mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-12-27 00:19:36 -05:00
913b09aeb8
* terraform: enable creation of SEV-SNP VMs on GCP * variant: add SEV-SNP attestation variant * config: add SEV-SNP config options for GCP * measurements: add GCP SEV-SNP measurements * gcp: separate package for SEV-ES * attestation: add GCP SEV-SNP attestation logic * gcp: factor out common logic * choose: add GCP SEV-SNP * cli: add TF variable passthrough for GCP SEV-SNP variables * cli: support GCP SEV-SNP for `constellation verify` * Adjust usage of GCP SEV-SNP throughout codebase * ci: add GCP SEV-SNP * terraform-provider: support GCP SEV-SNP * docs: add GCP SEV-SNP reference * linter fixes * gcp: only run test with TPM simulator * gcp: remove nonsense test * Update cli/internal/cmd/verify.go Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> * Update docs/docs/overview/clouds.md Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> * Update terraform-provider-constellation/internal/provider/attestation_data_source_test.go Co-authored-by: Adrian Stobbe <stobbe.adrian@gmail.com> * linter fixes * terraform_provider: correctly pass down CC technology * config: mark attestationconfigapi as unimplemented * gcp: fix comments and typos * snp: use nonce and PK hash in SNP report * snp: ensure we never use ARK supplied by Issuer (#3025) * Make sure SNP ARK is always loaded from config, or fetched from AMD KDS * GCP: Set validator `reportData` correctly --------- Signed-off-by: Daniel Weiße <dw@edgeless.systems> Co-authored-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * attestationconfigapi: add GCP to uploading * snp: use correct cert Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * terraform-provider: enable fetching of attestation config values for GCP SEV-SNP * linter fixes --------- Signed-off-by: Daniel Weiße <dw@edgeless.systems> Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> Co-authored-by: Adrian Stobbe <stobbe.adrian@gmail.com>
337 lines
9.0 KiB
Go
337 lines
9.0 KiB
Go
/*
|
|
Copyright (c) Edgeless Systems GmbH
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only
|
|
*/
|
|
|
|
/*
|
|
Package variant defines Attestation variants for different CSPs.
|
|
|
|
Each variant defines an OID, a string representation, and a function to compare it to other OIDs.
|
|
|
|
The OID is used in attested TLS to distinguish the attestation documents.
|
|
OIDs beginning with 1.3.9900 are reserved and can be used without registration.
|
|
|
|
* The 1.3.9900.1 branch is reserved for placeholder values and testing.
|
|
|
|
* The 1.3.9900.2 branch is reserved for AWS.
|
|
|
|
* The 1.3.9900.3 branch is reserved for GCP.
|
|
|
|
* The 1.3.9900.4 branch is reserved for Azure.
|
|
|
|
* The 1.3.9900.5 branch is reserved for QEMU.
|
|
|
|
Deprecated OIDs should never be reused for different purposes.
|
|
Instead, new OIDs should be added in the appropriate branch at the next available index.
|
|
|
|
String representation should be lowercase and contain only letters, numbers, and hyphens.
|
|
They should be prefixed with the branch name, e.g. all variants in the 1.3.9900.2 (AWS) branch should start with "aws-".
|
|
Each variant should have a unique string representation.
