@super-protocol/addons-tee 0.9.10 → 2.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/bindings/nvidia-native/README.md +174 -0
- package/bindings/nvidia-native/package.json +26 -0
- package/bindings/nvidia-native/postinstall.js +40 -0
- package/dist/index.d.ts +1 -1
- package/dist/index.js +1 -28
- package/package.json +4 -2
- package/.editorconfig +0 -15
- package/.eslintrc.json +0 -61
- package/.prettierignore +0 -3
- package/.prettierrc +0 -15
- package/bindings/amd-sev-snp-napi-rs/amd-sev-snp-napi-rs.linux-x64-gnu.node +0 -0
- package/bindings/amd-sev-snp-napi-rs/index.d.ts +0 -51
- package/bindings/amd-sev-snp-napi-rs/index.js +0 -339
- package/bindings/amd-sev-snp-napi-rs/package-lock.json +0 -40
- package/bindings/sgx-native/build/Release/libmbedcrypto_gramine.so.15 +0 -0
- package/bindings/sgx-native/build/Release/libmbedx509_gramine.so.6 +0 -0
- package/bindings/sgx-native/build/Release/libsgx_dcap_quoteverify.so.1 +0 -0
- package/bindings/sgx-native/build/Release/libtdx_attest.so.1 +0 -0
- package/bindings/sgx-native/build/Release/sgx_native.node +0 -0
- package/bindings/sgx-native/package-lock.json +0 -23
- package/bindings/sp-sev/.github/auto_assign-issues.yml +0 -5
- package/bindings/sp-sev/.github/auto_assign.yml +0 -21
- package/bindings/sp-sev/.github/dependabot.yml +0 -6
- package/bindings/sp-sev/.github/workflows/dco.yml +0 -10
- package/bindings/sp-sev/.github/workflows/lint.yml +0 -56
- package/bindings/sp-sev/.github/workflows/test.yml +0 -215
- package/bindings/sp-sev/.rustfmt.toml +0 -2
- package/bindings/sp-sev/CODEOWNERS +0 -1
- package/bindings/sp-sev/Cargo.lock +0 -2461
- package/bindings/sp-sev/Cargo.toml +0 -80
- package/bindings/sp-sev/LICENSE +0 -201
- package/bindings/sp-sev/README.md +0 -82
- package/bindings/sp-sev/build.rs +0 -17
- package/bindings/sp-sev/docs/attestation/README.md +0 -239
- package/bindings/sp-sev/docs/attestation/certchain.dot +0 -14
- package/bindings/sp-sev/docs/attestation/certchain.dot.png +0 -0
- package/bindings/sp-sev/docs/attestation/prerequisites.md +0 -6
- package/bindings/sp-sev/docs/attestation/process.msc +0 -60
- package/bindings/sp-sev/docs/attestation/process.msc.png +0 -0
- package/bindings/sp-sev/docs/attestation/protections.md +0 -53
- package/bindings/sp-sev/package-version.py +0 -11
- package/bindings/sp-sev/tests/api.rs +0 -194
- package/bindings/sp-sev/tests/certs.rs +0 -142
- package/bindings/sp-sev/tests/certs_data/cert_chain_milan +0 -74
- package/bindings/sp-sev/tests/certs_data/cert_chain_turin +0 -74
- package/bindings/sp-sev/tests/certs_data/report_milan.hex +0 -1
- package/bindings/sp-sev/tests/certs_data/vcek_milan.der +0 -0
- package/bindings/sp-sev/tests/certs_data/vcek_turin.der +0 -0
- package/bindings/sp-sev/tests/guest.rs +0 -57
- package/bindings/sp-sev/tests/id-block.rs +0 -172
- package/bindings/sp-sev/tests/measurement/ovmf_AmdSev_suffix.bin +0 -0
- package/bindings/sp-sev/tests/measurement/ovmf_OvmfX64_suffix.bin +0 -0
- package/bindings/sp-sev/tests/measurement/test_auth_block.bin +0 -0
- package/bindings/sp-sev/tests/measurement/test_auth_key.pem +0 -6
- package/bindings/sp-sev/tests/measurement/test_auth_sig.bin +0 -0
- package/bindings/sp-sev/tests/measurement/test_id_key.pem +0 -6
- package/bindings/sp-sev/tests/measurement/test_id_sig.bin +0 -0
- package/bindings/sp-sev/tests/measurement.rs +0 -510
- package/bindings/sp-sev/tests/naples/ark.cert.bad +0 -0
- package/bindings/sp-sev/tests/naples/ark.cert.sig +0 -0
- package/bindings/sp-sev/tests/naples/ark.rs +0 -38
- package/bindings/sp-sev/tests/naples/ask.rs +0 -29
- package/bindings/sp-sev/tests/naples/cek.cert +0 -0
- package/bindings/sp-sev/tests/naples/cek.rs +0 -30
- package/bindings/sp-sev/tests/naples/mod.rs +0 -20
- package/bindings/sp-sev/tests/naples/oca.cert +0 -0
- package/bindings/sp-sev/tests/naples/oca.rs +0 -45
- package/bindings/sp-sev/tests/naples/pdh.cert +0 -0
- package/bindings/sp-sev/tests/naples/pdh.rs +0 -28
- package/bindings/sp-sev/tests/naples/pek.cert +0 -0
- package/bindings/sp-sev/tests/naples/pek.rs +0 -32
- package/bindings/sp-sev/tests/rome/ark.rs +0 -33
- package/bindings/sp-sev/tests/rome/ask.rs +0 -29
- package/bindings/sp-sev/tests/rome/cek.cert +0 -0
- package/bindings/sp-sev/tests/rome/cek.rs +0 -29
- package/bindings/sp-sev/tests/rome/mod.rs +0 -16
- package/bindings/sp-sev/tests/rome/oca.cert +0 -0
- package/bindings/sp-sev/tests/rome/oca.rs +0 -45
- package/bindings/sp-sev/tests/rome/pdh.cert +0 -0
- package/bindings/sp-sev/tests/rome/pdh.rs +0 -28
- package/bindings/sp-sev/tests/rome/pek.cert +0 -0
- package/bindings/sp-sev/tests/rome/pek.rs +0 -32
- package/bindings/sp-sev/tests/session.rs +0 -39
- package/bindings/sp-sev/tests/sev_launch.rs +0 -120
- package/bindings/sp-sev/tests/snp_launch.rs +0 -108
- package/bindings/utils/virtee/LICENSE +0 -201
- package/bindings/utils/virtee/libsev.so +0 -0
- package/bindings/utils/virtee/snpguest +0 -0
- package/dist/proto/AmdSevSnp.d.ts +0 -194
- package/dist/proto/AmdSevSnp.js +0 -363
- package/dist/sgx-native-module/consts.d.ts +0 -24
