@super-protocol/addons-tee 0.9.10 → 2.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (116) hide show
  1. package/bindings/nvidia-native/README.md +174 -0
  2. package/bindings/nvidia-native/package.json +26 -0
  3. package/bindings/nvidia-native/postinstall.js +40 -0
  4. package/dist/index.d.ts +1 -1
  5. package/dist/index.js +1 -28
  6. package/package.json +4 -2
  7. package/.editorconfig +0 -15
  8. package/.eslintrc.json +0 -61
  9. package/.prettierignore +0 -3
  10. package/.prettierrc +0 -15
  11. package/bindings/amd-sev-snp-napi-rs/amd-sev-snp-napi-rs.linux-x64-gnu.node +0 -0
  12. package/bindings/amd-sev-snp-napi-rs/index.d.ts +0 -51
  13. package/bindings/amd-sev-snp-napi-rs/index.js +0 -339
  14. package/bindings/amd-sev-snp-napi-rs/package-lock.json +0 -40
  15. package/bindings/sgx-native/build/Release/libmbedcrypto_gramine.so.15 +0 -0
  16. package/bindings/sgx-native/build/Release/libmbedx509_gramine.so.6 +0 -0
  17. package/bindings/sgx-native/build/Release/libsgx_dcap_quoteverify.so.1 +0 -0
  18. package/bindings/sgx-native/build/Release/libtdx_attest.so.1 +0 -0
  19. package/bindings/sgx-native/build/Release/sgx_native.node +0 -0
  20. package/bindings/sgx-native/package-lock.json +0 -23
  21. package/bindings/sp-sev/.github/auto_assign-issues.yml +0 -5
  22. package/bindings/sp-sev/.github/auto_assign.yml +0 -21
  23. package/bindings/sp-sev/.github/dependabot.yml +0 -6
  24. package/bindings/sp-sev/.github/workflows/dco.yml +0 -10
  25. package/bindings/sp-sev/.github/workflows/lint.yml +0 -56
  26. package/bindings/sp-sev/.github/workflows/test.yml +0 -215
  27. package/bindings/sp-sev/.rustfmt.toml +0 -2
  28. package/bindings/sp-sev/CODEOWNERS +0 -1
  29. package/bindings/sp-sev/Cargo.lock +0 -2461
  30. package/bindings/sp-sev/Cargo.toml +0 -80
  31. package/bindings/sp-sev/LICENSE +0 -201
  32. package/bindings/sp-sev/README.md +0 -82
  33. package/bindings/sp-sev/build.rs +0 -17
  34. package/bindings/sp-sev/docs/attestation/README.md +0 -239
  35. package/bindings/sp-sev/docs/attestation/certchain.dot +0 -14
  36. package/bindings/sp-sev/docs/attestation/certchain.dot.png +0 -0
  37. package/bindings/sp-sev/docs/attestation/prerequisites.md +0 -6
  38. package/bindings/sp-sev/docs/attestation/process.msc +0 -60
  39. package/bindings/sp-sev/docs/attestation/process.msc.png +0 -0
  40. package/bindings/sp-sev/docs/attestation/protections.md +0 -53
  41. package/bindings/sp-sev/package-version.py +0 -11
  42. package/bindings/sp-sev/tests/api.rs +0 -194
  43. package/bindings/sp-sev/tests/certs.rs +0 -142
  44. package/bindings/sp-sev/tests/certs_data/cert_chain_milan +0 -74
  45. package/bindings/sp-sev/tests/certs_data/cert_chain_turin +0 -74
  46. package/bindings/sp-sev/tests/certs_data/report_milan.hex +0 -1
  47. package/bindings/sp-sev/tests/certs_data/vcek_milan.der +0 -0
  48. package/bindings/sp-sev/tests/certs_data/vcek_turin.der +0 -0
  49. package/bindings/sp-sev/tests/guest.rs +0 -57
  50. package/bindings/sp-sev/tests/id-block.rs +0 -172
  51. package/bindings/sp-sev/tests/measurement/ovmf_AmdSev_suffix.bin +0 -0
  52. package/bindings/sp-sev/tests/measurement/ovmf_OvmfX64_suffix.bin +0 -0
  53. package/bindings/sp-sev/tests/measurement/test_auth_block.bin +0 -0
  54. package/bindings/sp-sev/tests/measurement/test_auth_key.pem +0 -6
  55. package/bindings/sp-sev/tests/measurement/test_auth_sig.bin +0 -0
  56. package/bindings/sp-sev/tests/measurement/test_id_key.pem +0 -6
  57. package/bindings/sp-sev/tests/measurement/test_id_sig.bin +0 -0
  58. package/bindings/sp-sev/tests/measurement.rs +0 -510
  59. package/bindings/sp-sev/tests/naples/ark.cert.bad +0 -0
  60. package/bindings/sp-sev/tests/naples/ark.cert.sig +0 -0
  61. package/bindings/sp-sev/tests/naples/ark.rs +0 -38
  62. package/bindings/sp-sev/tests/naples/ask.rs +0 -29
  63. package/bindings/sp-sev/tests/naples/cek.cert +0 -0
  64. package/bindings/sp-sev/tests/naples/cek.rs +0 -30
  65. package/bindings/sp-sev/tests/naples/mod.rs +0 -20
  66. package/bindings/sp-sev/tests/naples/oca.cert +0 -0
  67. package/bindings/sp-sev/tests/naples/oca.rs +0 -45
  68. package/bindings/sp-sev/tests/naples/pdh.cert +0 -0
  69. package/bindings/sp-sev/tests/naples/pdh.rs +0 -28
  70. package/bindings/sp-sev/tests/naples/pek.cert +0 -0
  71. package/bindings/sp-sev/tests/naples/pek.rs +0 -32
  72. package/bindings/sp-sev/tests/rome/ark.rs +0 -33
  73. package/bindings/sp-sev/tests/rome/ask.rs +0 -29
  74. package/bindings/sp-sev/tests/rome/cek.cert +0 -0
  75. package/bindings/sp-sev/tests/rome/cek.rs +0 -29
  76. package/bindings/sp-sev/tests/rome/mod.rs +0 -16
  77. package/bindings/sp-sev/tests/rome/oca.cert +0 -0
  78. package/bindings/sp-sev/tests/rome/oca.rs +0 -45
  79. package/bindings/sp-sev/tests/rome/pdh.cert +0 -0
  80. package/bindings/sp-sev/tests/rome/pdh.rs +0 -28
  81. package/bindings/sp-sev/tests/rome/pek.cert +0 -0
  82. package/bindings/sp-sev/tests/rome/pek.rs +0 -32
  83. package/bindings/sp-sev/tests/session.rs +0 -39
  84. package/bindings/sp-sev/tests/sev_launch.rs +0 -120
  85. package/bindings/sp-sev/tests/snp_launch.rs +0 -108
  86. package/bindings/utils/virtee/LICENSE +0 -201
  87. package/bindings/utils/virtee/libsev.so +0 -0
  88. package/bindings/utils/virtee/snpguest +0 -0
  89. package/dist/proto/AmdSevSnp.d.ts +0 -194
  90. package/dist/proto/AmdSevSnp.js +0 -363
  91. package/dist/sgx-native-module/consts.d.ts +0 -24
  92. package/dist/sgx-native-module/consts.js +0 -38
  93. package/dist/sgx-native-module/dcap-quote-verify.service.d.ts +0 -12
  94. package/dist/sgx-native-module/dcap-quote-verify.service.js +0 -84
  95. package/dist/sgx-native-module/enclave.service.d.ts +0 -93
  96. package/dist/sgx-native-module/enclave.service.js +0 -211
  97. package/dist/sgx-native-module/errors.d.ts +0 -19
  98. package/dist/sgx-native-module/errors.js +0 -69
  99. package/dist/sgx-native-module/helpers.d.ts +0 -1
  100. package/dist/sgx-native-module/helpers.js +0 -50
  101. package/dist/sgx-native-module/index.d.ts +0 -9
  102. package/dist/sgx-native-module/index.js +0 -26
  103. package/dist/sgx-native-module/pki.service.d.ts +0 -52
  104. package/dist/sgx-native-module/pki.service.js +0 -89
  105. package/dist/sgx-native-module/sev-snp-mrenclave.d.ts +0 -59
  106. package/dist/sgx-native-module/sev-snp-mrenclave.js +0 -323
  107. package/dist/sgx-native-module/sev-snp-schema.d.ts +0 -22
  108. package/dist/sgx-native-module/sev-snp-schema.js +0 -24
  109. package/dist/sgx-native-module/sev-snp.d.ts +0 -126
  110. package/dist/sgx-native-module/sev-snp.js +0 -491