|
|
*/
|
|
package variant
|
|
|
|
import (
|
|
"encoding/asn1"
|
|
"fmt"
|
|
"sort"
|
|
|
|
"github.com/edgelesssys/constellation/v2/internal/cloud/cloudprovider"
|
|
)
|
|
|
|
const (
|
|
dummy = "dummy"
|
|
awsNitroTPM = "aws-nitro-tpm"
|
|
awsSEVSNP = "aws-sev-snp"
|
|
gcpSEVES = "gcp-sev-es"
|
|
gcpSEVSNP = "gcp-sev-snp"
|
|
azureTDX = "azure-tdx"
|
|
azureSEVSNP = "azure-sev-snp"
|
|
azureTrustedLaunch = "azure-trustedlaunch"
|
|
qemuVTPM = "qemu-vtpm"
|
|
qemuTDX = "qemu-tdx"
|
|
)
|
|
|
|
var providerAttestationMapping = map[cloudprovider.Provider][]Variant{
|
|
cloudprovider.AWS: {AWSSEVSNP{}, AWSNitroTPM{}},
|
|
cloudprovider.Azure: {AzureSEVSNP{}, AzureTDX{}, AzureTrustedLaunch{}},
|
|
cloudprovider.GCP: {GCPSEVES{}, GCPSEVSNP{}},
|
|
cloudprovider.QEMU: {QEMUVTPM{}},
|
|
cloudprovider.OpenStack: {QEMUVTPM{}},
|
|
}
|
|
|
|
// GetDefaultAttestation returns the default attestation variant for the given provider. If not found, it returns the default variant.
|
|
func GetDefaultAttestation(provider cloudprovider.Provider) Variant {
|
|
res, ok := providerAttestationMapping[provider]
|
|
if ok {
|
|
return res[0]
|
|
}
|
|
return Dummy{}
|
|
}
|
|
|
|
// GetAvailableAttestationVariants returns the available attestation variants.
|
|
func GetAvailableAttestationVariants() []Variant {
|
|
var res []Variant
|
|
|
|
// assumes that cloudprovider.Provider is a uint32 to sort the providers and get a consistent order
|
|
var keys []cloudprovider.Provider
|
|
for k := range providerAttestationMapping {
|
|
keys = append(keys, k)
|
|
}
|
|
sort.Slice(keys, func(i, j int) bool {
|
|
return uint(keys[i]) < uint(keys[j])
|
|
})
|
|
|
|
for _, k := range keys {
|
|
res = append(res, providerAttestationMapping[k]...)
|
|
}
|
|
return RemoveDuplicate(res)
|
|
}
|
|
|
|
// Getter returns an ASN.1 Object Identifier.
|
|
type Getter interface {
|
|
OID() asn1.ObjectIdentifier
|
|
}
|
|
|
|
// Variant describes an attestation variant.
|
|
type Variant interface {
|
|
Getter
|
|
String() string
|
|
Equal(other Getter) bool
|
|
}
|
|
|
|
// FromString returns the OID for the given string.
|
|
func FromString(oid string) (Variant, error) {
|
|
switch oid {
|
|
case dummy:
|
|
return Dummy{}, nil
|
|
case awsSEVSNP:
|
|
return AWSSEVSNP{}, nil
|
|
case awsNitroTPM:
|
|
return AWSNitroTPM{}, nil
|
|
case gcpSEVES:
|
|
return GCPSEVES{}, nil
|
|
case gcpSEVSNP:
|
|
return GCPSEVSNP{}, nil
|
|
case azureSEVSNP:
|
|
return AzureSEVSNP{}, nil
|
|
case azureTrustedLaunch:
|
|
return AzureTrustedLaunch{}, nil
|
|
case azureTDX:
|
|
return AzureTDX{}, nil
|
|
case qemuVTPM:
|
|
return QEMUVTPM{}, nil
|
|
case qemuTDX:
|
|
return QEMUTDX{}, nil
|
|
}
|
|
return nil, fmt.Errorf("unknown OID: %q", oid)
|
|
}
|
|
|
|
// ValidProvider returns true if the attestation variants is valid for the given provider.
|
|
func ValidProvider(provider cloudprovider.Provider, variant Variant) bool {
|
|
validTypes, ok := providerAttestationMapping[provider]
|
|
if ok {
|
|
for _, aType := range validTypes {
|
|
if variant.Equal(aType) {
|
|
return true
|
|
}
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
// Dummy OID for testing.
|
|
type Dummy struct{}
|
|
|
|
// OID returns the struct's object identifier.
|
|
func (Dummy) OID() asn1.ObjectIdentifier {
|
|
return asn1.ObjectIdentifier{1, 3, 9900, 1, 1}
|
|
}
|
|
|
|
// String returns the string representation of the OID.