- package/dist/sgx-native-module/consts.js +0 -38
- package/dist/sgx-native-module/dcap-quote-verify.service.d.ts +0 -12
- package/dist/sgx-native-module/dcap-quote-verify.service.js +0 -84
- package/dist/sgx-native-module/enclave.service.d.ts +0 -93
- package/dist/sgx-native-module/enclave.service.js +0 -211
- package/dist/sgx-native-module/errors.d.ts +0 -19
- package/dist/sgx-native-module/errors.js +0 -69
- package/dist/sgx-native-module/helpers.d.ts +0 -1
- package/dist/sgx-native-module/helpers.js +0 -50
- package/dist/sgx-native-module/index.d.ts +0 -9
- package/dist/sgx-native-module/index.js +0 -26
- package/dist/sgx-native-module/pki.service.d.ts +0 -52
- package/dist/sgx-native-module/pki.service.js +0 -89
- package/dist/sgx-native-module/sev-snp-mrenclave.d.ts +0 -59
- package/dist/sgx-native-module/sev-snp-mrenclave.js +0 -323
- package/dist/sgx-native-module/sev-snp-schema.d.ts +0 -22
- package/dist/sgx-native-module/sev-snp-schema.js +0 -24
- package/dist/sgx-native-module/sev-snp.d.ts +0 -126
- package/dist/sgx-native-module/sev-snp.js +0 -491
- package/dto/src/AmdSevSnp.proto +0 -31
- package/dto/src/Compression.proto +0 -11
- package/dto/src/Hash.proto +0 -6
- package/dto/src/OrderReport.proto +0 -21
- package/dto/src/TRI.proto +0 -22
- package/dto/src/TeeDeviceInfo.proto +0 -46
|
@@ -1,323 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
-
if (k2 === undefined) k2 = k;
|
|
4
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
-
}
|
|
8
|
-
Object.defineProperty(o, k2, desc);
|
|
9
|
-
}) : (function(o, m, k, k2) {
|
|
10
|
-
if (k2 === undefined) k2 = k;
|
|
11
|
-
o[k2] = m[k];
|
|
12
|
-
}));
|
|
13
|
-
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
-
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
-
}) : function(o, v) {
|
|
16
|
-
o["default"] = v;
|
|
17
|
-
});
|
|
18
|
-
var __importStar = (this && this.__importStar) || function (mod) {
|
|
19
|
-
if (mod && mod.__esModule) return mod;
|
|
20
|
-
var result = {};
|
|
21
|
-
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
22
|
-
__setModuleDefault(result, mod);
|
|
23
|
-
return result;
|
|
24
|
-
};
|
|
25
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
26
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
27
|
-
};
|
|
28
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
29
|
-
exports.SNPMrEnclaveCalculator = void 0;
|
|
30
|
-
const typebox_1 = require("@sinclair/typebox");
|
|
31
|
-
const value_1 = require("@sinclair/typebox/value");
|
|
32
|
-
const fs = __importStar(require("fs"));
|
|
33
|
-
const fsAsync = __importStar(require("fs/promises"));
|
|
34
|
-
const path = __importStar(require("path"));
|
|
35
|
-
const os = __importStar(require("os"));
|
|
36
|
-
const sev_snp_1 = require("./sev-snp");
|
|
37
|
-
const axios_1 = __importDefault(require("axios"));
|
|
38
|
-
const sdk_js_1 = require("@super-protocol/sdk-js");
|
|
39
|
-
const dto_js_1 = require("@super-protocol/dto-js");
|
|
40
|
-
const crypto_1 = require("crypto");
|
|
41
|
-
const stream_1 = require("stream");
|
|
42
|
-
const helpers_1 = require("./helpers");
|
|
43
|
-
const amd_sev_snp_napi_rs_1 = require("../../bindings/amd-sev-snp-napi-rs/");
|
|
44
|
-
const VMJsonSchema = typebox_1.Type.Object({
|
|
45
|
-
kernel: typebox_1.Type.Object({ sha256: typebox_1.Type.String() }),
|
|
46
|
-
initrd: typebox_1.Type.Optional(typebox_1.Type.Object({ sha256: typebox_1.Type.String() })),
|
|
47
|
-
bios_amd: typebox_1.Type.Optional(typebox_1.Type.Object({
|
|
48
|
-
sha256: typebox_1.Type.String(),
|
|
49
|
-
bucket: typebox_1.Type.String(),
|
|
50
|
-
prefix: typebox_1.Type.String(),
|
|
51
|
-
filename: typebox_1.Type.String(),
|
|
52
|
-
})),
|
|
53
|
-
bios: typebox_1.Type.Optional(typebox_1.Type.Object({
|
|
54
|
-
sha256: typebox_1.Type.String(),
|
|
55
|
-
bucket: typebox_1.Type.String(),
|
|
56
|
-
prefix: typebox_1.Type.String(),
|
|
57
|
-
filename: typebox_1.Type.String(),
|
|
58
|
-
})),
|
|
59
|
-
});
|
|
60
|
-
class VMConfigCache {
|
|
61
|
-
constructor(ttl = 5 * 60 * 1000) {
|
|
62
|
-
this.cache = {};
|
|
63
|
-
this.ttl = ttl;
|
|
64
|
-
}
|
|
65
|
-
set(key, value) {
|
|
66
|
-
const timestamp = Date.now();
|
|
67
|
-
this.cache[key] = {
|
|
68
|
-
value,
|
|
69
|
-
timestamp,
|
|
70
|
-
};
|
|
71
|
-
}
|
|
72
|
-
get(key, force = false) {
|
|
73
|
-
const record = this.cache[key];
|
|
74
|
-
if (record) {
|
|
75
|
-
if (force === false) {
|
|
76
|
-
const now = Date.now();
|
|
77
|
-
if (now - record.timestamp > this.ttl) {
|
|
78
|
-
return null;
|
|
79
|
-
}
|
|
80
|
-
}
|
|
81
|
-
return record.value;
|
|
82
|
-
}
|
|
83
|
-
return null;
|
|
84
|
-
}
|
|
85
|
-
clear() {
|
|
86
|
-
this.cache = {};
|
|
87
|
-
}
|
|
88
|
-
}
|
|
89
|
-
class SNPMrEnclaveCalculator {
|
|
90
|
-
constructor(config) {
|
|
91
|
-
this.axiosInstance = axios_1.default.create();
|
|
92
|
-
this.defaultCredentials = {
|
|
93
|
-
storageType: dto_js_1.StorageType.S3,
|
|
94
|
-
credentials: {
|
|
95
|
-
endpoint: "https://gateway.storjshare.io",
|
|
96
|
-
accessKeyId: "jxekrow2wxmjps6pr2jv22hamtha",
