@super-protocol/addons-tee 2.0.0 → 2.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (44) hide show
  1. package/bindings/amd-sev-snp-napi-rs/amd-sev-snp-napi-rs.linux-x64-gnu.node +0 -0
  2. package/bindings/amd-sev-snp-napi-rs/index.d.ts +51 -0
  3. package/bindings/amd-sev-snp-napi-rs/index.js +339 -0
  4. package/bindings/nvidia-native/build/Release/libnvat.so.1.1.0 +0 -0
  5. package/bindings/nvidia-native/build/Release/nvidia_native.node +0 -0
  6. package/bindings/sgx-native/build/Release/libmbedcrypto_gramine.so.15 +0 -0
  7. package/bindings/sgx-native/build/Release/libmbedx509_gramine.so.6 +0 -0
  8. package/bindings/sgx-native/build/Release/libsgx_dcap_quoteverify.so.1 +0 -0
  9. package/bindings/sgx-native/build/Release/libtdx_attest.so.1 +0 -0
  10. package/bindings/sgx-native/build/Release/sgx_native.node +0 -0
  11. package/bindings/usr/lib/node_modules/node-addon-api/node_api.Makefile +6 -0
  12. package/bindings/usr/lib/node_modules/node-addon-api/nothing.target.mk +159 -0
  13. package/bindings/utils/virtee/LICENSE +201 -0
  14. package/bindings/utils/virtee/libsev.so +0 -0
  15. package/bindings/utils/virtee/snpguest +0 -0
  16. package/dist/index.d.ts +2 -1
  17. package/dist/index.js +29 -1
  18. package/dist/nvidia-native-module/nvidia-attestation.d.ts +146 -0
  19. package/dist/nvidia-native-module/nvidia-attestation.js +374 -0
  20. package/dist/nvidia-native-module/nvidia-debug-state-policy.rego +45 -0
  21. package/dist/nvidia-native-module/nvidia-detailed-policy.rego +205 -0
  22. package/dist/proto/AmdSevSnp.d.ts +194 -0
  23. package/dist/proto/AmdSevSnp.js +363 -0
  24. package/dist/sgx-native-module/consts.d.ts +24 -0
  25. package/dist/sgx-native-module/consts.js +38 -0
  26. package/dist/sgx-native-module/dcap-quote-verify.service.d.ts +12 -0
  27. package/dist/sgx-native-module/dcap-quote-verify.service.js +84 -0
  28. package/dist/sgx-native-module/enclave.service.d.ts +93 -0
  29. package/dist/sgx-native-module/enclave.service.js +211 -0
  30. package/dist/sgx-native-module/errors.d.ts +19 -0
  31. package/dist/sgx-native-module/errors.js +69 -0
  32. package/dist/sgx-native-module/helpers.d.ts +1 -0
  33. package/dist/sgx-native-module/helpers.js +50 -0
  34. package/dist/sgx-native-module/index.d.ts +9 -0
  35. package/dist/sgx-native-module/index.js +26 -0
  36. package/dist/sgx-native-module/pki.service.d.ts +50 -0
  37. package/dist/sgx-native-module/pki.service.js +74 -0
  38. package/dist/sgx-native-module/sev-snp-mrenclave.d.ts +59 -0
  39. package/dist/sgx-native-module/sev-snp-mrenclave.js +322 -0
  40. package/dist/sgx-native-module/sev-snp-schema.d.ts +22 -0
  41. package/dist/sgx-native-module/sev-snp-schema.js +24 -0
  42. package/dist/sgx-native-module/sev-snp.d.ts +127 -0
  43. package/dist/sgx-native-module/sev-snp.js +513 -0
  44. package/package.json +1 -1
@@ -0,0 +1,74 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.PkiService = exports.ECPCurve = exports.CertificateFormat = exports.CertificateKeyType = void 0;
4
+ const { CryptoPrimitives } = require("../../bindings/sgx-native/build/Release/sgx_native.node");
5
+ var CertificateKeyType;
6
+ (function (CertificateKeyType) {
7
+ CertificateKeyType["RSA"] = "RSA";
8
+ CertificateKeyType["ECP"] = "ECP";
9
+ })(CertificateKeyType || (exports.CertificateKeyType = CertificateKeyType = {}));
10
+ var CertificateFormat;
11
+ (function (CertificateFormat) {
12
+ CertificateFormat["PEM"] = "PEM";
13
+ CertificateFormat["DER"] = "DER";
14
+ })(CertificateFormat || (exports.CertificateFormat = CertificateFormat = {}));
15
+ var ECPCurve;
16
+ (function (ECPCurve) {
17
+ ECPCurve["SECP192R1"] = "SECP192R1"; /*!< Domain parameters for the 192-bit curve defined by FIPS 186-4 and SEC1. */
18
+ ECPCurve["SECP224R1"] = "SECP224R1"; /*!< Domain parameters for the 224-bit curve defined by FIPS 186-4 and SEC1. */
19
+ ECPCurve["SECP256R1"] = "SECP256R1"; /*!< Domain parameters for the 256-bit curve defined by FIPS 186-4 and SEC1. */