|
|
func (Dummy) String() string {
|
|
return dummy
|
|
}
|
|
|
|
// Equal returns true if the other variant is also a Default.
|
|
func (Dummy) Equal(other Getter) bool {
|
|
return other.OID().Equal(Dummy{}.OID())
|
|
}
|
|
|
|
// AWSNitroTPM holds the AWS nitro TPM OID.
|
|
type AWSNitroTPM struct{}
|
|
|
|
// OID returns the struct's object identifier.
|
|
func (AWSNitroTPM) OID() asn1.ObjectIdentifier {
|
|
return asn1.ObjectIdentifier{1, 3, 9900, 2, 1}
|
|
}
|
|
|
|
// String returns the string representation of the OID.
|
|
func (AWSNitroTPM) String() string {
|
|
return awsNitroTPM
|
|
}
|
|
|
|
// Equal returns true if the other variant is also AWSNitroTPM.
|
|
func (AWSNitroTPM) Equal(other Getter) bool {
|
|
return other.OID().Equal(AWSNitroTPM{}.OID())
|
|
}
|
|
|
|
// AWSSEVSNP holds the AWS nitro TPM OID.
|
|
type AWSSEVSNP struct{}
|
|
|
|
// OID returns the struct's object identifier.
|
|
func (AWSSEVSNP) OID() asn1.ObjectIdentifier {
|
|
return asn1.ObjectIdentifier{1, 3, 9900, 2, 2}
|
|
}
|
|
|
|
// String returns the string representation of the OID.
|
|
func (AWSSEVSNP) String() string {
|
|
return awsSEVSNP
|
|
}
|
|
|
|
// Equal returns true if the other variant is also AWSSEVSNP.
|
|
func (AWSSEVSNP) Equal(other Getter) bool {
|
|
return other.OID().Equal(AWSSEVSNP{}.OID())
|
|
}
|
|
|
|
// GCPSEVES holds the GCP SEV-ES OID.
|
|
type GCPSEVES struct{}
|
|
|
|
// OID returns the struct's object identifier.
|
|
func (GCPSEVES) OID() asn1.ObjectIdentifier {
|
|
return asn1.ObjectIdentifier{1, 3, 9900, 3, 1}
|
|
}
|
|
|
|
// String returns the string representation of the OID.
|
|
func (GCPSEVES) String() string {
|
|
return gcpSEVES
|
|
}
|
|
|
|
// Equal returns true if the other variant is also GCPSEVES.
|
|
func (GCPSEVES) Equal(other Getter) bool {
|
|
return other.OID().Equal(GCPSEVES{}.OID())
|
|
}
|
|
|
|
// GCPSEVSNP holds the GCP SEV-SNP OID.
|
|
type GCPSEVSNP struct{}
|
|
|
|
// OID returns the struct's object identifier.
|
|
func (GCPSEVSNP) OID() asn1.ObjectIdentifier {
|
|
return asn1.ObjectIdentifier{1, 3, 9900, 3, 2}
|
|
}
|
|
|
|
// String returns the string representation of the OID.
|
|
func (GCPSEVSNP) String() string {
|
|
return gcpSEVSNP
|
|
}
|
|
|
|
// Equal returns true if the other variant is also GCPSEVSNP.
|
|
func (GCPSEVSNP) Equal(other Getter) bool {
|
|
return other.OID().Equal(GCPSEVSNP{}.OID())
|
|
}
|
|
|
|
// AzureTDX holds the OID for Azure TDX CVMs.
|
|
type AzureTDX struct{}
|
|
|
|
// OID returns the struct's object identifier.
|
|
func (AzureTDX) OID() asn1.ObjectIdentifier {
|
|
return asn1.ObjectIdentifier{1, 3, 9900, 4, 3}
|
|
}
|
|
|
|
// String returns the string representation of the OID.