|
|
97
|
-
secretKey: "jztnpl532njcljtdolnpbszq66lgqmwmgkbh747342hwc72grkohi",
|
|
98
|
-
// prefix and bucket can be any, as it will be filled later
|
|
99
|
-
bucket: "",
|
|
100
|
-
prefix: "",
|
|
101
|
-
},
|
|
102
|
-
};
|
|
103
|
-
this.cacheFolder = config.cacheFolder || fs.mkdtempSync(path.join(os.tmpdir(), "snp-mrenclave-cache-"));
|
|
104
|
-
const rmPrevCache = config.rmPrevCache ?? false;
|
|
105
|
-
this.vmRepoOwner = config.vmRepoOwner || "Super-Protocol";
|
|
106
|
-
this.vmRepo = config.vmRepo || "sp-vm";
|
|
107
|
-
this.releaseAsset = config.releaseAsset || "vm.json";
|
|
108
|
-
this.retryInterval = config.downloadAssetRetryInterval ?? 1000;
|
|
109
|
-
this.retryMax = config.downloadAssetRetryMax ?? 3;
|
|
110
|
-
this.storageAccess = config.storageAccess ?? this.defaultCredentials;
|
|
111
|
-
const cacheRecordsTTL = config.cacheRecordsTTL ?? 5 * 60 * 1000;
|
|
112
|
-
if (rmPrevCache) {
|
|
113
|
-
(0, helpers_1.gramineCompatibleRmDir)(this.cacheFolder);
|
|
114
|
-
}
|
|
115
|
-
if (!fs.existsSync(this.cacheFolder)) {
|
|
116
|
-
fs.mkdirSync(this.cacheFolder, { recursive: true });
|
|
117
|
-
}
|
|
118
|
-
this.vmInfoCache = new VMConfigCache(cacheRecordsTTL);
|
|
119
|
-
}
|
|
120
|
-
/**
|
|
121
|
-
* The method allows to obtain expected mrenclave if the virtual machine for which the report is
|
|
122
|
-
* submitted was running on one core and a Milan processor
|
|
123
|
-
* @param report - @see CalcSnpMrEnclaveParams
|
|
124
|
-
*/
|
|
125
|
-
async getSingleCoreMrEnclave(report) {
|
|
126
|
-
const mrEnclave = await sev_snp_1.SevSNP.getMrEnclave(Buffer.from(report.rawReport));
|
|
127
|
-
const vmMeasure = await this.downloadVM(report.build);
|
|
128
|
-
const expectedMrEnclave = await sev_snp_1.SevSNP.calcSnpMrEnclave({
|
|
129
|
-
ovmfPath: vmMeasure.ovmfFilePath,
|
|
130
|
-
kernelHash: vmMeasure.kernelHash,
|
|
131
|
-
initrdHash: vmMeasure.initrdHash,
|
|
132
|
-
cmdLineHash: Buffer.from(report.cmdLineHash),
|
|
133
|
-
vcpuSig: report.cpuSig,
|
|
134
|
-
vcpuCount: report.cores,
|
|
135
|
-
vmpl: await (0, amd_sev_snp_napi_rs_1.getReportVmpl)(Buffer.from(report.rawReport)),
|
|
136
|
-
policy: await (0, amd_sev_snp_napi_rs_1.getReportPolicy)(Buffer.from(report.rawReport)),
|
|
137
|
-
});
|
|
138
|
-
if (!mrEnclave.equals(expectedMrEnclave))
|
|
139
|
-
throw new Error(`Expected mrEnclave does not match the calculated one.\n` +
|
|
140
|
-
`mrEnclave: ${mrEnclave.toString("hex")}\n` +
|
|
141
|
-
`expectedMrEnclave: ${expectedMrEnclave.toString("hex")}\n` +
|
|
142
|
-
`report.build: ${report.build}\n` +
|
|
143
|
-
`vmMeasure: ${JSON.stringify(vmMeasure)}`);
|
|
144
|
-
const singleCoreMrEnclave = await sev_snp_1.SevSNP.calcSnpMrEnclave({
|
|
145
|
-
ovmfPath: vmMeasure.ovmfFilePath,
|
|
146
|
-
kernelHash: vmMeasure.kernelHash,
|
|
147
|
-
initrdHash: vmMeasure.initrdHash,
|
|
148
|
-
cmdLineHash: Buffer.from(report.cmdLineHash),
|
|
149
|
-
vcpuSig: sev_snp_1.SevSNP.getCpuSig(sev_snp_1.AMD_EPYC_MILAN_CPUINFO),
|
|
150
|
-
vcpuCount: 1,
|
|
151
|
-
});
|
|
152
|
-
return singleCoreMrEnclave;
|
|
153
|
-
}
|
|
154
|
-
async downloadAsset(assetUrl) {
|
|
155
|
-
const { retryInterval, retryMax } = this;
|
|
156
|
-
const response = await sdk_js_1.helpers.tryWithInterval({
|
|
157
|
-
checkResult(response) {
|
|
158
|
-
return { isResultOk: response.status === 200 };
|
|
159
|
-
},
|
|
160
|
-
handler: async () => {
|
|
161
|
-
return this.axiosInstance.get(assetUrl, {
|
|
162
|
-
responseType: "arraybuffer",
|
|
163
|
-
});
|
|
164
|
-
},
|
|
165
|
-
checkError(err) {
|
|
166
|
-
if (axios_1.default.isAxiosError(err) && err.response) {
|
|
167
|
-
const status = err.response.status;
|
|
168
|
-
return { retryable: status < 400 || status >= 500 || status === 429 };
|
|
169
|
-
}
|
|
170
|
-
return { retryable: axios_1.default.isAxiosError(err) };
|
|
171
|
-
},
|
|
172
|
-
retryInterval,
|
|
173
|
-
retryMax,
|
|
174
|
-
});
|
|
175
|
-
return response.data;
|
|
176
|
-
}
|
|
177
|
-
extractVMData(data) {
|
|
178
|
-
const vmRaw = data.toString("utf-8");
|
|
179
|
-
const parsed = JSON.parse(vmRaw);
|
|
180
|
-
const { isValid } = (0, sdk_js_1.validateBySchema)(parsed, VMJsonSchema);
|
|
181
|
-
if (!isValid) {
|
|
182
|
-
const validationErrors = Array.from(value_1.Value.Errors(VMJsonSchema, parsed));
|
|
183
|
-
if (validationErrors.length > 0) {
|
|
184
|
-
throw new Error(`Failed to validate VM JSON: ${validationErrors.map((e) => e.message).join(", ")}`);
|
|
185
|
-
}
|
|
186
|
-
}
|
|
187
|
-
const vm = parsed;
|
|
188
|
-
const kernelHash = vm.kernel.sha256;
|
|
189
|
-
const initrdHash = vm.initrd?.sha256;
|
|
190
|
-
const OVMF = vm.bios_amd || vm.bios;
|
|
191
|
-
if (!OVMF) {
|
|
192
|
-
throw new Error("Neither bios_amd nor bios is available");
|
|
193
|
-
}
|
|
194
|
-
const { sha256, bucket, prefix, filename } = OVMF;
|
|
195
|
-
if (!sha256 || !bucket || !prefix || !filename) {
|
|
196
|
-
throw new Error("Missing one or more required fields in OVMF");
|
|
197
|
-
}
|
|
198
|
-
return {
|
|
199
|
-
kernelHash: Buffer.from(kernelHash, "hex"),
