@super-protocol/addons-tee 1.0.0 → 2.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (116) hide show
  1. package/bindings/nvidia-native/README.md +174 -0
  2. package/bindings/nvidia-native/package.json +26 -0
  3. package/bindings/nvidia-native/postinstall.js +40 -0
  4. package/dist/index.d.ts +1 -1
  5. package/dist/index.js +1 -28
  6. package/package.json +4 -2
  7. package/.editorconfig +0 -15
  8. package/.eslintrc.json +0 -61
  9. package/.prettierignore +0 -3
  10. package/.prettierrc +0 -15
  11. package/bindings/amd-sev-snp-napi-rs/amd-sev-snp-napi-rs.linux-x64-gnu.node +0 -0
  12. package/bindings/amd-sev-snp-napi-rs/index.d.ts +0 -51
  13. package/bindings/amd-sev-snp-napi-rs/index.js +0 -339
  14. package/bindings/amd-sev-snp-napi-rs/package-lock.json +0 -40
  15. package/bindings/sgx-native/build/Release/libmbedcrypto_gramine.so.15 +0 -0
  16. package/bindings/sgx-native/build/Release/libmbedx509_gramine.so.6 +0 -0
  17. package/bindings/sgx-native/build/Release/libsgx_dcap_quoteverify.so.1 +0 -0
  18. package/bindings/sgx-native/build/Release/libtdx_attest.so.1 +0 -0
  19. package/bindings/sgx-native/build/Release/sgx_native.node +0 -0
  20. package/bindings/sgx-native/package-lock.json +0 -23
  21. package/bindings/sp-sev/.github/auto_assign-issues.yml +0 -5
  22. package/bindings/sp-sev/.github/auto_assign.yml +0 -21
  23. package/bindings/sp-sev/.github/dependabot.yml +0 -6
  24. package/bindings/sp-sev/.github/workflows/dco.yml +0 -10
  25. package/bindings/sp-sev/.github/workflows/lint.yml +0 -56
  26. package/bindings/sp-sev/.github/workflows/test.yml +0 -215
  27. package/bindings/sp-sev/.rustfmt.toml +0 -2
  28. package/bindings/sp-sev/CODEOWNERS +0 -1
  29. package/bindings/sp-sev/Cargo.lock +0 -2461
  30. package/bindings/sp-sev/Cargo.toml +0 -80
  31. package/bindings/sp-sev/LICENSE +0 -201
  32. package/bindings/sp-sev/README.md +0 -82
  33. package/bindings/sp-sev/build.rs +0 -17
  34. package/bindings/sp-sev/docs/attestation/README.md +0 -239
  35. package/bindings/sp-sev/docs/attestation/certchain.dot +0 -14
  36. package/bindings/sp-sev/docs/attestation/certchain.dot.png +0 -0
  37. package/bindings/sp-sev/docs/attestation/prerequisites.md +0 -6
  38. package/bindings/sp-sev/docs/attestation/process.msc +0 -60
  39. package/bindings/sp-sev/docs/attestation/process.msc.png +0 -0
  40. package/bindings/sp-sev/docs/attestation/protections.md +0 -53
  41. package/bindings/sp-sev/package-version.py +0 -11
  42. package/bindings/sp-sev/tests/api.rs +0 -194
  43. package/bindings/sp-sev/tests/certs.rs +0 -142
  44. package/bindings/sp-sev/tests/certs_data/cert_chain_milan +0 -74
  45. package/bindings/sp-sev/tests/certs_data/cert_chain_turin +0 -74
  46. package/bindings/sp-sev/tests/certs_data/report_milan.hex +0 -1
  47. package/bindings/sp-sev/tests/certs_data/vcek_milan.der +0 -0
  48. package/bindings/sp-sev/tests/certs_data/vcek_turin.der +0 -0
  49. package/bindings/sp-sev/tests/guest.rs +0 -57
  50. package/bindings/sp-sev/tests/id-block.rs +0 -172
  51. package/bindings/sp-sev/tests/measurement/ovmf_AmdSev_suffix.bin +0 -0
  52. package/bindings/sp-sev/tests/measurement/ovmf_OvmfX64_suffix.bin +0 -0
  53. package/bindings/sp-sev/tests/measurement/test_auth_block.bin +0 -0
  54. package/bindings/sp-sev/tests/measurement/test_auth_key.pem +0 -6
  55. package/bindings/sp-sev/tests/measurement/test_auth_sig.bin +0 -0
  56. package/bindings/sp-sev/tests/measurement/test_id_key.pem +0 -6
  57. package/bindings/sp-sev/tests/measurement/test_id_sig.bin +0 -0
  58. package/bindings/sp-sev/tests/measurement.rs +0 -510
  59. package/bindings/sp-sev/tests/naples/ark.cert.bad +0 -0
  60. package/bindings/sp-sev/tests/naples/ark.cert.sig +0 -0
  61. package/bindings/sp-sev/tests/naples/ark.rs +0 -38
  62. package/bindings/sp-sev/tests/naples/ask.rs +0 -29
  63. package/bindings/sp-sev/tests/naples/cek.cert +0 -0
  64. package/bindings/sp-sev/tests/naples/cek.rs +0 -30
  65. package/bindings/sp-sev/tests/naples/mod.rs +0 -20
  66. package/bindings/sp-sev/tests/naples/oca.cert +0 -0
  67. package/bindings/sp-sev/tests/naples/oca.rs +0 -45
  68. package/bindings/sp-sev/tests/naples/pdh.cert +0 -0
  69. package/bindings/sp-sev/tests/naples/pdh.rs +0 -28
  70. package/bindings/sp-sev/tests/naples/pek.cert +0 -0
  71. package/bindings/sp-sev/tests/naples/pek.rs +0 -32
  72. package/bindings/sp-sev/tests/rome/ark.rs +0 -33
  73. package/bindings/sp-sev/tests/rome/ask.rs +0 -29
  74. package/bindings/sp-sev/tests/rome/cek.cert +0 -0
  75. package/bindings/sp-sev/tests/rome/cek.rs +0 -29
  76. package/bindings/sp-sev/tests/rome/mod.rs +0 -16
  77. package/bindings/sp-sev/tests/rome/oca.cert +0 -0
  78. package/bindings/sp-sev/tests/rome/oca.rs +0 -45
  79. package/bindings/sp-sev/tests/rome/pdh.cert +0 -0