20
+ ECPCurve["SECP384R1"] = "SECP384R1"; /*!< Domain parameters for the 384-bit curve defined by FIPS 186-4 and SEC1. */
21
+ ECPCurve["SECP521R1"] = "SECP521R1"; /*!< Domain parameters for the 521-bit curve defined by FIPS 186-4 and SEC1. */
22
+ ECPCurve["BP256R1"] = "BP256R1"; /*!< Domain parameters for 256-bit Brainpool curve. */
23
+ ECPCurve["BP384R1"] = "BP384R1"; /*!< Domain parameters for 384-bit Brainpool curve. */
24
+ ECPCurve["BP512R1"] = "BP512R1"; /*!< Domain parameters for 512-bit Brainpool curve. */
25
+ // @TODO: MBEDTLS NOT SUPPORT EXRPORT CURVE25519 = "CURVE25519", /*!< Domain parameters for Curve25519. */
26
+ ECPCurve["SECP192K1"] = "SECP192K1"; /*!< Domain parameters for 192-bit "Koblitz" curve. */
27
+ ECPCurve["SECP224K1"] = "SECP224K1"; /*!< Domain parameters for 224-bit "Koblitz" curve. */
28
+ ECPCurve["SECP256K1"] = "SECP256K1"; /*!< Domain parameters for 256-bit "Koblitz" curve. */
29
+ // @TODO: MBEDTLS NOT SUPPORT EXRPORT CURVE448 = "CURVE448", /*!< Domain parameters for Curve448. */
30
+ })(ECPCurve || (exports.ECPCurve = ECPCurve = {}));
31
+ class PkiService {
32
+ constructor() {
33
+ this.cryptoPrimitives = new CryptoPrimitives();
34
+ }
35
+ async generateTlsCertificate(params = {}) {
36
+ const subject = {
37
+ commonName: params.subject?.commonName ?? "localhost",
38
+ countryName: params.subject?.countryName ?? "US",
39
+ state: params.subject?.state ?? "New York",
40
+ localityName: params.subject?.localityName ?? "New York",
41
+ organizationName: params.subject?.organizationName ?? "SuperProtocol",
42
+ organizationUnit: params.subject?.organizationUnit ?? "TEE",
43
+ };
44
+ const format = params.format ?? CertificateFormat.PEM;
45
+ const keyType = params.keyType ?? CertificateKeyType.RSA;
46
+ let rsaKeyBits;
47
+ let ecpCurve;
48
+ if (keyType === CertificateKeyType.RSA) {
49
+ rsaKeyBits = params.rsaKeyBits ?? 3072;
50
+ }
51
+ else if (keyType === CertificateKeyType.ECP) {
52
+ ecpCurve = params.ecpCurve ?? ECPCurve.SECP384R1;
53
+ }
54
+ const withQuote = params.withQuote ?? false;
55
+ const serialNumber = params.serialNumber ?? "01";
56
+ const days = params.days ?? 365;
57
+ const dnsNames = params.dnsNames ?? [];
58
+ const ips = params.ips ?? [];
59
+ return this.cryptoPrimitives.GenerateTlsCertificate({
60
+ format,
61
+ subject,
62
+ keyType,
63
+ withQuote,
64
+ rsaKeyBits,
65
+ ecpCurve,
66
+ serialNumber,
67
+ days,
68
+ dnsNames,
69
+ ips,
70
+ });
71
+ }
72
+ }
73
+ exports.PkiService = PkiService;
74
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,59 @@
1
+ /// <reference types="node" />
2
+ /// <reference types="node" />
3
+ import { StorageAccess } from "@super-protocol/sdk-js";
4
+ import { Transform } from "stream";
5
+ import { SNPReport } from "../proto/AmdSevSnp";
6
+ interface VMCommon {
7
+ kernelHash: Buffer;
8
+ initrdHash: Buffer | undefined;
9
+ ovmfHash: Buffer;
10
+ }
11
+ interface VMConfig extends VMCommon {
12
+ ovmfBucket: string;
13
+ ovmfPrefix: string;
14
+ ovmfFilename: string;
15
+ }
16
+ interface VMMeasure extends VMCommon {
17
+ ovmfFilePath: string;
18
+ }
19
+ export interface SNPMrEnclaveCalculatorArgs {
20
+ cacheFolder?: string;
21
+ rmPrevCache?: boolean;
22
+ vmRepoOwner?: string;
23
+ vmRepo?: string;
24
+ releaseAsset?: string;
25
+ downloadAssetRetryInterval?: number;
26
+ downloadAssetRetryMax?: number;
27
+ storageAccess?: StorageAccess;
28
+ cacheRecordsTTL?: number;
29
+ }
30
+ export declare class SNPMrEnclaveCalculator {
31
+ private readonly cacheFolder;
32
+ private readonly vmRepoOwner;
33
+ private readonly vmRepo;
34
+ private readonly releaseAsset;
35
+ private readonly axiosInstance;
36
+ private readonly retryInterval;
37
+ private readonly retryMax;
38
+ private readonly storageAccess;
39
+ private readonly vmInfoCache;
40
+ private readonly defaultCredentials;
41
+ constructor(config: SNPMrEnclaveCalculatorArgs);
42
+ /**
43
+ * The method allows to obtain expected mrenclave if the virtual machine for which the report is
44
+ * submitted was running on one core and a Milan processor
45
+ * @param report - @see CalcSnpMrEnclaveParams
46
+ */
47
+ getSingleCoreMrEnclave(report: SNPReport): Promise<Buffer>;
48
+ protected downloadAsset(assetUrl: string): Promise<Buffer>;
49
+ protected extractVMData(data: Buffer): VMConfig;
50
+ protected static calcHashStream(alg?: string): {
51
+ process: Transform;
52
+ get: () => Buffer;
53
+ };
54
+ protected static fileExist(filePath: string): Promise<boolean>;
55
+ protected getAssetUrl(build: string): Promise<string>;
56
+ protected downloadVM(build: string): Promise<VMMeasure>;
57
+ protected downloadOvmf(vmFiles: VMConfig, ovmfPath: string): Promise<void>;
58
+ }
59
+ export {};
@@ -0,0 +1,322 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
15
+ }) : function(o, v) {
16
+ o["default"] = v;
17
+ });
18
+ var __importStar = (this && this.__importStar) || function (mod) {
19
+ if (mod && mod.__esModule) return mod;
20
+ var result = {};
21
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
+ __setModuleDefault(result, mod);
23
+ return result;
24
+ };
25
+ var __importDefault = (this && this.__importDefault) || function (mod) {
26
+ return (mod && mod.__esModule) ? mod : { "default": mod };
27
+ };
28
+ Object.defineProperty(exports, "__esModule", { value: true });
29
+ exports.SNPMrEnclaveCalculator = void 0;
30
+ const typebox_1 = require("@sinclair/typebox");
31
+ const value_1 = require("@sinclair/typebox/value");
32
+ const fs = __importStar(require("fs"));
33
+ const fsAsync = __importStar(require("fs/promises"));
34
+ const path = __importStar(require("path"));
35
+ const os = __importStar(require("os"));
36
+ const sev_snp_1 = require("./sev-snp");
37
+ const axios_1 = __importDefault(require("axios"));
38
+ const sdk_js_1 = require("@super-protocol/sdk-js");
39
+ const dto_js_1 = require("@super-protocol/dto-js");
40
+ const crypto_1 = require("crypto");
41
+ const stream_1 = require("stream");
42
+ const helpers_1 = require("./helpers");
43
+ const amd_sev_snp_napi_rs_1 = require("../../bindings/amd-sev-snp-napi-rs/");
44
+ const VMJsonSchema = typebox_1.Type.Object({
45
+ kernel: typebox_1.Type.Object({ sha256: typebox_1.Type.String() }),
46
+ initrd: typebox_1.Type.Optional(typebox_1.Type.Object({ sha256: typebox_1.Type.String() })),
47
+ bios_amd: typebox_1.Type.Optional(typebox_1.Type.Object({
48
+ sha256: typebox_1.Type.String(),
49
+ bucket: typebox_1.Type.String(),
50
+ prefix: typebox_1.Type.String(),
51
+ filename: typebox_1.Type.String(),
52
+ })),
53
+ bios: typebox_1.Type.Optional(typebox_1.Type.Object({
54
+ sha256: typebox_1.Type.String(),
55
+ bucket: typebox_1.Type.String(),
56
+ prefix: typebox_1.Type.String(),
57
+ filename: typebox_1.Type.String(),
58
+ })),
59
+ });
60
+ class VMConfigCache {
61
+ constructor(ttl = 5 * 60 * 1000) {
62
+ this.cache = {};
63
+ this.ttl = ttl;
64
+ }
65
+ set(key, value) {
66
+ const timestamp = Date.now();
67
+ this.cache[key] = {
68
+ value,
69
+ timestamp,
70
+ };
71
+ }
72
+ get(key, force = false) {
73
+ const record = this.cache[key];
74
+ if (record) {
75
+ if (force === false) {
76
+ const now = Date.now();
77
+ if (now - record.timestamp > this.ttl) {
78
+ return null;
79
+ }
80
+ }
81
+ return record.value;
82
+ }
83
+ return null;
84
+ }
85
+ clear() {
86
+ this.cache = {};
87
+ }
88
+ }
89
+ class SNPMrEnclaveCalculator {
90
+ constructor(config) {
91
+ this.axiosInstance = axios_1.default.create();
92
+ this.defaultCredentials = {
93
+ storageType: dto_js_1.StorageType.S3,
94
+ credentials: {
95
+ endpoint: "https://gateway.storjshare.io",
96
+ accessKeyId: "jxekrow2wxmjps6pr2jv22hamtha",
97
+ secretKey: "jztnpl532njcljtdolnpbszq66lgqmwmgkbh747342hwc72grkohi",
98
+ // prefix and bucket can be any, as it will be filled later
99
+ bucket: "",
100
+ prefix: "",