|
|
200
|
-
initrdHash: initrdHash ? Buffer.from(initrdHash, "hex") : undefined,
|
|
201
|
-
ovmfHash: Buffer.from(sha256, "hex"),
|
|
202
|
-
ovmfBucket: bucket,
|
|
203
|
-
ovmfPrefix: prefix,
|
|
204
|
-
ovmfFilename: filename,
|
|
205
|
-
};
|
|
206
|
-
}
|
|
207
|
-
static calcHashStream(alg = "sha256") {
|
|
208
|
-
const hash = (0, crypto_1.createHash)(alg);
|
|
209
|
-
return {
|
|
210
|
-
process: new stream_1.Transform({
|
|
211
|
-
transform: (data, encoding, done) => {
|
|
212
|
-
hash.update(data);
|
|
213
|
-
done(null, data);
|
|
214
|
-
},
|
|
215
|
-
}),
|
|
216
|
-
get: () => hash.digest(),
|
|
217
|
-
};
|
|
218
|
-
}
|
|
219
|
-
static async fileExist(filePath) {
|
|
220
|
-
try {
|
|
221
|
-
await fsAsync.access(filePath, fs.constants.F_OK);
|
|
222
|
-
return true;
|
|
223
|
-
}
|
|
224
|
-
catch (err) {
|
|
225
|
-
return false;
|
|
226
|
-
}
|
|
227
|
-
}
|
|
228
|
-
async getAssetUrl(build) {
|
|
229
|
-
const { retryInterval, retryMax } = this;
|
|
230
|
-
const response = await sdk_js_1.helpers.tryWithInterval({
|
|
231
|
-
checkResult(response) {
|
|
232
|
-
return { isResultOk: response.status === 200 };
|
|
233
|
-
},
|
|
234
|
-
handler: async () => {
|
|
235
|
-
return this.axiosInstance.get(`https://api.github.com/repos/${this.vmRepoOwner}/${this.vmRepo}/releases/tags/${build}`);
|
|
236
|
-
},
|
|
237
|
-
checkError(err) {
|
|
238
|
-
if (axios_1.default.isAxiosError(err) && err.response) {
|
|
239
|
-
const status = err.response.status;
|
|
240
|
-
return { retryable: status < 400 || status >= 500 || status === 429 };
|
|
241
|
-
}
|
|
242
|
-
return { retryable: axios_1.default.isAxiosError(err) };
|
|
243
|
-
},
|
|
244
|
-
retryInterval,
|
|
245
|
-
retryMax,
|
|
246
|
-
});
|
|
247
|
-
const { data } = response;
|
|
248
|
-
const asset = data.assets.find((asset) => asset.name === this.releaseAsset);
|
|
249
|
-
if (!asset) {
|
|
250
|
-
throw new Error(`Failed to find asset named ${this.releaseAsset} for build ${build}.`);
|
|
251
|
-
}
|
|
252
|
-
return asset.browser_download_url;
|
|
253
|
-
}
|
|
254
|
-
async downloadVM(build) {
|
|
255
|
-
let fromCache = false;
|
|
256
|
-
let vmFiles;
|
|
257
|
-
const vmInfo = this.vmInfoCache.get(build);
|
|
258
|
-
if (vmInfo) {
|
|
259
|
-
fromCache = true;
|
|
260
|
-
vmFiles = vmInfo;
|
|
261
|
-
}
|
|
262
|
-
else {
|
|
263
|
-
try {
|
|
264
|
-
const assetUrl = await this.getAssetUrl(build);
|
|
265
|
-
const vm = await this.downloadAsset(assetUrl);
|
|
266
|
-
vmFiles = this.extractVMData(vm);
|
|
267
|
-
}
|
|
268
|
-
catch (error) {
|
|
269
|
-
const vmInfo = this.vmInfoCache.get(build, true);
|
|
270
|
-
if (vmInfo) {
|
|
271
|
-
fromCache = true;
|
|
272
|
-
vmFiles = vmInfo;
|
|
273
|
-
}
|
|
274
|
-
else {
|
|
275
|
-
throw error;
|
|
276
|
-
}
|
|
277
|
-
}
|
|
278
|
-
}
|
|
279
|
-
const ovmfPath = path.join(this.cacheFolder, `${vmFiles.ovmfHash.toString("hex")}_OVMF.fd`);
|
|
280
|
-
let fileExistAndCorrect = false;
|
|
281
|
-
if (await SNPMrEnclaveCalculator.fileExist(ovmfPath)) {
|
|
282
|
-
const fileStream = fs.createReadStream(ovmfPath);
|
|
283
|
-
const hash = await sdk_js_1.Crypto.createHash(fileStream, {
|
|
284
|
-
algo: dto_js_1.HashAlgorithm.SHA256,
|
|
285
|
-
encoding: dto_js_1.Encoding.hex,
|
|
286
|
-
});
|
|
287
|
-
if (vmFiles.ovmfHash.toString("hex") === hash.hash) {
|
|
288
|
-
fileExistAndCorrect = true;
|
|
289
|
-
}
|
|
290
|
-
}
|
|
291
|
-
if (fileExistAndCorrect !== true) {
|
|
292
|
-
await this.downloadOvmf(vmFiles, ovmfPath);
|
|
293
|
-
}
|
|
294
|
-
if (fromCache !== true) {
|
|
295
|
-
this.vmInfoCache.set(build, vmFiles);
|
|
296
|
-
}
|
|
297
|
-
return {
|
|
298
|
-
initrdHash: vmFiles.initrdHash,
|
|
299
|
-
kernelHash: vmFiles.kernelHash,
|
|
300
|
-
ovmfFilePath: ovmfPath,
|
|
301
|
-
ovmfHash: vmFiles.ovmfHash,
|
|
302
|
-
};
|
|
303
|
-
}
|
|
304
|
-
async downloadOvmf(vmFiles, ovmfPath) {
|
|
305
|
-
const access = {
|
|
306
|
-
...this.storageAccess,
|
|
307
|
-
credentials: {
|
|
308
|
-
...this.storageAccess.credentials,
|
|
309
|
-
bucket: vmFiles.ovmfBucket,
|
|
310
|
-
prefix: vmFiles.ovmfPrefix.endsWith("/") ? vmFiles.ovmfPrefix : `${vmFiles.ovmfPrefix}/`,
|
|
311
|
-
},
|
|
312
|
-
};
|
|
313
|
-
const storageProvider = (0, sdk_js_1.getStorageProvider)(access);
|
|
314
|
-
const downloaderStream = await storageProvider.downloadFile(vmFiles.ovmfFilename, {});
|
|
315
|
-
const { process: hashStream, get: getStreamHash } = SNPMrEnclaveCalculator.calcHashStream("sha256");
|
|
316
|
-
await stream_1.promises.pipeline(downloaderStream, hashStream, fs.createWriteStream(ovmfPath));
|
|
317
|
-
if (!vmFiles.ovmfHash.equals(getStreamHash())) {
|
|
318
|
-
throw new Error("The downloaded OVMF-file does not match the expected checksum");
|
|
319
|
-
}
|
|
320
|
-
}
|
|
321
|
-
}
|
|
322
|
-
exports.SNPMrEnclaveCalculator = SNPMrEnclaveCalculator;
|
|
323
