constellation/internal/attestation/azure/snp/imds.go
Otto Bittner 405db3286e AB#2386: TrustedLaunch support for azure attestation
* There are now two attestation packages on azure.
The issuer on the server side is created base on successfully
querying the idkeydigest from the TPM. Fallback on err: Trusted Launch.
* The bootstrapper's issuer choice is validated by the CLI's validator,
which is created based on the local config.
* Add "azureCVM" field to new "internal-config" cm.
This field is populated by the bootstrapper.
* Group attestation OIDs by CSP (#42)
* Bootstrapper now uses IssuerWrapper type to pass
the issuer (and some context info) to the initserver.
* Introduce VMType package akin to cloudprovider. Used by
IssuerWrapper.
* Extend unittests.
* Remove CSP specific attestation integration tests

Co-authored-by: <dw@edgeless.systems>
Signed-off-by: Otto Bittner <cobittner@posteo.net>
2022-09-05 12:03:48 +02:00

50 lines
980 B
Go

/*
Copyright (c) Edgeless Systems GmbH
SPDX-License-Identifier: AGPL-3.0-only
*/
package snp
import (
"context"
"encoding/json"
"net/http"
)
// Modified version of bootstrapper/cloudprovider/azure/imds.go
const (
imdsVcekURL = "http://169.254.169.254/metadata/THIM/amd/certification"
)
type imdsClient struct {
client *http.Client
}
// Retrieve retrieves instance metadata from the azure imds API.
func (c imdsClient) getVcek(ctx context.Context) (vcekResponse, error) {
req, err := http.NewRequestWithContext(ctx, http.MethodGet, imdsVcekURL, http.NoBody)
if err != nil {
return vcekResponse{}, err
}
req.Header.Add("Metadata", "True")
resp, err := c.client.Do(req)
if err != nil {
return vcekResponse{}, err
}
defer resp.Body.Close()
var res vcekResponse
if err := json.NewDecoder(resp.Body).Decode(&res); err != nil {
return vcekResponse{}, err
}
return res, nil
}
type vcekResponse struct {
VcekCert string
CertificateChain string
}