2022-05-02 07:21:07 -04:00
|
|
|
package cmd
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
2022-06-09 10:10:42 -04:00
|
|
|
"fmt"
|
2022-05-02 07:21:07 -04:00
|
|
|
"regexp"
|
|
|
|
"strings"
|
|
|
|
|
2022-06-08 02:26:08 -04:00
|
|
|
"github.com/edgelesssys/constellation/cli/internal/cloudcmd"
|
2022-06-07 05:05:52 -04:00
|
|
|
"github.com/edgelesssys/constellation/cli/internal/proto"
|
2022-07-26 04:58:39 -04:00
|
|
|
"github.com/edgelesssys/constellation/internal/attestation"
|
2022-06-07 05:08:44 -04:00
|
|
|
"github.com/edgelesssys/constellation/internal/cloud/cloudprovider"
|
2022-05-02 07:21:07 -04:00
|
|
|
"github.com/edgelesssys/constellation/internal/constants"
|
2022-07-26 04:58:39 -04:00
|
|
|
"github.com/edgelesssys/constellation/internal/crypto"
|
2022-05-16 11:32:00 -04:00
|
|
|
"github.com/edgelesssys/constellation/internal/file"
|
2022-05-02 07:21:07 -04:00
|
|
|
"github.com/edgelesssys/constellation/internal/state"
|
|
|
|
"github.com/spf13/afero"
|
|
|
|
"github.com/spf13/cobra"
|
|
|
|
)
|
|
|
|
|
|
|
|
var diskUUIDRegexp = regexp.MustCompile("^[0-9a-fA-F]{8}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{12}$")
|
|
|
|
|
2022-06-08 02:14:28 -04:00
|
|
|
// NewRecoverCmd returns a new cobra.Command for the recover command.
|
|
|
|
func NewRecoverCmd() *cobra.Command {
|
2022-05-02 07:21:07 -04:00
|
|
|
cmd := &cobra.Command{
|
|
|
|
Use: "recover",
|
2022-05-09 11:02:47 -04:00
|
|
|
Short: "Recover a completely stopped Constellation cluster",
|
2022-05-04 03:13:46 -04:00
|
|
|
Long: "Recover a Constellation cluster by sending a recovery key to an instance in the boot stage." +
|
2022-05-02 07:21:07 -04:00
|
|
|
"\nThis is only required if instances restart without other instances available for bootstrapping.",
|
|
|
|
Args: cobra.ExactArgs(0),
|
|
|
|
RunE: runRecover,
|
|
|
|
}
|
2022-05-06 11:51:41 -04:00
|
|
|
cmd.Flags().StringP("endpoint", "e", "", "endpoint of the instance, passed as HOST[:PORT] (required)")
|
2022-05-06 07:56:02 -04:00
|
|
|
must(cmd.MarkFlagRequired("endpoint"))
|
2022-05-06 11:51:41 -04:00
|
|
|
cmd.Flags().String("disk-uuid", "", "disk UUID of the encrypted state disk (required)")
|
2022-05-04 02:50:50 -04:00
|
|
|
must(cmd.MarkFlagRequired("disk-uuid"))
|
2022-07-29 03:52:47 -04:00
|
|
|
cmd.Flags().String("master-secret", constants.MasterSecretFilename, "path to master secret file")
|
2022-05-02 07:21:07 -04:00
|
|
|
return cmd
|
|
|
|
}
|
|
|
|
|
2022-07-29 03:52:47 -04:00
|
|
|
func runRecover(cmd *cobra.Command, _ []string) error {
|
2022-05-02 07:21:07 -04:00
|
|
|
fileHandler := file.NewHandler(afero.NewOsFs())
|
|
|
|
recoveryClient := &proto.KeyClient{}
|
|
|
|
defer recoveryClient.Close()
|
2022-06-28 05:19:03 -04:00
|
|
|
return recover(cmd, fileHandler, recoveryClient)
|
2022-05-02 07:21:07 -04:00
|
|
|
}
|
|
|
|
|
2022-06-28 05:19:03 -04:00
|
|
|
func recover(cmd *cobra.Command, fileHandler file.Handler, recoveryClient recoveryClient) error {
|
2022-07-29 03:52:47 -04:00
|
|
|
flags, err := parseRecoverFlags(cmd)
|
2022-05-02 07:21:07 -04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-07-29 03:52:47 -04:00
|
|
|
var masterSecret masterSecret
|
|
|
|
if err := fileHandler.ReadJSON(flags.secretPath, &masterSecret); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-05-23 09:01:39 -04:00
|
|
|
var stat state.ConstellationState
|
|
|
|
if err := fileHandler.ReadJSON(constants.StateFilename, &stat); err != nil {
|
2022-05-02 07:21:07 -04:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-05-23 09:01:39 -04:00
|
|
|
provider := cloudprovider.FromString(stat.CloudProvider)
|
|
|
|
|
|
|
|
config, err := readConfig(cmd.OutOrStdout(), fileHandler, flags.configPath, provider)
|
|
|
|
if err != nil {
|
2022-06-09 10:10:42 -04:00
