mirror of
https://github.com/edgelesssys/constellation.git
synced 2025-05-14 20:22:13 -04:00
terraform-provider: add attestation data source (#2640)
Signed-off-by: Daniel Weiße <dw@edgeless.systems> Co-authored-by: Daniel Weiße <dw@edgeless.systems>
This commit is contained in:
parent
03c5692fdd
commit
a2de1d23ec
18 changed files with 871 additions and 177 deletions
|
@ -26,7 +26,7 @@ var ErrNoVersionsFound = errors.New("no versions found")
|
|||
type Fetcher interface {
|
||||
FetchSEVSNPVersion(ctx context.Context, version SEVSNPVersionAPI) (SEVSNPVersionAPI, error)
|
||||
FetchSEVSNPVersionList(ctx context.Context, list SEVSNPVersionList) (SEVSNPVersionList, error)
|
||||
FetchSEVSNPVersionLatest(ctx context.Context, attesation variant.Variant) (SEVSNPVersionAPI, error)
|
||||
FetchSEVSNPVersionLatest(ctx context.Context, attestation variant.Variant) (SEVSNPVersionAPI, error)
|
||||
}
|
||||
|
||||
// fetcher fetches AttestationCfg API resources without authentication.
|
||||
|
|
|
@ -4,6 +4,7 @@ load("//bazel/go:go_test.bzl", "go_test")
|
|||
go_library(
|
||||
name = "measurements",
|
||||
srcs = [
|
||||
"fetchmeasurements.go",
|
||||
"measurements.go",
|
||||
# keep
|
||||
"measurements_enterprise.go",
|
||||
|
@ -16,6 +17,8 @@ go_library(
|
|||
"//internal/api/versionsapi",
|
||||
"//internal/attestation/variant",
|
||||
"//internal/cloud/cloudprovider",
|
||||
"//internal/sigstore",
|
||||
"//internal/sigstore/keyselect",
|
||||
"@com_github_google_go_tpm//tpmutil",
|
||||
"@com_github_siderolabs_talos_pkg_machinery//config/encoder",
|
||||
"@in_gopkg_yaml_v3//:yaml_v3",
|
||||
|
@ -24,7 +27,10 @@ go_library(
|
|||
|
||||
go_test(
|
||||
name = "measurements_test",
|
||||
srcs = ["measurements_test.go"],
|
||||
srcs = [
|
||||
"fetchmeasurements_test.go",
|
||||
"measurements_test.go",
|
||||
],
|
||||
embed = [":measurements"],
|
||||
deps = [
|
||||
"//internal/api/versionsapi",
|
||||
|
|
113
internal/attestation/measurements/fetchmeasurements.go
Normal file
113
internal/attestation/measurements/fetchmeasurements.go
Normal file
|
@ -0,0 +1,113 @@
|
|||
/*
|
||||
Copyright (c) Edgeless Systems GmbH
|
||||
|
||||
SPDX-License-Identifier: AGPL-3.0-only
|
||||
*/
|
||||
|
||||
package measurements
|
||||
|
||||
import (
|
||||
"context"
|
||||
"fmt"
|
||||
"net/http"
|
||||
|
||||
"github.com/edgelesssys/constellation/v2/internal/api/versionsapi"
|
||||
"github.com/edgelesssys/constellation/v2/internal/attestation/variant"
|
||||
"github.com/edgelesssys/constellation/v2/internal/cloud/cloudprovider"
|
||||
"github.com/edgelesssys/constellation/v2/internal/sigstore"
|
||||
"github.com/edgelesssys/constellation/v2/internal/sigstore/keyselect"
|
||||
)
|
||||
|
||||
// RekorError is returned when verifying measurements with Rekor fails.
|
||||
type RekorError struct {
|
||||
err error
|
||||
}
|
||||
|
||||
// Error returns the error message.