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"sev-snp-mrenclave.js","sourceRoot":"","sources":["../../src/sgx-native-module/sev-snp-mrenclave.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,+CAAiD;AACjD,mDAAgD;AAChD,uCAAyB;AACzB,qDAAuC;AACvC,2CAA6B;AAC7B,uCAAyB;AACzB,uCAA2D;AAC3D,kDAA6C;AAC7C,mDAMgC;AAChC,mDAA8E;AAC9E,mCAAoC;AACpC,mCAA6C;AAC7C,uCAAmD;AAEnD,6EAAqF;AAkBrF,MAAM,YAAY,GAAG,cAAI,CAAC,MAAM,CAAC;IAC7B,MAAM,EAAE,cAAI,CAAC,MAAM,CAAC,EAAE,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE,EAAE,CAAC;IAC9C,MAAM,EAAE,cAAI,CAAC,QAAQ,CAAC,cAAI,CAAC,MAAM,CAAC,EAAE,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC;IAC7D,QAAQ,EAAE,cAAI,CAAC,QAAQ,CACnB,cAAI,CAAC,MAAM,CAAC;QACR,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,QAAQ,EAAE,cAAI,CAAC,MAAM,EAAE;KAC1B,CAAC,CACL;IACD,IAAI,EAAE,cAAI,CAAC,QAAQ,CACf,cAAI,CAAC,MAAM,CAAC;QACR,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,QAAQ,EAAE,cAAI,CAAC,MAAM,EAAE;KAC1B,CAAC,CACL;CACJ,CAAC,CAAC;AAGH,MAAM,aAAa;IAIf,YAAY,MAAc,CAAC,GAAG,EAAE,GAAG,IAAI;QAH/B,UAAK,GAA8D,EAAE,CAAC;QAI1E,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;IACnB,CAAC;IAED,GAAG,CAAC,GAAW,EAAE,KAAe;QAC5B,MAAM,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAC7B,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG;YACd,KAAK;YACL,SAAS;SACZ,CAAC;IACN,CAAC;IAED,GAAG,CAAC,GAAW,EAAE,QAAiB,KAAK;QACnC,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QAE/B,IAAI,MAAM,EAAE,CAAC;YACT,IAAI,KAAK,KAAK,KAAK,EAAE,CAAC;gBAClB,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;gBACvB,IAAI,GAAG,GAAG,MAAM,CAAC,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;oBACpC,OAAO,IAAI,CAAC;gBAChB,CAAC;YACL,CAAC;YAED,OAAO,MAAM,CAAC,KAAK,CAAC;QACxB,CAAC;QAED,OAAO,IAAI,CAAC;IAChB,CAAC;IAED,KAAK;QACD,IAAI,CAAC,KAAK,GAAG,EAAE,CAAC;IACpB,CAAC;CACJ;AAcD,MAAa,sBAAsB;IAsB/B,YAAY,MAAkC;QAjB7B,kBAAa,GAAG,eAAK,CAAC,MAAM,EAAE,CAAC;QAK/B,uBAAkB,GAAkB;YACjD,WAAW,EAAE,oBAAW,CAAC,EAAE;YAC3B,WAAW,EAAE;gBACT,QAAQ,EAAE,+BAA+B;gBACzC,WAAW,EAAE,8BAA8B;gBAC3C,SAAS,EAAE,uDAAuD;gBAClE,2DAA2D;gBAC3D,MAAM,EAAE,EAAE;gBACV,MAAM,EAAE,EAAE;aACb;SACJ,CAAC;QAGE,IAAI,CAAC,WAAW,GAAG,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,MAAM,EAAE,EAAE,sBAAsB,CAAC,CAAC,CAAC;QACxG,MAAM,WAAW,GAAG,MAAM,CAAC,WAAW,IAAI,KAAK,CAAC;QAChD,IAAI,CAAC,WAAW,GAAG,MAAM,CAAC,WAAW,IAAI,gBAAgB,CAAC;QAC1D,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC,MAAM,IAAI,OAAO,CAAC;QACvC,IAAI,CAAC,YAAY,GAAG,MAAM,CAAC,YAAY,IAAI,SAAS,CAAC;QACrD,IAAI,CAAC,aAAa,GAAG,MAAM,CAAC,0BAA0B,IAAI,IAAI,CAAC;QAC/D,IAAI,CAAC,QAAQ,GAAG,MAAM,CAAC,qBAAqB,IAAI,CAAC,CAAC;QAElD,IAAI,CAAC,aAAa,GAAG,MAAM,CAAC,aAAa,IAAI,IAAI,CAAC,kBAAkB,CAAC;QAErE,MAAM,eAAe,GAAG,MAAM,CAAC,eAAe,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC;QAEhE,IAAI,WAAW,EAAE,CAAC;YACd,IAAA,gCAAsB,EAAC,IAAI,CAAC,WAAW,CAAC,CAAC;QAC7C,CAAC;QAED,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC;YACnC,EAAE,CAAC,SAAS,CAAC,IAAI,CAAC,WAAW,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QACxD,CAAC;QAED,IAAI,CAAC,WAAW,GAAG,IAAI,aAAa,CAAC,eAAe,CAAC,CAAC;IAC1D,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,sBAAsB,CAAC,MAAiB;QACjD,MAAM,SAAS,GAAG,MAAM,gBAAM,CAAC,YAAY,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,CAAC;QAC3E,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;QACtD,MAAM,iBAAiB,GAAG,MAAM,gBAAM,CAAC,gBAAgB,CAAC;YACpD,QAAQ,EAAE,SAAS,CAAC,YAAY;YAChC,UAAU,EAAE,SAAS,CAAC,UAAU;YAChC,UAAU,EAAE,SAAS,CAAC,UAAU;YAChC,WAAW,EAAE,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC;YAC5C,OAAO,EAAE,MAAM,CAAC,MAAM;YACtB,SAAS,EAAE,MAAM,CAAC,KAAK;YACvB,IAAI,EAAE,MAAM,IAAA,mCAAa,EAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;YACxD,MAAM,EAAE,MAAM,IAAA,qCAAe,EAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;SAC/D,CAAC,CAAC;QAEH,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,iBAAiB,CAAC;YACpC,MAAM,IAAI,KAAK,CACX,yDAAyD;gBACrD,cAAc,SAAS,CAAC,QAAQ,CAAC,KAAK,CAAC,IAAI;gBAC3C,sBAAsB,iBAAiB,CAAC,QAAQ,CAAC,KAAK,CAAC,IAAI;gBAC3D,iBAAiB,MAAM,CAAC,KAAK,IAAI;gBACjC,cAAc,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,EAAE,CAChD,CAAC;QAEN,MAAM,mBAAmB,GAAG,MAAM,gBAAM,CAAC,gBAAgB,CAAC;YACtD,QAAQ,EAAE,SAAS,CAAC,YAAY;YAChC,UAAU,EAAE,SAAS,CAAC,UAAU;YAChC,UAAU,EAAE,SAAS,CAAC,UAAU;YAChC,WAAW,EAAE,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC;YAC5C,OAAO,EAAE,gBAAM,CAAC,SAAS,CAAC,gCAAsB,CAAC;YACjD,SAAS,EAAE,CAAC;SACf,CAAC,CAAC;QAEH,OAAO,mBAAmB,CAAC;IAC/B,CAAC;IAES,KAAK,CAAC,aAAa,CAAC,QAAgB;QAC1C,MAAM,EAAE,aAAa,EAAE,QAAQ,EAAE,GAAG,IAAI,CAAC;QACzC,MAAM,QAAQ,GAAG,MAAM,gBAAU,CAAC,eAAe,CAAgB;YAC7D,WAAW,CAAC,QAAQ;gBAChB,OAAO,EAAE,UAAU,EAAE,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE,CAAC;YACnD,CAAC;YACD,OAAO,EAAE,KAAK,IAAI,EAAE;gBAChB,OAAO,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,QAAQ,EAAE;oBACpC,YAAY,EAAE,aAAa;iBAC9B,CAAC,CAAC;YACP,CAAC;YACD,UAAU,CAAC,GAAG;gBACV,IAAI,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,IAAI,GAAG,CAAC,QAAQ,EAAE,CAAC;oBAC1C,MAAM,MAAM,GAAG,GAAG,CAAC,QAAQ,CAAC,MAAM,CAAC;oBAEnC,OAAO,EAAE,SAAS,EAAE,MAAM,GAAG,GAAG,IAAI,MAAM,IAAI,GAAG,IAAI,MAAM,KAAK,GAAG,EAAE,CAAC;gBAC1E,CAAC;gBAED,OAAO,EAAE,SAAS,EAAE,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,EAAE,CAAC;YAClD,CAAC;YACD,aAAa;YACb,QAAQ;SACX,CAAC,CAAC;QAEH,OAAO,QAAQ,CAAC,IAAI,CAAC;IACzB,CAAC;IAES,aAAa,CAAC,IAAY;QAChC,MAAM,KAAK,GAAG,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;QAErC,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;QACjC,MAAM,EAAE,OAAO,EAAE,GAAG,IAAA,yBAAgB,EAAC,MAAM,EAAE,YAAY,CAAC,CAAC;QAC3D,IAAI,CAAC,OAAO,EAAE,CAAC;YACX,MAAM,gBAAgB,GAAG,KAAK,CAAC,IAAI,CAAC,aAAK,CAAC,MAAM,CAAC,YAAY,EAAE,MAAM,CAAC,CAAC,CAAC;YACxE,IAAI,gBAAgB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC9B,MAAM,IAAI,KAAK,CAAC,+BAA+B,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;YACxG,CAAC;QACL,CAAC;QAED,MAAM,EAAE,GAAG,MAAgB,CAAC;QAE5B,MAAM,UAAU,GAAG,EAAE,CAAC,MAAM,CAAC,MAAM,CAAC;QACpC,MAAM,UAAU,GAAG,EAAE,CAAC,MAAM,EAAE,MAAM,CAAC;QAErC,MAAM,IAAI,GAAG,EAAE,CAAC,QAAQ,IAAI,EAAE,CAAC,IAAI,CAAC;QACpC,IAAI,CAAC,IAAI,EAAE,CAAC;YACR,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;QAC9D,CAAC;QAED,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,QAAQ,EAAE,GAAG,IAAI,CAAC;QAElD,IAAI,CAAC,MAAM,IAAI,CAAC,MAAM,IAAI,CAAC,MAAM,IAAI,CAAC,QAAQ,EAAE,CAAC;YAC7C,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;QACnE,CAAC;QAED,OAAO;YACH,UAAU,EAAE,MAAM,CAAC,IAAI,CAAC,UAAU,EAAE,KAAK,CAAC;YAC1C,UAAU,EAAE,UAAU,CAAC,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS;YACnE,QAAQ,EAAE,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,KAAK,CAAC;YACpC,UAAU,EAAE,MAAM;YAClB,UAAU,EAAE,MAAM;YAClB,YAAY,EAAE,QAAQ;SACzB,CAAC;IACN,CAAC;IAES,MAAM,CAAC,cAAc,CAAC,GAAG,GAAG,QAAQ;QAC1C,MAAM,IAAI,GAAG,IAAA,mBAAU,EAAC,GAAG,CAAC,CAAC;QAE7B,OAAO;YACH,OAAO,EAAE,IAAI,kBAAS,CAAC;gBACnB,SAAS,EAAE,CAAC,IAAI,EAAE,QAAQ,EAAE,IAAI,EAAQ,EAAE;oBACtC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;oBAClB,IAAI,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;gBACrB,CAAC;aACJ,CAAC;YACF,GAAG,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,MAAM,EAAE;SAC3B,CAAC;IACN,CAAC;IAES,MAAM,CAAC,KAAK,CAAC,SAAS,CAAC,QAAgB;QAC7C,IAAI,CAAC;YACD,MAAM,OAAO,CAAC,MAAM,CAAC,QAAQ,EAAE,EAAE,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC;YAElD,OAAO,IAAI,CAAC;QAChB,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACX,OAAO,KAAK,CAAC;QACjB,CAAC;IACL,CAAC;IAES,KAAK,CAAC,WAAW,CAAC,KAAa;QACrC,MAAM,EAAE,aAAa,EAAE,QAAQ,EAAE,GAAG,IAAI,CAAC;QACzC,MAAM,QAAQ,GAAG,MAAM,gBAAU,CAAC,eAAe,CAAgB;YAC7D,WAAW,CAAC,QAAQ;gBAChB,OAAO,EAAE,UAAU,EAAE,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE,CAAC;YACnD,CAAC;YACD,OAAO,EAAE,KAAK,IAAI,EAAE;gBAChB,OAAO,IAAI,CAAC,aAAa,CAAC,GAAG,CACzB,gCAAgC,IAAI,CAAC,WAAW,IAAI,IAAI,CAAC,MAAM,kBAAkB,KAAK,EAAE,CAC3F,CAAC;YACN,CAAC;YACD,UAAU,CAAC,GAAG;gBACV,IAAI,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,IAAI,GAAG,CAAC,QAAQ,EAAE,CAAC;oBAC1C,MAAM,MAAM,GAAG,GAAG,CAAC,QAAQ,CAAC,MAAM,CAAC;oBAEnC,OAAO,EAAE,SAAS,EAAE,MAAM,GAAG,GAAG,IAAI,MAAM,IAAI,GAAG,IAAI,MAAM,KAAK,GAAG,EAAE,CAAC;gBAC1E,CAAC;gBAED,OAAO,EAAE,SAAS,EAAE,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,EAAE,CAAC;YAClD,CAAC;YACD,aAAa;YACb,QAAQ;SACX,CAAC,CAAC;QACH,MAAM,EAAE,IAAI,EAAE,GAAG,QAAQ,CAAC;QAC1B,MAAM,KAAK,GAAG,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAuB,EAAE,EAAE,CAAC,KAAK,CAAC,IAAI,KAAK,IAAI,CAAC,YAAY,CAAC,CAAC;QAE9F,IAAI,CAAC,KAAK,EAAE,CAAC;YACT,MAAM,IAAI,KAAK,CAAC,8BAA8B,IAAI,CAAC,YAAY,cAAc,KAAK,GAAG,CAAC,CAAC;QAC3F,CAAC;QAED,OAAO,KAAK,CAAC,oBAAoB,CAAC;IACtC,CAAC;IAES,KAAK,CAAC,UAAU,CAAC,KAAa;QACpC,IAAI,SAAS,GAAG,KAAK,CAAC;QACtB,IAAI,OAAiB,CAAC;QAEtB,MAAM,MAAM,GAAG,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC;QAC3C,IAAI,MAAM,EAAE,CAAC;YACT,SAAS,GAAG,IAAI,CAAC;YACjB,OAAO,GAAG,MAAM,CAAC;QACrB,CAAC;aAAM,CAAC;YACJ,IAAI,CAAC;gBACD,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,KAAK,CAAC,CAAC;gBAC/C,MAAM,EAAE,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,CAAC;gBAC9C,OAAO,GAAG,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,CAAC;YACrC,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACb,MAAM,MAAM,GAAG,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;gBACjD,IAAI,MAAM,EAAE,CAAC;oBACT,SAAS,GAAG,IAAI,CAAC;oBACjB,OAAO,GAAG,MAAM,CAAC;gBACrB,CAAC;qBAAM,CAAC;oBACJ,MAAM,KAAK,CAAC;gBAChB,CAAC;YACL,CAAC;QACL,CAAC;QAED,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,GAAG,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC;QAE5F,IAAI,mBAAmB,GAAG,KAAK,CAAC;QAChC,IAAI,MAAM,sBAAsB,CAAC,SAAS,CAAC,QAAQ,CAAC,EAAE,CAAC;YACnD,MAAM,UAAU,GAAG,EAAE,CAAC,gBAAgB,CAAC,QAAQ,CAAC,CAAC;YACjD,MAAM,IAAI,GAAG,MAAM,eAAM,CAAC,UAAU,CAAC,UAAU,EAAE;gBAC7C,IAAI,EAAE,sBAAa,CAAC,MAAM;gBAC1B,QAAQ,EAAE,iBAAQ,CAAC,GAAG;aACzB,CAAC,CAAC;YAEH,IAAI,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC,KAAK,CAAC,KAAK,IAAI,CAAC,IAAI,EAAE,CAAC;gBACjD,mBAAmB,GAAG,IAAI,CAAC;YAC/B,CAAC;QACL,CAAC;QAED,IAAI,mBAAmB,KAAK,IAAI,EAAE,CAAC;YAC/B,MAAM,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;QAC/C,CAAC;QAED,IAAI,SAAS,KAAK,IAAI,EAAE,CAAC;YACrB,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;QACzC,CAAC;QAED,OAAO;YACH,UAAU,EAAE,OAAO,CAAC,UAAU;YAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;YAC9B,YAAY,EAAE,QAAQ;YACtB,QAAQ,EAAE,OAAO,CAAC,QAAQ;SAC7B,CAAC;IACN,CAAC;IAES,KAAK,CAAC,YAAY,CAAC,OAAiB,EAAE,QAAgB;QAC5D,MAAM,MAAM,GAAkB;YAC1B,GAAG,IAAI,CAAC,aAAa;YACrB,WAAW,EAAE;gBACT,GAAG,IAAI,CAAC,aAAa,CAAC,WAAW;gBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;gBAC1B,MAAM,EAAE,OAAO,CAAC,UAAU,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC,GAAG,OAAO,CAAC,UAAU,GAAG;aAC3F;SACJ,CAAC;QAEF,MAAM,eAAe,GAAG,IAAA,2BAAkB,EAAC,MAAM,CAAC,CAAC;QACnD,MAAM,gBAAgB,GAAG,MAAM,eAAe,CAAC,YAAY,CAAC,OAAO,CAAC,YAAY,EAAE,EAAE,CAAC,CAAC;QACtF,MAAM,EAAE,OAAO,EAAE,UAAU,EAAE,GAAG,EAAE,aAAa,EAAE,GAAG,sBAAsB,CAAC,cAAc,CAAC,QAAQ,CAAC,CAAC;QACpG,MAAM,iBAAQ,CAAC,QAAQ,CAAC,gBAAgB,EAAE,UAAU,EAAE,EAAE,CAAC,iBAAiB,CAAC,QAAQ,CAAC,CAAC,CAAC;QAEtF,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAC,aAAa,EAAE,CAAC,EAAE,CAAC;YAC5C,MAAM,IAAI,KAAK,CAAC,+DAA+D,CAAC,CAAC;QACrF,CAAC;IACL,CAAC;CACJ;AA1RD,wDA0RC"}