  80. package/bindings/sp-sev/tests/rome/pdh.rs +0 -28
  81. package/bindings/sp-sev/tests/rome/pek.cert +0 -0
  82. package/bindings/sp-sev/tests/rome/pek.rs +0 -32
  83. package/bindings/sp-sev/tests/session.rs +0 -39
  84. package/bindings/sp-sev/tests/sev_launch.rs +0 -120
  85. package/bindings/sp-sev/tests/snp_launch.rs +0 -108
  86. package/bindings/utils/virtee/LICENSE +0 -201
  87. package/bindings/utils/virtee/libsev.so +0 -0
  88. package/bindings/utils/virtee/snpguest +0 -0
  89. package/dist/proto/AmdSevSnp.d.ts +0 -194
  90. package/dist/proto/AmdSevSnp.js +0 -363
  91. package/dist/sgx-native-module/consts.d.ts +0 -24
  92. package/dist/sgx-native-module/consts.js +0 -38
  93. package/dist/sgx-native-module/dcap-quote-verify.service.d.ts +0 -12
  94. package/dist/sgx-native-module/dcap-quote-verify.service.js +0 -84
  95. package/dist/sgx-native-module/enclave.service.d.ts +0 -93
  96. package/dist/sgx-native-module/enclave.service.js +0 -211
  97. package/dist/sgx-native-module/errors.d.ts +0 -19
  98. package/dist/sgx-native-module/errors.js +0 -69
  99. package/dist/sgx-native-module/helpers.d.ts +0 -1
  100. package/dist/sgx-native-module/helpers.js +0 -50
  101. package/dist/sgx-native-module/index.d.ts +0 -9
  102. package/dist/sgx-native-module/index.js +0 -26
  103. package/dist/sgx-native-module/pki.service.d.ts +0 -50
  104. package/dist/sgx-native-module/pki.service.js +0 -74
  105. package/dist/sgx-native-module/sev-snp-mrenclave.d.ts +0 -59
  106. package/dist/sgx-native-module/sev-snp-mrenclave.js +0 -322
  107. package/dist/sgx-native-module/sev-snp-schema.d.ts +0 -22
  108. package/dist/sgx-native-module/sev-snp-schema.js +0 -24
  109. package/dist/sgx-native-module/sev-snp.d.ts +0 -127
  110. package/dist/sgx-native-module/sev-snp.js +0 -513
  111. package/dto/src/AmdSevSnp.proto +0 -31
  112. package/dto/src/Compression.proto +0 -11
  113. package/dto/src/Hash.proto +0 -6
  114. package/dto/src/OrderReport.proto +0 -21
  115. package/dto/src/TRI.proto +0 -22
  116. package/dto/src/TeeDeviceInfo.proto +0 -46
@@ -1,322 +0,0 @@
1
- "use strict";
2
- var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
- if (k2 === undefined) k2 = k;
4
- var desc = Object.getOwnPropertyDescriptor(m, k);
5
- if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
- desc = { enumerable: true, get: function() { return m[k]; } };
7
- }
8
- Object.defineProperty(o, k2, desc);
9
- }) : (function(o, m, k, k2) {
10
- if (k2 === undefined) k2 = k;
11
- o[k2] = m[k];
12
- }));
13
- var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
- Object.defineProperty(o, "default", { enumerable: true, value: v });
15
- }) : function(o, v) {
16
- o["default"] = v;
17
- });
18
- var __importStar = (this && this.__importStar) || function (mod) {
19
- if (mod && mod.__esModule) return mod;
20
- var result = {};
21
- if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
- __setModuleDefault(result, mod);
23
- return result;
24
- };
25
- var __importDefault = (this && this.__importDefault) || function (mod) {
26
- return (mod && mod.__esModule) ? mod : { "default": mod };
27
- };
28
- Object.defineProperty(exports, "__esModule", { value: true });
29
- exports.SNPMrEnclaveCalculator = void 0;
30
- const typebox_1 = require("@sinclair/typebox");
31
- const value_1 = require("@sinclair/typebox/value");
32
- const fs = __importStar(require("fs"));
33
- const fsAsync = __importStar(require("fs/promises"));
34
- const path = __importStar(require("path"));
35
- const os = __importStar(require("os"));
36
- const sev_snp_1 = require("./sev-snp");
37
- const axios_1 = __importDefault(require("axios"));
38
- const sdk_js_1 = require("@super-protocol/sdk-js");
39
- const dto_js_1 = require("@super-protocol/dto-js");
40
- const crypto_1 = require("crypto");
41
- const stream_1 = require("stream");
42
- const helpers_1 = require("./helpers");
43
- const amd_sev_snp_napi_rs_1 = require("../../bindings/amd-sev-snp-napi-rs/");
44
- const VMJsonSchema = typebox_1.Type.Object({
45
- kernel: typebox_1.Type.Object({ sha256: typebox_1.Type.String() }),
46
- initrd: typebox_1.Type.Optional(typebox_1.Type.Object({ sha256: typebox_1.Type.String() })),
47
- bios_amd: typebox_1.Type.Optional(typebox_1.Type.Object({
48
- sha256: typebox_1.Type.String(),
49
- bucket: typebox_1.Type.String(),
50
- prefix: typebox_1.Type.String(),
51
- filename: typebox_1.Type.String(),
52
- })),
53
- bios: typebox_1.Type.Optional(typebox_1.Type.Object({
54
- sha256: typebox_1.Type.String(),
55
- bucket: typebox_1.Type.String(),
56
- prefix: typebox_1.Type.String(),
57
- filename: typebox_1.Type.String(),
58
- })),
59
- });
60
- class VMConfigCache {
61
- constructor(ttl = 5 * 60 * 1000) {
62
- this.cache = {};
63
- this.ttl = ttl;
64
- }
65
- set(key, value) {
66