101
+ },
102
+ };
103
+ this.cacheFolder = config.cacheFolder || fs.mkdtempSync(path.join(os.tmpdir(), "snp-mrenclave-cache-"));
104
+ const rmPrevCache = config.rmPrevCache ?? false;
105
+ this.vmRepoOwner = config.vmRepoOwner || "Super-Protocol";
106
+ this.vmRepo = config.vmRepo || "sp-vm";
107
+ this.releaseAsset = config.releaseAsset || "vm.json";
108
+ this.retryInterval = config.downloadAssetRetryInterval ?? 1000;
109
+ this.retryMax = config.downloadAssetRetryMax ?? 3;
110
+ this.storageAccess = config.storageAccess ?? this.defaultCredentials;
111
+ const cacheRecordsTTL = config.cacheRecordsTTL ?? 5 * 60 * 1000;
112
+ if (rmPrevCache) {
113
+ (0, helpers_1.gramineCompatibleRmDir)(this.cacheFolder);
114
+ }
115
+ if (!fs.existsSync(this.cacheFolder)) {
116
+ fs.mkdirSync(this.cacheFolder, { recursive: true });
117
+ }
118
+ this.vmInfoCache = new VMConfigCache(cacheRecordsTTL);
119
+ }
120
+ /**
121
+ * The method allows to obtain expected mrenclave if the virtual machine for which the report is
122
+ * submitted was running on one core and a Milan processor
123
+ * @param report - @see CalcSnpMrEnclaveParams
124
+ */
125
+ async getSingleCoreMrEnclave(report) {
126
+ const mrEnclave = await sev_snp_1.SevSNP.getMrEnclave(Buffer.from(report.rawReport));
127
+ const vmMeasure = await this.downloadVM(report.build);
128
+ const expectedMrEnclave = await sev_snp_1.SevSNP.calcSnpMrEnclave({
129
+ ovmfPath: vmMeasure.ovmfFilePath,
130
+ kernelHash: vmMeasure.kernelHash,
131
+ initrdHash: vmMeasure.initrdHash,
132
+ cmdLineHash: Buffer.from(report.cmdLineHash),
133
+ vcpuSig: report.cpuSig,
134
+ vcpuCount: report.cores,
135
+ vmpl: await (0, amd_sev_snp_napi_rs_1.getReportVmpl)(Buffer.from(report.rawReport)),
136
+ policy: await (0, amd_sev_snp_napi_rs_1.getReportPolicy)(Buffer.from(report.rawReport)),
137
+ });
138
+ if (!mrEnclave.equals(expectedMrEnclave))
139
+ throw new Error(`Expected mrEnclave does not match the calculated one.\n` +
140
+ `mrEnclave: ${mrEnclave.toString("hex")}\n` +
141
+ `expectedMrEnclave: ${expectedMrEnclave.toString("hex")}\n` +
142
+ `report.build: ${report.build}\n` +
143
+ `vmMeasure: ${JSON.stringify(vmMeasure)}`);
144
+ const singleCoreMrEnclave = await sev_snp_1.SevSNP.calcSnpMrEnclave({
145
+ ovmfPath: vmMeasure.ovmfFilePath,
146
+ kernelHash: vmMeasure.kernelHash,
147
+ initrdHash: vmMeasure.initrdHash,
148
+ cmdLineHash: Buffer.from(report.cmdLineHash),
149
+ vcpuSig: sev_snp_1.SevSNP.getCpuSig(sev_snp_1.AMD_EPYC_MILAN_CPUINFO),
150
+ vcpuCount: 1,
151
+ });
152
+ return singleCoreMrEnclave;
153
+ }
154
+ async downloadAsset(assetUrl) {
155
+ const { retryInterval, retryMax } = this;
156
+ const response = await sdk_js_1.helpers.tryWithInterval({
157
+ checkResult(response) {
158
+ return { isResultOk: response.status === 200 };
159
+ },
160
+ handler: async () => {
161
+ return this.axiosInstance.get(assetUrl, {
162
+ responseType: "arraybuffer",
163
+ });
164
+ },
165
+ checkError(err) {
166
+ if (axios_1.default.isAxiosError(err) && err.response) {
167
+ const status = err.response.status;
168
+ return { retryable: status < 400 || status >= 500 || status === 429 };
169
+ }
170
+ return { retryable: axios_1.default.isAxiosError(err) };
171
+ },
172
+ retryInterval,
173
+ retryMax,
174
+ });
175
+ return response.data;
176
+ }
177
+ extractVMData(data) {
178
+ const vmRaw = data.toString("utf-8");
179
+ const parsed = JSON.parse(vmRaw);
180
+ const { isValid } = (0, sdk_js_1.validateBySchema)(parsed, VMJsonSchema);
181
+ if (!isValid) {
182
+ const validationErrors = Array.from(value_1.Value.Errors(VMJsonSchema, parsed));
183
+ const details = validationErrors.map((e) => e.message).join(", ");
184
+ throw new Error(`Failed to validate VM JSON:${details ? `: ${details}` : ""}`);
185
+ }
186
+ const vm = parsed;
187
+ const kernelHash = vm.kernel.sha256;
188
+ const initrdHash = vm.initrd?.sha256;
189
+ const OVMF = vm.bios_amd || vm.bios;
