2023-06-14 08:17:52 -04:00
|
|
|
/*
|
|
|
|
Copyright (c) Edgeless Systems GmbH
|
|
|
|
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
*/
|
|
|
|
package config
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
|
|
|
|
"github.com/edgelesssys/constellation/v2/internal/api/attestationconfigapi"
|
|
|
|
"github.com/edgelesssys/constellation/v2/internal/attestation/idkeydigest"
|
|
|
|
"github.com/edgelesssys/constellation/v2/internal/attestation/measurements"
|
|
|
|
"github.com/edgelesssys/constellation/v2/internal/attestation/variant"
|
|
|
|
"github.com/edgelesssys/constellation/v2/internal/cloud/cloudprovider"
|
2024-01-24 09:10:15 -05:00
|
|
|
"github.com/edgelesssys/constellation/v2/internal/encoding"
|
2023-06-14 08:17:52 -04:00
|
|
|
)
|
|
|
|
|
2024-01-24 09:10:15 -05:00
|
|
|
var (
|
|
|
|
_ svnResolveMarshaller = &AzureSEVSNP{}
|
|
|
|
_ svnResolveMarshaller = &AzureTDX{}
|
|
|
|
)
|
2024-01-10 07:32:13 -05:00
|
|
|
|
2023-06-14 08:17:52 -04:00
|
|
|
// DefaultForAzureSEVSNP returns the default configuration for Azure SEV-SNP attestation.
|
|
|
|
// Version numbers have placeholder values and the latest available values can be fetched using [AzureSEVSNP.FetchAndSetLatestVersionNumbers].
|
|
|
|
func DefaultForAzureSEVSNP() *AzureSEVSNP {
|
|
|
|
return &AzureSEVSNP{
|
|
|
|
Measurements: measurements.DefaultsFor(cloudprovider.Azure, variant.AzureSEVSNP{}),
|
|
|
|
BootloaderVersion: NewLatestPlaceholderVersion(),
|
|
|
|
TEEVersion: NewLatestPlaceholderVersion(),
|
|
|
|
SNPVersion: NewLatestPlaceholderVersion(),
|
|
|
|
MicrocodeVersion: NewLatestPlaceholderVersion(),
|
|
|
|
FirmwareSignerConfig: SNPFirmwareSignerConfig{
|
|
|
|
AcceptedKeyDigests: idkeydigest.DefaultList(),
|
|
|
|
EnforcementPolicy: idkeydigest.MAAFallback,
|
|
|
|
},
|
2023-11-06 08:22:44 -05:00
|
|
|
AMDRootKey: mustParsePEM(arkPEM),
|
2023-06-14 08:17:52 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetVariant returns azure-sev-snp as the variant.
|
|
|
|
func (AzureSEVSNP) GetVariant() variant.Variant {
|
|
|
|
return variant.AzureSEVSNP{}
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetMeasurements returns the measurements used for attestation.
|
|
|
|
func (c AzureSEVSNP) GetMeasurements() measurements.M {
|
|
|
|
return c.Measurements
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetMeasurements updates a config's measurements using the given measurements.
|
|
|
|
func (c *AzureSEVSNP) SetMeasurements(m measurements.M) {
|
|
|
|
c.Measurements = m
|
|
|
|
}
|
|
|
|
|
|
|
|
// EqualTo returns true if the config is equal to the given config.
|
|
|
|
func (c AzureSEVSNP) EqualTo(old AttestationCfg) (bool, error) {
|
|
|
|
otherCfg, ok := old.(*AzureSEVSNP)
|
|
|
|
if !ok {
|
|
|
|
return false, fmt.Errorf("cannot compare %T with %T", c, old)
|
|
|
|
}
|
|
|
|
|
|
|
|
firmwareSignerCfgEqual := c.FirmwareSignerConfig.EqualTo(otherCfg.FirmwareSignerConfig)
|
|
|
|
measurementsEqual := c.Measurements.EqualTo(otherCfg.Measurements)
|
|
|
|
bootloaderEqual := c.BootloaderVersion == otherCfg.BootloaderVersion
|
|
|
|
teeEqual := c.TEEVersion == otherCfg.TEEVersion
|
|
|
|
snpEqual := c.SNPVersion == otherCfg.SNPVersion
|
|
|
|
microcodeEqual := c.MicrocodeVersion == otherCfg.MicrocodeVersion
|
|
|
|
rootKeyEqual := bytes.Equal(c.AMDRootKey.Raw, otherCfg.AMDRootKey.Raw)
|
|
|
|
|
|
|
|
return firmwareSignerCfgEqual && measurementsEqual && bootloaderEqual && teeEqual && snpEqual && microcodeEqual && rootKeyEqual, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// FetchAndSetLatestVersionNumbers fetches the latest version numbers from the configapi and sets them.
|
2023-09-25 05:53:02 -04:00
|
|
|
func (c *AzureSEVSNP) FetchAndSetLatestVersionNumbers(ctx context.Context, fetcher attestationconfigapi.Fetcher) error {
|
2023-11-14 07:25:03 -05:00
|
|
|
// Only talk to the API if at least one version number is set to latest.
|
|
|
|
if !(c.BootloaderVersion.WantLatest || c.TEEVersion.WantLatest || c.SNPVersion.WantLatest || c.MicrocodeVersion.WantLatest) {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-11-14 04:03:01 -05:00
|
|
|
versions, err := fetcher.FetchSEVSNPVersionLatest(ctx, variant.AzureSEVSNP{})
|
2023-06-14 08:17:52 -04:00
|
|
|
if err != nil {
|
2023-11-14 07:25:03 -05:00
|
|
|
return fmt.Errorf("fetching latest TCB versions from configapi: %w", err)
|
2023-06-14 08:17:52 -04:00
|
|
|
}
|
|
|
|
// set number and keep isLatest flag
|
2023-11-14 04:03:01 -05:00
|
|
|
c.mergeWithLatestVersion(versions.SEVSNPVersion)
|
2023-06-14 08:17:52 -04:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-11-14 04:03:01 -05:00
|
|
|
func (c *AzureSEVSNP) mergeWithLatestVersion(latest attestationconfigapi.SEVSNPVersion) {
|
2023-06-14 08:17:52 -04:00
|
|
|
if c.BootloaderVersion.WantLatest {
|
|
|
|
c.BootloaderVersion.Value = latest.Bootloader
|
|
|
|
}
|
|
|
|
if c.TEEVersion.WantLatest {
|
|
|
|
c.TEEVersion.Value = latest.TEE
|
|
|
|
}
|
|
|
|
if c.SNPVersion.WantLatest {
|
|
|
|
c.SNPVersion.Value = latest.SNP
|
|
|
|
}
|
|
|
|
if c.MicrocodeVersion.WantLatest {
|
|
|
|
c.MicrocodeVersion.Value = latest.Microcode
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-01-10 07:32:13 -05:00
|
|
|
func (c *AzureSEVSNP) getToMarshallLatestWithResolvedVersions() AttestationCfg {
|
|
|
|
cp := *c
|
|
|
|
cp.BootloaderVersion.WantLatest = false
|
|
|
|
cp.TEEVersion.WantLatest = false
|
|
|
|
cp.SNPVersion.WantLatest = false
|
|
|
|
cp.MicrocodeVersion.WantLatest = false
|
|
|
|
return &cp
|
|
|
|
}
|
|
|
|
|
2023-06-14 08:17:52 -04:00
|
|
|
// GetVariant returns azure-trusted-launch as the variant.
|
|
|
|
func (AzureTrustedLaunch) GetVariant() variant.Variant {
|
|
|
|
return variant.AzureTrustedLaunch{}
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetMeasurements returns the measurements used for attestation.
|
|
|
|
func (c AzureTrustedLaunch) GetMeasurements() measurements.M {
|
|
|
|
return c.Measurements
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetMeasurements updates a config's measurements using the given measurements.
|
|
|
|
func (c *AzureTrustedLaunch) SetMeasurements(m measurements.M) {
|
|
|
|
c.Measurements = m
|
|
|
|
}
|
|
|
|
|
|
|
|
// EqualTo returns true if the config is equal to the given config.