- const timestamp = Date.now();
67
- this.cache[key] = {
68
- value,
69
- timestamp,
70
- };
71
- }
72
- get(key, force = false) {
73
- const record = this.cache[key];
74
- if (record) {
75
- if (force === false) {
76
- const now = Date.now();
77
- if (now - record.timestamp > this.ttl) {
78
- return null;
79
- }
80
- }
81
- return record.value;
82
- }
83
- return null;
84
- }
85
- clear() {
86
- this.cache = {};
87
- }
88
- }
89
- class SNPMrEnclaveCalculator {
90
- constructor(config) {
91
- this.axiosInstance = axios_1.default.create();
92
- this.defaultCredentials = {
93
- storageType: dto_js_1.StorageType.S3,
94
- credentials: {
95
- endpoint: "https://gateway.storjshare.io",
96
- accessKeyId: "jxekrow2wxmjps6pr2jv22hamtha",
97
- secretKey: "jztnpl532njcljtdolnpbszq66lgqmwmgkbh747342hwc72grkohi",
98
- // prefix and bucket can be any, as it will be filled later
99
- bucket: "",
100
- prefix: "",
101
- },
102
- };
103
- this.cacheFolder = config.cacheFolder || fs.mkdtempSync(path.join(os.tmpdir(), "snp-mrenclave-cache-"));
104
- const rmPrevCache = config.rmPrevCache ?? false;
105
- this.vmRepoOwner = config.vmRepoOwner || "Super-Protocol";
106
- this.vmRepo = config.vmRepo || "sp-vm";
107
- this.releaseAsset = config.releaseAsset || "vm.json";
108
- this.retryInterval = config.downloadAssetRetryInterval ?? 1000;
109
- this.retryMax = config.downloadAssetRetryMax ?? 3;
110
- this.storageAccess = config.storageAccess ?? this.defaultCredentials;
111
- const cacheRecordsTTL = config.cacheRecordsTTL ?? 5 * 60 * 1000;
112
- if (rmPrevCache) {
113
- (0, helpers_1.gramineCompatibleRmDir)(this.cacheFolder);
114
- }
115
- if (!fs.existsSync(this.cacheFolder)) {
116
- fs.mkdirSync(this.cacheFolder, { recursive: true });
117
- }
118
- this.vmInfoCache = new VMConfigCache(cacheRecordsTTL);
119
- }
120
- /**
121
- * The method allows to obtain expected mrenclave if the virtual machine for which the report is
122
- * submitted was running on one core and a Milan processor
123
- * @param report - @see CalcSnpMrEnclaveParams
124
- */
125
- async getSingleCoreMrEnclave(report) {
126
- const mrEnclave = await sev_snp_1.SevSNP.getMrEnclave(Buffer.from(report.rawReport));
127
- const vmMeasure = await this.downloadVM(report.build);
128
- const expectedMrEnclave = await sev_snp_1.SevSNP.calcSnpMrEnclave({
129
- ovmfPath: vmMeasure.ovmfFilePath,
130
- kernelHash: vmMeasure.kernelHash,
131
- initrdHash: vmMeasure.initrdHash,
132
- cmdLineHash: Buffer.from(report.cmdLineHash),
133
- vcpuSig: report.cpuSig,
134
- vcpuCount: report.cores,
135
- vmpl: await (0, amd_sev_snp_napi_rs_1.getReportVmpl)(Buffer.from(report.rawReport)),
136
- policy: await (0, amd_sev_snp_napi_rs_1.getReportPolicy)(Buffer.from(report.rawReport)),
137
- });
138
- if (!mrEnclave.equals(expectedMrEnclave))
139
- throw new Error(`Expected mrEnclave does not match the calculated one.\n` +
140
- `mrEnclave: ${mrEnclave.toString("hex")}\n` +
141
- `expectedMrEnclave: ${expectedMrEnclave.toString("hex")}\n` +
142
- `report.build: ${report.build}\n` +
143
- `vmMeasure: ${JSON.stringify(vmMeasure)}`);
144
- const singleCoreMrEnclave = await sev_snp_1.SevSNP.calcSnpMrEnclave({
145
- ovmfPath: vmMeasure.ovmfFilePath,
146
- kernelHash: vmMeasure.kernelHash,
147
- initrdHash: vmMeasure.initrdHash,
148
- cmdLineHash: Buffer.from(report.cmdLineHash),
149
- vcpuSig: sev_snp_1.SevSNP.getCpuSig(sev_snp_1.AMD_EPYC_MILAN_CPUINFO),
150
- vcpuCount: 1,
151
- });
152
- return singleCoreMrEnclave;
153
- }
154
- async downloadAsset(assetUrl) {
155
- const { retryInterval, retryMax } = this;
156
- const response = await sdk_js_1.helpers.tryWithInterval({
157
- checkResult(response) {
158
- return { isResultOk: response.status === 200 };
159
- },
160
- handler: async () => {
161
- return this.axiosInstance.get(assetUrl, {
162
- responseType: "arraybuffer",
163
- });
164
- },
165
- checkError(err) {
166
- if (axios_1.default.isAxiosError(err) && err.response) {
167
- const status = err.response.status;
168
- return { retryable: status < 400 || status >= 500 || status === 429 };
169
- }
170
- return { retryable: axios_1.default.isAxiosError(err) };
171
- },
172
- retryInterval,
173
- retryMax,
174
- });
175
- return response.data;
176
- }
177
- extractVMData(data) {
178
- const vmRaw = data.toString("utf-8");
179
- const parsed = JSON.parse(vmRaw);
180
- const { isValid } = (0, sdk_js_1.validateBySchema)(parsed, VMJsonSchema);
181
- if (!isValid) {
182
- const validationErrors = Array.from(value_1.Value.Errors(VMJsonSchema, parsed));
183
- const details = validationErrors.map((e) => e.message).join(", ");
184
- throw new Error(`Failed to validate VM JSON:${details ? `: ${details}` : ""}`);
185
- }
186
- const vm = parsed;
187
- const kernelHash = vm.kernel.sha256;
188
- const initrdHash = vm.initrd?.sha256;
189