|
|
@@ -1,22 +0,0 @@
|
|
|
1
|
-
import { Static, TLiteral } from "@sinclair/typebox";
|
|
2
|
-
import { ImportantSecurityFields } from "../../bindings/amd-sev-snp-napi-rs";
|
|
3
|
-
export declare const CommonPolicyKeyName = "Common";
|
|
4
|
-
export declare const importantFieldNames: (keyof ImportantSecurityFields)[];
|
|
5
|
-
export declare enum RuleOperator {
|
|
6
|
-
Le = "le",
|
|
7
|
-
Eq = "eq",
|
|
8
|
-
Ge = "ge"
|
|
9
|
-
}
|
|
10
|
-
declare const PolicyRuleSchema: import("@sinclair/typebox").TObject<{
|
|
11
|
-
name: import("@sinclair/typebox").TUnion<[TLiteral<string>, ...TLiteral<string>[]]>;
|
|
12
|
-
operator: import("@sinclair/typebox").TUnion<TLiteral<RuleOperator>[]>;
|
|
13
|
-
value: import("@sinclair/typebox").TUnion<[import("@sinclair/typebox").TNumber, import("@sinclair/typebox").TBoolean]>;
|
|
14
|
-
}>;
|
|
15
|
-
export declare const PolicySetSchema: import("@sinclair/typebox").TObject<{
|
|
16
|
-
[x: string]: any;
|
|
17
|
-
}>;
|
|
18
|
-
export type PolicySet = Static<typeof PolicySetSchema>;
|
|
19
|
-
export type PolicyRule = Static<typeof PolicyRuleSchema> & {
|
|
20
|
-
name: keyof ImportantSecurityFields;
|
|
21
|
-
};
|
|
22
|
-
export {};
|
|
@@ -1,24 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.PolicySetSchema = exports.RuleOperator = exports.importantFieldNames = exports.CommonPolicyKeyName = void 0;
|
|
4
|
-
const typebox_1 = require("@sinclair/typebox");
|
|
5
|
-
const amd_sev_snp_napi_rs_1 = require("../../bindings/amd-sev-snp-napi-rs");
|
|
6
|
-
exports.CommonPolicyKeyName = "Common";
|
|
7
|
-
exports.importantFieldNames = Object.keys(amd_sev_snp_napi_rs_1.IMPORTANT_SECURITY_FIELDS_DUMMY);
|
|
8
|
-
const importantFieldLiterals = exports.importantFieldNames.map((k) => typebox_1.Type.Literal(k));
|
|
9
|
-
var RuleOperator;
|
|
10
|
-
(function (RuleOperator) {
|
|
11
|
-
RuleOperator["Le"] = "le";
|
|
12
|
-
RuleOperator["Eq"] = "eq";
|
|
13
|
-
RuleOperator["Ge"] = "ge";
|
|
14
|
-
})(RuleOperator || (exports.RuleOperator = RuleOperator = {}));
|
|
15
|
-
const PolicyRuleSchema = typebox_1.Type.Object({
|
|
16
|
-
name: typebox_1.Type.Union(importantFieldLiterals),
|
|
17
|
-
operator: typebox_1.Type.Union(Object.values(RuleOperator).map((op) => typebox_1.Type.Literal(op))),
|
|
18
|
-
value: typebox_1.Type.Union([typebox_1.Type.Number(), typebox_1.Type.Boolean()]),
|
|
19
|
-
});
|
|
20
|
-
exports.PolicySetSchema = typebox_1.Type.Partial(typebox_1.Type.Object(Object.fromEntries([
|
|
21
|
-
...Object.values(amd_sev_snp_napi_rs_1.WellKnownSnpCodeNames).map((key) => [key, typebox_1.Type.Array(PolicyRuleSchema)]),
|
|
22
|
-
[exports.CommonPolicyKeyName, typebox_1.Type.Array(PolicyRuleSchema)],
|
|
23
|
-
])), { additionalProperties: false });
|
|
24
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,126 +0,0 @@
|
|
|
1
|
-
/// <reference types="node" />
|
|
2
|
-
import { CpuInfo, ImportantSecurityFields, WellKnownSnpCodeNames } from "../../bindings/amd-sev-snp-napi-rs/";
|
|
3
|
-
import { SnpCert, SevSnpCertificateFormat, SNPReport, SNPReportWithChain } from "../proto/AmdSevSnp";
|
|
4
|
-
import { PolicySet } from "./sev-snp-schema";
|
|
5
|
-
export interface CalcSnpMrEnclaveParams {
|
|
6
|
-
ovmfPath: string;
|
|
7
|
-
kernelHash: Buffer;
|
|
8
|
-
initrdHash?: Buffer;
|
|
9
|
-
cmdLineHash: Buffer;
|
|
10
|
-
vcpuSig: number;
|
|
11
|
-
vcpuCount: number;
|
|
12
|
-
vmpl?: number;
|
|
13
|
-
policy?: bigint;
|
|
14
|
-
}
|
|
15
|
-
export declare const AMD_EPYC_MILAN_CPUINFO: CpuInfo;
|
|
16
|
-
export declare const EMPTY_INITRD_SHA256_HASH: Buffer;
|
|
17
|
-
export type ArkHashes = {
|
|
18
|
-
[key: string]: Buffer;
|
|
19
|
-
};
|
|
20
|
-
export declare function getDefaultArkHashes(): ArkHashes;
|
|
21
|
-
export declare class SevSNP {
|
|
22
|
-
static serializeSNPReport(report: SNPReportWithChain): Buffer;
|
|
23
|
-
static deserializeSNPReport(serialized: Buffer): SNPReportWithChain;
|
|
24
|
-
protected static convertCertToPem(cert: Buffer): string;
|
|
25
|
-
protected static convertPemToDer(cert: string): Buffer;
|
|
26
|
-
protected static splitCerts(certsPem: string): string[];
|
|
27
|
-
protected static readCmdLine(): Promise<string>;
|
|
28
|
-
/**
|
|
29
|
-
* Method for generation AMD SEV-SNP Report
|
|
30
|
-
* @param userData - The data that will be included in the report and will be signed