|
|
|
|
func (c AzureTrustedLaunch) EqualTo(other AttestationCfg) (bool, error) {
|
|
|
|
otherCfg, ok := other.(*AzureTrustedLaunch)
|
|
|
|
if !ok {
|
|
|
|
return false, fmt.Errorf("cannot compare %T with %T", c, other)
|
|
|
|
}
|
|
|
|
return c.Measurements.EqualTo(otherCfg.Measurements), nil
|
|
|
|
}
|
2024-01-24 09:10:15 -05:00
|
|
|
|
|
|
|
// DefaultForAzureTDX returns the default configuration for Azure TDX attestation.
|
|
|
|
func DefaultForAzureTDX() *AzureTDX {
|
|
|
|
return &AzureTDX{
|
|
|
|
Measurements: measurements.DefaultsFor(cloudprovider.Azure, variant.AzureTDX{}),
|
2024-01-26 09:46:21 -05:00
|
|
|
// TODO(AB#3798): Enable latest versioning for Azure TDX
|
|
|
|
QESVN: 0,
|
|
|
|
PCESVN: 0,
|
|
|
|
TEETCBSVN: encoding.HexBytes{0x02, 0x01, 0x06, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
|
|
|
|
QEVendorID: encoding.HexBytes{0x93, 0x9a, 0x72, 0x33, 0xf7, 0x9c, 0x4c, 0xa9, 0x94, 0x0a, 0x0d, 0xb3, 0x95, 0x7f, 0x06, 0x07},
|
|
|
|
MRSeam: encoding.HexBytes{0x36, 0x03, 0x04, 0xd3, 0x4a, 0x16, 0xaa, 0xce, 0x0a, 0x18, 0xe0, 0x9a, 0xd2, 0xd0, 0x7d, 0x2b, 0x9f, 0xd3, 0xc1, 0x74, 0x37, 0x8e, 0x5b, 0xf1, 0x08, 0x38, 0x80, 0x79, 0x82, 0x7f, 0x89, 0xff, 0x62, 0xac, 0xc5, 0xf8, 0xc4, 0x73, 0xdd, 0x40, 0x70, 0x63, 0x24, 0x83, 0x4e, 0x20, 0x29, 0x46},
|
|
|
|
XFAM: encoding.HexBytes{0xe7, 0x18, 0x06, 0x00, 0x00, 0x00, 0x00, 0x00},
|
2024-01-24 09:10:15 -05:00
|
|
|
|
|
|
|
IntelRootKey: mustParsePEM(tdxRootPEM),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetVariant returns azure-tdx as the variant.
|
|
|
|
func (AzureTDX) GetVariant() variant.Variant {
|
|
|
|
return variant.AzureTDX{}
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetMeasurements returns the measurements used for attestation.
|
|
|
|
func (c AzureTDX) GetMeasurements() measurements.M {
|
|
|
|
return c.Measurements
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetMeasurements updates a config's measurements using the given measurements.
|
|
|
|
func (c *AzureTDX) SetMeasurements(m measurements.M) {
|
|
|
|
c.Measurements = m
|
|
|
|
}
|
|
|
|
|
|
|
|
// EqualTo returns true if the config is equal to the given config.
|
|
|
|
func (c AzureTDX) EqualTo(other AttestationCfg) (bool, error) {
|
|
|
|
otherCfg, ok := other.(*AzureTDX)
|
|
|
|
if !ok {
|
|
|
|
return false, fmt.Errorf("cannot compare %T with %T", c, other)
|
|
|
|
}
|
|
|
|
return c.Measurements.EqualTo(otherCfg.Measurements), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *AzureTDX) getToMarshallLatestWithResolvedVersions() AttestationCfg {
|
|
|
|
cp := *c
|
|
|
|
// TODO: We probably want to support "latest" pseudo versioning for Azure TDX
|
|
|
|
// But we should decide on which claims can be reliably used for attestation first
|
|
|
|
return &cp
|
|
|
|
}
|