- const OVMF = vm.bios_amd || vm.bios;
190
- if (!OVMF) {
191
- throw new Error("Neither bios_amd nor bios is available");
192
- }
193
- const { sha256, bucket, prefix, filename } = OVMF;
194
- if (!sha256 || !bucket || !prefix || !filename) {
195
- throw new Error("Missing one or more required fields in OVMF");
196
- }
197
- return {
198
- kernelHash: Buffer.from(kernelHash, "hex"),
199
- initrdHash: initrdHash ? Buffer.from(initrdHash, "hex") : undefined,
200
- ovmfHash: Buffer.from(sha256, "hex"),
201
- ovmfBucket: bucket,
202
- ovmfPrefix: prefix,
203
- ovmfFilename: filename,
204
- };
205
- }
206
- static calcHashStream(alg = "sha256") {
207
- const hash = (0, crypto_1.createHash)(alg);
208
- return {
209
- process: new stream_1.Transform({
210
- transform: (data, encoding, done) => {
211
- hash.update(data);
212
- done(null, data);
213
- },
214
- }),
215
- get: () => hash.digest(),
216
- };
217
- }
218
- static async fileExist(filePath) {
219
- try {
220
- await fsAsync.access(filePath, fs.constants.F_OK);
221
- return true;
222
- }
223
- catch (err) {
224
- return false;
225
- }
226
- }
227
- async getAssetUrl(build) {
228
- const { retryInterval, retryMax } = this;
229
- const response = await sdk_js_1.helpers.tryWithInterval({
230
- checkResult(response) {
231
- return { isResultOk: response.status === 200 };
232
- },
233
- handler: async () => {
234
- return this.axiosInstance.get(`https://api.github.com/repos/${this.vmRepoOwner}/${this.vmRepo}/releases/tags/${build}`);
235
- },
236
- checkError(err) {
237
- if (axios_1.default.isAxiosError(err) && err.response) {
238
- const status = err.response.status;
239
- return { retryable: status < 400 || status >= 500 || status === 429 };
240
- }
241
- return { retryable: axios_1.default.isAxiosError(err) };
242
- },
243
- retryInterval,
244
- retryMax,
245
- });
246
- const { data } = response;
247
- const asset = data.assets.find((asset) => asset.name === this.releaseAsset);
248
- if (!asset) {
249
- throw new Error(`Failed to find asset named ${this.releaseAsset} for build ${build}.`);
250
- }
251
- return asset.browser_download_url;
252
- }
253
- async downloadVM(build) {
254
- let fromCache = false;
255
- let vmFiles;
256
- const vmInfo = this.vmInfoCache.get(build);
257
- if (vmInfo) {
258
- fromCache = true;
259
- vmFiles = vmInfo;
260
- }
261
- else {
262
- try {
263
- const assetUrl = await this.getAssetUrl(build);
264
- const vm = await this.downloadAsset(assetUrl);
265
- vmFiles = this.extractVMData(vm);
266
- }
267
- catch (error) {
268
- const vmInfo = this.vmInfoCache.get(build, true);
269
- if (vmInfo) {
270
- fromCache = true;
271
- vmFiles = vmInfo;
272
- }
273
- else {
274
- throw error;
275
- }
276
- }
277
- }
278
- const ovmfPath = path.join(this.cacheFolder, `${vmFiles.ovmfHash.toString("hex")}_OVMF.fd`);
279
- let fileExistAndCorrect = false;
280
- if (await SNPMrEnclaveCalculator.fileExist(ovmfPath)) {
281
- const fileStream = fs.createReadStream(ovmfPath);
282
- const hash = await sdk_js_1.Crypto.createHash(fileStream, {
283
- algo: dto_js_1.HashAlgorithm.SHA256,
284
- encoding: dto_js_1.Encoding.hex,
285
- });
286
- if (vmFiles.ovmfHash.toString("hex") === hash.hash) {
287
- fileExistAndCorrect = true;
288
- }
289
- }
290
- if (fileExistAndCorrect !== true) {
291
- await this.downloadOvmf(vmFiles, ovmfPath);
292
- }
293
- if (fromCache !== true) {
294
- this.vmInfoCache.set(build, vmFiles);
295
- }
296
- return {
297
- initrdHash: vmFiles.initrdHash,
298
- kernelHash: vmFiles.kernelHash,
299
- ovmfFilePath: ovmfPath,
300
- ovmfHash: vmFiles.ovmfHash,
301
- };
302
- }
303
- async downloadOvmf(vmFiles, ovmfPath) {
304
- const access = {
305
- ...this.storageAccess,
306
- credentials: {
307
- ...this.storageAccess.credentials,
308
- bucket: vmFiles.ovmfBucket,
309
- prefix: vmFiles.ovmfPrefix.endsWith("/") ? vmFiles.ovmfPrefix : `${vmFiles.ovmfPrefix}/`,
310
- },
311
- };
312
- const storageProvider = (0, sdk_js_1.getStorageProvider)(access);
313
- const downloaderStream = await storageProvider.downloadFile(vmFiles.ovmfFilename, {});
314
- const { process: hashStream, get: getStreamHash } = SNPMrEnclaveCalculator.calcHashStream("sha256");
315
- await stream_1.promises.pipeline(downloaderStream, hashStream, fs.createWriteStream(ovmfPath));
316
- if (!vmFiles.ovmfHash.equals(getStreamHash())) {
317
- throw new Error("The downloaded OVMF-file does not match the expected checksum");
318
- }
319
- }
320
- }
321
- exports.SNPMrEnclaveCalculator = SNPMrEnclaveCalculator;
322
