := reportedKeys[signatureInfo.SignatureKeyID]; exists {
continue
}
reportedKeys[signatureInfo.SignatureKeyID] = nil
}
problem := gpgProblemMessage(g, signatureInfo)
if problem != "" {
problems = append(problems, problem)
// Report at most 10 problems
if len(problems) >= 10 {
break
}
}
}
return problems, legacyDescription
}
// gpgProblemMessage generates a message describing GPG verification issues for a specific revision signature and the configured policy.
// When an empty string is returned, it means there is no problem - the validation has passed.
func gpgProblemMessage(g *v1alpha1.SourceIntegrityGitPolicyGPG, signatureInfo git.RevisionSignatureInfo) string {
if signatureInfo.VerificationResult != git.GPGVerificationResultGood {
return fmt.Sprintf(
"Failed verifying revision %s by '%s': %s (key_id=%s)",
signatureInfo.Revision, signatureInfo.AuthorIdentity, signatureInfo.VerificationResult, signatureInfo.SignatureKeyID,
)
}
for _, allowedKey := range g.Keys {
allowedKey, err := KeyID(allowedKey)
if err != nil {
log.Error(err.Error())
continue
}
if allowedKey == signatureInfo.SignatureKeyID {
return ""
}
}
return fmt.Sprintf(
"Failed verifying revision %s by '%s': signed with unallowed key (key_id=%s)",
signatureInfo.Revision, signatureInfo.AuthorIdentity, signatureInfo.SignatureKeyID,
)
}
// IsGPGEnabled returns true if the GPG feature is enabled
func IsGPGEnabled() bool {
if en := os.Getenv("ARGOCD_GPG_ENABLED"); strings.EqualFold(en, "false") || strings.EqualFold(en, "no") {
return false
}
return true
}