ce8d31bbb3
Until https://github.com/coreos/clair/pull/193 is merged, having vulnerabilities that are tagged both rhel and centos would duplicate in the database or use a change that requires a migration. But presently due to the fetcher logic, the rhel provided vulnerabilities are labelled for centos, and then the namespace does not match and therefore not tested against. So until such a day that a vulnerability could have both rhel and centos label, then hack this in. It'll accomplish the same during this interim. Signed-off-by: Vincent Batts <vbatts@hashbangbash.com>
78 lines
2.5 KiB
Go
78 lines
2.5 KiB
Go
// Copyright 2015 clair authors
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package redhatrelease
|
|
|
|
import (
|
|
"regexp"
|
|
"strings"
|
|
|
|
"github.com/coreos/clair/database"
|
|
"github.com/coreos/clair/worker/detectors"
|
|
"github.com/coreos/pkg/capnslog"
|
|
)
|
|
|
|
var (
|
|
log = capnslog.NewPackageLogger("github.com/coreos/clair", "worker/detectors/namespace/redhatrelease")
|
|
|
|
centosReleaseRegexp = regexp.MustCompile(`(?P<os>[^\s]*) (Linux release|release) (?P<version>[\d]+)`)
|
|
redhatReleaseRegexp = regexp.MustCompile(`(?P<os>Red Hat Enterprise Linux) (Client release|Server release|Workstation release) (?P<version>[\d]+)`)
|
|
)
|
|
|
|
// RedhatReleaseNamespaceDetector implements NamespaceDetector and detects the OS from the
|
|
// /etc/centos-release, /etc/redhat-release and /etc/system-release files.
|
|
//
|
|
// Typically for CentOS and Red-Hat like systems
|
|
// eg. CentOS release 5.11 (Final)
|
|
// eg. CentOS release 6.6 (Final)
|
|
// eg. CentOS Linux release 7.1.1503 (Core)
|
|
// eg. Red Hat Enterprise Linux Server release 7.2 (Maipo)
|
|
type RedhatReleaseNamespaceDetector struct{}
|
|
|
|
func init() {
|
|
detectors.RegisterNamespaceDetector("redhat-release", &RedhatReleaseNamespaceDetector{})
|
|
}
|
|
|
|
func (detector *RedhatReleaseNamespaceDetector) Detect(data map[string][]byte) *database.Namespace {
|
|
for _, filePath := range detector.GetRequiredFiles() {
|
|
f, hasFile := data[filePath]
|
|
if !hasFile {
|
|
continue
|
|
}
|
|
|
|
var r []string
|
|
|
|
// try for RHEL
|
|
r = redhatReleaseRegexp.FindStringSubmatch(string(f))
|
|
if len(r) == 4 {
|
|
// TODO(vbatts) this is a hack until https://github.com/coreos/clair/pull/193
|
|
return &database.Namespace{Name: "centos" + ":" + r[3]}
|
|
}
|
|
|
|
// then try centos first
|
|
r = centosReleaseRegexp.FindStringSubmatch(string(f))
|
|
if len(r) == 4 {
|
|
return &database.Namespace{Name: strings.ToLower(r[1]) + ":" + r[3]}
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// GetRequiredFiles returns the list of files that are required for Detect()
|
|
func (detector *RedhatReleaseNamespaceDetector) GetRequiredFiles() []string {
|
|
return []string{"etc/centos-release", "etc/redhat-release", "etc/system-release"}
|
|
}
|