|
||||
func (e *RekorError) Error() string {
|
||||
return fmt.Sprintf("verifying measurements with Rekor failed: %s", e.err)
|
||||
}
|
||||
|
||||
// Unwrap returns the wrapped error.
|
||||
func (e *RekorError) Unwrap() error {
|
||||
return e.err
|
||||
}
|
||||
|
||||
// VerifyFetcher is a high-level fetcher that fetches measurements and verifies them.
|
||||
type VerifyFetcher struct {
|
||||
client *http.Client
|
||||
newCosignVerifier cosignVerifierConstructor
|
||||
rekor rekorVerifier
|
||||
}
|
||||
|
||||
// NewVerifyFetcher creates a new MeasurementFetcher.
|
||||
func NewVerifyFetcher(newCosignVerifier func([]byte) (sigstore.Verifier, error), rekor rekorVerifier, client *http.Client) *VerifyFetcher {
|
||||
return &VerifyFetcher{
|
||||
newCosignVerifier: newCosignVerifier,
|
||||
rekor: rekor,
|
||||
client: client,
|
||||
}
|
||||
}
|
||||
|
||||
// FetchAndVerifyMeasurements fetches and verifies measurements for the given version and attestation variant.
|
||||
func (m *VerifyFetcher) FetchAndVerifyMeasurements(ctx context.Context,
|
||||
image string, csp cloudprovider.Provider, attestationVariant variant.Variant,
|
||||
noVerify bool,
|
||||
) (M, error) {
|
||||
version, err := versionsapi.NewVersionFromShortPath(image, versionsapi.VersionKindImage)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("parsing image version: %w", err)
|
||||
}
|
||||
publicKey, err := keyselect.CosignPublicKeyForVersion(version)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("getting public key: %w", err)
|
||||
}
|
||||
|
||||
cosign, err := m.newCosignVerifier(publicKey)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("creating cosign verifier: %w", err)
|
||||
}
|
||||
|
||||
measurementsURL, signatureURL, err := versionsapi.MeasurementURL(version)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
var fetchedMeasurements M
|
||||
if noVerify {
|
||||
if err := fetchedMeasurements.FetchNoVerify(
|
||||
ctx,
|
||||
m.client,
|
||||
measurementsURL,
|
||||
version,
|
||||
csp,
|
||||
attestationVariant,
|
||||
); err != nil {
|
||||
return nil, fmt.Errorf("fetching measurements: %w", err)
|
||||
}
|
||||
} else {
|
||||
hash, err := fetchedMeasurements.FetchAndVerify(
|
||||
ctx,
|
||||
m.client,
|
||||
cosign,
|
||||
measurementsURL,
|
||||
signatureURL,
|
||||
version,
|
||||
csp,
|
||||
attestationVariant,
|
||||
)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("fetching and verifying measurements: %w", err)
|
||||
}
|
||||
if err := sigstore.VerifyWithRekor(ctx, publicKey, m.rekor, hash); err != nil {
|
||||
return nil, &RekorError{err: err}
|
||||
}
|
||||
}
|
||||
return fetchedMeasurements, nil
|
||||
}
|
||||
|
||||
type cosignVerifierConstructor func([]byte) (sigstore.Verifier, error)
|
||||
|
||||
type rekorVerifier interface {
|
||||
SearchByHash(context.Context, string) ([]string, error)
|
||||
VerifyEntry(context.Context, string, string) error
|
||||
}
|
198
internal/attestation/measurements/fetchmeasurements_test.go
Normal file
198
internal/attestation/measurements/fetchmeasurements_test.go
Normal file
|
@ -0,0 +1,198 @@
|
|||
/*
|
||||
Copyright (c) Edgeless Systems GmbH
|
||||
|
||||