  111. package/dto/src/AmdSevSnp.proto +0 -31
  112. package/dto/src/Compression.proto +0 -11
  113. package/dto/src/Hash.proto +0 -6
  114. package/dto/src/OrderReport.proto +0 -21
  115. package/dto/src/TRI.proto +0 -22
  116. package/dto/src/TeeDeviceInfo.proto +0 -46
@@ -1,491 +0,0 @@
1
- "use strict";
2
- var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
- if (k2 === undefined) k2 = k;
4
- var desc = Object.getOwnPropertyDescriptor(m, k);
5
- if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
- desc = { enumerable: true, get: function() { return m[k]; } };
7
- }
8
- Object.defineProperty(o, k2, desc);
9
- }) : (function(o, m, k, k2) {
10
- if (k2 === undefined) k2 = k;
11
- o[k2] = m[k];
12
- }));
13
- var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
- Object.defineProperty(o, "default", { enumerable: true, value: v });
15
- }) : function(o, v) {
16
- o["default"] = v;
17
- });
18
- var __importStar = (this && this.__importStar) || function (mod) {
19
- if (mod && mod.__esModule) return mod;
20
- var result = {};
21
- if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
- __setModuleDefault(result, mod);
23
- return result;
24
- };
25
- var __importDefault = (this && this.__importDefault) || function (mod) {
26
- return (mod && mod.__esModule) ? mod : { "default": mod };
27
- };
28
- Object.defineProperty(exports, "__esModule", { value: true });
29
- exports.SevSNP = exports.getDefaultArkHashes = exports.EMPTY_INITRD_SHA256_HASH = exports.AMD_EPYC_MILAN_CPUINFO = void 0;
30
- const amd_sev_snp_napi_rs_1 = require("../../bindings/amd-sev-snp-napi-rs/");
31
- const sdk_js_1 = require("@super-protocol/sdk-js");
32
- const axios_1 = __importDefault(require("axios"));
33
- const forge = __importStar(require("node-forge"));
34
- const fs = __importStar(require("fs/promises"));
35
- const path = __importStar(require("path"));
36
- const os = __importStar(require("os"));
37
- const child_process_1 = require("child_process");
38
- const crypto_1 = require("crypto");
39
- const helpers_1 = require("./helpers");
40
- const AmdSevSnp_1 = require("../proto/AmdSevSnp");
41
- const sev_snp_schema_1 = require("./sev-snp-schema");
42
- const value_1 = require("@sinclair/typebox/value");
43
- exports.AMD_EPYC_MILAN_CPUINFO = {
44
- family: 25,
45
- model: 1,
46
- stepping: 1,
47
- };
48
- exports.EMPTY_INITRD_SHA256_HASH = Buffer.from("e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "hex");
49
- function getDefaultArkHashes() {
50
- const ark_hashes = {};
51
- ark_hashes["ARK-Milan"] = SevSNP.getCertHash({
52
- format: AmdSevSnp_1.SevSnpCertificateFormat.PEM,
53
- cert: Buffer.from(amd_sev_snp_napi_rs_1.ARK_MILAN_PEM),
54
- });
55
- ark_hashes["ARK-Genoa"] = SevSNP.getCertHash({
56
- format: AmdSevSnp_1.SevSnpCertificateFormat.PEM,
57
- cert: Buffer.from(amd_sev_snp_napi_rs_1.ARK_GENOA_PEM),
58
- });
59
- ark_hashes["ARK-Turin"] = SevSNP.getCertHash({
60
- format: AmdSevSnp_1.SevSnpCertificateFormat.PEM,
61
- cert: Buffer.from(amd_sev_snp_napi_rs_1.ARK_TURIN_PEM),
62
- });
63
- return ark_hashes;
64
- }
65
- exports.getDefaultArkHashes = getDefaultArkHashes;
66
- class SevSNP {
67
- static serializeSNPReport(report) {
68
- return Buffer.from(AmdSevSnp_1.SNPReportWithChain.encode(report).finish());
69
- }
70
- static deserializeSNPReport(serialized) {
71
- return AmdSevSnp_1.SNPReportWithChain.decode(serialized);
72
- }
73
- static convertCertToPem(cert) {
74
- const pemHeader = "-----BEGIN CERTIFICATE-----\n";
75
- const pemFooter = "\n-----END CERTIFICATE-----";
76
- if (cert.slice(0, pemHeader.length).compare(Buffer.from(pemHeader)) === 0) {
77
- return cert.toString();
78
- }
79
- const formattedBase64 = cert
80
- .toString("base64")
81
- .match(/.{1,64}/g)
82
- ?.join("\n");
83
- return pemHeader + formattedBase64 + pemFooter;
84
- }
85
- static convertPemToDer(cert) {
86
- return Buffer.from(forge.pki.pemToDer(cert).getBytes(), "binary");
87
- }
88
- static splitCerts(certsPem) {
89
- const certRegex = /-----BEGIN CERTIFICATE-----(?:\s|.)*?-----END CERTIFICATE-----/g;
90
- const matches = certsPem.match(certRegex);
91
- return Array.from(matches || []);
92
- }
93
- static async readCmdLine() {
94
- const data = await fs.readFile("/proc/cmdline", "utf-8");
95
- // Workaround: VM in direct boot mode sometimes adds to the end of the cmdline initrd=initrd, need to remove it
96
- return data.replace(/initrd=initrd\s*/, "");
97
- }
98
- /**
99
- * Method for generation AMD SEV-SNP Report
100
- * @param userData - The data that will be included in the report and will be signed
101
- * @param vmpl - Optional VMPL value to pass to the firmware when requesting a report (default: 0)
102
- */
103
- static async generateSNPReport(userData, vmpl = 0) {
104
- if (userData.length > amd_sev_snp_napi_rs_1.SNP_REPORT_DATA_SIZE) {
105
- throw new Error(`userData cannot exceed ${amd_sev_snp_napi_rs_1.SNP_REPORT_DATA_SIZE} bytes.`);
106
- }
107
- const paddedUserData = Buffer.alloc(64);
108
- userData.copy(paddedUserData);
109
- const rawReport = (0, amd_sev_snp_napi_rs_1.getSnpReport)(paddedUserData, vmpl);
110
- const cpuInfo = (0, amd_sev_snp_napi_rs_1.getCpuInfo)();
111
- const cpuSig = (0, amd_sev_snp_napi_rs_1.getCpuSig)(cpuInfo);
112
- const cores = (0, amd_sev_snp_napi_rs_1.getLogicalCoresCount)();
113
- const cmdLine = await SevSNP.readCmdLine();
114
- return {
115
- rawReport,
116
- cpuSig,
117
- cores,
118
- cmdLineHash: SevSNP.calculateCmdlineHash(cmdLine),
119
- build: SevSNP.extractBuildFromCmdline(cmdLine),
120
- };
121
- }
122
- /**
123
- * Method for fetch certificates from AMD KDS
124
- * @param report - report generated by the `generateSNPReport` method
125
- * @param options - options for working with HTTP, allows you to configure repetitions and the interval between them,
126
- * as well as the format of the returned certificates
127
- */
128
- static async getReportChain(report, options) {
129
- const retryMax = options?.retryMax ?? 50;
130
- const retryInterval = options?.retryInterval ?? Math.floor(Math.random() * 10000) + 5000;
131
- const certFormat = options?.certFormat ?? AmdSevSnp_1.SevSnpCertificateFormat.DER;
132
- const certs = [];
133
- const axiosInstance = axios_1.default.create();
134
- let vcek = Buffer.alloc(0);
135
- let cpuGeneration = amd_sev_snp_napi_rs_1.WellKnownSnpCodeNames.Milan;
136
- let generations = Object.values(amd_sev_snp_napi_rs_1.WellKnownSnpCodeNames);
137
- // Try to detect CPU generation from the report itself. If detection
138
- // succeeds, only attempt to fetch VCEK for the detected generation.