|
|
|
return fmt.Errorf("reading and validating config: %w", err)
|
2022-05-02 07:21:07 -04:00
|
|
|
}
|
|
|
|
|
2022-08-09 08:04:40 -04:00
|
|
|
validators, err := cloudcmd.NewValidator(provider, config)
|
2022-05-02 07:21:07 -04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
cmd.Print(validators.WarningsIncludeInit())
|
|
|
|
|
2022-05-06 07:56:02 -04:00
|
|
|
if err := recoveryClient.Connect(flags.endpoint, validators.V()); err != nil {
|
2022-05-02 07:21:07 -04:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-07-29 03:52:47 -04:00
|
|
|
diskKey, err := deriveStateDiskKey(masterSecret.Key, masterSecret.Salt, flags.diskUUID)
|
2022-05-02 07:21:07 -04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-07-29 03:52:47 -04:00
|
|
|
measurementSecret, err := attestation.DeriveMeasurementSecret(masterSecret.Key, masterSecret.Salt)
|
2022-07-26 04:58:39 -04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := recoveryClient.PushStateDiskKey(cmd.Context(), diskKey, measurementSecret); err != nil {
|
2022-05-02 07:21:07 -04:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
cmd.Println("Pushed recovery key.")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-07-29 03:52:47 -04:00
|
|
|
func parseRecoverFlags(cmd *cobra.Command) (recoverFlags, error) {
|
2022-05-06 07:56:02 -04:00
|
|
|
endpoint, err := cmd.Flags().GetString("endpoint")
|
2022-05-02 07:21:07 -04:00
|
|
|
if err != nil {
|
2022-06-09 10:10:42 -04:00
|
|
|
return recoverFlags{}, fmt.Errorf("parsing endpoint argument: %w", err)
|
2022-05-02 07:21:07 -04:00
|
|
|
}
|
2022-06-29 09:26:29 -04:00
|
|
|
endpoint, err = validateEndpoint(endpoint, constants.BootstrapperPort)
|
2022-05-06 07:56:02 -04:00
|
|
|
if err != nil {
|
2022-06-09 10:10:42 -04:00
|
|
|
return recoverFlags{}, fmt.Errorf("validating endpoint argument: %w", err)
|
2022-05-02 07:21:07 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
diskUUID, err := cmd.Flags().GetString("disk-uuid")
|
|
|
|
if err != nil {
|
2022-06-09 10:10:42 -04:00
|
|
|
return recoverFlags{}, fmt.Errorf("parsing disk-uuid argument: %w", err)
|
2022-05-02 07:21:07 -04:00
|
|
|
}
|
|
|
|
if match := diskUUIDRegexp.MatchString(diskUUID); !match {
|
|
|
|
return recoverFlags{}, errors.New("flag '--disk-uuid' isn't a valid LUKS UUID")
|
|
|
|
}
|
|
|
|
diskUUID = strings.ToLower(diskUUID)
|
|
|
|
|
|
|
|
masterSecretPath, err := cmd.Flags().GetString("master-secret")
|
|
|
|
if err != nil {
|
2022-06-09 10:10:42 -04:00
|
|
|
return recoverFlags{}, fmt.Errorf("parsing master-secret path argument: %w", err)
|
2022-05-02 07:21:07 -04:00
|
|
|
}
|
|
|
|
|
2022-05-13 05:56:43 -04:00
|
|
|
configPath, err := cmd.Flags().GetString("config")
|
2022-05-02 07:21:07 -04:00
|
|
|
if err != nil {
|
2022-06-09 10:10:42 -04:00
|
|
|
return recoverFlags{}, fmt.Errorf("parsing config path argument: %w", err)
|
2022-05-02 07:21:07 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
return recoverFlags{
|
2022-07-29 03:52:47 -04:00
|
|
|
endpoint: endpoint,
|
|
|
|
diskUUID: diskUUID,
|
|
|
|
secretPath: masterSecretPath,
|
|
|
|
configPath: configPath,
|
2022-05-02 07:21:07 -04:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type recoverFlags struct {
|
2022-07-29 03:52:47 -04:00
|
|
|
endpoint string
|
|
|
|
diskUUID string
|
|
|
|
secretPath string
|
|
|
|
configPath string
|
2022-05-02 07:21:07 -04:00
|
|
|
}
|
|
|
|
|
2022-07-29 03:52:47 -04:00
|
|
|
// deriveStateDiskKey derives a state disk key from a master key, a salt, and a disk UUID.
|
|
|
|
func deriveStateDiskKey(masterKey, salt []byte, diskUUID string) ([]byte, error) {
|
|
|
|
return crypto.DeriveKey(masterKey, salt, []byte(crypto.HKDFInfoPrefix+diskUUID), crypto.StateDiskKeyLength)
|
2022-05-02 07:21:07 -04:00
|
|
|
}
|