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"sev-snp-mrenclave.js","sourceRoot":"","sources":["../../src/sgx-native-module/sev-snp-mrenclave.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,+CAAiD;AACjD,mDAAgD;AAChD,uCAAyB;AACzB,qDAAuC;AACvC,2CAA6B;AAC7B,uCAAyB;AACzB,uCAA2D;AAC3D,kDAA6C;AAC7C,mDAMgC;AAChC,mDAA8E;AAC9E,mCAAoC;AACpC,mCAA6C;AAC7C,uCAAmD;AAEnD,6EAAqF;AAkBrF,MAAM,YAAY,GAAG,cAAI,CAAC,MAAM,CAAC;IAC7B,MAAM,EAAE,cAAI,CAAC,MAAM,CAAC,EAAE,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE,EAAE,CAAC;IAC9C,MAAM,EAAE,cAAI,CAAC,QAAQ,CAAC,cAAI,CAAC,MAAM,CAAC,EAAE,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC;IAC7D,QAAQ,EAAE,cAAI,CAAC,QAAQ,CACnB,cAAI,CAAC,MAAM,CAAC;QACR,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,QAAQ,EAAE,cAAI,CAAC,MAAM,EAAE;KAC1B,CAAC,CACL;IACD,IAAI,EAAE,cAAI,CAAC,QAAQ,CACf,cAAI,CAAC,MAAM,CAAC;QACR,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,QAAQ,EAAE,cAAI,CAAC,MAAM,EAAE;KAC1B,CAAC,CACL;CACJ,CAAC,CAAC;AAGH,MAAM,aAAa;IAIf,YAAY,MAAc,CAAC,GAAG,EAAE,GAAG,IAAI;QAH/B,UAAK,GAA8D,EAAE,CAAC;QAI1E,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;IACnB,CAAC;IAED,GAAG,CAAC,GAAW,EAAE,KAAe;QAC5B,MAAM,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAC7B,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG;YACd,KAAK;YACL,SAAS;SACZ,CAAC;IACN,CAAC;IAED,GAAG,CAAC,GAAW,EAAE,QAAiB,KAAK;QACnC,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QAE/B,IAAI,MAAM,EAAE,CAAC;YACT,IAAI,KAAK,KAAK,KAAK,EAAE,CAAC;gBAClB,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;gBACvB,IAAI,GAAG,GAAG,MAAM,CAAC,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;oBACpC,OAAO,IAAI,CAAC;gBAChB,CAAC;YACL,CAAC;YAED,OAAO,MAAM,CAAC,KAAK,CAAC;QACxB,CAAC;QAED,OAAO,IAAI,CAAC;IAChB,CAAC;IAED,KAAK;QACD,IAAI,CAAC,KAAK,GAAG,EAAE,CAAC;IACpB,CAAC;CACJ;AAcD,MAAa,sBAAsB;IAsB/B,YAAY,MAAkC;QAjB7B,kBAAa,GAAG,eAAK,CAAC,MAAM,EAAE,CAAC;QAK/B,uBAAkB,GAAkB;YACjD,WAAW,EAAE,oBAAW,CAAC,EAAE;YAC3B,WAAW,EAAE;gBACT,QAAQ,EAAE,+BAA+B;gBACzC,WAAW,EAAE,8BAA8B;gBAC3C,SAAS,EAAE,uDAAuD;gBAClE,2DAA2D;gBAC3D,MAAM,EAAE,EAAE;gBACV,MAAM,EAAE,EAAE;aACb;SACJ,CAAC;QAGE,IAAI,CAAC,WAAW,GAAG,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,MAAM,EAAE,EAAE,sBAAsB,CAAC,CAAC,CAAC;QACxG,MAAM,WAAW,GAAG,MAAM,CAAC,WAAW,IAAI,KAAK,CAAC;QAChD,IAAI,CAAC,WAAW,GAAG,MAAM,CAAC,WAAW,IAAI,gBAAgB,CAAC;QAC1D,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC,MAAM,IAAI,OAAO,CAAC;QACvC,IAAI,CAAC,YAAY,GAAG,MAAM,CAAC,YAAY,IAAI,SAAS,CAAC;QACrD,IAAI,CAAC,aAAa,GAAG,MAAM,CAAC,0BAA0B,IAAI,IAAI,CAAC;QAC/D,IAAI,CAAC,QAAQ,GAAG,MAAM,CAAC,qBAAqB,IAAI,CAAC,CAAC;QAElD,IAAI,CAAC,aAAa,GAAG,MAAM,CAAC,aAAa,IAAI,IAAI,CAAC,kBAAkB,CAAC;QAErE,MAAM,eAAe,GAAG,MAAM,CAAC,eAAe,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC;QAEhE,IAAI,WAAW,EAAE,CAAC;YACd,IAAA,gCAAsB,EAAC,IAAI,CAAC,WAAW,CAAC,CAAC;QAC7C,CAAC;QAED,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC;YACnC,EAAE,CAAC,SAAS,CAAC,IAAI,CAAC,WAAW,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QACxD,CAAC;QAED,IAAI,CAAC,WAAW,GAAG,IAAI,aAAa,CAAC,eAAe,CAAC,CAAC;IAC1D,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,sBAAsB,CAAC,MAAiB;QACjD,MAAM,SAAS,GAAG,MAAM,gBAAM,CAAC,YAAY,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,CAAC;QAC3E,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;QACtD,MAAM,iBAAiB,GAAG,MAAM,gBAAM,CAAC,gBAAgB,CAAC;YACpD,QAAQ,EAAE,SAAS,CAAC,YAAY;YAChC,UAAU,EAAE,SAAS,CAAC,UAAU;YAChC,UAAU,EAAE,SAAS,CAAC,UAAU;YAChC,WAAW,EAAE,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC;YAC5C,OAAO,EAAE,MAAM,CAAC,MAAM;YACtB,SAAS,EAAE,MAAM,CAAC,KAAK;YACvB,IAAI,EAAE,MAAM,IAAA,mCAAa,EAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;YACxD,MAAM,EAAE,MAAM,IAAA,qCAAe,EAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;SAC/D,CAAC,CAAC;QAEH,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,iBAAiB,CAAC;YACpC,MAAM,IAAI,KAAK,CACX,yDAAyD;gBACrD,cAAc,SAAS,CAAC,QAAQ,CAAC,KAAK,CAAC,IAAI;gBAC3C,sBAAsB,iBAAiB,CAAC,QAAQ,CAAC,KAAK,CAAC,IAAI;gBAC3D,iBAAiB,MAAM,CAAC,KAAK,IAAI;gBACjC,cAAc,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,EAAE,CAChD,CAAC;QAEN,MAAM,mBAAmB,GAAG,MAAM,gBAAM,CAAC,gBAAgB,CAAC;YACtD,QAAQ,EAAE,SAAS,CAAC,YAAY;YAChC,UAAU,EAAE,SAAS,CAAC,UAAU;YAChC,UAAU,EAAE,SAAS,CAAC,UAAU;YAChC,WAAW,EAAE,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC;YAC5C,OAAO,EAAE,gBAAM,CAAC,SAAS,CAAC,gCAAsB,CAAC;YACjD,SAAS,EAAE,CAAC;SACf,CAAC,CAAC;QAEH,OAAO,mBAAmB,CAAC;IAC/B,CAAC;IAES,KAAK,CAAC,aAAa,CAAC,QAAgB;QAC1C,MAAM,EAAE,aAAa,EAAE,QAAQ,EAAE,GAAG,IAAI,CAAC;QACzC,MAAM,QAAQ,GAAG,MAAM,gBAAU,CAAC,eAAe,CAAgB;YAC7D,WAAW,CAAC,QAAQ;gBAChB,OAAO,EAAE,UAAU,EAAE,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE,CAAC;YACnD,CAAC;YACD,OAAO,EAAE,KAAK,IAAI,EAAE;gBAChB,OAAO,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,QAAQ,EAAE;oBACpC,YAAY,EAAE,aAAa;iBAC9B,CAAC,CAAC;YACP,CAAC;YACD,UAAU,CAAC,GAAG;gBACV,IAAI,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,IAAI,GAAG,CAAC,QAAQ,EAAE,CAAC;oBAC1C,MAAM,MAAM,GAAG,GAAG,CAAC,QAAQ,CAAC,MAAM,CAAC;oBAEnC,OAAO,EAAE,SAAS,EAAE,MAAM,GAAG,GAAG,IAAI,MAAM,IAAI,GAAG,IAAI,MAAM,KAAK,GAAG,EAAE,CAAC;gBAC1E,CAAC;gBAED,OAAO,EAAE,SAAS,EAAE,