139
- try {
140
- const cpuInfo = await SevSNP.getReportCpuInfo(Buffer.from(report.rawReport));
141
- const detected = await SevSNP.getCpuGeneration(cpuInfo);
142
- generations = [detected];
143
- }
144
- catch (err) {
145
- // Detection failed or report doesn't contain CPU info; fall back to
146
- // trying all known generations.
147
- }
148
- for (const generation of generations) {
149
- cpuGeneration = generation;
150
- const vcekUrl = (0, amd_sev_snp_napi_rs_1.getVcekKdsUrl)(Buffer.from(report.rawReport), generation);
151
- try {
152
- const response = await sdk_js_1.helpers.tryWithInterval({
153
- checkResult(response) {
154
- return { isResultOk: response.status === 200 };
155
- },
156
- handler() {
157
- return axiosInstance.get(vcekUrl, {
158
- responseType: "arraybuffer",
159
- });
160
- },
161
- checkError(err) {
162
- if (axios_1.default.isAxiosError(err) && err.response) {
163
- const status = err.response.status;
164
- return { retryable: status == 429 };
165
- }
166
- return { retryable: axios_1.default.isAxiosError(err) };
167
- },
168
- retryInterval,
169
- retryMax,
170
- });
171
- vcek = response.data;
172
- break;
173
- }
174
- catch (err) {
175
- const isLast = generation === generations[generations.length - 1];
176
- if (isLast) {
177
- throw err;
178
- }
179
- }
180
- }
181
- const pemVcek = SevSNP.convertCertToPem(vcek);
182
- certs.push({
183
- type: AmdSevSnp_1.SevSNPCertType.VCEK,
184
- format: certFormat,
185
- cert: certFormat === AmdSevSnp_1.SevSnpCertificateFormat.PEM ? Buffer.from(pemVcek) : SevSNP.convertPemToDer(pemVcek),
186
- });
187
- const caUrl = `${amd_sev_snp_napi_rs_1.KDS_CERT_SITE}/${amd_sev_snp_napi_rs_1.KDS_VCEK}/${cpuGeneration}/cert_chain`;
188
- const response = await sdk_js_1.helpers.tryWithInterval({
189
- checkResult(response) {
190
- return { isResultOk: response.status === 200 };
191
- },
192
- handler() {
193
- return axiosInstance.get(caUrl, {
194
- responseType: "arraybuffer",
195
- });
196
- },
197
- checkError(err) {
198
- if (axios_1.default.isAxiosError(err) && err.response) {
199
- const status = err.response.status;
200
- return { retryable: status == 429 };
201
- }
202
- return { retryable: axios_1.default.isAxiosError(err) };
203
- },
204
- retryInterval,
205
- retryMax,
206
- });
207
- const CAChain = SevSNP.splitCerts(response.data.toString());
208
- if (CAChain.length !== 2) {
209
- throw new Error("Cert chain must have 2 certificates");
210
- }
211
- certs.push({
212
- type: AmdSevSnp_1.SevSNPCertType.ARK,
213
- format: certFormat,
214
- cert: certFormat === AmdSevSnp_1.SevSnpCertificateFormat.PEM
215
- ? Buffer.from(CAChain[1])
216
- : SevSNP.convertPemToDer(CAChain[1]),
217
- });
218
- certs.push({
219
- type: AmdSevSnp_1.SevSNPCertType.ASK,
220
- format: certFormat,
221
- cert: certFormat === AmdSevSnp_1.SevSnpCertificateFormat.PEM
222
- ? Buffer.from(CAChain[0])
223
- : SevSNP.convertPemToDer(CAChain[0]),
224
- });
225
- return certs;
226
- }
227
- /**
228
- * Method for generation AMD SEV-SNP Report and fetching certificates
229
- * @param userData - @see generateSNPReport
230
- * @param options - @see getReportChain
231
- */
232
- static async generateSNPReportWithChain(userData, options) {
233
- const snpReport = await SevSNP.generateSNPReport(userData);
234
- const certs = await SevSNP.getReportChain(snpReport, options);
235
- return {
236
- snpReport,
237
- certs: certs,
238
- };
239
- }
240
- static async runSubProcess(binaryPath, args = [], options = {}) {
241
- return new Promise((resolve, reject) => {
242
- const subprocess = (0, child_process_1.spawn)(binaryPath, args, {
243
- cwd: options.cwd,
244
- stdio: "pipe",
245
- });
246
- let stdout = "";
247
- let stderr = "";
248
- subprocess.stdout?.on("data", (chunk) => (stdout += chunk.toString()));
249
- subprocess.stderr?.on("data", (chunk) => (stderr += chunk.toString()));
250
- let timeoutId;
251
- if (options.timeoutMs && options.timeoutMs > 0) {
252
- timeoutId = setTimeout(() => {
253
- subprocess.kill();
254
- reject(new Error(`Process timed out after ${options.timeoutMs}ms`));
255
- }, options.timeoutMs);
256
- }
257
- subprocess.on("close", (exitCode) => {
258
- if (timeoutId)
259
- clearTimeout(timeoutId);
260
- resolve({
261
- exitCode: exitCode || 0,
262
- stdout,
263
- stderr,
264
- });
265
- });
266
- subprocess.on("error", (error) => {
267
- if (timeoutId)
268
- clearTimeout(timeoutId);
269
- reject(new Error(`Failed to start process: ${error.message}`));
270
- });
271
- });
272
- }
273
- static getCertHash(cert) {
274
- const hash = (0, crypto_1.createHash)("sha256");
275
- if (cert.format === AmdSevSnp_1.SevSnpCertificateFormat.PEM) {
276
- hash.update(SevSNP.convertPemToDer(cert.cert.toString()));
277
- }
278
- else {
279
- hash.update(cert.cert);
280
- }
281
- return hash.digest();
282
- }
283
- static isValidArk(ARK, trustedHashes) {
284
- const ArkCert = forge.pki.certificateFromPem(ARK.format === AmdSevSnp_1.SevSnpCertificateFormat.PEM
285
- ? ARK.cert.toString()
286
- : SevSNP.convertCertToPem(Buffer.from(ARK.cert)));
287
- const ArkCN = ArkCert.subject.attributes.find((attr) => attr.name === "commonName")?.value;
288
- if (!ArkCN) {
289
- throw new Error("Can't extract CN from ARK certificate");
290
- }
291
- const ArkHash = SevSNP.getCertHash(ARK);
292
- const TrustedHash = (trustedHashes && trustedHashes[ArkCN]) || Buffer.alloc(0);
293
- return ArkHash.equals(TrustedHash);
294
- }
295
- /**
296
- * AMD SEV-SNP verification method
297
- * @param report - report with full certificate chain
298
- * @param options - trustedHashes - map of trusted AMD ARK Certificates (CommonName as Key, Sha256 Hash of Der Certificate as Value) - optional
299
- * timeoutMs - timeout of the utility snpnost in ms
300
- * snpGuestBinaryPath - path for snpguest util
301
- */
302
- static async verifyReport(report, options) {
303
- const trustedHashes = options?.trustedHashes ?? getDefaultArkHashes();
304
- const timeoutMs = options?.timeoutMs ?? 10000;
305
- const snpGuestBinaryPath = options?.snpGuestBinaryPath ?? path.resolve(__dirname, "../../bindings/utils/virtee/snpguest");
306
- const tmpDirTemplate = options?.tmpDirTemplate ?? path.join(os.tmpdir(), "temp-");
307
- if (!path.isAbsolute(snpGuestBinaryPath)) {
308
- throw new Error("snpGuestBinaryPath must be an absolute path");
309
- }
310
- const ARK = report.certs.find((cert) => cert.type === AmdSevSnp_1.SevSNPCertType.ARK);
311
- if (!ARK) {
312
- throw new Error("Can't find ARK certificate in certificate chain");
313
- }
314
- if (!SevSNP.isValidArk(ARK, trustedHashes)) {
315
- throw new Error("The supplied certificate chain contains an untrusted root certificate");
316
- }
317
- const tempDir = await fs.mkdtemp(tmpDirTemplate);
318
- try {
319
- for (const certEntry of report.certs) {
320
- const fileName = (0, AmdSevSnp_1.sevSNPCertTypeToJSON)(certEntry.type).toLowerCase();
321
- const extension = certEntry.format === AmdSevSnp_1.SevSnpCertificateFormat.PEM ? "pem" : "der";
322
- await fs.writeFile(`${tempDir}/${fileName}.${extension}`, certEntry.cert, certEntry.format === AmdSevSnp_1.SevSnpCertificateFormat.PEM ? "utf8" : undefined);
323
- }
324
- const reportPath = `${tempDir}/report.bin`;
325
- await fs.writeFile(reportPath, Buffer.from(report.snpReport.rawReport));
326
- const snpguestRes = await SevSNP.runSubProcess(snpGuestBinaryPath, ["verify", "attestation", tempDir, reportPath], { timeoutMs });
327
- if (snpguestRes.exitCode != 0) {
328
- throw new Error(`Error validating report. Output: ${snpguestRes.stdout}\n${snpguestRes.stderr}`);
329
- }
330
- }
331
- finally {
332
- await (0, helpers_1.gramineCompatibleRmDir)(tempDir);
333
- }
334
- }
335
- static calcMrEnclave(measure, vmpl, policy) {
336
- const hash = (0, crypto_1.createHash)("sha256");
337
- hash.update(measure);
338
- const vmplBuf = Buffer.alloc(4);
339
- vmplBuf.writeUInt32LE(vmpl, 0);
340
- hash.update(vmplBuf);
341
- const policyBuf = Buffer.alloc(8);
342
- policyBuf.writeBigUint64LE(policy, 0);
343
- hash.update(policyBuf);
344
- return hash.digest();
345
- }
346
- /**
347
- * Method for obtaining mrEnclave from report. MrEnclave includes report measure, report vmpl and report policy
348
- * @param report - report without certificates
349
- */
350
- static getMrEnclave(report) {
351
- const measure = (0, amd_sev_snp_napi_rs_1.getReportMeasure)(report);
352
- const vmpl = (0, amd_sev_snp_napi_rs_1.getReportVmpl)(report);
353
- const policy = (0, amd_sev_snp_napi_rs_1.getReportPolicy)(report);
354
- return SevSNP.calcMrEnclave(measure, vmpl, policy);
355
- }
356
- /**
357
- * Method for obtaining reportData. This data was passed when generating the report
358
- * @param report - report without certificates
359
- */
360
- static async getReportData(report) {
361
- return (0, amd_sev_snp_napi_rs_1.getReportData)(report);
362
- }
363
- /**
364
- * Method for obtaining measure. Please do not confuse with mrenclave. Report measure is part of mrEnclave.