|
|
31
|
-
* @param vmpl - Optional VMPL value to pass to the firmware when requesting a report (default: 0)
|
|
32
|
-
*/
|
|
33
|
-
static generateSNPReport(userData: Buffer, vmpl?: number): Promise<SNPReport>;
|
|
34
|
-
/**
|
|
35
|
-
* Method for fetch certificates from AMD KDS
|
|
36
|
-
* @param report - report generated by the `generateSNPReport` method
|
|
37
|
-
* @param options - options for working with HTTP, allows you to configure repetitions and the interval between them,
|
|
38
|
-
* as well as the format of the returned certificates
|
|
39
|
-
*/
|
|
40
|
-
static getReportChain(report: SNPReport, options?: {
|
|
41
|
-
retryMax?: number;
|
|
42
|
-
retryInterval?: number;
|
|
43
|
-
certFormat?: SevSnpCertificateFormat;
|
|
44
|
-
}): Promise<SnpCert[]>;
|
|
45
|
-
/**
|
|
46
|
-
* Method for generation AMD SEV-SNP Report and fetching certificates
|
|
47
|
-
* @param userData - @see generateSNPReport
|
|
48
|
-
* @param options - @see getReportChain
|
|
49
|
-
*/
|
|
50
|
-
static generateSNPReportWithChain(userData: Buffer, options?: {
|
|
51
|
-
retryMax?: number;
|
|
52
|
-
retryInterval?: number;
|
|
53
|
-
certFormat?: SevSnpCertificateFormat;
|
|
54
|
-
}): Promise<SNPReportWithChain>;
|
|
55
|
-
protected static runSubProcess(binaryPath: string, args?: string[], options?: {
|
|
56
|
-
cwd?: string;
|
|
57
|
-
timeoutMs?: number;
|
|
58
|
-
}): Promise<{
|
|
59
|
-
exitCode: number;
|
|
60
|
-
stdout: string;
|
|
61
|
-
stderr: string;
|
|
62
|
-
}>;
|
|
63
|
-
static getCertHash(cert: Omit<SnpCert, "type">): Buffer;
|
|
64
|
-
protected static isValidArk(ARK: SnpCert, trustedHashes: ArkHashes): boolean;
|
|
65
|
-
/**
|
|
66
|
-
* AMD SEV-SNP verification method
|
|
67
|
-
* @param report - report with full certificate chain
|
|
68
|
-
* @param options - trustedHashes - map of trusted AMD ARK Certificates (CommonName as Key, Sha256 Hash of Der Certificate as Value) - optional
|
|
69
|
-
* timeoutMs - timeout of the utility snpnost in ms
|
|
70
|
-
* snpGuestBinaryPath - path for snpguest util
|
|
71
|
-
*/
|
|
72
|
-
static verifyReport(report: SNPReportWithChain, options?: {
|
|
73
|
-
trustedHashes?: ArkHashes;
|
|
74
|
-
timeoutMs?: number;
|
|
75
|
-
snpGuestBinaryPath?: string;
|
|
76
|
-
tmpDirTemplate?: string;
|
|
77
|
-
}): Promise<void>;
|
|
78
|
-
protected static calcMrEnclave(measure: Buffer, vmpl: number, policy: bigint): Buffer;
|
|
79
|
-
/**
|
|
80
|
-
* Method for obtaining mrEnclave from report. MrEnclave includes report measure, report vmpl and report policy
|
|
81
|
-
* @param report - report without certificates
|
|
82
|
-
*/
|
|
83
|
-
static getMrEnclave(report: Buffer): Buffer;
|
|
84
|
-
/**
|
|
85
|
-
* Method for obtaining reportData. This data was passed when generating the report
|
|
86
|
-
* @param report - report without certificates
|
|
87
|
-
*/
|
|
88
|
-
static getReportData(report: Buffer): Promise<Buffer>;
|
|
89
|
-
/**
|
|
90
|
-
* Method for obtaining measure. Please do not confuse with mrenclave. Report measure is part of mrEnclave.
|
|
91
|
-
* @param report - report without certificates
|
|
92
|
-
*/
|
|
93
|
-
static getReportMeasure(report: Buffer): Promise<Buffer>;
|
|
94
|
-
protected static calculateFileSha256(filePath: string): Promise<Buffer>;
|
|
95
|
-
protected static calculateCmdlineHash(cmdLine: string): Buffer;
|
|
96
|
-
/**
|
|
97
|
-
* The method allows to get the expected mrEnclave without generating a report
|
|
98
|
-
* @param params - @see CalcSnpMrEnclaveParams
|
|
99
|
-
*/
|
|
100
|
-
static calcSnpMrEnclave(params: CalcSnpMrEnclaveParams): Promise<Buffer>;
|
|
101
|
-
protected static extractBuildFromCmdline(cmdLine: string, paramName?: string): string;
|
|
102
|
-
/**
|
|
103
|
-
* Compute the 32-bit CPUID signature from family, model, and stepping.
|
|
104
|
-
* This computation is described in AMD's CPUID Specification, publication #25481
|
|
105
|
-
* https://www.amd.com/system/files/TechDocs/25481.pdf
|
|
106
|
-
* See section: CPUID Fn0000_0001_EAX Family, Model, Stepping Identifiers
|
|
107
|
-
* @param cpuInfo - Structure containing family, model and stepping @see CpuInfo
|
|
108
|
-
*/
|
|
109
|
-
static getCpuSig(cpuInfo: CpuInfo): number;
|
|
110
|
-
static getReportImportantSecurityFields(report: Buffer): Promise<ImportantSecurityFields>;
|
|
111
|
-
static getReportCpuInfo(report: Buffer): Promise<CpuInfo>;
|
|
112
|
-
static getCpuGeneration(cpuInfo: CpuInfo): Promise<WellKnownSnpCodeNames>;
|
|
113
|
-
/**
|
|
114
|
-
* Parse and validate policy
|
|
115
|
-
* @param input - Raw policy as json-text or object
|
|
116
|
-
*/
|
|
117
|
-
static parsePolicySet(input: string | Record<string, unknown>): PolicySet;
|
|
118
|
-
private static checkRule;
|
|
119
|
-
/**
|
|
120
|
-
* Verify SNP report against a PolicySet.
|
|
121
|
-
* Throws an error if any rule fails.
|
|
122
|
-
* @param report - SNPReport
|
|
123
|
-
* @param policySet - PolicySet containing rules
|
|
124
|
-
*/
|
|
125
|
-
static verifyPolicy(report: Buffer, policySet: PolicySet): Promise<void>;
|
|
126
|
-
}
|