SPDX-License-Identifier: AGPL-3.0-only
|
||||
*/
|
||||
|
||||
package measurements
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"context"
|
||||
"encoding/hex"
|
||||
"io"
|
||||
"net/http"
|
||||
"testing"
|
||||
|
||||
"github.com/edgelesssys/constellation/v2/internal/attestation/variant"
|
||||
"github.com/edgelesssys/constellation/v2/internal/cloud/cloudprovider"
|
||||
"github.com/edgelesssys/constellation/v2/internal/sigstore"
|
||||
"github.com/stretchr/testify/assert"
|
||||
)
|
||||
|
||||
func TestFetchMeasurements(t *testing.T) {
|
||||
measurements := `{
|
||||
"version": "v999.999.999",
|
||||
"ref": "-",
|
||||
"stream": "stable",
|
||||
"list": [
|
||||
{
|
||||
"csp": "GCP",
|
||||
"attestationVariant":"gcp-sev-es",
|
||||
"measurements": {
|
||||
"0": {
|
||||
"expected": "0000000000000000000000000000000000000000000000000000000000000000",
|
||||
"warnOnly":false
|
||||
},
|
||||
"1": {
|
||||
"expected": "1111111111111111111111111111111111111111111111111111111111111111",
|
||||
"warnOnly":false
|
||||
},
|
||||
"2": {
|
||||
"expected": "2222222222222222222222222222222222222222222222222222222222222222",
|
||||
"warnOnly":false
|
||||
},
|
||||
"3": {
|
||||
"expected": "3333333333333333333333333333333333333333333333333333333333333333",
|
||||
"warnOnly":false
|
||||
},
|
||||
"4": {
|
||||
"expected": "4444444444444444444444444444444444444444444444444444444444444444",
|
||||
"warnOnly":false
|
||||
},
|
||||
"5": {
|
||||
"expected": "5555555555555555555555555555555555555555555555555555555555555555",
|
||||
"warnOnly":false
|
||||
},
|
||||
"6": {
|
||||
"expected": "6666666666666666666666666666666666666666666666666666666666666666",
|
||||
"warnOnly":true
|
||||
}
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
`
|
||||
signature := "placeholder-signature"
|
||||
|
||||
client := newTestClient(func(req *http.Request) *http.Response {
|
||||
if req.URL.Path == "/constellation/v2/ref/-/stream/stable/v999.999.999/image/measurements.json" {
|
||||
return &http.Response{
|
||||
StatusCode: http.StatusOK,
|
||||
Body: io.NopCloser(bytes.NewBufferString(measurements)),
|
||||
Header: make(http.Header),
|
||||
}
|
||||
}
|
||||
if req.URL.Path == "/constellation/v2/ref/-/stream/stable/v999.999.999/image/measurements.json.sig" {
|
||||
return &http.Response{
|
||||
StatusCode: http.StatusOK,
|
||||
Body: io.NopCloser(bytes.NewBufferString(signature)),
|
||||
Header: make(http.Header),
|
||||
}
|
||||
}
|
||||
|
||||
return &http.Response{
|
||||
StatusCode: http.StatusNotFound,
|
||||
Body: io.NopCloser(bytes.NewBufferString("Not found.")),
|
||||
Header: make(http.Header),
|
||||
}
|
||||
})
|
||||
|
||||
testCases := map[string]struct {
|
||||
cosign cosignVerifierConstructor
|
||||
rekor rekorVerifier
|
||||
noVerify bool
|
||||
wantErr bool
|
||||
asRekorErr bool
|
||||
}{
|
||||
"success": {
|
||||
cosign: newStubCosignVerifier,
|
||||
rekor: singleUUIDVerifier(),
|
||||
},
|
||||
"success without cosign verify": {
|
||||
noVerify: true,
|
||||
cosign: func(_ []byte) (sigstore.Verifier, error) {
|
||||
return &stubCosignVerifier{
|
||||
verifyError: assert.AnError,
|
||||
}, nil
|
||||
},
|
