mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-12-27 16:39:38 -05:00
913b09aeb8
* terraform: enable creation of SEV-SNP VMs on GCP * variant: add SEV-SNP attestation variant * config: add SEV-SNP config options for GCP * measurements: add GCP SEV-SNP measurements * gcp: separate package for SEV-ES * attestation: add GCP SEV-SNP attestation logic * gcp: factor out common logic * choose: add GCP SEV-SNP * cli: add TF variable passthrough for GCP SEV-SNP variables * cli: support GCP SEV-SNP for `constellation verify` * Adjust usage of GCP SEV-SNP throughout codebase * ci: add GCP SEV-SNP * terraform-provider: support GCP SEV-SNP * docs: add GCP SEV-SNP reference * linter fixes * gcp: only run test with TPM simulator * gcp: remove nonsense test * Update cli/internal/cmd/verify.go Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> * Update docs/docs/overview/clouds.md Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> * Update terraform-provider-constellation/internal/provider/attestation_data_source_test.go Co-authored-by: Adrian Stobbe <stobbe.adrian@gmail.com> * linter fixes * terraform_provider: correctly pass down CC technology * config: mark attestationconfigapi as unimplemented * gcp: fix comments and typos * snp: use nonce and PK hash in SNP report * snp: ensure we never use ARK supplied by Issuer (#3025) * Make sure SNP ARK is always loaded from config, or fetched from AMD KDS * GCP: Set validator `reportData` correctly --------- Signed-off-by: Daniel Weiße <dw@edgeless.systems> Co-authored-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * attestationconfigapi: add GCP to uploading * snp: use correct cert Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * terraform-provider: enable fetching of attestation config values for GCP SEV-SNP * linter fixes --------- Signed-off-by: Daniel Weiße <dw@edgeless.systems> Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> Co-authored-by: Adrian Stobbe <stobbe.adrian@gmail.com>
213 lines
6.5 KiB
Go
213 lines
6.5 KiB
Go
/*
|
|
Copyright (c) Edgeless Systems GmbH
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only
|
|
*/
|
|
package main
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"log/slog"
|
|
"path"
|
|
|
|
"github.com/aws/aws-sdk-go-v2/aws"
|
|
"github.com/aws/aws-sdk-go-v2/service/s3"
|
|
s3types "github.com/aws/aws-sdk-go-v2/service/s3/types"
|
|
"github.com/edgelesssys/constellation/v2/internal/api/attestationconfigapi"
|
|
"github.com/edgelesssys/constellation/v2/internal/attestation/variant"
|
|
"github.com/edgelesssys/constellation/v2/internal/cloud/cloudprovider"
|
|
"github.com/edgelesssys/constellation/v2/internal/logger"
|
|
"github.com/edgelesssys/constellation/v2/internal/staticupload"
|
|
"github.com/spf13/cobra"
|
|
)
|
|
|
|
// newDeleteCmd creates the delete command.
|
|
func newDeleteCmd() *cobra.Command {
|
|
cmd := &cobra.Command{
|
|
Use: "delete {aws|azure|gcp} {snp-report|guest-firmware} <version>",
|
|
Short: "Delete an object from the attestationconfig API",
|
|
Long: "Delete a specific object version from the config api. <version> is the name of the object to delete (without .json suffix)",
|
|
Example: "COSIGN_PASSWORD=$CPW COSIGN_PRIVATE_KEY=$CKEY cli delete azure snp-report 1.0.0",
|
|
Args: cobra.MatchAll(cobra.ExactArgs(3), isCloudProvider(0), isValidKind(1)),
|
|
PreRunE: envCheck,
|
|
RunE: runDelete,
|
|
}
|
|
|
|
recursivelyCmd := &cobra.Command{
|
|
Use: "recursive {aws|azure|gcp}",
|
|
Short: "delete all objects from the API path constellation/v1/attestation/<csp>",
|
|
Long: "Delete all objects from the API path constellation/v1/attestation/<csp>",
|
|
Example: "COSIGN_PASSWORD=$CPW COSIGN_PRIVATE_KEY=$CKEY cli delete recursive azure",
|
|
Args: cobra.MatchAll(cobra.ExactArgs(1), isCloudProvider(0)),
|
|
RunE: runRecursiveDelete,
|
|
}
|
|
|
|
cmd.AddCommand(recursivelyCmd)
|
|
|
|
return cmd
|
|
}
|
|
|
|
func runDelete(cmd *cobra.Command, args []string) (retErr error) {
|
|
log := logger.NewTextLogger(slog.LevelDebug).WithGroup("attestationconfigapi")
|
|
|
|
deleteCfg, err := newDeleteConfig(cmd, ([3]string)(args[:3]))
|
|
if err != nil {
|
|
return fmt.Errorf("creating delete config: %w", err)
|
|
}
|
|
|
|
cfg := staticupload.Config{
|
|
Bucket: deleteCfg.bucket,
|
|
Region: deleteCfg.region,
|
|
DistributionID: deleteCfg.distribution,
|
|
}
|
|
client, clientClose, err := attestationconfigapi.NewClient(cmd.Context(), cfg,
|
|
[]byte(cosignPwd), []byte(privateKey), false, 1, log)
|
|
if err != nil {
|
|
return fmt.Errorf("create attestation client: %w", err)
|
|
}
|
|
defer func() {
|
|
err := clientClose(cmd.Context())
|
|
if err != nil {
|
|
retErr = errors.Join(retErr, fmt.Errorf("failed to invalidate cache: %w", err))
|
|
}
|
|
}()
|
|
|
|
switch deleteCfg.provider {
|
|
case cloudprovider.AWS:
|
|
return deleteEntry(cmd.Context(), variant.AWSSEVSNP{}, client, deleteCfg)
|
|
case cloudprovider.Azure:
|
|
return deleteEntry(cmd.Context(), variant.AzureSEVSNP{}, client, deleteCfg)
|
|
case cloudprovider.GCP:
|
|
return deleteEntry(cmd.Context(), variant.GCPSEVSNP{}, client, deleteCfg)
|
|
default:
|
|
return fmt.Errorf("unsupported cloud provider: %s", deleteCfg.provider)
|
|
}
|
|
}
|
|
|
|
func runRecursiveDelete(cmd *cobra.Command, args []string) (retErr error) {
|
|
// newDeleteConfig expects 3 args, so we pass "all" for the version argument and "snp-report" as kind.