190
+ if (!OVMF) {
191
+ throw new Error("Neither bios_amd nor bios is available");
192
+ }
193
+ const { sha256, bucket, prefix, filename } = OVMF;
194
+ if (!sha256 || !bucket || !prefix || !filename) {
195
+ throw new Error("Missing one or more required fields in OVMF");
196
+ }
197
+ return {
198
+ kernelHash: Buffer.from(kernelHash, "hex"),
199
+ initrdHash: initrdHash ? Buffer.from(initrdHash, "hex") : undefined,
200
+ ovmfHash: Buffer.from(sha256, "hex"),
201
+ ovmfBucket: bucket,
202
+ ovmfPrefix: prefix,
203
+ ovmfFilename: filename,
204
+ };
205
+ }
206
+ static calcHashStream(alg = "sha256") {
207
+ const hash = (0, crypto_1.createHash)(alg);
208
+ return {
209
+ process: new stream_1.Transform({
210
+ transform: (data, encoding, done) => {
211
+ hash.update(data);
212
+ done(null, data);
213
+ },
214
+ }),
215
+ get: () => hash.digest(),
216
+ };
217
+ }
218
+ static async fileExist(filePath) {
219
+ try {
220
+ await fsAsync.access(filePath, fs.constants.F_OK);
221
+ return true;
222
+ }
223
+ catch (err) {
224
+ return false;
225
+ }
226
+ }
227
+ async getAssetUrl(build) {
228
+ const { retryInterval, retryMax } = this;
229
+ const response = await sdk_js_1.helpers.tryWithInterval({
230
+ checkResult(response) {
231
+ return { isResultOk: response.status === 200 };
232
+ },
233
+ handler: async () => {
234
+ return this.axiosInstance.get(`https://api.github.com/repos/${this.vmRepoOwner}/${this.vmRepo}/releases/tags/${build}`);
235
+ },
236
+ checkError(err) {
237
+ if (axios_1.default.isAxiosError(err) && err.response) {
238
+ const status = err.response.status;
239
+ return { retryable: status < 400 || status >= 500 || status === 429 };
240
+ }
241
+ return { retryable: axios_1.default.isAxiosError(err) };
242
+ },
243
+ retryInterval,
244
+ retryMax,
245
+ });
246
+ const { data } = response;
247
+ const asset = data.assets.find((asset) => asset.name === this.releaseAsset);
248
+ if (!asset) {
249
+ throw new Error(`Failed to find asset named ${this.releaseAsset} for build ${build}.`);
250
+ }
251
+ return asset.browser_download_url;
252
+ }
253
+ async downloadVM(build) {
254
+ let fromCache = false;
255
+ let vmFiles;
256
+ const vmInfo = this.vmInfoCache.get(build);
257
+ if (vmInfo) {
258
+ fromCache = true;
259
+ vmFiles = vmInfo;
260
+ }
261
+ else {
262
+ try {
263
+ const assetUrl = await this.getAssetUrl(build);
264
+ const vm = await this.downloadAsset(assetUrl);
265
+ vmFiles = this.extractVMData(vm);
266
+ }
267
+ catch (error) {
268
+ const vmInfo = this.vmInfoCache.get(build, true);
269
+ if (vmInfo) {
270
+ fromCache = true;
271
+ vmFiles = vmInfo;
272
+ }
273
+ else {
274
+ throw error;
275
+ }
276
+ }
277
+ }
278
+ const ovmfPath = path.join(this.cacheFolder, `${vmFiles.ovmfHash.toString("hex")}_OVMF.fd`);
279
+ let fileExistAndCorrect = false;
280
+ if (await SNPMrEnclaveCalculator.fileExist(ovmfPath)) {
281
+ const fileStream = fs.createReadStream(ovmfPath);
282
+ const hash = await sdk_js_1.Crypto.createHash(fileStream, {
283
+ algo: dto_js_1.HashAlgorithm.SHA256,
284
+ encoding: dto_js_1.Encoding.hex,
285
+ });
286
+ if (vmFiles.ovmfHash.toString("hex") === hash.hash) {
287
+ fileExistAndCorrect = true;
288
+ }
289
+ }
290
+ if (fileExistAndCorrect !== true) {
291
+ await this.downloadOvmf(vmFiles, ovmfPath);
292
+ }
293
+ if (fromCache !== true) {
294
+ this.vmInfoCache.set(build, vmFiles);
295
+ }
296
+ return {
297
+ initrdHash: vmFiles.initrdHash,
298
+ kernelHash: vmFiles.kernelHash,
299
+ ovmfFilePath: ovmfPath,
300
+ ovmfHash: vmFiles.ovmfHash,
301
+ };
302
+ }
303
+ async downloadOvmf(vmFiles, ovmfPath) {
304
+ const access = {
305
+ ...this.storageAccess,
306
+ credentials: {
307
+ ...this.storageAccess.credentials,
308
+ bucket: vmFiles.ovmfBucket,
309
+ prefix: vmFiles.ovmfPrefix.endsWith("/") ? vmFiles.ovmfPrefix : `${vmFiles.ovmfPrefix}/`,
310
+ },
311
+ };
312
+ const storageProvider = (0, sdk_js_1.getStorageProvider)(access);
