-
Notifications
You must be signed in to change notification settings - Fork 60
Expand file tree
/
Copy pathMakefile
More file actions
308 lines (256 loc) · 9.72 KB
/
Makefile
File metadata and controls
308 lines (256 loc) · 9.72 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
# Copyright 2024 Chainguard, Inc.
# SPDX-License-Identifier: Apache-2.0
SAMPLES_REPO ?= chainguard-sandbox/malcontent-samples
SAMPLES_COMMIT ?= f948cfd0f9d2a35a2452fe43ea4d094979652103
# BEGIN: lint-install ../malcontent
# http://github.com/tinkerbell/lint-install
.PHONY: lint
lint: _lint
LINT_ARCH := $(shell uname -m)
LINT_OS := $(shell uname)
LINT_OS_LOWER := $(shell echo $(LINT_OS) | tr '[:upper:]' '[:lower:]')
LINT_ROOT := $(shell dirname $(realpath $(firstword $(MAKEFILE_LIST))))
# flags required to successfully build malcontent with yara-x's C API
CPPFLAGS ?= "-I$(LINT_ROOT)/out/include"
LDFLAGS :=
PKGCONF_PATH ?= "$(LINT_ROOT)/out/lib/pkgconfig"
ifeq ($(LINT_OS),Darwin)
LDFLAGS="-L$(LINT_ROOT)/out/lib -Wl,-no_warn_duplicate_libraries,-rpath,$(LINT_ROOT)/out/lib,-lyara_x_capi"
else ifeq ($(LINT_OS),Linux)
LDFLAGS="-L$(LINT_ROOT)/out/lib -Wl,-rpath,$(LINT_ROOT)/out/lib,-lyara_x_capi,-no-pie"
endif
# yara-x adds an additional string for the platform (apple, unknown)
LINT_PLATFORM :=
ifeq ($(LINT_OS),Darwin)
LINT_PLATFORM=apple
else
LINT_PLATFORM=unknown
endif
LINT_PLATFOM_SUFFIX :=
ifeq ($(LINT_OS),Linux)
LINT_PLATFORM_SUFFIX=-gnu
endif
LINTERS :=
FIXERS :=
GOLANGCI_LINT_CONFIG := $(LINT_ROOT)/.golangci.yml
GOLANGCI_LINT_VERSION ?= v2.10.1
GOLANGCI_LINT_BIN := $(LINT_ROOT)/out/linters/golangci-lint-$(GOLANGCI_LINT_VERSION)-$(LINT_ARCH)
$(GOLANGCI_LINT_BIN):
mkdir -p $(LINT_ROOT)/out/linters
rm -rf $(LINT_ROOT)/out/linters/golangci-lint-*
curl -sSfL https://raw.githubusercontent.com/golangci/golangci-lint/master/install.sh | sh -s -- -b $(LINT_ROOT)/out/linters $(GOLANGCI_LINT_VERSION)
mv $(LINT_ROOT)/out/linters/golangci-lint $@
YARA_X_REPO ?= virusTotal/yara-x
YARA_X_VERSION ?= v1.15.0
YARA_X_COMMIT ?= 71e1b4e0d9ca5a050d98a8db5ef3788d5ff00e36
YARA_X_SHA :=
ifeq ($(LINT_OS),Darwin)
ifeq ($(shell uname -m),arm64)
LINT_ARCH = aarch64
YARA_X_SHA = d3afa669299e35a79e1243201ee5f7a8b52079c3765e2e9d300beb44ad2a9c49
else
YARA_X_SHA = 6466a91bd9f40e6e329ef6eb8217c11e4d352b0e31f48234c02f9b30ec6e113a
endif
else ifeq ($(LINT_OS),Linux)
ifneq ($(filter $(shell uname -m),aarch64 arm64),)
LINT_ARCH = aarch64
YARA_X_SHA = 56d173b7a47a8285318b618b21fe8648db165f160bbbee02f56b8da2341c2b19
else
YARA_X_SHA = 90bb8898a2052781890684d8b030d62401a1226caab9fe58adf6fd7513f4a7b3
endif
endif
YARA_X_BIN := $(LINT_ROOT)/out/linters/yr-$(YARA_X_VERSION)-$(LINT_ARCH)
$(YARA_X_BIN):
mkdir -p $(LINT_ROOT)/out/linters
rm -rf $(LINT_ROOT)/out/linters/yr
curl -sSfL https://github.com/VirusTotal/yara-x/releases/download/$(YARA_X_VERSION)/yara-x-$(YARA_X_VERSION)-$(LINT_ARCH)-$(LINT_PLATFORM)-$(LINT_OS_LOWER)$(LINT_PLATFORM_SUFFIX).gz -o yara-x.gz
echo "$(YARA_X_SHA) *yara-x.gz" | shasum -a 256 --check
tar -xzvf yara-x.gz && mv yr $(LINT_ROOT)/out/linters && rm yara-x.gz
mv $(LINT_ROOT)/out/linters/yr $@
LINTERS += golangci-lint-lint
golangci-lint-lint: $(GOLANGCI_LINT_BIN)
find . -maxdepth 1 -name go.mod -print0 | xargs -0 -L1 -I{} /bin/sh -c 'CGO_LDFLAGS=$(LDFLAGS) CGO_CPPFLAGS=$(CPPFLAGS) PKG_CONFIG_PATH=$(PKGCONF_PATH) "$(GOLANGCI_LINT_BIN)" run -c "$(GOLANGCI_LINT_CONFIG)"' \;
FIXERS += golangci-lint-fix
golangci-lint-fix: $(GOLANGCI_LINT_BIN)
CGO_LDFLAGS=$(LDFLAGS) \
CGO_CPPFLAGS=$(CPPFLAGS) \
PKG_CONFIG_PATH=$(PKGCONF_PATH) \
find . -maxdepth 1 -name go.mod -execdir "$(GOLANGCI_LINT_BIN)" run -c "$(GOLANGCI_LINT_CONFIG)" --fix \;
FIXERS += modernize
modernize:
CGO_LDFLAGS=$(LDFLAGS) \
CGO_CPPFLAGS=$(CPPFLAGS) \
PKG_CONFIG_PATH=$(PKGCONF_PATH) \
go run golang.org/x/tools/gopls/internal/analysis/modernize/cmd/modernize@latest -fix -test ./...
LINTERS += yara-x-fmt
yara-x-fmt: $(YARA_X_BIN)
find rules -type f -name "*.yara" -execdir "$(YARA_X_BIN)" fmt {} \;
yara-x-compile: $(YARA_X_BIN)
"$(YARA_X_BIN)" compile --path-as-namespace -w rules/
.PHONY: _lint $(LINTERS)
_lint: $(LINTERS)
.PHONY: fix $(FIXERS)
fix: $(FIXERS)
# END: lint-install ../malcontent
# sample checkouts have 3 stages:
# out/samples/.git - I'm a blank git repo
# out/samples/.git/commit-<hash> - I'm checked out to this particular commit
# out/samples/.decompressed-<hash> - I've decompressed to this particular commit
out/${SAMPLES_REPO}/.git/commit-$(SAMPLES_COMMIT):
mkdir -p out/$(SAMPLES_REPO)
test -d out/$(SAMPLES_REPO)/.git || git clone --depth 4 https://github.com/$(SAMPLES_REPO).git out/$(SAMPLES_REPO)
rm out/$(SAMPLES_REPO)/.git/commit-* 2>/dev/null || true
git -C out/$(SAMPLES_REPO) switch - || true
git -C out/$(SAMPLES_REPO) pull
git -C out/$(SAMPLES_REPO) checkout $(SAMPLES_COMMIT)
touch out/$(SAMPLES_REPO)/.git/commit-$(SAMPLES_COMMIT)
out/$(SAMPLES_REPO)/.decompressed-$(SAMPLES_COMMIT): out/${SAMPLES_REPO}/.git/commit-$(SAMPLES_COMMIT)
find out/$(SAMPLES_REPO)/ -name "*.xz" -type f -exec xz -dk {} \;
touch out/$(SAMPLES_REPO)/.decompressed-$(SAMPLES_COMMIT)
out/$(YARA_X_REPO)/.git/commit-$(YARA_X_COMMIT):
mkdir -p out/$(YARA_X_REPO)
test -d out/$(YARA_X_REPO)/.git || git clone https://github.com/$(YARA_X_REPO).git out/$(YARA_X_REPO)
rm out/$(YARA_X_REPO)/.git/commit-* 2>/dev/null || true
git -C out/$(YARA_X_REPO) switch - || true
git -C out/$(YARA_X_REPO) pull --rebase --autostash
git -C out/$(YARA_X_REPO) checkout $(YARA_X_COMMIT)
touch out/$(YARA_X_REPO)/.git/commit-$(YARA_X_COMMIT)
samples: out/$(SAMPLES_REPO)/.decompressed-$(SAMPLES_COMMIT)
.PHONY: install-yara-x
install-yara-x: out/$(YARA_X_REPO)/.git/commit-$(YARA_X_COMMIT)
mkdir -p out/lib
mkdir -p out/include
cd out/$(YARA_X_REPO) && \
cargo install cargo-c --locked && \
RUSTFLAGS="-C target-feature=+crt-static" cargo cinstall -p yara-x-capi --features=native-code-serialization --profile release-lto --prefix="$(LINT_ROOT)/out" --libdir="$(LINT_ROOT)/out/lib" --crt-static --library-type="staticlib"
.PHONY: update-deps
update-deps:
go get -u ./...
go mod tidy
# unit tests only
.PHONY: test
test:
CGO_LDFLAGS=$(LDFLAGS) \
CGO_CPPFLAGS=$(CPPFLAGS) \
PKG_CONFIG_PATH=$(PKGCONF_PATH) \
go test -race ./pkg/...
FUZZ_TIME ?= 10s
.PHONY: fuzz
fuzz:
@grep -r "^func Fuzz" --include="*_test.go" pkg/ | \
awk -F'[:(]' '{gsub(/func /, "", $$2); dir=$$1; sub(/\/[^/]+$$/, "/", dir); print $$2, "./" dir}' | \
while read -r func dir; do \
echo "--- $$func ($$dir) ---"; \
CGO_LDFLAGS=$(LDFLAGS) \
CGO_CPPFLAGS=$(CPPFLAGS) \
PKG_CONFIG_PATH=$(PKGCONF_PATH) \
go test -timeout 0 -fuzz="^$$func$$" -fuzztime=$(FUZZ_TIME) "$$dir" || exit 1; \
done
# fuzz tests - runs continuously (use Ctrl+C to stop)
# Usage: make fuzz-continuous FUZZ_TARGET=FuzzExtractArchive FUZZ_PKG=./pkg/archive/
FUZZ_TARGET ?= FuzzExtractArchive
FUZZ_PKG ?= ./pkg/archive/
.PHONY: fuzz-continuous
fuzz-continuous:
CGO_LDFLAGS=$(LDFLAGS) \
CGO_CPPFLAGS=$(CPPFLAGS) \
PKG_CONFIG_PATH=$(PKGCONF_PATH) \
go test -fuzz=$(FUZZ_TARGET) $(FUZZ_PKG)
# unit tests only
.PHONY: coverage
coverage: out/mal.coverage
# generate the html report
.PHONY: coverage-html
coverage-html: out/coverage.html
# pop open the html page in a browser directly
.PHONY: coverage-browser
coverage-browser: out/mal.coverage
CGO_LDFLAGS=$(LDFLAGS) \
CGO_CPPFLAGS=$(CPPFLAGS) \
PKG_CONFIG_PATH=$(PKGCONF_PATH) \
go tool cover -html=$<
# generate the html report
out/coverage.html: out/mal.coverage
CGO_LDFLAGS=$(LDFLAGS) \
CGO_CPPFLAGS=$(CPPFLAGS) \
PKG_CONFIG_PATH=$(PKGCONF_PATH) \
go tool cover -html=$< -o $@
# we always want to regen the coverage data file
.PHONY: out/mal.coverage
out/mal.coverage:
mkdir -p out
CGO_LDFLAGS=$(LDFLAGS) \
CGO_CPPFLAGS=$(CPPFLAGS) \
PKG_CONFIG_PATH=$(PKGCONF_PATH) \
go test -coverprofile $@ -race ./pkg/... -coverpkg ./pkg/...
# integration tests only
.PHONY: integration
integration: out/$(SAMPLES_REPO)/.decompressed-$(SAMPLES_COMMIT)
CGO_LDFLAGS=$(LDFLAGS) \
CGO_CPPFLAGS=$(CPPFLAGS) \
PKG_CONFIG_PATH=$(PKGCONF_PATH) \
go test -race -timeout 0 ./tests/...
.PHONY: bench
bench: out/$(SAMPLES_REPO)/.decompressed-$(SAMPLES_COMMIT)
CGO_LDFLAGS=$(LDFLAGS) \
CGO_CPPFLAGS=$(CPPFLAGS) \
PKG_CONFIG_PATH=$(PKGCONF_PATH) \
go test -run=^\$$ -bench=. ./... -benchmem
BENCH_CMD := CGO_LDFLAGS=$(LDFLAGS) CGO_CPPFLAGS=$(CPPFLAGS) PKG_CONFIG_PATH=$(PKGCONF_PATH) \
go test -benchmem -run=^\$$ -bench ^BenchmarkRun\$$ github.com/chainguard-dev/malcontent/tests -args
.PHONY: bench-malcontent
bench-malcontent:
$(BENCH_CMD) -path="macOS/clean/malcontent"
.PHONY: bench-all-samples
bench-all-samples:
$(BENCH_CMD) -path=""
.PHONY: bench-does-nothing
bench-does-nothing:
$(BENCH_CMD) -path="does-nothing"
.PHONY: bench-javascript
bench-javascript:
$(BENCH_CMD) -path="Javascript"
.PHONY: bench-linux
bench-linux:
$(BENCH_CMD) -path="Linux"
.PHONY: bench-macos
bench-macos:
$(BENCH_CMD) -path="macOS"
.PHONY: bench-npm
bench-npm:
$(BENCH_CMD) -path="NPM"
.PHONY: bench-php
bench-php:
$(BENCH_CMD) -path="PHP"
.PHONY: bench-python
bench-python:
$(BENCH_CMD) -path="Python"
.PHONY: bench-typescript
bench-typescript:
$(BENCH_CMD) -path="TypeScript"
.PHONY: bench-windows
bench-windows:
$(BENCH_CMD) -path="Windows"
.PHONY: out/mal
out/mal:
mkdir -p out
CGO_LDFLAGS=$(LDFLAGS) \
CGO_CPPFLAGS=$(CPPFLAGS) \
PKG_CONFIG_PATH=$(PKGCONF_PATH) \
go build -o out/mal ./cmd/mal
.PHONY: update-third-party
update-third-party:
./third_party/yara/update.sh
.PHONY: refresh-sample-testdata
refresh-sample-testdata: out/$(SAMPLES_REPO)/.decompressed-$(SAMPLES_COMMIT) out/mal
MALCONTENT_UPX_PATH=$(shell which upx) ./out/mal refresh
ARCH ?= $(shell uname -m)
CRANE_VERSION=v0.21.0
out/crane-$(ARCH)-$(CRANE_VERSION):
mkdir -p out
GOBIN=$(CURDIR)/out go install github.com/google/go-containerregistry/cmd/crane@$(CRANE_VERSION)
mv out/crane out/crane-$(ARCH)-$(CRANE_VERSION)
export-image: out/crane-$(ARCH)-$(CRANE_VERSION)
./out/crane-$(ARCH)-$(CRANE_VERSION) \
export \
cgr.dev/chainguard/static:latest@sha256:bde549df44d5158013856a778b34d8972cf52bb2038ec886475d857ec7c365ed - | xz > pkg/action/testdata/static.tar.xz