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,EAAE,CAAC;YAClD,CAAC;YACD,aAAa;YACb,QAAQ;SACX,CAAC,CAAC;QAEH,OAAO,QAAQ,CAAC,IAAI,CAAC;IACzB,CAAC;IAES,aAAa,CAAC,IAAY;QAChC,MAAM,KAAK,GAAG,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;QAErC,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;QACjC,MAAM,EAAE,OAAO,EAAE,GAAG,IAAA,yBAAgB,EAAC,MAAM,EAAE,YAAY,CAAC,CAAC;QAC3D,IAAI,CAAC,OAAO,EAAE,CAAC;YACX,MAAM,gBAAgB,GAAG,KAAK,CAAC,IAAI,CAAC,aAAK,CAAC,MAAM,CAAC,YAAY,EAAE,MAAM,CAAC,CAAC,CAAC;YACxE,MAAM,OAAO,GAAG,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YAClE,MAAM,IAAI,KAAK,CAAC,8BAA8B,OAAO,CAAC,CAAC,CAAC,KAAK,OAAO,EAAE,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;QACnF,CAAC;QAED,MAAM,EAAE,GAAG,MAAgB,CAAC;QAE5B,MAAM,UAAU,GAAG,EAAE,CAAC,MAAM,CAAC,MAAM,CAAC;QACpC,MAAM,UAAU,GAAG,EAAE,CAAC,MAAM,EAAE,MAAM,CAAC;QAErC,MAAM,IAAI,GAAG,EAAE,CAAC,QAAQ,IAAI,EAAE,CAAC,IAAI,CAAC;QACpC,IAAI,CAAC,IAAI,EAAE,CAAC;YACR,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;QAC9D,CAAC;QAED,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,QAAQ,EAAE,GAAG,IAAI,CAAC;QAElD,IAAI,CAAC,MAAM,IAAI,CAAC,MAAM,IAAI,CAAC,MAAM,IAAI,CAAC,QAAQ,EAAE,CAAC;YAC7C,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;QACnE,CAAC;QAED,OAAO;YACH,UAAU,EAAE,MAAM,CAAC,IAAI,CAAC,UAAU,EAAE,KAAK,CAAC;YAC1C,UAAU,EAAE,UAAU,CAAC,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS;YACnE,QAAQ,EAAE,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,KAAK,CAAC;YACpC,UAAU,EAAE,MAAM;YAClB,UAAU,EAAE,MAAM;YAClB,YAAY,EAAE,QAAQ;SACzB,CAAC;IACN,CAAC;IAES,MAAM,CAAC,cAAc,CAAC,GAAG,GAAG,QAAQ;QAC1C,MAAM,IAAI,GAAG,IAAA,mBAAU,EAAC,GAAG,CAAC,CAAC;QAE7B,OAAO;YACH,OAAO,EAAE,IAAI,kBAAS,CAAC;gBACnB,SAAS,EAAE,CAAC,IAAI,EAAE,QAAQ,EAAE,IAAI,EAAQ,EAAE;oBACtC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;oBAClB,IAAI,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;gBACrB,CAAC;aACJ,CAAC;YACF,GAAG,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,MAAM,EAAE;SAC3B,CAAC;IACN,CAAC;IAES,MAAM,CAAC,KAAK,CAAC,SAAS,CAAC,QAAgB;QAC7C,IAAI,CAAC;YACD,MAAM,OAAO,CAAC,MAAM,CAAC,QAAQ,EAAE,EAAE,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC;YAElD,OAAO,IAAI,CAAC;QAChB,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACX,OAAO,KAAK,CAAC;QACjB,CAAC;IACL,CAAC;IAES,KAAK,CAAC,WAAW,CAAC,KAAa;QACrC,MAAM,EAAE,aAAa,EAAE,QAAQ,EAAE,GAAG,IAAI,CAAC;QACzC,MAAM,QAAQ,GAAG,MAAM,gBAAU,CAAC,eAAe,CAAgB;YAC7D,WAAW,CAAC,QAAQ;gBAChB,OAAO,EAAE,UAAU,EAAE,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE,CAAC;YACnD,CAAC;YACD,OAAO,EAAE,KAAK,IAAI,EAAE;gBAChB,OAAO,IAAI,CAAC,aAAa,CAAC,GAAG,CACzB,gCAAgC,IAAI,CAAC,WAAW,IAAI,IAAI,CAAC,MAAM,kBAAkB,KAAK,EAAE,CAC3F,CAAC;YACN,CAAC;YACD,UAAU,CAAC,GAAG;gBACV,IAAI,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,IAAI,GAAG,CAAC,QAAQ,EAAE,CAAC;oBAC1C,MAAM,MAAM,GAAG,GAAG,CAAC,QAAQ,CAAC,MAAM,CAAC;oBAEnC,OAAO,EAAE,SAAS,EAAE,MAAM,GAAG,GAAG,IAAI,MAAM,IAAI,GAAG,IAAI,MAAM,KAAK,GAAG,EAAE,CAAC;gBAC1E,CAAC;gBAED,OAAO,EAAE,SAAS,EAAE,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,EAAE,CAAC;YAClD,CAAC;YACD,aAAa;YACb,QAAQ;SACX,CAAC,CAAC;QACH,MAAM,EAAE,IAAI,EAAE,GAAG,QAAQ,CAAC;QAC1B,MAAM,KAAK,GAAG,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAuB,EAAE,EAAE,CAAC,KAAK,CAAC,IAAI,KAAK,IAAI,CAAC,YAAY,CAAC,CAAC;QAE9F,IAAI,CAAC,KAAK,EAAE,CAAC;YACT,MAAM,IAAI,KAAK,CAAC,8BAA8B,IAAI,CAAC,YAAY,cAAc,KAAK,GAAG,CAAC,CAAC;QAC3F,CAAC;QAED,OAAO,KAAK,CAAC,oBAAoB,CAAC;IACtC,CAAC;IAES,KAAK,CAAC,UAAU,CAAC,KAAa;QACpC,IAAI,SAAS,GAAG,KAAK,CAAC;QACtB,IAAI,OAAiB,CAAC;QAEtB,MAAM,MAAM,GAAG,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC;QAC3C,IAAI,MAAM,EAAE,CAAC;YACT,SAAS,GAAG,IAAI,CAAC;YACjB,OAAO,GAAG,MAAM,CAAC;QACrB,CAAC;aAAM,CAAC;YACJ,IAAI,CAAC;gBACD,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,KAAK,CAAC,CAAC;gBAC/C,MAAM,EAAE,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,CAAC;gBAC9C,OAAO,GAAG,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,CAAC;YACrC,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACb,MAAM,MAAM,GAAG,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;gBACjD,IAAI,MAAM,EAAE,CAAC;oBACT,SAAS,GAAG,IAAI,CAAC;oBACjB,OAAO,GAAG,MAAM,CAAC;gBACrB,CAAC;qBAAM,CAAC;oBACJ,MAAM,KAAK,CAAC;gBAChB,CAAC;YACL,CAAC;QACL,CAAC;QAED,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,GAAG,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC;QAE5F,IAAI,mBAAmB,GAAG,KAAK,CAAC;QAChC,IAAI,MAAM,sBAAsB,CAAC,SAAS,CAAC,QAAQ,CAAC,EAAE,CAAC;YACnD,MAAM,UAAU,GAAG,EAAE,CAAC,gBAAgB,CAAC,QAAQ,CAAC,CAAC;YACjD,MAAM,IAAI,GAAG,MAAM,eAAM,CAAC,UAAU,CAAC,UAAU,EAAE;gBAC7C,IAAI,EAAE,sBAAa,CAAC,MAAM;gBAC1B,QAAQ,EAAE,iBAAQ,CAAC,GAAG;aACzB,CAAC,CAAC;YAEH,IAAI,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC,KAAK,CAAC,KAAK,IAAI,CAAC,IAAI,EAAE,CAAC;gBACjD,mBAAmB,GAAG,IAAI,CAAC;YAC/B,CAAC;QACL,CAAC;QAED,IAAI,mBAAmB,KAAK,IAAI,EAAE,CAAC;YAC/B,MAAM,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