365
- * @param report - report without certificates
366
- */
367
- static async getReportMeasure(report) {
368
- return (0, amd_sev_snp_napi_rs_1.getReportMeasure)(report);
369
- }
370
- static async calculateFileSha256(filePath) {
371
- const fileData = await fs.readFile(filePath);
372
- const hash = (0, crypto_1.createHash)("sha256");
373
- hash.update(fileData);
374
- return hash.digest();
375
- }
376
- static calculateCmdlineHash(cmdLine) {
377
- const cmdLineBytes = Buffer.concat([Buffer.from(cmdLine.trim(), "utf-8"), Buffer.from([0])]);
378
- const hash = (0, crypto_1.createHash)("sha256");
379
- hash.update(cmdLineBytes);
380
- return hash.digest();
381
- }
382
- /**
383
- * The method allows to get the expected mrEnclave without generating a report
384
- * @param params - @see CalcSnpMrEnclaveParams
385
- */
386
- static async calcSnpMrEnclave(params) {
387
- const measure = (0, amd_sev_snp_napi_rs_1.calcSnpMeasure)(params.ovmfPath, params.kernelHash, params.initrdHash ?? exports.EMPTY_INITRD_SHA256_HASH, params.cmdLineHash, params.vcpuSig, params.vcpuCount);
388
- return SevSNP.calcMrEnclave(measure, params.vmpl ?? 0, params.policy ?? BigInt(0x30000));
389
- }
390
- static extractBuildFromCmdline(cmdLine, paramName = "build") {
391
- const regex = new RegExp(`${paramName}=([^\\s]+)`);
392
- const match = cmdLine.match(regex);
393
- if (match) {
394
- return match[1];
395
- }
396
- else {
397
- throw new Error(`${paramName} parameter not found`);
398
- }
399
- }
400
- /**
401
- * Compute the 32-bit CPUID signature from family, model, and stepping.
402
- * This computation is described in AMD's CPUID Specification, publication #25481
403
- * https://www.amd.com/system/files/TechDocs/25481.pdf
404
- * See section: CPUID Fn0000_0001_EAX Family, Model, Stepping Identifiers
405
- * @param cpuInfo - Structure containing family, model and stepping @see CpuInfo
406
- */
407
- static getCpuSig(cpuInfo) {
408
- return (0, amd_sev_snp_napi_rs_1.getCpuSig)(cpuInfo);
409
- }
410
- static async getReportImportantSecurityFields(report) {
411
- return (0, amd_sev_snp_napi_rs_1.getReportImportantSecurityFields)(report);
412
- }
413
- static async getReportCpuInfo(report) {
414
- return (0, amd_sev_snp_napi_rs_1.getReportCpuInfo)(report);
415
- }
416
- static async getCpuGeneration(cpuInfo) {
417
- return (0, amd_sev_snp_napi_rs_1.getCpuGeneration)(cpuInfo);
418
- }
419
- /**
420
- * Parse and validate policy
421
- * @param input - Raw policy as json-text or object
422
- */
423
- static parsePolicySet(input) {
424
- let parsed;
425
- if (typeof input === "string") {
426
- if (input.trim().length === 0) {
427
- return {};
428
- }
429
- parsed = JSON.parse(input);
430
- }
431
- else {
432
- parsed = input;
433
- }
434
- const { isValid } = (0, sdk_js_1.validateBySchema)(parsed, sev_snp_schema_1.PolicySetSchema);
435
- if (!isValid) {
436
- const validationErrors = Array.from(value_1.Value.Errors(sev_snp_schema_1.PolicySetSchema, parsed));
437
- if (validationErrors.length > 0) {
438
- throw new Error(`Failed to validate policy JSON: ${validationErrors.map((e) => e.message).join(", ")}`);
439
- }
440
- }
441
- return parsed;
442
- }
443
- static checkRule(rule, fields) {
444
- const fieldValue = fields[rule.name];
445
- switch (rule.operator) {
446
- case sev_snp_schema_1.RuleOperator.Le:
447
- return fieldValue <= rule.value;
448
- case sev_snp_schema_1.RuleOperator.Eq:
449
- return fieldValue === rule.value;
450
- case sev_snp_schema_1.RuleOperator.Ge:
451
- return fieldValue >= rule.value;
452
- default:
453
- return false;
454
- }
455
- }
456
- /**
457
- * Verify SNP report against a PolicySet.
458
- * Throws an error if any rule fails.