313
+ const downloaderStream = await storageProvider.downloadFile(vmFiles.ovmfFilename, {});
314
+ const { process: hashStream, get: getStreamHash } = SNPMrEnclaveCalculator.calcHashStream("sha256");
315
+ await stream_1.promises.pipeline(downloaderStream, hashStream, fs.createWriteStream(ovmfPath));
316
+ if (!vmFiles.ovmfHash.equals(getStreamHash())) {
317
+ throw new Error("The downloaded OVMF-file does not match the expected checksum");
318
+ }
319
+ }
320
+ }
321
+ exports.SNPMrEnclaveCalculator = SNPMrEnclaveCalculator;
322
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"sev-snp-mrenclave.js","sourceRoot":"","sources":["../../src/sgx-native-module/sev-snp-mrenclave.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,+CAAiD;AACjD,mDAAgD;AAChD,uCAAyB;AACzB,qDAAuC;AACvC,2CAA6B;AAC7B,uCAAyB;AACzB,uCAA2D;AAC3D,kDAA6C;AAC7C,mDAMgC;AAChC,mDAA8E;AAC9E,mCAAoC;AACpC,mCAA6C;AAC7C,uCAAmD;AAEnD,6EAAqF;AAkBrF,MAAM,YAAY,GAAG,cAAI,CAAC,MAAM,CAAC;IAC7B,MAAM,EAAE,cAAI,CAAC,MAAM,CAAC,EAAE,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE,EAAE,CAAC;IAC9C,MAAM,EAAE,cAAI,CAAC,QAAQ,CAAC,cAAI,CAAC,MAAM,CAAC,EAAE,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC;IAC7D,QAAQ,EAAE,cAAI,CAAC,QAAQ,CACnB,cAAI,CAAC,MAAM,CAAC;QACR,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,QAAQ,EAAE,cAAI,CAAC,MAAM,EAAE;KAC1B,CAAC,CACL;IACD,IAAI,EAAE,cAAI,CAAC,QAAQ,CACf,cAAI,CAAC,MAAM,CAAC;QACR,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,QAAQ,EAAE,cAAI,CAAC,MAAM,EAAE;KAC1B,CAAC,CACL;CACJ,CAAC,CAAC;AAGH,MAAM,aAAa;IAIf,YAAY,MAAc,CAAC,GAAG,EAAE,GAAG,IAAI;QAH/B,UAAK,GAA8D,EAAE,CAAC;QAI1E,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;IACnB,CAAC;IAED,GAAG,CAAC,GAAW,EAAE,KAAe;QAC5B,MAAM,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAC7B,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG;YACd,KAAK;YACL,SAAS;SACZ,CAAC;IACN,CAAC;IAED,GAAG,CAAC,GAAW,EAAE,QAAiB,KAAK;QACnC,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QAE/B,IAAI,MAAM,EAAE,CAAC;YACT,IAAI,KAAK,KAAK,KAAK,EAAE,CAAC;gBAClB,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;gBACvB,IAAI,GAAG,GAAG,MAAM,CAAC,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;oBACpC,OAAO,IAAI,CAAC;gBAChB,CAAC;YACL,CAAC;YAED,OAAO,MAAM,CAAC,KAAK,CAAC;QACxB,CAAC;QAED,OAAO,IAAI,CAAC;IAChB,CAAC;IAED,KAAK;QACD,IAAI,CAAC,KAAK,GAAG,EAAE,CAAC;IACpB,CAAC;CACJ;AAcD,MAAa,sBAAsB;IAsB/B,YAAY,MAAkC;QAjB7B,kBAAa,GAAG,eAAK,CAAC,MAAM,EAAE,CAAC;QAK/B,uBAAkB,GAAkB;YACjD,WAAW,EAAE,oBAAW,CAAC,EAAE;YAC3B,WAAW,EAAE;gBACT,QAAQ,EAAE,+BAA+B;gBACzC,WAAW,EAAE,8BAA8B;gBAC3C,SAAS,EAAE,uDAAuD;gBAClE,2DAA2D;gBAC3D,MAAM,EAAE,EAAE;gBACV,MAAM,EAAE,EAAE;aACb;SACJ,CAAC;QAGE,IAAI,CAAC,WAAW,GAAG,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,MAAM,EAAE,EAAE,sBAAsB,CAAC,CAAC,CAAC;QACxG,MAAM,WAAW,GAAG,MAAM,CAAC,WAAW,IAAI,KAAK,CAAC;QAChD,IAAI,CAAC,WAAW,GAAG,MAAM,CAAC,WAAW,IAAI,gBAAgB,CAAC;QAC1D,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC,MAAM,IAAI,OAAO,CAAC;QACvC,IAAI,CAAC,YAAY,GAAG,MAAM,CAAC,YAAY,IAAI,SAAS,CAAC;QACrD,IAAI,CAAC,aAAa,GAAG,MAAM,CAAC,0BAA0B,IAAI,IAAI,CAAC;QAC/D,IAAI,CAAC,QAAQ,GAAG,MAAM,CAAC,qBAAqB,IAAI,CAAC,CAAC;QAElD,IAAI,CAAC,aAAa,GAAG,MAAM,CAAC,aAAa,IAAI,IAAI,CAAC,kBAAkB,CAAC;QAErE,MAAM,eAAe,GAAG,MAAM,CAAC,eAAe,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC;QAEhE,IAAI,WAAW,EAAE,CAAC;YACd,IAAA,gCAAsB,EAAC,IAAI,CAAC,WAAW,CAAC,CAAC;QAC7C,CAAC;QAED,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC;YACnC,EAAE,CAAC,SAAS,CAAC,IAAI,CAAC,WAAW,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QACxD,CAAC;QAED,IAAI,CAAC,WAAW,GAAG,IAAI,aAAa,CAAC,eAAe,CAAC,CAAC;IAC1D,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,sBAAsB,CAAC,MAAiB;QACjD,MAAM,SAAS,GAAG,MAAM,gBAAM,CAAC,YAAY,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,CAAC;QAC3E,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;QACtD,MAAM,iBAAiB,GAAG,MAAM,gBAAM,CAAC,gBAAgB,CAAC;YACpD,QAAQ,EAAE,SAAS,CAAC,YAAY;YAChC,UAAU,EAAE,SAAS,CAAC,UAAU;YAChC,UAAU,EAAE,SAAS,CAAC,UAAU;YAChC,WAAW,EAAE,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC;YAC5C,OAAO,EAAE,MAAM,CAAC,MAAM;YACtB,SAAS,EAAE,MAAM,CAAC,KAAK;YACvB,IAAI,EAAE,MAAM,IAAA,mCAAa,EAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;YACxD,MAAM,EAAE,MAAM,IAAA,qCAAe,EAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;SAC/D,CAAC,CAAC;QAEH,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,iBAAiB,CAAC;YACpC,MAAM,IAAI,KAAK,CACX,yDAAyD;gBACrD,cAAc,SAAS,CAAC,QAAQ,CAAC,KAAK,CAAC,IAAI;gBAC3C,sBAAsB,iBAAiB,CAAC,QAAQ,CAAC,KAAK,CAAC,IAAI;gBAC3D,iBAAiB,MAAM,CAAC,KAAK,IAAI;gBACjC,cAAc,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,EAAE,CAChD,CAAC;QAEN,MAAM,mBAAmB,GAAG,MAAM,gBAAM,CAAC,gBAAgB,CAAC;YACtD,QAAQ,EAAE,SAAS,CAAC,YAAY;YAChC,UAAU,EAAE,SAAS,CAAC,UAAU;YAChC,UAAU,EAAE,SAAS,CAAC,UAAU;YAChC,WAAW,EAAE,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC;YAC5C,OAAO,EAAE,gBAAM,CAAC,SAAS,CAAC,gCAAsB,CAAC;YACjD,SAAS,EAAE,CAAC;SACf,CAAC,CAAC;QAEH,OAAO,mBAAmB,CAAC;IAC/B,CAAC;IAES,KAAK,CAAC,aAAa,CAAC,QAAgB;QAC1C,MAAM,EAAE,aAAa,EAAE,QAAQ,EAAE,GAAG,IAAI,CAAC;QACzC,MAAM,QAAQ,GAAG,MAAM,gBAAU,CAAC,eAAe,CAAgB;YAC7D,WAAW,CAAC,QAAQ;gBAChB,OAAO,EAAE,UAAU,EAAE,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE,CAAC;YACnD,CAAC;YACD,OAAO,EAAE,KAAK,IAAI,EAAE;gBAChB,OAAO,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,QAAQ,EAAE;oBACpC,YAAY,EAAE,aAAa;iBAC9B,CAAC,CAAC;YACP,CAAC;YACD,UAAU,CAAC,GAAG;gBACV,IAAI,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,IAAI,GAAG,CAAC,QAAQ,EAAE,CAAC;oBAC1C,MAAM,MAAM,GAAG,GAAG,CAAC,QAAQ,CAAC,MAAM,CAAC;oBAEnC,OAAO,EAAE,SAAS,EAAE,MAAM,GAAG,GAAG,IAAI,MAAM,IAAI,GAAG,IAAI,MAAM,KAAK,GAAG,EAAE,CAAC;gBAC1E,CAAC;gBAED,OAAO,EAAE,SAAS,EAAE,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,EAAE,CAAC;YAClD,CAAC;YACD,aAAa;YACb,QAAQ;SACX,CAAC,CAAC;QAEH,OAAO,QAAQ,CAAC,IAAI,CAAC;IACzB,CAAC;IAES,aAAa,CAAC,IAAY;QAChC,MAAM,KAAK,GAAG,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;QAErC,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;QACjC,MAAM,EAAE,OAAO,EAAE,GAAG,IAAA,yBAAgB,EAAC,MAAM,EAAE,YAAY,CAAC,CAAC;QAC3D,IAAI,CAAC,OAAO,EAAE,CAAC;YACX,MAAM,gBAAgB,GAAG,KAAK,CAAC,IAAI,CAAC,aAAK,CAAC,MAAM,CAAC,YAAY,EAAE,MAAM,CAAC,CAAC,CAAC;YACxE,MAAM,OAAO,GAAG,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YAClE,MAAM,IAAI,KAAK,CAAC,8BAA8B,OAAO,CAAC,CAAC,CAAC,KAAK,OAAO,EAAE,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;QACnF,CAAC;QAED,MAAM,EAAE,GAAG,MAAgB,CAAC;QAE5B,MAAM,UAAU,GAAG,EAAE,CAAC,MAAM,CAAC,MAAM,CAAC;QACpC,MAAM,UAAU,GAAG,EAAE,CAAC,MAAM,EAAE,MAAM,CAAC;QAErC,MAAM,IAAI,GAAG,EAAE,CAAC,QAAQ,IAAI,EAAE,CAAC,IAAI,CAAC;QACpC,IAAI,CAAC,IAAI,EAAE,CAAC;YACR,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;QAC9D,CAAC;QAED,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,QAAQ,EAAE,GAAG,IAAI,CAAC;QAElD,IAAI,CAAC,MAAM,IAAI,CAAC,MAAM,IAAI,CAAC,MAAM,IAAI,CAAC,QAAQ,EAAE,CAAC;YAC7C,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;QACnE,CAAC;QAED,OAAO;YACH,UAAU,EAAE,MAAM,CAAC,IAAI,CAAC,UAAU,EAAE,KAAK,CAAC;YAC1C,UAAU,EAAE,UAAU,CAAC,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS;YACnE,QAAQ,EAAE,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,KAAK,CAAC;YACpC,UAAU,EAAE,MAAM;YAClB,UAAU,EAAE,MAAM;YAClB,YAAY,EAAE,QAAQ;SACzB,CAAC;IACN,CAAC;IAES,MAAM,CAAC,cAAc,CAAC,GAAG,GAAG,QAAQ;QAC1C,MAAM,IAAI,GAAG,IAAA,mBAAU,EAAC,GAAG,CAAC,CAAC;QAE7B,OAAO;YACH,OAAO,EAAE,IAAI,kBAAS,CAAC;gBACnB,SAAS,EAAE,CAAC,IAAI,EAAE,QAAQ,EAAE,IAAI,EAAQ,EAAE;oBACtC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;oBAClB,IAAI,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;gBACrB,CAAC;aACJ,CAAC;YACF,GAAG,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,MAAM,EAAE;SAC3B,CAAC;IACN,CAAC;IAES,MAAM,CAAC,KAAK,CAAC,SAAS,CAAC,QAAgB;QAC7C,IAAI,CAAC;YACD,MAAM,OAAO,CAAC,MAAM,CAAC,QAAQ,EAAE,EAAE,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC;YAElD,OAAO,IAAI,CAAC;QAChB,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACX,OAAO,KAAK,CAAC;QACjB,CAAC;IACL,CAAC;IAES,KAAK