mirror of
https://github.com/edgelesssys/constellation.git
synced 2025-05-07 16:55:15 -04:00

keyservice joinservice upgrade-agent measurement-reader debugd disk-mapper rewrote joinservice main rewrote some unit tests rewrote upgrade-agent + some grpc functions rewrote measurement-reader rewrote debugd removed unused import removed forgotten zap reference in measurements reader rewrote disk-mapper + tests rewrote packages verify disk-mapper malicious join bootstrapper attestationconfigapi versionapi internal/cloud/azure disk-mapper tests image/upload/internal/cmd rewrote verify (WIP with loglevel increase) rewrote forgotten zap references in disk-mapper rewrote malicious join rewrote bootstrapper rewrote parts of internal/ rewrote attestationconfigapi (WIP) rewrote versionapi cli rewrote internal/cloud/azure rewrote disk-mapper tests (untested by me rn) rewrote image/upload/internal/cmd removed forgotten zap references in verify/cmd rewrote packages hack/oci-pin hack/qemu-metadata-api debugd/internal/debugd/deploy hack/bazel-deps-mirror cli/internal/cmd cli-k8s-compatibility rewrote hack/qemu-metadata-api/server rewrote debugd/internal/debugd/deploy rewrote hack/bazel-deps-mirror rewrote rest of hack/qemu-metadata-api rewrote forgotten zap references in joinservice server rewrote cli/internal/cmd rewrote cli-k8s-compatibility rewrote packages internal/staticupload e2d/internal/upgrade internal/constellation/helm internal/attestation/aws/snp internal/attestation/azure/trustedlaunch joinservice/internal/certcache/amkds some missed unit tests rewrote e2e/internal/upgrade rewrote internal/constellation/helm internal/attestation/aws/snp internal/attestation/azure/trustedlaunch joinservice/internal/certcache/amkds search and replace test logging over all left *_test.go
106 lines
2.6 KiB
Go
106 lines
2.6 KiB
Go
/*
|
|
Copyright (c) Edgeless Systems GmbH
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only
|
|
*/
|
|
|
|
package cmd
|
|
|
|
import (
|
|
"fmt"
|
|
"io"
|
|
"log/slog"
|
|
"os"
|
|
|
|
"github.com/edgelesssys/constellation/v2/internal/osimage"
|
|
"github.com/edgelesssys/constellation/v2/internal/osimage/archive"
|
|
awsupload "github.com/edgelesssys/constellation/v2/internal/osimage/aws"
|
|
"github.com/spf13/cobra"
|
|
)
|
|
|
|
// newAWSCmd returns the command that uploads an OS image to AWS.
|
|
func newAWSCmd() *cobra.Command {
|
|
cmd := &cobra.Command{
|
|
Use: "aws",
|
|
Short: "Upload OS image to AWS",
|
|
Long: "Upload OS image to AWS.",
|
|
Args: cobra.ExactArgs(0),
|
|
RunE: runAWS,
|
|
}
|
|
|
|
cmd.Flags().String("aws-region", "eu-central-1", "AWS region used during AMI creation")
|
|
cmd.Flags().String("aws-bucket", "constellation-images", "S3 bucket used during AMI creation")
|
|
return cmd
|
|
}
|
|
|
|
func runAWS(cmd *cobra.Command, _ []string) error {
|
|
workdir := os.Getenv("BUILD_WORKING_DIRECTORY")
|
|
if len(workdir) > 0 {
|
|
must(os.Chdir(workdir))
|
|
}
|
|
|
|
flags, err := parseAWSFlags(cmd)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
log := slog.New(slog.NewTextHandler(os.Stdout, &slog.HandlerOptions{Level: flags.logLevel}))
|
|
log.Debug("Parsed flags: %+v", flags)
|
|
|
|
archiveC, archiveCClose, err := archive.New(cmd.Context(), flags.region, flags.bucket, flags.distributionID, log)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer func() {
|
|
if err := archiveCClose(cmd.Context()); err != nil {
|
|
log.Error("closing archive client: %v", err)
|
|
}
|
|
}()
|
|
|
|
uploadC, err := awsupload.New(flags.awsRegion, flags.awsBucket, log)
|
|
if err != nil {
|
|
return fmt.Errorf("uploading image: %w", err)
|
|
}
|
|
|
|
file, err := os.Open(flags.rawImage)
|
|
if err != nil {
|
|
return fmt.Errorf("uploading image: opening image file %w", err)
|
|
}
|
|
defer file.Close()
|
|
size, err := file.Seek(0, io.SeekEnd)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if _, err := file.Seek(0, io.SeekStart); err != nil {
|
|
return err
|
|
}
|
|
out := cmd.OutOrStdout()
|
|
if len(flags.out) > 0 {
|
|
outF, err := os.Create(flags.out)
|
|
if err != nil {
|
|
return fmt.Errorf("uploading image: opening output file %w", err)
|
|
}
|
|
defer outF.Close()
|
|
out = outF
|
|
}
|
|
|
|
uploadReq := &osimage.UploadRequest{
|
|
Provider: flags.provider,
|
|
Version: flags.version,
|
|
AttestationVariant: flags.attestationVariant,
|
|
SecureBoot: flags.secureBoot,
|
|
Size: size,
|
|
Timestamp: flags.timestamp,
|
|
Image: file,
|
|
}
|
|
|
|
if flags.secureBoot {
|
|
sbDatabase, uefiVarStore, err := loadSecureBootKeys(flags.pki)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
uploadReq.SBDatabase = sbDatabase
|
|
uploadReq.UEFIVarStore = uefiVarStore
|
|
}
|
|
|
|
return uploadImage(cmd.Context(), archiveC, uploadC, uploadReq, out)
|
|
}
|