;QAC/C,CAAC;QAED,IAAI,SAAS,KAAK,IAAI,EAAE,CAAC;YACrB,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;QACzC,CAAC;QAED,OAAO;YACH,UAAU,EAAE,OAAO,CAAC,UAAU;YAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;YAC9B,YAAY,EAAE,QAAQ;YACtB,QAAQ,EAAE,OAAO,CAAC,QAAQ;SAC7B,CAAC;IACN,CAAC;IAES,KAAK,CAAC,YAAY,CAAC,OAAiB,EAAE,QAAgB;QAC5D,MAAM,MAAM,GAAkB;YAC1B,GAAG,IAAI,CAAC,aAAa;YACrB,WAAW,EAAE;gBACT,GAAG,IAAI,CAAC,aAAa,CAAC,WAAW;gBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;gBAC1B,MAAM,EAAE,OAAO,CAAC,UAAU,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC,GAAG,OAAO,CAAC,UAAU,GAAG;aAC3F;SACJ,CAAC;QAEF,MAAM,eAAe,GAAG,IAAA,2BAAkB,EAAC,MAAM,CAAC,CAAC;QACnD,MAAM,gBAAgB,GAAG,MAAM,eAAe,CAAC,YAAY,CAAC,OAAO,CAAC,YAAY,EAAE,EAAE,CAAC,CAAC;QACtF,MAAM,EAAE,OAAO,EAAE,UAAU,EAAE,GAAG,EAAE,aAAa,EAAE,GAAG,sBAAsB,CAAC,cAAc,CAAC,QAAQ,CAAC,CAAC;QACpG,MAAM,iBAAQ,CAAC,QAAQ,CAAC,gBAAgB,EAAE,UAAU,EAAE,EAAE,CAAC,iBAAiB,CAAC,QAAQ,CAAC,CAAC,CAAC;QAEtF,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAC,aAAa,EAAE,CAAC,EAAE,CAAC;YAC5C,MAAM,IAAI,KAAK,CAAC,+DAA+D,CAAC,CAAC;QACrF,CAAC;IACL,CAAC;CACJ;AAzRD,wDAyRC"}
@@ -1,22 +0,0 @@
1
- import { Static, TLiteral } from "@sinclair/typebox";
2
- import { ImportantSecurityFields } from "../../bindings/amd-sev-snp-napi-rs";
3
- export declare const CommonPolicyKeyName = "Common";
4
- export declare const importantFieldNames: (keyof ImportantSecurityFields)[];
5
- export declare enum RuleOperator {
6
- Le = "le",
7
- Eq = "eq",
8
- Ge = "ge"
9
- }
10
- declare const PolicyRuleSchema: import("@sinclair/typebox").TObject<{
11
- name: import("@sinclair/typebox").TUnion<[TLiteral<string>, ...TLiteral<string>[]]>;
12
- operator: import("@sinclair/typebox").TUnion<TLiteral<RuleOperator>[]>;
13
- value: import("@sinclair/typebox").TUnion<[import("@sinclair/typebox").TNumber, import("@sinclair/typebox").TBoolean]>;
14
- }>;
15
- export declare const PolicySetSchema: import("@sinclair/typebox").TObject<{
16
- [x: string]: any;
17
- }>;
18
- export type PolicySet = Static<typeof PolicySetSchema>;
19
- export type PolicyRule = Static<typeof PolicyRuleSchema> & {
20
- name: keyof ImportantSecurityFields;
21
- };
22
- export {};
@@ -1,24 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.PolicySetSchema = exports.RuleOperator = exports.importantFieldNames = exports.CommonPolicyKeyName = void 0;
4
- const typebox_1 = require("@sinclair/typebox");
5
- const amd_sev_snp_napi_rs_1 = require("../../bindings/amd-sev-snp-napi-rs");
6
- exports.CommonPolicyKeyName = "Common";
7
- exports.importantFieldNames = Object.keys(amd_sev_snp_napi_rs_1.IMPORTANT_SECURITY_FIELDS_DUMMY);
8
- const importantFieldLiterals = exports.importantFieldNames.map((k) => typebox_1.Type.Literal(k));
9
- var RuleOperator;
10
- (function (RuleOperator) {
11
- RuleOperator["Le"] = "le";
12
- RuleOperator["Eq"] = "eq";
13
- RuleOperator["Ge"] = "ge";
14
- })(RuleOperator || (exports.RuleOperator = RuleOperator = {}));
15
- const PolicyRuleSchema = typebox_1.Type.Object({
16
- name: typebox_1.Type.Union(importantFieldLiterals),
17
- operator: typebox_1.Type.Union(Object.values(RuleOperator).map((op) => typebox_1.Type.Literal(op))),
18
- value: typebox_1.Type.Union([typebox_1.Type.Number(), typebox_1.Type.Boolean()]),
19
- });
20
- exports.PolicySetSchema = typebox_1.Type.Partial(typebox_1.Type.Object(Object.fromEntries([
21
- ...Object.values(amd_sev_snp_napi_rs_1.WellKnownSnpCodeNames).map((key) => [key, typebox_1.Type.Array(PolicyRuleSchema)]),
22
- [exports.CommonPolicyKeyName, typebox_1.Type.Array(PolicyRuleSchema)],
23
- ])), { additionalProperties: false });
24
- //# sourceMappingURL=data:application/json;base64,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
@@ -1,127 +0,0 @@
1
- /// <reference types="node" />
2
- import { CpuInfo, ImportantSecurityFields, WellKnownSnpCodeNames } from "../../bindings/amd-sev-snp-napi-rs/";
3
- import { SnpCert, SevSnpCertificateFormat, SNPReport, SNPReportWithChain } from "../proto/AmdSevSnp";
4
- import { PolicySet } from "./sev-snp-schema";
5
- export interface CalcSnpMrEnclaveParams {
6
- ovmfPath: string;
7
- kernelHash: Buffer;
8
- initrdHash?: Buffer;
9
- cmdLineHash: Buffer;
10
- vcpuSig: number;
11
- vcpuCount: number;
12
- vmpl?: number;
13
- policy?: bigint;
14
- }
15
- export declare const AMD_EPYC_MILAN_CPUINFO: CpuInfo;
16
- export declare const EMPTY_INITRD_SHA256_HASH: Buffer;
17
- export type ArkHashes = {
18
- [key: string]: Buffer;
19
- };
20
- export declare function getDefaultArkHashes(): ArkHashes;
21
- export declare class SevSNP {
22
- static serializeSNPReport(report: SNPReportWithChain): Buffer;
23
- static deserializeSNPReport(serialized: Buffer): SNPReportWithChain;
24
- protected static convertCertToPem(cert: Buffer): string;
25
