mirror of
https://github.com/edgelesssys/constellation.git
synced 2025-08-10 16:00:19 -04:00
AB#2386: TrustedLaunch support for azure attestation
* There are now two attestation packages on azure. The issuer on the server side is created base on successfully querying the idkeydigest from the TPM. Fallback on err: Trusted Launch. * The bootstrapper's issuer choice is validated by the CLI's validator, which is created based on the local config. * Add "azureCVM" field to new "internal-config" cm. This field is populated by the bootstrapper. * Group attestation OIDs by CSP (#42) * Bootstrapper now uses IssuerWrapper type to pass the issuer (and some context info) to the initserver. * Introduce VMType package akin to cloudprovider. Used by IssuerWrapper. * Extend unittests. * Remove CSP specific attestation integration tests Co-authored-by: <dw@edgeless.systems> Signed-off-by: Otto Bittner <cobittner@posteo.net>
This commit is contained in:
parent
4bfb98d35a
commit
405db3286e
33 changed files with 749 additions and 431 deletions
|
@ -49,7 +49,16 @@ func main() {
|
|||
|
||||
handler := file.NewHandler(afero.NewOsFs())
|
||||
|
||||
validator, err := watcher.NewValidator(log.Named("validator"), *provider, handler)
|
||||
cvmRaw, err := handler.Read(filepath.Join(constants.ServiceBasePath, constants.AzureCVM))
|
||||
if err != nil {
|
||||
log.With(zap.Error(err)).Fatalf("Failed to get azureCVM from config map")
|
||||
}
|
||||
azureCVM, err := strconv.ParseBool(string(cvmRaw))
|
||||
if err != nil {
|
||||
log.With(zap.Error(err)).Fatalf("Failed to parse content of AzureCVM: %s", cvmRaw)
|
||||
}
|
||||
|
||||
validator, err := watcher.NewValidator(log.Named("validator"), *provider, handler, azureCVM)
|
||||
if err != nil {
|
||||
flag.Usage()
|
||||
log.With(zap.Error(err)).Fatalf("Failed to create validator")
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue