/* Copyright (c) Edgeless Systems GmbH SPDX-License-Identifier: AGPL-3.0-only */ package config import ( "bytes" "context" "fmt" "github.com/edgelesssys/constellation/v2/internal/api/attestationconfigapi" "github.com/edgelesssys/constellation/v2/internal/attestation/idkeydigest" "github.com/edgelesssys/constellation/v2/internal/attestation/measurements" "github.com/edgelesssys/constellation/v2/internal/attestation/variant" "github.com/edgelesssys/constellation/v2/internal/cloud/cloudprovider" "github.com/edgelesssys/constellation/v2/internal/encoding" ) var ( _ svnResolveMarshaller = &AzureSEVSNP{} _ svnResolveMarshaller = &AzureTDX{} ) // DefaultForAzureSEVSNP returns the default configuration for Azure SEV-SNP attestation. // Version numbers have placeholder values and the latest available values can be fetched using [AzureSEVSNP.FetchAndSetLatestVersionNumbers]. func DefaultForAzureSEVSNP() *AzureSEVSNP { return &AzureSEVSNP{ Measurements: measurements.DefaultsFor(cloudprovider.Azure, variant.AzureSEVSNP{}), BootloaderVersion: NewLatestPlaceholderVersion(), TEEVersion: NewLatestPlaceholderVersion(), SNPVersion: NewLatestPlaceholderVersion(), MicrocodeVersion: NewLatestPlaceholderVersion(), FirmwareSignerConfig: SNPFirmwareSignerConfig{ AcceptedKeyDigests: idkeydigest.DefaultList(), EnforcementPolicy: idkeydigest.MAAFallback, }, AMDRootKey: mustParsePEM(arkPEM), } } // GetVariant returns azure-sev-snp as the variant. func (AzureSEVSNP) GetVariant() variant.Variant { return variant.AzureSEVSNP{} } // GetMeasurements returns the measurements used for attestation. func (c AzureSEVSNP) GetMeasurements() measurements.M { return c.Measurements } // SetMeasurements updates a config's measurements using the given measurements. func (c *AzureSEVSNP) SetMeasurements(m measurements.M) { c.Measurements = m } // EqualTo returns true if the config is equal to the given config. func (c AzureSEVSNP) EqualTo(old AttestationCfg) (bool, error) { otherCfg, ok := old.(*AzureSEVSNP) if !ok { return false, fmt.Errorf("cannot compare %T with %T", c, old) } firmwareSignerCfgEqual := c.FirmwareSignerConfig.EqualTo(otherCfg.FirmwareSignerConfig) measurementsEqual := c.Measurements.EqualTo(otherCfg.Measurements) bootloaderEqual := c.BootloaderVersion == otherCfg.BootloaderVersion teeEqual := c.TEEVersion == otherCfg.TEEVersion snpEqual := c.SNPVersion == otherCfg.SNPVersion microcodeEqual := c.MicrocodeVersion == otherCfg.MicrocodeVersion rootKeyEqual := bytes.Equal(c.AMDRootKey.Raw, otherCfg.AMDRootKey.Raw) return firmwareSignerCfgEqual && measurementsEqual && bootloaderEqual && teeEqual && snpEqual && microcodeEqual && rootKeyEqual, nil } // FetchAndSetLatestVersionNumbers fetches the latest version numbers from the configapi and sets them. func (c *AzureSEVSNP) FetchAndSetLatestVersionNumbers(ctx context.Context, fetcher attestationconfigapi.Fetcher) error { // Only talk to the API if at least one version number is set to latest. if !