459
- * @param report - SNPReport
460
- * @param policySet - PolicySet containing rules
461
- */
462
- static async verifyPolicy(report, policySet) {
463
- if (Object.keys(policySet).length === 0) {
464
- return; // No policy set provided, consider it valid
465
- }
466
- const fields = await this.getReportImportantSecurityFields(report);
467
- const commonPolicy = policySet[sev_snp_schema_1.CommonPolicyKeyName];
468
- if (commonPolicy) {
469
- for (const rule of commonPolicy) {
470
- if (!this.checkRule(rule, fields)) {
471
- const fieldValue = fields[rule.name];
472
- throw new Error(`Policy violation in "commonPolicy": field "${rule.name}" has value ${JSON.stringify(fieldValue)}, ` +
473
- `expected ${rule.operator} ${JSON.stringify(rule.value)}`);
474
- }
475
- }
476
- }
477
- const cpuGen = await this.getCpuGeneration(await this.getReportCpuInfo(report));
478
- const cpuPolicy = policySet[cpuGen];
479
- if (cpuPolicy) {
480
- for (const rule of cpuPolicy) {
481
- if (!this.checkRule(rule, fields)) {
482
- const fieldValue = fields[rule.name];
483
- throw new Error(`Policy violation in "${cpuGen}": field "${rule.name}" has value ${JSON.stringify(fieldValue)}, ` +
484
- `expected ${rule.operator} ${JSON.stringify(rule.value)}`);
485
- }
486
- }
487
- }
488
- }
489
- }
490
- exports.SevSNP = SevSNP;
491
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"sev-snp.js","sourceRoot":"","sources":["../../src/sgx-native-module/sev-snp.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,6EAuB6C;AAE7C,mDAAiF;AACjF,kDAA6C;AAC7C,kDAAoC;AAEpC,gDAAkC;AAClC,2CAA6B;AAC7B,uCAAyB;AACzB,iDAAsC;AACtC,mCAAoC;AACpC,uCAAmD;AACnD,kDAO4B;AAC5B,qDAA6G;AAC7G,mDAAgD;AAanC,QAAA,sBAAsB,GAAY;IAC3C,MAAM,EAAE,EAAE;IACV,KAAK,EAAE,CAAC;IACR,QAAQ,EAAE,CAAC;CACd,CAAC;AAEW,QAAA,wBAAwB,GAAG,MAAM,CAAC,IAAI,CAC/C,kEAAkE,EAClE,KAAK,CACR,CAAC;AAIF,SAAgB,mBAAmB;IAC/B,MAAM,UAAU,GAA8B,EAAE,CAAC;IAEjD,UAAU,CAAC,WAAW,CAAC,GAAG,MAAM,CAAC,WAAW,CAAC;QACzC,MAAM,EAAE,mCAAuB,CAAC,GAAG;QACnC,IAAI,EAAE,MAAM,CAAC,IAAI,CAAC,mCAAa,CAAC;KACnC,CAAC,CAAC;IAEH,UAAU,CAAC,WAAW,CAAC,GAAG,MAAM,CAAC,WAAW,CAAC;QACzC,MAAM,EAAE,mCAAuB,CAAC,GAAG;QACnC,IAAI,EAAE,MAAM,CAAC,IAAI,CAAC,mCAAa,CAAC;KACnC,CAAC,CAAC;IAEH,UAAU,CAAC,WAAW,CAAC,GAAG,MAAM,CAAC,WAAW,CAAC;QACzC,MAAM,EAAE,mCAAuB,CAAC,GAAG;QACnC,IAAI,EAAE,MAAM,CAAC,IAAI,CAAC,mCAAa,CAAC;KACnC,CAAC,CAAC;IAEH,OAAO,UAAU,CAAC;AACtB,CAAC;AAnBD,kDAmBC;AAED,MAAa,MAAM;IACR,MAAM,CAAC,kBAAkB,CAAC,MAA0B;QACvD,OAAO,MAAM,CAAC,IAAI,CAAC,8BAAkB,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC;IACnE,CAAC;IAEM,MAAM,CAAC,oBAAoB,CAAC,UAAkB;QACjD,OAAO,8BAAkB,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC;IACjD,CAAC;IAES,MAAM,CAAC,gBAAgB,CAAC,IAAY;QAC1C,MAAM,SAAS,GAAG,+BAA+B,CAAC;QAClD,MAAM,SAAS,GAAG,6BAA6B,CAAC;QAEhD,IAAI,IAAI,CAAC,KAAK,CAAC,CAAC,EAAE,SAAS,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,EAAE,CAAC;YACxE,OAAO,IAAI,CAAC,QAAQ,EAAE,CAAC;QAC3B,CAAC;QACD,MAAM,eAAe,GAAG,IAAI;aACvB,QAAQ,CAAC,QAAQ,CAAC;aAClB,KAAK,CAAC,UAAU,CAAC;YAClB,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;QAEjB,OAAO,SAAS,GAAG,eAAe,GAAG,SAAS,CAAC;IACnD,CAAC;IAES,MAAM,CAAC,eAAe,CAAC,IAAY;QACzC,OAAO,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,QAAQ,EAAE,EAAE,QAAQ,CAAC,CAAC;IACtE,CAAC;IAES,MAAM,CAAC,UAAU,CAAC,QAAgB;QACxC,MAAM,SAAS,GAAG,iEAAiE,CAAC;QACpF,MAAM,OAAO,GAAG,QAAQ,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC;QAE1C,OAAO,KAAK,CAAC,IAAI,CAAC,OAAO,IAAI,EAAE,CAAC,CAAC;IACrC,CAAC;IAES,MAAM,CAAC,KAAK,CAAC,WAAW;QAC9B,MAAM,IAAI,GAAG,MAAM,EAAE,CAAC,QAAQ,CAAC,eAAe,EAAE,OAAO,CAAC,CAAC;QACzD,+GAA+G;QAC/G,OAAO,IAAI,CAAC,OAAO,CAAC,kBAAkB,EAAE,EAAE,CAAC,CAAC;IAChD,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,KAAK,CAAC,iBAAiB,CAAC,QAAgB,EAAE,OAAe,CAAC;QACpE,IAAI,QAAQ,CAAC,MAAM,GAAG,0CAAoB,EAAE,CAAC;YACzC,MAAM,IAAI,KAAK,CAAC,0BAA0B,0CAAoB,SAAS,CAAC,CAAC;QAC7E,CAAC;QAED,MAAM,cAAc,GAAG,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;QACxC,QAAQ,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC;QAE9B,MAAM,SAAS,GAAG,IAAA,kCAAY,EAAC,cAAc,EAAE,IAAI,CAAC,CAAC;QACrD,MAAM,OAAO,GAAG,IAAA,gCAAU,GAAE,CAAC;QAC7B,MAAM,MAAM,GAAG,IAAA,+BAAS,EAAC,OAAO,CAAC,CAAC;QAClC,MAAM,KAAK,GAAG,IAAA,0CAAoB,GAAE,CAAC;QACrC,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,WAAW,EAAE,CAAC;QAE3C,OAAO;YACH,SAAS;YACT,MAAM;YACN,KAAK;YACL,WAAW,EAAE,MAAM,CAAC,oBAAoB,CAAC,OAAO,CAAC;YACjD,KAAK,EAAE,MAAM,CAAC,uBAAuB,CAAC,OAAO,CAAC;SACjD,CAAC;IACN,CAAC;IAED;;;;;OAKG;IACI,MAAM,CAAC,KAAK,CAAC,cAAc,CAC9B,MAAiB,EACjB,OAIC;QAED,MAAM,QAAQ,GAAG,OAAO,EAAE,QAAQ,IAAI,EAAE,CAAC;QACzC,MAAM,aAAa,GAAG,OAAO,EAAE,aAAa,IAAI,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,GAAG,KAAK,CAAC,GAAG,IAAI,CAAC;QACzF,MAAM,UAAU,GAAG,OAAO,EAAE,UAAU,IAAI,mCAAuB,CAAC,GAAG,CAAC;QACtE,MAAM,KAAK,GAAc,EAAE,CAAC;QAE5B,MAAM,aAAa,GAAG,eAAK,CAAC,MAAM,EAAE,CAAC;QACrC,IAAI,IAAI,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;QAC3B,IAAI,aAAa,GAAG,2CAAqB,CAAC,KAAK,CAAC;QAChD,IAAI,WAAW,GAAG,MAAM,CAAC,MAAM,CAAC,2CAAqB,CAAC,CAAC;QAEvD,oEAAoE;QACpE,oEAAoE;QACpE,IAAI,CAAC;YACD,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,gBAAgB,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,CAAC;YAC7E,MAAM,QAAQ,GAAG,MAAM,MAAM,CAAC,gBAAgB,CAAC,OAAO,CAAC,CAAC;YACxD,WAAW,GAAG,CAAC,QAAQ,CAAC,CAAC;QAC7B,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACX,oEAAoE;YACpE,gCAAgC;QACpC,CAAC;QAED,KAAK,MAAM,UAAU,IAAI,WAAW,EAAE,CAAC;