- protected static convertPemToDer(cert: string): Buffer;
26
- protected static splitCerts(certsPem: string): string[];
27
- protected static readCmdLine(): Promise<string>;
28
- /**
29
- * Method for generation AMD SEV-SNP Report
30
- * @param userData - The data that will be included in the report and will be signed
31
- * @param vmpl - Optional VMPL value to pass to the firmware when requesting a report (default: 0)
32
- */
33
- static generateSNPReport(userData: Buffer, vmpl?: number): Promise<SNPReport>;
34
- /**
35
- * Method for fetch certificates from AMD KDS
36
- * @param report - report generated by the `generateSNPReport` method
37
- * @param options - options for working with HTTP, allows you to configure repetitions and the interval between them,
38
- * as well as the format of the returned certificates
39
- */
40
- static getReportChain(report: SNPReport, options?: {
41
- retryMax?: number;
42
- retryInterval?: number;
43
- certFormat?: SevSnpCertificateFormat;
44
- httpTimeoutMs?: number;
45
- }): Promise<SnpCert[]>;
46
- /**
47
- * Method for generation AMD SEV-SNP Report and fetching certificates
48
- * @param userData - @see generateSNPReport
49
- * @param options - @see getReportChain
50
- */
51
- static generateSNPReportWithChain(userData: Buffer, options?: {
52
- retryMax?: number;
53
- retryInterval?: number;
54
- certFormat?: SevSnpCertificateFormat;
55
- }): Promise<SNPReportWithChain>;
56
- protected static runSubProcess(binaryPath: string, args?: string[], options?: {
57
- cwd?: string;
58
- timeoutMs?: number;
59
- }): Promise<{
60
- exitCode: number;
61
- stdout: string;
62
- stderr: string;
63
- }>;
64
- static getCertHash(cert: SnpCert): Buffer;
65
- protected static isValidArk(ARK: SnpCert, trustedHashes: ArkHashes): boolean;
66
- /**
67
- * AMD SEV-SNP verification method
68
- * @param report - report with full certificate chain
69
- * @param options - trustedHashes - map of trusted AMD ARK Certificates (CommonName as Key, Sha256 Hash of Der Certificate as Value) - optional
70
- * timeoutMs - timeout of the utility snpnost in ms
71
- * snpGuestBinaryPath - path for snpguest util
72
- */
73
- static verifyReport(report: SNPReportWithChain, options?: {
74
- trustedHashes?: ArkHashes;
75
- timeoutMs?: number;
76
- snpGuestBinaryPath?: string;
77
- tmpDirTemplate?: string;
78
- }): Promise<void>;
79
- protected static calcMrEnclave(measure: Buffer, vmpl: number, policy: bigint): Buffer;
80
- /**
81
- * Method for obtaining mrEnclave from report. MrEnclave includes report measure, report vmpl and report policy
82
- * @param report - report without certificates
83
- */
84
- static getMrEnclave(report: Buffer): Buffer;
85
- /**
86
- * Method for obtaining reportData. This data was passed when generating the report
87
- * @param report - report without certificates
88
- */
89
- static getReportData(report: Buffer): Promise<Buffer>;
90
- /**
91
- * Method for obtaining measure. Please do not confuse with mrenclave. Report measure is part of mrEnclave.
92
- * @param report - report without certificates
93
- */
94
- static getReportMeasure(report: Buffer): Promise<Buffer>;
95
- protected static calculateFileSha256(filePath: string): Promise<Buffer>;
96
- protected static calculateCmdlineHash(cmdLine: string): Buffer;
97
- /**
98
- * The method allows to get the expected mrEnclave without generating a report
99
- * @param params - @see CalcSnpMrEnclaveParams
100
- */
101
- static calcSnpMrEnclave(params: CalcSnpMrEnclaveParams): Promise<Buffer>;
102
- protected static extractBuildFromCmdline(cmdLine: string, paramName?: string): string;
103
- /**
104
- * Compute the 32-bit CPUID signature from family, model, and stepping.
105
- * This computation is described in AMD's CPUID Specification, publication #25481
106
- * https://www.amd.com/system/files/TechDocs/25481.pdf
107
- * See section: CPUID Fn0000_0001_EAX Family, Model, Stepping Identifiers
108
- * @param cpuInfo - Structure containing family, model and stepping @see CpuInfo
109
- */
110
- static getCpuSig(cpuInfo: CpuInfo): number;
111
- static getReportImportantSecurityFields(report: Buffer): Promise<ImportantSecurityFields>;
112
- static getReportCpuInfo(report: Buffer): Promise<CpuInfo>;
113
- static getCpuGeneration(cpuInfo: CpuInfo): Promise<WellKnownSnpCodeNames>;
114
- /**
115
- * Parse and validate policy
116
- * @param input - Raw policy as json-text or object
117
- */
118
- static parsePolicySet(input: string | Record<string, unknown>): PolicySet;
119
- private static checkRule;
120
- /**
121
- * Verify SNP report against a PolicySet.
122
- * Throws an error if any rule fails.
123
- * @param report - SNPReport
124
- * @param policySet - PolicySet containing rules
125
- */
126
- static verifyPolicy(report: Buffer, policySet: PolicySet): Promise<void>;
127
- }