|
|
args = append(args, "snp-report")
|
|
args = append(args, "all")
|
|
deleteCfg, err := newDeleteConfig(cmd, ([3]string)(args[:3]))
|
|
if err != nil {
|
|
return fmt.Errorf("creating delete config: %w", err)
|
|
}
|
|
|
|
log := logger.NewTextLogger(slog.LevelDebug).WithGroup("attestationconfigapi")
|
|
client, closeFn, err := staticupload.New(cmd.Context(), staticupload.Config{
|
|
Bucket: deleteCfg.bucket,
|
|
Region: deleteCfg.region,
|
|
DistributionID: deleteCfg.distribution,
|
|
}, log)
|
|
if err != nil {
|
|
return fmt.Errorf("create static upload client: %w", err)
|
|
}
|
|
defer func() {
|
|
err := closeFn(cmd.Context())
|
|
if err != nil {
|
|
retErr = errors.Join(retErr, fmt.Errorf("failed to close client: %w", err))
|
|
}
|
|
}()
|
|
|
|
var deletePath string
|
|
switch deleteCfg.provider {
|
|
case cloudprovider.AWS:
|
|
deletePath = path.Join(attestationconfigapi.AttestationURLPath, variant.AWSSEVSNP{}.String())
|
|
case cloudprovider.Azure:
|
|
deletePath = path.Join(attestationconfigapi.AttestationURLPath, variant.AzureSEVSNP{}.String())
|
|
case cloudprovider.GCP:
|
|
deletePath = path.Join(attestationconfigapi.AttestationURLPath, variant.GCPSEVSNP{}.String())
|
|
default:
|
|
return fmt.Errorf("unsupported cloud provider: %s", deleteCfg.provider)
|
|
}
|
|
|
|
return deleteEntryRecursive(cmd.Context(), deletePath, client, deleteCfg)
|
|
}
|
|
|
|
type deleteConfig struct {
|
|
provider cloudprovider.Provider
|
|
kind objectKind
|
|
version string
|
|
region string
|
|
bucket string
|
|
url string
|
|
distribution string
|
|
cosignPublicKey string
|
|
}
|
|
|
|
func newDeleteConfig(cmd *cobra.Command, args [3]string) (deleteConfig, error) {
|
|
region, err := cmd.Flags().GetString("region")
|
|
if err != nil {
|
|
return deleteConfig{}, fmt.Errorf("getting region: %w", err)
|
|
}
|
|
|
|
bucket, err := cmd.Flags().GetString("bucket")
|
|
if err != nil {
|
|
return deleteConfig{}, fmt.Errorf("getting bucket: %w", err)
|
|
}
|
|
|
|
testing, err := cmd.Flags().GetBool("testing")
|
|
if err != nil {
|
|
return deleteConfig{}, fmt.Errorf("getting testing flag: %w", err)
|
|
}
|
|
apiCfg := getAPIEnvironment(testing)
|
|
|
|
provider := cloudprovider.FromString(args[0])
|
|
kind := kindFromString(args[1])
|
|
version := args[2]
|
|
|
|
return deleteConfig{
|
|
provider: provider,
|
|
kind: kind,
|
|
version: version,
|
|
region: region,
|
|
bucket: bucket,
|
|
url: apiCfg.url,
|
|
distribution: apiCfg.distribution,
|
|
cosignPublicKey: apiCfg.cosignPublicKey,
|
|
}, nil
|
|
}
|
|
|
|
func deleteEntry(ctx context.Context, attvar variant.Variant, client *attestationconfigapi.Client, cfg deleteConfig) error {
|
|
if cfg.kind != snpReport {
|
|
return fmt.Errorf("kind %s not supported", cfg.kind)
|
|
}
|
|
|
|
return client.DeleteSEVSNPVersion(ctx, attvar, cfg.version)
|
|
}
|
|
|
|
func deleteEntryRecursive(ctx context.Context, path string, client *staticupload.Client, cfg deleteConfig) error {
|
|
resp, err := client.ListObjectsV2(ctx, &s3.ListObjectsV2Input{
|
|
Bucket: aws.String(cfg.bucket),
|
|
Prefix: aws.String(path),
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Delete all objects in the path.
|
|
objIDs := make([]s3types.ObjectIdentifier, len(resp.Contents))
|
|
for i, obj := range resp.Contents {
|
|
objIDs[i] = s3types.ObjectIdentifier{Key: obj.Key}
|
|
}
|
|
if len(objIDs) > 0 {
|
|
_, err = client.DeleteObjects(ctx, &s3.DeleteObjectsInput{
|
|
Bucket: aws.String(cfg.bucket),
|
|
Delete: &s3types.Delete{
|
|
Objects: objIDs,
|
|
Quiet: toPtr(true),
|
|
},
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func toPtr[T any](v T) *T {
|
|
return &v
|
|
}
|