YACnC,aAAa,GAAG,UAAU,CAAC;YAC3B,MAAM,OAAO,GAAG,IAAA,mCAAa,EAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,UAAU,CAAC,CAAC;YACzE,IAAI,CAAC;gBACD,MAAM,QAAQ,GAAG,MAAM,gBAAU,CAAC,eAAe,CAAgB;oBAC7D,WAAW,CAAC,QAAQ;wBAChB,OAAO,EAAE,UAAU,EAAE,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE,CAAC;oBACnD,CAAC;oBACD,OAAO;wBACH,OAAO,aAAa,CAAC,GAAG,CAAC,OAAO,EAAE;4BAC9B,YAAY,EAAE,aAAa;yBAC9B,CAAC,CAAC;oBACP,CAAC;oBACD,UAAU,CAAC,GAAG;wBACV,IAAI,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,IAAI,GAAG,CAAC,QAAQ,EAAE,CAAC;4BAC1C,MAAM,MAAM,GAAG,GAAG,CAAC,QAAQ,CAAC,MAAM,CAAC;4BAEnC,OAAO,EAAE,SAAS,EAAE,MAAM,IAAI,GAAG,EAAE,CAAC;wBACxC,CAAC;wBAED,OAAO,EAAE,SAAS,EAAE,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,EAAE,CAAC;oBAClD,CAAC;oBACD,aAAa;oBACb,QAAQ;iBACX,CAAC,CAAC;gBACH,IAAI,GAAG,QAAQ,CAAC,IAAI,CAAC;gBACrB,MAAM;YACV,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACX,MAAM,MAAM,GAAG,UAAU,KAAK,WAAW,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;gBAClE,IAAI,MAAM,EAAE,CAAC;oBACT,MAAM,GAAG,CAAC;gBACd,CAAC;YACL,CAAC;QACL,CAAC;QACD,MAAM,OAAO,GAAG,MAAM,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;QAC9C,KAAK,CAAC,IAAI,CAAC;YACP,IAAI,EAAE,0BAAc,CAAC,IAAI;YACzB,MAAM,EAAE,UAAU;YAClB,IAAI,EAAE,UAAU,KAAK,mCAAuB,CAAC,GAAG,CAAC,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC;SAC5G,CAAC,CAAC;QAEH,MAAM,KAAK,GAAG,GAAG,mCAAa,IAAI,8BAAQ,IAAI,aAAa,aAAa,CAAC;QACzE,MAAM,QAAQ,GAAG,MAAM,gBAAU,CAAC,eAAe,CAAgB;YAC7D,WAAW,CAAC,QAAQ;gBAChB,OAAO,EAAE,UAAU,EAAE,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE,CAAC;YACnD,CAAC;YACD,OAAO;gBACH,OAAO,aAAa,CAAC,GAAG,CAAC,KAAK,EAAE;oBAC5B,YAAY,EAAE,aAAa;iBAC9B,CAAC,CAAC;YACP,CAAC;YACD,UAAU,CAAC,GAAG;gBACV,IAAI,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,IAAI,GAAG,CAAC,QAAQ,EAAE,CAAC;oBAC1C,MAAM,MAAM,GAAG,GAAG,CAAC,QAAQ,CAAC,MAAM,CAAC;oBAEnC,OAAO,EAAE,SAAS,EAAE,MAAM,IAAI,GAAG,EAAE,CAAC;gBACxC,CAAC;gBAED,OAAO,EAAE,SAAS,EAAE,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,EAAE,CAAC;YAClD,CAAC;YACD,aAAa;YACb,QAAQ;SACX,CAAC,CAAC;QAEH,MAAM,OAAO,GAAG,MAAM,CAAC,UAAU,CAAC,QAAQ,CAAC,IAAI,CAAC,QAAQ,EAAE,CAAC,CAAC;QAC5D,IAAI,OAAO,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACvB,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;QAC3D,CAAC;QAED,KAAK,CAAC,IAAI,CAAC;YACP,IAAI,EAAE,0BAAc,CAAC,GAAG;YACxB,MAAM,EAAE,UAAU;YAClB,IAAI,EACA,UAAU,KAAK,mCAAuB,CAAC,GAAG;gBACtC,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;gBACzB,CAAC,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;SAC/C,CAAC,CAAC;QACH,KAAK,CAAC,IAAI,CAAC;YACP,IAAI,EAAE,0BAAc,CAAC,GAAG;YACxB,MAAM,EAAE,UAAU;YAClB,IAAI,EACA,UAAU,KAAK,mCAAuB,CAAC,GAAG;gBACtC,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;gBACzB,CAAC,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;SAC/C,CAAC,CAAC;QAEH,OAAO,KAAK,CAAC;IACjB,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,KAAK,CAAC,0BAA0B,CAC1C,QAAgB,EAChB,OAIC;QAED,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,iBAAiB,CAAC,QAAQ,CAAC,CAAC;QAC3D,MAAM,KAAK,GAAG,MAAM,MAAM,CAAC,cAAc,CAAC,SAAS,EAAE,OAAO,CAAC,CAAC;QAE9D,OAAO;YACH,SAAS;YACT,KAAK,EAAE,KAAK;SACf,CAAC;IACN,CAAC;IAES,MAAM,CAAC,KAAK,CAAC,aAAa,CAChC,UAAkB,EAClB,OAAiB,EAAE,EACnB,UAAgD,EAAE;QAElD,OAAO,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;YACnC,MAAM,UAAU,GAAG,IAAA,qBAAK,EAAC,UAAU,EAAE,IAAI,EAAE;gBACvC,GAAG,EAAE,OAAO,CAAC,GAAG;gBAChB,KAAK,EAAE,MAAM;aAChB,CAAC,CAAC;YAEH,IAAI,MAAM,GAAG,EAAE,CAAC;YAChB,IAAI,MAAM,GAAG,EAAE,CAAC;YAEhB,UAAU,CAAC,MAAM,EAAE,EAAE,CAAC,MAAM,EAAE,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC,MAAM,IAAI,KAAK,CAAC,QAAQ,EAAE,CAAC,CAAC,CAAC;YACvE,UAAU,CAAC,MAAM,EAAE,EAAE,CAAC,MAAM,EAAE,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC,MAAM,IAAI,KAAK,CAAC,QAAQ,EAAE,CAAC,CAAC,CAAC;YAEvE,IAAI,SAAqC,CAAC;YAC1C,IAAI,OAAO,CAAC,SAAS,IAAI,OAAO,CAAC,SAAS,GAAG,CAAC,EAAE,CAAC;gBAC7C,SAAS,GAAG,UAAU,CAAC,GAAG,EAAE;oBACxB,UAAU,CAAC,IAAI,EAAE,CAAC;oBAClB,MAAM,CAAC,IAAI,KAAK,CAAC,2BAA2B,OAAO,CAAC,SAAS,IAAI,CAAC,CAAC,CAAC;gBACxE,CAAC,EAAE,OAAO,CAAC,SAAS,CAAC,CAAC;YAC1B,CAAC;YAED,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE,EAAE;gBAChC,IAAI,SAAS;oBAAE,YAAY,CAAC,SAAS,CAAC,CAAC;gBACvC,OAAO,CAAC;oBACJ,QAAQ,EAAE,QAAQ,IAAI,CAAC;oBACvB,MAAM;oBACN,MAAM;iBACT,CAAC,CAAC;YACP,CAAC,CAAC,CAAC;YAEH,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;gBAC7B,IAAI,SAAS;oBAAE,YAAY,CAAC,SAAS,CAAC,CAAC;gBACvC,MAAM,CAAC,IAAI,KAAK,CAAC,4BAA4B,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC,CAAC;YACnE,CAAC,CAAC,CAAC;QACP,CAAC,CAAC,CAAC;IACP,CAAC;IAEM,MAAM,CAAC,WAAW,CAAC,IAA2B;QACjD,MAAM,IAAI,GAAG,IAAA,mBAAU,EAAC,QAAQ,CAAC,CAAC;QAClC,IAAI,IAAI,CAAC,MAAM,KAAK,mCAAuB,CAAC,GAAG,EAAE,CAAC;YAC9C,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,CAAC,CAAC,CAAC;QAC9D,CAAC;aAAM,CAAC;YACJ,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,IAAc,CAAC,CAAC;QACrC,CAAC;QAED,OAAO,IAAI,CAAC,MAAM,EAAE,CAAC;IACzB,CAAC;IAES,MAAM,CAAC,UAAU,CAAC,GAAY,EAAE,aAAwB;QAC9D,MAAM,OAAO,GAAG,KAAK,CAAC,GAAG,CAAC,kBAAkB,CACxC,GAAG,CAAC,MAAM,KAAK,mCAAuB,CAAC,GAAG;YACtC,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,QAAQ,EAAE;YACrB,CAAC,CAAC,MAAM,CAAC,gBAAgB,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,CACvD,CAAC;QACF,MAAM,KAAK,GAAG,OAAO,CAAC,OAAO,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,IAAI,KAAK,YAAY,CAAC,EAAE,KAEtE,CAAC;QAChB,IAAI,CAAC,KAAK,EAAE,CAAC;YACT,