(c.BootloaderVersion.WantLatest || c.TEEVersion.WantLatest || c.SNPVersion.WantLatest || c.MicrocodeVersion.WantLatest) { return nil } versions, err := fetcher.FetchSEVSNPVersionLatest(ctx, variant.AzureSEVSNP{}) if err != nil { return fmt.Errorf("fetching latest TCB versions from configapi: %w", err) } // set number and keep isLatest flag c.mergeWithLatestVersion(versions.SEVSNPVersion) return nil } func (c *AzureSEVSNP) mergeWithLatestVersion(latest attestationconfigapi.SEVSNPVersion) { if c.BootloaderVersion.WantLatest { c.BootloaderVersion.Value = latest.Bootloader } if c.TEEVersion.WantLatest { c.TEEVersion.Value = latest.TEE } if c.SNPVersion.WantLatest { c.SNPVersion.Value = latest.SNP } if c.MicrocodeVersion.WantLatest { c.MicrocodeVersion.Value = latest.Microcode } } func (c *AzureSEVSNP) getToMarshallLatestWithResolvedVersions() AttestationCfg { cp := *c cp.BootloaderVersion.WantLatest = false cp.TEEVersion.WantLatest = false cp.SNPVersion.WantLatest = false cp.MicrocodeVersion.WantLatest = false return &cp } // GetVariant returns azure-trusted-launch as the variant. func (AzureTrustedLaunch) GetVariant() variant.Variant { return variant.AzureTrustedLaunch{} } // GetMeasurements returns the measurements used for attestation. func (c AzureTrustedLaunch) GetMeasurements() measurements.M { return c.Measurements } // SetMeasurements updates a config's measurements using the given measurements. func (c *AzureTrustedLaunch) SetMeasurements(m measurements.M) { c.Measurements = m } // EqualTo returns true if the config is equal to the given config. func (c AzureTrustedLaunch) EqualTo(other AttestationCfg) (bool, error) { otherCfg, ok := other.(*AzureTrustedLaunch) if !ok { return false, fmt.Errorf("cannot compare %T with %T", c, other) } return c.Measurements.EqualTo(otherCfg.Measurements), nil } // DefaultForAzureTDX returns the default configuration for Azure TDX attestation. func DefaultForAzureTDX() *AzureTDX { return &AzureTDX{ Measurements: measurements.DefaultsFor(cloudprovider.Azure, variant.AzureTDX{}), // TODO(AB#3798): Enable latest versioning for Azure TDX QESVN: 0, PCESVN: 0, TEETCBSVN: encoding.HexBytes{0x02, 0x01, 0x06, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, QEVendorID: encoding.HexBytes{0x93, 0x9a, 0x72, 0x33, 0xf7, 0x9c, 0x4c, 0xa9, 0x94, 0x0a, 0x0d, 0xb3, 0x95, 0x7f, 0x06, 0x07}, // Don't set a default for MRSEAM as it effectively prevents upgrading the SEAM module // Quote verification still makes sure the module comes from Intel (through MRSIGNERSEAM), and is not of a lower version than expected // MRSeam: nil, XFAM: encoding.HexBytes{0xe7, 0x18, 0x06, 0x00, 0x00, 0x00, 0x00, 0x00}, IntelRootKey: mustParsePEM(tdxRootPEM), } } // GetVariant returns azure-tdx as the variant. func (AzureTDX) GetVariant() variant.Variant { return variant.AzureTDX{} } // GetMeasurements returns the measurements used for attestation. func (c AzureTDX) GetMeasurements() measurements.M { return c.Measurements } // SetMeasurements updates a config's measurements using the given measurements. func (c *AzureTDX) SetMeasurements(m measurements.M) { c.Measurements = m } // EqualTo returns true if the config is equal to the given config. func (c AzureTDX) EqualTo(other AttestationCfg) (bool, error) { otherCfg, ok := other.(*AzureTDX) if !ok { return false, fmt.Errorf("cannot compare %T with %T", c, other) } return c.Measurements.EqualTo(otherCfg.Measurements), nil } func (c *AzureTDX) getToMarshallLatestWithResolvedVersions() AttestationCfg { cp := *c // TODO: We probably want to support "latest" pseudo versioning for Azure TDX // But we should decide on which claims can be reliably used for attestation first return &cp }