|
|
func (AzureTDX) String() string {
|
|
return azureTDX
|
|
}
|
|
|
|
// Equal returns true if the other variant is also AzureTDX.
|
|
func (AzureTDX) Equal(other Getter) bool {
|
|
return other.OID().Equal(AzureTDX{}.OID())
|
|
}
|
|
|
|
// AzureSEVSNP holds the OID for Azure SNP CVMs.
|
|
type AzureSEVSNP struct{}
|
|
|
|
// OID returns the struct's object identifier.
|
|
func (AzureSEVSNP) OID() asn1.ObjectIdentifier {
|
|
return asn1.ObjectIdentifier{1, 3, 9900, 4, 1}
|
|
}
|
|
|
|
// String returns the string representation of the OID.
|
|
func (AzureSEVSNP) String() string {
|
|
return azureSEVSNP
|
|
}
|
|
|
|
// Equal returns true if the other variant is also AzureSEVSNP.
|
|
func (AzureSEVSNP) Equal(other Getter) bool {
|
|
return other.OID().Equal(AzureSEVSNP{}.OID())
|
|
}
|
|
|
|
// AzureTrustedLaunch holds the OID for Azure TrustedLaunch VMs.
|
|
type AzureTrustedLaunch struct{}
|
|
|
|
// OID returns the struct's object identifier.
|
|
func (AzureTrustedLaunch) OID() asn1.ObjectIdentifier {
|
|
return asn1.ObjectIdentifier{1, 3, 9900, 4, 2}
|
|
}
|
|
|
|
// String returns the string representation of the OID.
|
|
func (AzureTrustedLaunch) String() string {
|
|
return azureTrustedLaunch
|
|
}
|
|
|
|
// Equal returns true if the other variant is also AzureTrustedLaunch.
|
|
func (AzureTrustedLaunch) Equal(other Getter) bool {
|
|
return other.OID().Equal(AzureTrustedLaunch{}.OID())
|
|
}
|
|
|
|
// QEMUVTPM holds the QEMUVTPM OID.
|
|
type QEMUVTPM struct{}
|
|
|
|
// OID returns the struct's object identifier.
|
|
func (QEMUVTPM) OID() asn1.ObjectIdentifier {
|
|
return asn1.ObjectIdentifier{1, 3, 9900, 5, 1}
|
|
}
|
|
|
|
// String returns the string representation of the OID.
|
|
func (QEMUVTPM) String() string {
|
|
return qemuVTPM
|
|
}
|
|
|
|
// Equal returns true if the other variant is also QEMUVTPM.
|
|
func (QEMUVTPM) Equal(other Getter) bool {
|
|
return other.OID().Equal(QEMUVTPM{}.OID())
|
|
}
|
|
|
|
// QEMUTDX holds the QEMU TDX OID.
|
|
// Placeholder for dev-cloud integration.
|
|
type QEMUTDX struct{}
|
|
|
|
// OID returns the struct's object identifier.
|
|
// Placeholder for dev-cloud integration.
|
|
func (QEMUTDX) OID() asn1.ObjectIdentifier {
|
|
return asn1.ObjectIdentifier{1, 3, 9900, 5, 99}
|
|
}
|
|
|
|
// String returns the string representation of the OID.
|
|
func (QEMUTDX) String() string {
|
|
return qemuTDX
|
|
}
|
|
|
|
// Equal returns true if the other variant is also QEMUTDX.
|
|
func (QEMUTDX) Equal(other Getter) bool {
|
|
return other.OID().Equal(QEMUTDX{}.OID())
|
|
}
|
|
|
|
// RemoveDuplicate removes duplicate elements from a slice.
|
|
func RemoveDuplicate[T comparable](sliceList []T) []T {
|
|
allKeys := make(map[T]bool)
|
|
list := []T{}
|
|
for _, item := range sliceList {
|
|
if _, value := allKeys[item]; !value {
|
|
allKeys[item] = true
|
|
list = append(list, item)
|
|
}
|
|
}
|
|
return list
|
|
}
|