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;QAC7D,CAAC;QAED,MAAM,OAAO,GAAG,MAAM,CAAC,WAAW,CAAC,GAAG,CAAC,CAAC;QACxC,MAAM,WAAW,GAAG,CAAC,aAAa,IAAI,aAAa,CAAC,KAAK,CAAC,CAAC,IAAI,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;QAE/E,OAAO,OAAO,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC;IACvC,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,KAAK,CAAC,YAAY,CAC5B,MAA0B,EAC1B,OAKC;QAED,MAAM,aAAa,GAAG,OAAO,EAAE,aAAa,IAAI,mBAAmB,EAAE,CAAC;QACtE,MAAM,SAAS,GAAG,OAAO,EAAE,SAAS,IAAI,KAAK,CAAC;QAC9C,MAAM,kBAAkB,GACpB,OAAO,EAAE,kBAAkB,IAAI,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,sCAAsC,CAAC,CAAC;QACnG,MAAM,cAAc,GAAG,OAAO,EAAE,cAAc,IAAI,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,MAAM,EAAE,EAAE,OAAO,CAAC,CAAC;QAElF,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,kBAAkB,CAAC,EAAE,CAAC;YACvC,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;QACnE,CAAC;QACD,MAAM,GAAG,GAAG,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,IAAI,KAAK,0BAAc,CAAC,GAAG,CAAC,CAAC;QAC1E,IAAI,CAAC,GAAG,EAAE,CAAC;YACP,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACvE,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,GAAG,EAAE,aAAa,CAAC,EAAE,CAAC;YACzC,MAAM,IAAI,KAAK,CAAC,uEAAuE,CAAC,CAAC;QAC7F,CAAC;QAED,MAAM,OAAO,GAAG,MAAM,EAAE,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC;QAEjD,IAAI,CAAC;YACD,KAAK,MAAM,SAAS,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;gBACnC,MAAM,QAAQ,GAAG,IAAA,gCAAoB,EAAC,SAAS,CAAC,IAAI,CAAC,CAAC,WAAW,EAAE,CAAC;gBACpE,MAAM,SAAS,GAAG,SAAS,CAAC,MAAM,KAAK,mCAAuB,CAAC,GAAG,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC;gBACnF,MAAM,EAAE,CAAC,SAAS,CACd,GAAG,OAAO,IAAI,QAAQ,IAAI,SAAS,EAAE,EACrC,SAAS,CAAC,IAAI,EACd,SAAS,CAAC,MAAM,KAAK,mCAAuB,CAAC,GAAG,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CACxE,CAAC;YACN,CAAC;YACD,MAAM,UAAU,GAAG,GAAG,OAAO,aAAa,CAAC;YAE3C,MAAM,EAAE,CAAC,SAAS,CAAC,UAAU,EAAE,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,SAAU,CAAC,SAAS,CAAC,CAAC,CAAC;YAEzE,MAAM,WAAW,GAAG,MAAM,MAAM,CAAC,aAAa,CAC1C,kBAAkB,EAClB,CAAC,QAAQ,EAAE,aAAa,EAAE,OAAO,EAAE,UAAU,CAAC,EAC9C,EAAE,SAAS,EAAE,CAChB,CAAC;YACF,IAAI,WAAW,CAAC,QAAQ,IAAI,CAAC,EAAE,CAAC;gBAC5B,MAAM,IAAI,KAAK,CAAC,oCAAoC,WAAW,CAAC,MAAM,KAAK,WAAW,CAAC,MAAM,EAAE,CAAC,CAAC;YACrG,CAAC;QACL,CAAC;gBAAS,CAAC;YACP,MAAM,IAAA,gCAAsB,EAAC,OAAO,CAAC,CAAC;QAC1C,CAAC;IACL,CAAC;IAES,MAAM,CAAC,aAAa,CAAC,OAAe,EAAE,IAAY,EAAE,MAAc;QACxE,MAAM,IAAI,GAAG,IAAA,mBAAU,EAAC,QAAQ,CAAC,CAAC;QAClC,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;QAErB,MAAM,OAAO,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;QAChC,OAAO,CAAC,aAAa,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;QAC/B,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;QAErB,MAAM,SAAS,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;QAClC,SAAS,CAAC,gBAAgB,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;QACtC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;QAEvB,OAAO,IAAI,CAAC,MAAM,EAAE,CAAC;IACzB,CAAC;IAED;;;OAGG;IACI,MAAM,CAAC,YAAY,CAAC,MAAc;QACrC,MAAM,OAAO,GAAG,IAAA,sCAAgB,EAAC,MAAM,CAAC,CAAC;QACzC,MAAM,IAAI,GAAG,IAAA,mCAAa,EAAC,MAAM,CAAC,CAAC;QACnC,MAAM,MAAM,GAAG,IAAA,qCAAe,EAAC,MAAM,CAAC,CAAC;QAEvC,OAAO,MAAM,CAAC,aAAa,CAAC,OAAO,EAAE,IAAI,EAAE,MAAM,CAAC,CAAC;IACvD,CAAC;IAED;;;OAGG;IACI,MAAM,CAAC,KAAK,CAAC,aAAa,CAAC,MAAc;QAC5C,OAAO,IAAA,mCAAa,EAAC,MAAM,CAAC,CAAC;IACjC,CAAC;IAED;;;OAGG;IACI,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAAC,MAAc;QAC/C,OAAO,IAAA,sCAAgB,EAAC,MAAM,CAAC,CAAC;IACpC,CAAC;IAES,MAAM,CAAC,KAAK,CAAC,mBAAmB,CAAC,QAAgB;QACvD,MAAM,QAAQ,GAAG,MAAM,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;QAC7C,MAAM,IAAI,GAAG,IAAA,mBAAU,EAAC,QAAQ,CAAC,CAAC;QAClC,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;QAEtB,OAAO,IAAI,CAAC,MAAM,EAAE,CAAC;IACzB,CAAC;IAES,MAAM,CAAC,oBAAoB,CAAC,OAAe;QACjD,MAAM,YAAY,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,EAAE,OAAO,CAAC,EAAE,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QAC7F,MAAM,IAAI,GAAG,IAAA,mBAAU,EAAC,QAAQ,CAAC,CAAC;QAClC,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;QAE1B,OAAO,IAAI,CAAC,MAAM,EAAE,CAAC;IACzB,CAAC;IAED;;;OAGG;IACI,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAAC,MAA8B;QAC/D,MAAM,OAAO,GAAG,IAAA,oCAAc,EAC1B,MAAM,CAAC,QAAQ,EACf,MAAM,CAAC,UAAU,EACjB,MAAM,CAAC,UAAU,IAAI,gCAAwB,EAC7C,MAAM,CAAC,WAAW,EAClB,MAAM,CAAC,OAAO,EACd,MAAM,CAAC,SAAS,CACnB,CAAC;QAEF,OAAO,MAAM,CAAC,aAAa,CAAC,OAAO,EAAE,MAAM,CAAC,IAAI,IAAI,CAAC,EAAE,MAAM,CAAC,MAAM,IAAI,MAAM,CAAC,OAAO,CAAC,CAAC,CAAC;IAC7F,CAAC;IAES,MAAM,CAAC,uBAAuB,CAAC,OAAe,EAAE,SAAS,GAAG,OAAO;QACzE,MAAM,KAAK,GAAG,IAAI,MAAM,CAAC,GAAG,SAAS,YAAY,CAAC,CAAC;QACnD,MAAM,KAAK,GAAG,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;QACnC,IAAI,KAAK,EAAE,CAAC;YACR,OAAO,KAAK,CAAC,CAAC,CAAC,CAAC;QACpB,CAAC;aAAM,CAAC;YACJ,MAAM,IAAI,KAAK,CAAC,GAAG,SAAS,sBAAsB,CAAC,CAAC;QACxD,CAAC;IACL,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,SAAS,CAAC,OAAgB;QACpC,OAAO,IAAA,+BAAS,EAAC,OAAO,CAAC,CAAC;IAC9B,CAAC;IAEM,MAAM,CAAC,KAAK,CAAC,gCAAgC,CAAC,MAAc;QAC/D,OAAO,IAAA,sDAAgC,EAAC,MAAM,CAAC,CAAC;IACpD,CAAC;IAEM,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAAC,MAAc;QAC/C,OAAO,IAAA,sCAAgB,EAAC,MAAM,CAAC,CAAC;IACpC,CAAC;IAEM,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAAC,OAAgB;QACjD,OAAO,IAAA,sCAAgB,EAAC,OAAO,CAAC,CAAC;IACrC,CAAC;IACD;;;OAGG;IACI,MAAM,CAAC,cAAc,CAAC,KAAuC;QAChE,IAAI,MAA+B,CAAC;QACpC,