constellation/verify/server/server.go

159 lines
4.8 KiB
Go
Raw Normal View History

/*
Copyright (c) Edgeless Systems GmbH
SPDX-License-Identifier: AGPL-3.0-only
*/
// Package server implements the gRPC and REST endpoints for retrieving attestation statements.
package server
import (
"context"
"encoding/base64"
"encoding/json"
"fmt"
2024-02-08 09:20:01 -05:00
"log/slog"
"net"
"net/http"
"sync"
2022-08-01 10:51:34 -04:00
"time"
2023-01-17 09:28:07 -05:00
"github.com/edgelesssys/constellation/v2/internal/constants"
2022-09-21 07:47:57 -04:00
"github.com/edgelesssys/constellation/v2/internal/logger"
"github.com/edgelesssys/constellation/v2/verify/verifyproto"
"google.golang.org/grpc"
"google.golang.org/grpc/codes"
2022-08-01 10:51:34 -04:00
"google.golang.org/grpc/keepalive"
"google.golang.org/grpc/peer"
"google.golang.org/grpc/status"
)
type attestation struct {
Data []byte `json:"data"`
}
// Server implements Constellation's verify API.
// The server exposes both HTTP and gRPC endpoints
// to retrieve attestation statements.
type Server struct {
2024-02-08 09:20:01 -05:00
log *slog.Logger
issuer AttestationIssuer
verifyproto.UnimplementedAPIServer
}
// New initializes a new verification server.
2024-02-08 09:20:01 -05:00
func New(log *slog.Logger, issuer AttestationIssuer) *Server {
return &Server{
log: log,
issuer: issuer,
}
}
// Run starts the HTTP and gRPC servers.
// If one of the servers fails, other server will be closed and the error will be returned.
func (s *Server) Run(httpListener, grpcListener net.Listener) error {
var err error
var wg sync.WaitGroup
var once sync.Once
grpcLog := logger.GRPCLogger(s.log)
logger.ReplaceGRPCLogger(grpcLog)
2022-08-01 10:51:34 -04:00
grpcServer := grpc.NewServer(
logger.GetServerUnaryInterceptor(grpcLog),
2022-08-01 10:51:34 -04:00
grpc.KeepaliveParams(keepalive.ServerParameters{Time: 15 * time.Second}),
)
verifyproto.RegisterAPIServer(grpcServer, s)
httpHandler := http.NewServeMux()
httpHandler.HandleFunc("/", s.getAttestationHTTP)
httpServer := &http.Server{Handler: httpHandler}
wg.Add(1)
go func() {
defer wg.Done()
defer grpcServer.GracefulStop()
2024-02-08 09:20:01 -05:00
s.log.Info(fmt.Sprintf("Starting HTTP server on %s", httpListener.Addr().String()))
httpErr := httpServer.Serve(httpListener)
if httpErr != nil && httpErr != http.ErrServerClosed {
once.Do(func() { err = httpErr })
}
}()
wg.Add(1)
go func() {
defer wg.Done()
defer func() { _ = httpServer.Shutdown(context.Background()) }()
2024-02-08 09:20:01 -05:00
s.log.Info(fmt.Sprintf("Starting gRPC server on %s", grpcListener.Addr().String()))
grpcErr := grpcServer.Serve(grpcListener)
if grpcErr != nil {
once.Do(func() { err = grpcErr })
}
}()
wg.Wait()
return err
}
// GetAttestation implements the gRPC endpoint for requesting attestation statements.
func (s *Server) GetAttestation(ctx context.Context, req *verifyproto.GetAttestationRequest) (*verifyproto.GetAttestationResponse, error) {
peerAddr := "unknown"
if peer, ok := peer.FromContext(ctx); ok {
peerAddr = peer.Addr.String()
}
2024-02-08 09:20:01 -05:00
log := s.log.With(slog.String("peerAddress", peerAddr)).WithGroup("gRPC")
s.log.Info("Received attestation request")
if len(req.Nonce) == 0 {
2024-02-08 09:20:01 -05:00
log.Error("Received attestation request with empty nonce")
return nil, status.Error(codes.InvalidArgument, "nonce is required to issue attestation")
}
2024-02-08 09:20:01 -05:00
log.Info("Creating attestation")
statement, err := s.issuer.Issue(ctx, []byte(constants.ConstellationVerifyServiceUserData), req.Nonce)
if err != nil {
return nil, status.Errorf(codes.Internal, "issuing attestation statement: %v", err)
}
2024-02-08 09:20:01 -05:00
log.Info("Attestation request successful")
return &verifyproto.GetAttestationResponse{Attestation: statement}, nil
}
// getAttestationHTTP implements the HTTP endpoint for retrieving attestation statements.
func (s *Server) getAttestationHTTP(w http.ResponseWriter, r *http.Request) {
2024-02-08 09:20:01 -05:00
log := s.log.With(slog.String("peerAddress", r.RemoteAddr)).WithGroup("http")
nonceB64 := r.URL.Query()["nonce"]
if len(nonceB64) != 1 || nonceB64[0] == "" {
2024-02-08 09:20:01 -05:00
log.Error("Received attestation request with empty or multiple nonce parameter")
http.Error(w, "nonce parameter is required exactly once", http.StatusBadRequest)
return
}
nonce, err := base64.URLEncoding.DecodeString(nonceB64[0])
if err != nil {
2024-02-08 09:20:01 -05:00
log.With(slog.Any("error", err)).Error("Received attestation request with invalid nonce")
http.Error(w, fmt.Sprintf("invalid base64 encoding for nonce: %v", err), http.StatusBadRequest)
return
}
2024-02-08 09:20:01 -05:00
log.Info("Creating attestation")
quote, err := s.issuer.Issue(r.Context(), []byte(constants.ConstellationVerifyServiceUserData), nonce)
if err != nil {
http.Error(w, fmt.Sprintf("issuing attestation statement: %v", err), http.StatusInternalServerError)
return
}
2024-02-08 09:20:01 -05:00
log.Info("Attestation request successful")
w.Header().Set("Content-Type", "application/json")
if err := json.NewEncoder(w).Encode(attestation{quote}); err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
}
}
// AttestationIssuer issues an attestation document for the provided userData and nonce.
type AttestationIssuer interface {
Issue(ctx context.Context, userData []byte, nonce []byte) (quote []byte, err error)
}