blob: ca8801591c7645b15ef95d37cff777dffce2ad0a [file] [log] [blame]
// Copyright 2022 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package worker
import (
"context"
"crypto/sha256"
"encoding/hex"
"encoding/json"
"errors"
"fmt"
"io"
"net/http"
"os"
"os/exec"
"path"
"path/filepath"
"strings"
"golang.org/x/pkgsite-metrics/internal/analysis"
"golang.org/x/pkgsite-metrics/internal/derrors"
"golang.org/x/pkgsite-metrics/internal/queue"
"golang.org/x/pkgsite-metrics/internal/sandbox"
"golang.org/x/pkgsite-metrics/internal/scan"
"golang.org/x/pkgsite-metrics/internal/version"
)
type analysisServer struct {
*Server
openFile openFileFunc // Used to open binary files from GCS, except for testing.
}
const analysisBinariesBucketDir = "analysis-binaries"
func (s *analysisServer) handleScan(w http.ResponseWriter, r *http.Request) (err error) {
defer derrors.Wrap(&err, "analysisServer.handleScan")
ctx := r.Context()
req, err := analysis.ParseScanRequest(r, "/analysis/scan")
if err != nil {
return fmt.Errorf("%w: %v", derrors.InvalidArgument, err)
}
if req.Binary == "" {
return fmt.Errorf("%w: analysis: missing binary", derrors.InvalidArgument)
}
if req.Suffix != "" {
return fmt.Errorf("%w: analysis: only implemented for whole modules (no suffix)", derrors.InvalidArgument)
}
row := s.scan(ctx, req)
return writeResult(ctx, req.Serve, w, s.bqClient, analysis.TableName, row)
}
func (s *analysisServer) scan(ctx context.Context, req *analysis.ScanRequest) *analysis.Result {
row := &analysis.Result{
ModulePath: req.Module,
Version: req.Version,
BinaryName: req.Binary,
WorkVersion: analysis.WorkVersion{
BinaryArgs: req.Args,
WorkerVersion: s.cfg.VersionID,
SchemaVersion: analysis.SchemaVersion,
},
}
err := doScan(ctx, req.Module, req.Version, req.Insecure, func() error {
jsonTree, binaryHash, err := s.scanInternal(ctx, req)
if err != nil {
return err
}
row.WorkVersion.BinaryVersion = hex.EncodeToString(binaryHash)
info, err := s.proxyClient.Info(ctx, req.Module, req.Version)
if err != nil {
return fmt.Errorf("%w: %v", derrors.ProxyError, err)
}
row.Version = info.Version
row.CommitTime = info.Time
row.Diagnostics = analysis.JSONTreeToDiagnostics(jsonTree)
return nil
})
if err != nil {
row.AddError(err)
}
row.SortVersion = version.ForSorting(row.Version)
return row
}
func (s *analysisServer) scanInternal(ctx context.Context, req *analysis.ScanRequest) (jt analysis.JSONTree, binaryHash []byte, err error) {
var tempDir string
if req.Insecure {
tempDir, err = os.MkdirTemp("", "analysis")
if err != nil {
return nil, nil, err
}
defer removeDir(&err, tempDir)
}
var destPath string
if req.Insecure {
destPath = filepath.Join(tempDir, "binary")
} else {
destPath = path.Join(sandboxRoot, "binaries", path.Base(req.Binary))
}
if s.cfg.BinaryBucket == "" {
return nil, nil, errors.New("missing binary bucket (define GO_ECOSYSTEM_BINARY_BUCKET)")
}
srcPath := path.Join(analysisBinariesBucketDir, req.Binary)
if err := copyToLocalFile(destPath, true, srcPath, s.openFile); err != nil {
return nil, nil, err
}
binaryHash, err = hashFile(destPath)
if err != nil {
return nil, nil, err
}
mdir := moduleDir(req.Module, req.Version, req.Insecure)
defer removeDir(&err, mdir)
if err := prepareModule(ctx, req.Module, req.Version, mdir, s.proxyClient, req.Insecure); err != nil {
return nil, nil, err
}
var sbox *sandbox.Sandbox
if !req.Insecure {
sbox = sandbox.New("/bundle")
sbox.Runsc = "/usr/local/bin/runsc"
destPath = strings.TrimPrefix(destPath, sandboxRoot)
}
tree, err := runAnalysisBinary(sbox, destPath, req.Args, mdir)
if err != nil {
return nil, nil, err
}
return tree, binaryHash, nil
}
func hashFile(filename string) (_ []byte, err error) {
defer derrors.Wrap(&err, "hashFile(%q)", filename)
f, err := os.Open(filename)
if err != nil {
return nil, err
}
defer f.Close()
h := sha256.New()
if _, err := io.Copy(h, f); err != nil {
return nil, err
}
return h.Sum(nil), nil
}
// Run the binary on the module.
func runAnalysisBinary(sbox *sandbox.Sandbox, binaryPath, reqArgs, moduleDir string) (analysis.JSONTree, error) {
args := []string{"-json"}
args = append(args, strings.Fields(reqArgs)...)
args = append(args, "./...")
out, err := runBinaryInDir(sbox, binaryPath, args, moduleDir)
if err != nil {
return nil, fmt.Errorf("running analysis binary %s: %s", binaryPath, derrors.IncludeStderr(err))
}
var tree analysis.JSONTree
if err := json.Unmarshal(out, &tree); err != nil {
return nil, err
}
return tree, nil
}
func runBinaryInDir(sbox *sandbox.Sandbox, path string, args []string, dir string) ([]byte, error) {
if sbox == nil {
cmd := exec.Command(path, args...)
cmd.Dir = dir
return cmd.Output()
}
cmd := sbox.Command(path, args...)
cmd.Dir = dir
return cmd.Output()
}
func (s *analysisServer) handleEnqueue(w http.ResponseWriter, r *http.Request) (err error) {
defer derrors.Wrap(&err, "analysisServer.handleEnqueue")
ctx := r.Context()
params := &analysis.EnqueueParams{Min: defaultMinImportedByCount}
if err := scan.ParseParams(r, params); err != nil {
return fmt.Errorf("%w: %v", derrors.InvalidArgument, err)
}
mods, err := readModules(ctx, s.cfg, params.File, params.Min)
if err != nil {
return err
}
tasks := createAnalysisQueueTasks(params, mods)
return enqueueTasks(ctx, tasks, s.queue,
&queue.Options{Namespace: "analysis", TaskNameSuffix: params.Suffix})
}
func createAnalysisQueueTasks(params *analysis.EnqueueParams, mods []scan.ModuleSpec) []queue.Task {
var tasks []queue.Task
for _, mod := range mods {
tasks = append(tasks, &analysis.ScanRequest{
ModuleURLPath: scan.ModuleURLPath{
Module: mod.Path,
Version: mod.Version,
},
ScanParams: analysis.ScanParams{
Binary: params.Binary,
Args: params.Args,
ImportedBy: mod.ImportedBy,
Insecure: params.Insecure,
},
})
}
return tasks
}