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC5B,IAAI,KAAK,CAAC,IAAI,EAAE,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBAC5B,OAAO,EAAe,CAAC;YAC3B,CAAC;YACD,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;QAC/B,CAAC;aAAM,CAAC;YACJ,MAAM,GAAG,KAAK,CAAC;QACnB,CAAC;QAED,MAAM,EAAE,OAAO,EAAE,GAAG,IAAA,yBAAgB,EAAC,MAAM,EAAE,gCAAe,CAAC,CAAC;QAC9D,IAAI,CAAC,OAAO,EAAE,CAAC;YACX,MAAM,gBAAgB,GAAG,KAAK,CAAC,IAAI,CAAC,aAAK,CAAC,MAAM,CAAC,gCAAe,EAAE,MAAM,CAAC,CAAC,CAAC;YAC3E,IAAI,gBAAgB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC9B,MAAM,IAAI,KAAK,CAAC,mCAAmC,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;YAC5G,CAAC;QACL,CAAC;QAED,OAAO,MAAmB,CAAC;IAC/B,CAAC;IAEO,MAAM,CAAC,SAAS,CAAC,IAAgB,EAAE,MAA+B;QACtE,MAAM,UAAU,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QACrC,QAAQ,IAAI,CAAC,QAAQ,EAAE,CAAC;YACpB,KAAK,6BAAY,CAAC,EAAE;gBAChB,OAAO,UAAU,IAAI,IAAI,CAAC,KAAK,CAAC;YACpC,KAAK,6BAAY,CAAC,EAAE;gBAChB,OAAO,UAAU,KAAK,IAAI,CAAC,KAAK,CAAC;YACrC,KAAK,6BAAY,CAAC,EAAE;gBAChB,OAAO,UAAU,IAAI,IAAI,CAAC,KAAK,CAAC;YACpC;gBACI,OAAO,KAAK,CAAC;QACrB,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACI,MAAM,CAAC,KAAK,CAAC,YAAY,CAAC,MAAc,EAAE,SAAoB;QACjE,IAAI,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACtC,OAAO,CAAC,4CAA4C;QACxD,CAAC;QAED,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAAC,MAAM,CAAC,CAAC;QACnE,MAAM,YAAY,GAAG,SAAS,CAAC,oCAAmB,CAAiB,CAAC;QACpE,IAAI,YAAY,EAAE,CAAC;YACf,KAAK,MAAM,IAAI,IAAI,YAAY,EAAE,CAAC;gBAC9B,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,IAAI,EAAE,MAAM,CAAC,EAAE,CAAC;oBAChC,MAAM,UAAU,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;oBACrC,MAAM,IAAI,KAAK,CACX,8CAA8C,IAAI,CAAC,IAAI,eAAe,IAAI,CAAC,SAAS,CAAC,UAAU,CAAC,IAAI;wBAChG,YAAY,IAAI,CAAC,QAAQ,IAAI,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,KAAK,CAAC,EAAE,CAChE,CAAC;gBACN,CAAC;YACL,CAAC;QACL,CAAC;QAED,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC,MAAM,IAAI,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC,CAAC;QAChF,MAAM,SAAS,GAAG,SAAS,CAAC,MAAM,CAAiB,CAAC;QACpD,IAAI,SAAS,EAAE,CAAC;YACZ,KAAK,MAAM,IAAI,IAAI,SAAS,EAAE,CAAC;gBAC3B,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,IAAI,EAAE,MAAM,CAAC,EAAE,CAAC;oBAChC,MAAM,UAAU,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;oBACrC,MAAM,IAAI,KAAK,CACX,wBAAwB,MAAM,aAAa,IAAI,CAAC,IAAI,eAAe,IAAI,CAAC,SAAS,CAAC,UAAU,CAAC,IAAI;wBAC7F,YAAY,IAAI,CAAC,QAAQ,IAAI,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,KAAK,CAAC,EAAE,CAChE,CAAC;gBACN,CAAC;YACL,CAAC;QACL,CAAC;IACL,CAAC;CACJ;AAxhBD,wBAwhBC"}
@@ -1,31 +0,0 @@
1
- syntax = "proto3";
2
-
3
- enum SevSNPCertType {
4
- ARK = 0;
5
- ASK = 1;
6
- VCEK = 2;
7
- }
8
-
9
- enum SevSnpCertificateFormat {
10
- PEM = 0;
11
- DER = 1;
12
- }
13
-
14
- message SnpCert {
15
- SevSNPCertType type = 1;
16
- bytes cert = 2;
17
- SevSnpCertificateFormat format = 3;
18
- }
19
-
20
- message SNPReport {
21
- bytes rawReport = 1;
22
- uint32 cpuSig = 2;
23
- uint32 cores = 3;
24
- bytes cmdLineHash = 4;
25
- string build = 5;
26
- }
27
-
28
- message SNPReportWithChain {
29
- SNPReport snpReport = 1;
30
- repeated SnpCert certs = 2;
31
- }
@@ -1,11 +0,0 @@
1
- syntax = "proto3";
2
-
3
- message Compression {
4
- enum TYPE {
5
- Uncompressed = 0;
6
- GZIP = 1;
7
- }
8
-
9
- TYPE type = 1;
10
- bytes data = 2;
11
- }
@@ -1,6 +0,0 @@
1
- syntax = "proto3";
2
-
3
- message Hash {
4
- string algo = 1;
5
- bytes hash = 2;
6
- }
@@ -1,21 +0,0 @@
1
- syntax = "proto3";
2
-
3
- import "Hash.proto";
4
-
5
- message OrderReportProto {
6
- repeated bytes certificates = 1;
7
- WorkloadInfo workloadInfo = 2;
8
- }
9
-
10
- message WorkloadInfo {
11
- repeated RuntimeInfo runtimeInfo = 1;
12
- int64 created = 2;
13
- }
14
-
15
- message RuntimeInfo {
16
- string type = 1;
17
- int64 size = 2;
18
- Hash hash = 3;
19
- optional Hash signatureKeyHash = 4;
20
- optional Hash argsHash = 5;
21
- }
package/dto/src/TRI.proto DELETED
@@ -1,22 +0,0 @@
1
- syntax = "proto3";
2
-
3
- import "Hash.proto";
4
-
5
- message Encryption {
6
- string algo = 1;
7
- optional bytes key = 2;
8
- optional string cipher = 3;
9
- optional bytes ciphertext = 4;
10
- optional bytes iv = 6;
11
- optional bytes mac = 7;
12
- string encoding = 8;
13
- }
14
-
15
- message TRI {
16
- repeated Hash solutionHashes = 1;
17
- bytes mrenclave = 2;
18
- string args = 3;
19
- Encryption encryption = 4;
20
- bytes mrsigner = 5;
21
- repeated Hash imageHashes = 6;
22
- }
@@ -1,46 +0,0 @@
1
- syntax = "proto3";
2
-
3
- message TeeDeviceInfo {
4
- CpuInfo cpu = 1;
5
- MemoryInfo memory = 2;
6
- DiskInfo disk = 3;
7
- GpuInfo gpu = 4;
8
- }
9
-
10
- message CpuInfo {
11
- string vendor_id = 1;
12
- int32 cpu_family = 2;
13
- int32 model = 3;
14
- string model_name = 4;
15
- int32 total_physical_cores = 5;
16
- int32 total_logical_cores = 6;
17
- int32 base_freq = 7;
18
- int32 max_freq = 8;
19
- }
20
-
21
- message MemoryInfo {
22
- string type = 1;
23
- int64 size = 2;
24
- }
25
-
26
- message DiskInfo {
27
- string type = 1;
28
- int64 size = 2;
29
- }
30
-
31
- message GpuInfo {
32
- string type = 1;
33
- int32 count = 2;
34
- int64 memory_size = 3;
35
- }
36
-
37
- message NvtrustGPUInfo {
38
- string model = 1;
39
- string driverVersion = 2;
40
- string vbios = 3;
41
- bool dbgStat = 4;
42
- }
43
-
44
- message NvtrustGPUList {
45
- repeated NvtrustGPUInfo gpus = 1;
46
- }