||||
rekor: singleUUIDVerifier(),
|
||||
},
|
||||
"failing search results is ErrRekor": {
|
||||
cosign: newStubCosignVerifier,
|
||||
rekor: &stubRekorVerifier{
|
||||
SearchByHashUUIDs: []string{},
|
||||
SearchByHashError: assert.AnError,
|
||||
},
|
||||
wantErr: true,
|
||||
asRekorErr: true,
|
||||
},
|
||||
"failing verify is ErrRekor": {
|
||||
cosign: newStubCosignVerifier,
|
||||
rekor: &stubRekorVerifier{
|
||||
SearchByHashUUIDs: []string{"11111111111111111111111111111111111111111111111111111111111111111111111111111111"},
|
||||
VerifyEntryError: assert.AnError,
|
||||
},
|
||||
wantErr: true,
|
||||
asRekorErr: true,
|
||||
},
|
||||
"signature verification failure": {
|
||||
cosign: func(_ []byte) (sigstore.Verifier, error) {
|
||||
return &stubCosignVerifier{
|
||||
verifyError: assert.AnError,
|
||||
}, nil
|
||||
},
|
||||
rekor: singleUUIDVerifier(),
|
||||
wantErr: true,
|
||||
},
|
||||
}
|
||||
|
||||
for name, tc := range testCases {
|
||||
t.Run(name, func(t *testing.T) {
|
||||
assert := assert.New(t)
|
||||
sut := NewVerifyFetcher(tc.cosign, tc.rekor, client)
|
||||
m, err := sut.FetchAndVerifyMeasurements(context.Background(), "v999.999.999", cloudprovider.GCP, variant.GCPSEVES{}, tc.noVerify)
|
||||
if tc.wantErr {
|
||||
assert.Error(err)
|
||||
if tc.asRekorErr {
|
||||
var rekErr *RekorError
|
||||
assert.ErrorAs(err, &rekErr)
|
||||
}
|
||||
return
|
||||
}
|
||||
assert.NoError(err)
|
||||
// verify example measurements
|
||||
assert.Equal("6666666666666666666666666666666666666666666666666666666666666666", hex.EncodeToString(m[6].Expected))
|
||||
assert.Equal(WarnOnly, m[6].ValidationOpt)
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
// SubRekorVerifier is a stub for RekorVerifier.
|
||||
type stubRekorVerifier struct {
|
||||
SearchByHashUUIDs []string
|
||||
SearchByHashError error
|
||||
VerifyEntryError error
|
||||
}
|
||||
|
||||
// SearchByHash returns the exported fields SearchByHashUUIDs, SearchByHashError.
|
||||
func (v *stubRekorVerifier) SearchByHash(context.Context, string) ([]string, error) {
|
||||
return v.SearchByHashUUIDs, v.SearchByHashError
|
||||
}
|
||||
|
||||
// VerifyEntry returns the exported field VerifyEntryError.
|
||||
func (v *stubRekorVerifier) VerifyEntry(context.Context, string, string) error {
|
||||
return v.VerifyEntryError
|
||||
}
|
||||
|
||||
type stubCosignVerifier struct {
|
||||
verifyError error
|
||||
}
|
||||
|
||||
func newStubCosignVerifier(_ []byte) (sigstore.Verifier, error) {
|
||||
return &stubCosignVerifier{}, nil
|
||||
}
|
||||
|
||||
func (v *stubCosignVerifier) VerifySignature(_, _ []byte) error {
|
||||
return v.verifyError
|
||||
}
|
||||
|
||||
// singleUUIDVerifier constructs a RekorVerifier that returns a single UUID and no errors,
|
||||
// and should work for most tests on the happy path.
|
||||
func singleUUIDVerifier() *stubRekorVerifier {
|
||||
return &stubRekorVerifier{
|
||||
SearchByHashUUIDs: []string{"11111111111111111111111111111111111111111111111111111111111111111111111111111111"},
|
||||
SearchByHashError: nil,
|
||||
VerifyEntryError: nil,
|
||||
}
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue