make GarbleActionID a full sha256 hash

This is in preparation for the switch to Go's cache package,
whose ActionID type is also a full sha256 hash with 32 bytes.
We were using "short" hashes as shown by `go tool buildid`,
since that was consistent and 15 bytes was generally enough.
pull/750/head
Daniel Martí 2 years ago
parent 7872177381
commit cee53a7868

@ -47,11 +47,8 @@ func decodeBuildIDHash(str string) []byte {
} }
// encodeBuildIDHash encodes a build ID hash in base64, just like cmd/go does. // encodeBuildIDHash encodes a build ID hash in base64, just like cmd/go does.
func encodeBuildIDHash(h []byte) string { func encodeBuildIDHash(h [sha256.Size]byte) string {
if len(h) != buildIDHashLength { return base64.RawURLEncoding.EncodeToString(h[:buildIDHashLength])
panic(fmt.Sprintf("hashToString expects a hash of length %d, got %d", buildIDHashLength, len(h)))
}
return base64.RawURLEncoding.EncodeToString(h)
} }
func alterToolVersion(tool string, args []string) error { func alterToolVersion(tool string, args []string) error {
@ -101,7 +98,7 @@ var (
// //
// This includes garble's own version, obtained via its own binary's content ID, // This includes garble's own version, obtained via its own binary's content ID,
// as well as any other options which affect a build, such as GOGARBLE and -tiny. // as well as any other options which affect a build, such as GOGARBLE and -tiny.
func addGarbleToHash(inputHash []byte) []byte { func addGarbleToHash(inputHash []byte) [sha256.Size]byte {
// Join the two content IDs together into a single base64-encoded sha256 // Join the two content IDs together into a single base64-encoded sha256
// sum. This includes the original tool's content ID, and garble's own // sum. This includes the original tool's content ID, and garble's own
// content ID. // content ID.
@ -119,8 +116,9 @@ func addGarbleToHash(inputHash []byte) []byte {
appendFlags(hasher, true) appendFlags(hasher, true)
// addGarbleToHash returns the sum buffer, so we need a new copy. // addGarbleToHash returns the sum buffer, so we need a new copy.
// Otherwise the next use of the global sumBuffer would conflict. // Otherwise the next use of the global sumBuffer would conflict.
sumBuffer := make([]byte, 0, sha256.Size) var sumBuffer [sha256.Size]byte
return hasher.Sum(sumBuffer)[:buildIDHashLength] hasher.Sum(sumBuffer[:0])
return sumBuffer
} }
// appendFlags writes garble's own flags to w in string form. // appendFlags writes garble's own flags to w in string form.
@ -202,7 +200,7 @@ func toUpper(b byte) byte { return b - ('a' - 'A') }
func runtimeHashWithCustomSalt(salt []byte) uint32 { func runtimeHashWithCustomSalt(salt []byte) uint32 {
hasher.Reset() hasher.Reset()
if !flagSeed.present() { if !flagSeed.present() {
hasher.Write(sharedCache.ListedPackages["runtime"].GarbleActionID) hasher.Write(sharedCache.ListedPackages["runtime"].GarbleActionID[:])
} else { } else {
hasher.Write(flagSeed.bytes) hasher.Write(flagSeed.bytes)
} }
@ -225,7 +223,7 @@ func entryOffKey() uint32 {
func hashWithPackage(pkg *listedPackage, name string) string { func hashWithPackage(pkg *listedPackage, name string) string {
if !flagSeed.present() { if !flagSeed.present() {
return hashWithCustomSalt(pkg.GarbleActionID, name) return hashWithCustomSalt(pkg.GarbleActionID[:], name)
} }
// Use a separator at the end of ImportPath as a salt, // Use a separator at the end of ImportPath as a salt,
// to ensure that "pkgfoo.bar" and "pkg.foobar" don't both hash // to ensure that "pkgfoo.bar" and "pkg.foobar" don't both hash
@ -239,7 +237,8 @@ func hashWithStruct(strct *types.Struct, fieldName string) string {
// struct type "canonical"? // struct type "canonical"?
fieldsSalt := []byte(strct.String()) fieldsSalt := []byte(strct.String())
if !flagSeed.present() { if !flagSeed.present() {
fieldsSalt = addGarbleToHash(fieldsSalt) withGarbleHash := addGarbleToHash(fieldsSalt)
fieldsSalt = withGarbleHash[:]
} }
return hashWithCustomSalt(fieldsSalt, fieldName) return hashWithCustomSalt(fieldsSalt, fieldName)
} }

@ -951,7 +951,7 @@ func transformCompile(args []string) ([]string, error) {
} }
// Literal obfuscation uses math/rand, so seed it deterministically. // Literal obfuscation uses math/rand, so seed it deterministically.
randSeed := curPkg.GarbleActionID randSeed := curPkg.GarbleActionID[:]
if flagSeed.present() { if flagSeed.present() {
randSeed = flagSeed.bytes randSeed = flagSeed.bytes
} }

@ -5,6 +5,7 @@ package main
import ( import (
"bytes" "bytes"
"crypto/sha256"
"encoding/gob" "encoding/gob"
"encoding/json" "encoding/json"
"errors" "errors"
@ -166,7 +167,7 @@ type listedPackage struct {
// with Garble's own inputs as per addGarbleToHash. // with Garble's own inputs as per addGarbleToHash.
// It is set even when ToObfuscate is false, as it is also used for random // It is set even when ToObfuscate is false, as it is also used for random
// seeds and build cache paths, and not just to obfuscate names. // seeds and build cache paths, and not just to obfuscate names.
GarbleActionID []byte `json:"-"` GarbleActionID [sha256.Size]byte `json:"-"`
// ToObfuscate records whether the package should be obfuscated. // ToObfuscate records whether the package should be obfuscated.
// When true, GarbleActionID must not be empty. // When true, GarbleActionID must not be empty.

Loading…
Cancel
Save