mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-12-27 08:29:33 -05:00
bd63aa3c6b
sed -i '1i/*\nCopyright (c) Edgeless Systems GmbH\n\nSPDX-License-Identifier: AGPL-3.0-only\n*/\n' `grep -rL --include='*.go' 'DO NOT EDIT'` gofumpt -w .
205 lines
7.0 KiB
Go
205 lines
7.0 KiB
Go
/*
|
|
Copyright (c) Edgeless Systems GmbH
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only
|
|
*/
|
|
|
|
package keyservice
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"net"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/edgelesssys/constellation/internal/cloud/metadata"
|
|
"github.com/edgelesssys/constellation/internal/crypto"
|
|
"github.com/edgelesssys/constellation/internal/grpc/atlscredentials"
|
|
"github.com/edgelesssys/constellation/internal/logger"
|
|
"github.com/edgelesssys/constellation/internal/oid"
|
|
"github.com/edgelesssys/constellation/joinservice/joinproto"
|
|
"github.com/edgelesssys/constellation/state/keyproto"
|
|
"go.uber.org/zap"
|
|
"google.golang.org/grpc"
|
|
"google.golang.org/grpc/codes"
|
|
"google.golang.org/grpc/credentials"
|
|
"google.golang.org/grpc/status"
|
|
"k8s.io/utils/clock"
|
|
)
|
|
|
|
// KeyAPI is the interface called by control-plane or an admin during restart of a node.
|
|
type KeyAPI struct {
|
|
listenAddr string
|
|
log *logger.Logger
|
|
mux sync.Mutex
|
|
metadata metadata.InstanceLister
|
|
issuer QuoteIssuer
|
|
key []byte
|
|
measurementSecret []byte
|
|
keyReceived chan struct{}
|
|
|
|
clock clock.WithTicker
|
|
timeout time.Duration
|
|
interval time.Duration
|
|
|
|
keyproto.UnimplementedAPIServer
|
|
}
|
|
|
|
// New initializes a KeyAPI with the given parameters.
|
|
func New(log *logger.Logger, issuer QuoteIssuer, metadata metadata.InstanceLister, timeout time.Duration, interval time.Duration) *KeyAPI {
|
|
return &KeyAPI{
|
|
log: log,
|
|
metadata: metadata,
|
|
issuer: issuer,
|
|
keyReceived: make(chan struct{}, 1),
|
|
clock: clock.RealClock{},
|
|
timeout: timeout,
|
|
interval: interval,
|
|
}
|
|
}
|
|
|
|
// PushStateDiskKey is the rpc to push state disk decryption keys to a restarting node.
|
|
func (a *KeyAPI) PushStateDiskKey(ctx context.Context, in *keyproto.PushStateDiskKeyRequest) (*keyproto.PushStateDiskKeyResponse, error) {
|
|
a.mux.Lock()
|
|
defer a.mux.Unlock()
|
|
if len(a.key) != 0 {
|
|
return nil, status.Error(codes.FailedPrecondition, "node already received a passphrase")
|
|
}
|
|
if len(in.StateDiskKey) != crypto.StateDiskKeyLength {
|
|
return nil, status.Errorf(codes.InvalidArgument, "received invalid passphrase: expected length: %d, but got: %d", crypto.StateDiskKeyLength, len(in.StateDiskKey))
|
|
}
|
|
if len(in.MeasurementSecret) != crypto.RNGLengthDefault {
|
|
return nil, status.Errorf(codes.InvalidArgument, "received invalid measurement secret: expected length: %d, but got: %d", crypto.RNGLengthDefault, len(in.MeasurementSecret))
|
|
}
|
|
|
|
a.key = in.StateDiskKey
|
|
a.measurementSecret = in.MeasurementSecret
|
|
a.keyReceived <- struct{}{}
|
|
return &keyproto.PushStateDiskKeyResponse{}, nil
|
|
}
|
|
|
|
// WaitForDecryptionKey notifies control-plane nodes to send a decryption key and waits until a key is received.
|
|
func (a *KeyAPI) WaitForDecryptionKey(uuid, listenAddr string) (diskKey, measurementSecret []byte, err error) {
|
|
if uuid == "" {
|
|
return nil, nil, errors.New("received no disk UUID")
|
|
}
|
|
a.listenAddr = listenAddr
|
|
creds := atlscredentials.New(a.issuer, nil)
|
|
server := grpc.NewServer(grpc.Creds(creds))
|
|
keyproto.RegisterAPIServer(server, a)
|
|
listener, err := net.Listen("tcp", listenAddr)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
defer listener.Close()
|
|
|
|
a.log.Infof("Waiting for decryption key. Listening on: %s", listener.Addr().String())
|
|
go server.Serve(listener)
|
|
defer server.GracefulStop()
|
|
|
|
a.requestKeyLoop(uuid)
|
|
return a.key, a.measurementSecret, nil
|
|
}
|
|
|
|
// ResetKey resets a previously set key.
|
|
func (a *KeyAPI) ResetKey() {
|
|
a.key = nil
|
|
}
|
|
|
|
// requestKeyLoop continuously requests decryption keys from all available control-plane nodes, until the KeyAPI receives a key.
|
|
func (a *KeyAPI) requestKeyLoop(uuid string, opts ...grpc.DialOption) {
|
|
// we do not perform attestation, since the restarting node does not need to care about notifying the correct node
|
|
// if an incorrect key is pushed by a malicious actor, decrypting the disk will fail, and the node will not start
|
|
creds := atlscredentials.New(a.issuer, nil)
|
|
|
|
ticker := a.clock.NewTicker(a.interval)
|
|
defer ticker.Stop()
|
|
for {
|
|
endpoints, err := a.getJoinServiceEndpoints()
|
|
if err != nil {
|
|
a.log.With(zap.Error(err)).Errorf("Failed to get JoinService endpoints")
|
|
} else {
|
|
a.log.Infof("Received list with JoinService endpoints: %v", endpoints)
|
|
for _, endpoint := range endpoints {
|
|
a.requestKey(endpoint, uuid, creds, opts...)
|
|
}
|
|
}
|
|
|
|
select {
|
|
case <-a.keyReceived:
|
|
// return if a key was received
|
|
// a key can be send by
|
|
// - a control-plane node, after the request rpc was received
|
|
// - by a Constellation admin, at any time this loop is running on a node during boot
|
|
return
|
|
case <-ticker.C():
|
|
}
|
|
}
|
|
}
|
|
|
|
func (a *KeyAPI) getJoinServiceEndpoints() ([]string, error) {
|
|
ctx, cancel := context.WithTimeout(context.Background(), a.timeout)
|
|
defer cancel()
|
|
return metadata.JoinServiceEndpoints(ctx, a.metadata)
|
|
}
|
|
|
|
func (a *KeyAPI) requestKey(endpoint, uuid string, credentials credentials.TransportCredentials, opts ...grpc.DialOption) {
|
|
opts = append(opts, grpc.WithTransportCredentials(credentials))
|
|
|
|
a.log.With(zap.String("endpoint", endpoint)).Infof("Requesting rejoin ticket")
|
|
rejoinTicket, err := a.requestRejoinTicket(endpoint, uuid, opts...)
|
|
if err != nil {
|
|
a.log.With(zap.Error(err), zap.String("endpoint", endpoint)).Errorf("Failed to request rejoin ticket")
|
|
return
|
|
}
|
|
|
|
a.log.With(zap.String("endpoint", endpoint)).Infof("Pushing key to own server")
|
|
if err := a.pushKeyToOwnServer(rejoinTicket.StateDiskKey, rejoinTicket.MeasurementSecret, opts...); err != nil {
|
|
a.log.With(zap.Error(err), zap.String("endpoint", a.listenAddr)).Errorf("Failed to push key to own server")
|
|
return
|
|
}
|
|
}
|
|
|
|
func (a *KeyAPI) requestRejoinTicket(endpoint, uuid string, opts ...grpc.DialOption) (*joinproto.IssueRejoinTicketResponse, error) {
|
|
ctx, cancel := context.WithTimeout(context.Background(), a.timeout)
|
|
defer cancel()
|
|
conn, err := grpc.DialContext(ctx, endpoint, opts...)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("dialing gRPC: %w", err)
|
|
}
|
|
defer conn.Close()
|
|
client := joinproto.NewAPIClient(conn)
|
|
req := &joinproto.IssueRejoinTicketRequest{DiskUuid: uuid}
|
|
return client.IssueRejoinTicket(ctx, req)
|
|
}
|
|
|
|
func (a *KeyAPI) pushKeyToOwnServer(stateDiskKey, measurementSecret []byte, opts ...grpc.DialOption) error {
|
|
ctx, cancel := context.WithTimeout(context.Background(), a.timeout)
|
|
defer cancel()
|
|
conn, err := grpc.DialContext(ctx, a.listenAddr, opts...)
|
|
if err != nil {
|
|
return fmt.Errorf("dialing gRPC: %w", err)
|
|
}
|
|
defer conn.Close()
|
|
client := keyproto.NewAPIClient(conn)
|
|
req := &keyproto.PushStateDiskKeyRequest{StateDiskKey: stateDiskKey, MeasurementSecret: measurementSecret}
|
|
_, err = client.PushStateDiskKey(ctx, req)
|
|
return err
|
|
}
|
|
|
|
// QuoteValidator validates quotes.
|
|
type QuoteValidator interface {
|
|
oid.Getter
|
|
// Validate validates a quote and returns the user data on success.
|
|
Validate(attDoc []byte, nonce []byte) ([]byte, error)
|
|
}
|
|
|
|
// QuoteIssuer issues quotes.
|
|
type QuoteIssuer interface {
|
|
oid.Getter
|
|
// Issue issues a quote for remote attestation for a given message
|
|
Issue(userData []byte, nonce []byte) (quote []byte, err error)
|
|
}
|