,CAAC,WAAW,CAAC,KAAa;QACrC,MAAM,EAAE,aAAa,EAAE,QAAQ,EAAE,GAAG,IAAI,CAAC;QACzC,MAAM,QAAQ,GAAG,MAAM,gBAAU,CAAC,eAAe,CAAgB;YAC7D,WAAW,CAAC,QAAQ;gBAChB,OAAO,EAAE,UAAU,EAAE,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE,CAAC;YACnD,CAAC;YACD,OAAO,EAAE,KAAK,IAAI,EAAE;gBAChB,OAAO,IAAI,CAAC,aAAa,CAAC,GAAG,CACzB,gCAAgC,IAAI,CAAC,WAAW,IAAI,IAAI,CAAC,MAAM,kBAAkB,KAAK,EAAE,CAC3F,CAAC;YACN,CAAC;YACD,UAAU,CAAC,GAAG;gBACV,IAAI,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,IAAI,GAAG,CAAC,QAAQ,EAAE,CAAC;oBAC1C,MAAM,MAAM,GAAG,GAAG,CAAC,QAAQ,CAAC,MAAM,CAAC;oBAEnC,OAAO,EAAE,SAAS,EAAE,MAAM,GAAG,GAAG,IAAI,MAAM,IAAI,GAAG,IAAI,MAAM,KAAK,GAAG,EAAE,CAAC;gBAC1E,CAAC;gBAED,OAAO,EAAE,SAAS,EAAE,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,EAAE,CAAC;YAClD,CAAC;YACD,aAAa;YACb,QAAQ;SACX,CAAC,CAAC;QACH,MAAM,EAAE,IAAI,EAAE,GAAG,QAAQ,CAAC;QAC1B,MAAM,KAAK,GAAG,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAuB,EAAE,EAAE,CAAC,KAAK,CAAC,IAAI,KAAK,IAAI,CAAC,YAAY,CAAC,CAAC;QAE9F,IAAI,CAAC,KAAK,EAAE,CAAC;YACT,MAAM,IAAI,KAAK,CAAC,8BAA8B,IAAI,CAAC,YAAY,cAAc,KAAK,GAAG,CAAC,CAAC;QAC3F,CAAC;QAED,OAAO,KAAK,CAAC,oBAAoB,CAAC;IACtC,CAAC;IAES,KAAK,CAAC,UAAU,CAAC,KAAa;QACpC,IAAI,SAAS,GAAG,KAAK,CAAC;QACtB,IAAI,OAAiB,CAAC;QAEtB,MAAM,MAAM,GAAG,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC;QAC3C,IAAI,MAAM,EAAE,CAAC;YACT,SAAS,GAAG,IAAI,CAAC;YACjB,OAAO,GAAG,MAAM,CAAC;QACrB,CAAC;aAAM,CAAC;YACJ,IAAI,CAAC;gBACD,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,KAAK,CAAC,CAAC;gBAC/C,MAAM,EAAE,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,CAAC;gBAC9C,OAAO,GAAG,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,CAAC;YACrC,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACb,MAAM,MAAM,GAAG,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;gBACjD,IAAI,MAAM,EAAE,CAAC;oBACT,SAAS,GAAG,IAAI,CAAC;oBACjB,OAAO,GAAG,MAAM,CAAC;gBACrB,CAAC;qBAAM,CAAC;oBACJ,MAAM,KAAK,CAAC;gBAChB,CAAC;YACL,CAAC;QACL,CAAC;QAED,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,GAAG,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC;QAE5F,IAAI,mBAAmB,GAAG,KAAK,CAAC;QAChC,IAAI,MAAM,sBAAsB,CAAC,SAAS,CAAC,QAAQ,CAAC,EAAE,CAAC;YACnD,MAAM,UAAU,GAAG,EAAE,CAAC,gBAAgB,CAAC,QAAQ,CAAC,CAAC;YACjD,MAAM,IAAI,GAAG,MAAM,eAAM,CAAC,UAAU,CAAC,UAAU,EAAE;gBAC7C,IAAI,EAAE,sBAAa,CAAC,MAAM;gBAC1B,QAAQ,EAAE,iBAAQ,CAAC,GAAG;aACzB,CAAC,CAAC;YAEH,IAAI,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC,KAAK,CAAC,KAAK,IAAI,CAAC,IAAI,EAAE,CAAC;gBACjD,mBAAmB,GAAG,IAAI,CAAC;YAC/B,CAAC;QACL,CAAC;QAED,IAAI,mBAAmB,KAAK,IAAI,EAAE,CAAC;YAC/B,MAAM,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;QAC/C,CAAC;QAED,IAAI,SAAS,KAAK,IAAI,EAAE,CAAC;YACrB,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;QACzC,CAAC;QAED,OAAO;YACH,UAAU,EAAE,OAAO,CAAC,UAAU;YAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;YAC9B,YAAY,EAAE,QAAQ;YACtB,QAAQ,EAAE,OAAO,CAAC,QAAQ;SAC7B,CAAC;IACN,CAAC;IAES,KAAK,CAAC,YAAY,CAAC,OAAiB,EAAE,QAAgB;QAC5D,MAAM,MAAM,GAAkB;YAC1B,GAAG,IAAI,CAAC,aAAa;YACrB,WAAW,EAAE;gBACT,GAAG,IAAI,CAAC,aAAa,CAAC,WAAW;gBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;gBAC1B,MAAM,EAAE,OAAO,CAAC,UAAU,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC,GAAG,OAAO,CAAC,UAAU,GAAG;aAC3F;SACJ,CAAC;QAEF,MAAM,eAAe,GAAG,IAAA,2BAAkB,EAAC,MAAM,CAAC,CAAC;QACnD,MAAM,gBAAgB,GAAG,MAAM,eAAe,CAAC,YAAY,CAAC,OAAO,CAAC,YAAY,EAAE,EAAE,CAAC,CAAC;QACtF,MAAM,EAAE,OAAO,EAAE,UAAU,EAAE,GAAG,EAAE,aAAa,EAAE,GAAG,sBAAsB,CAAC,cAAc,CAAC,QAAQ,CAAC,CAAC;QACpG,MAAM,iBAAQ,CAAC,QAAQ,CAAC,gBAAgB,EAAE,UAAU,EAAE,EAAE,CAAC,iBAAiB,CAAC,QAAQ,CAAC,CAAC,CAAC;QAEtF,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAC,aAAa,EAAE,CAAC,EAAE,CAAC;YAC5C,MAAM,IAAI,KAAK,CAAC,+DAA+D,CAAC,CAAC;QACrF,CAAC;IACL,CAAC;CACJ;AAzRD,wDAyRC"}
@@ -0,0 +1,22 @@
1
+ import { Static, TLiteral } from "@sinclair/typebox";
2
+ import { ImportantSecurityFields } from "../../bindings/amd-sev-snp-napi-rs";
3
+ export declare const CommonPolicyKeyName = "Common";
4
+ export declare const importantFieldNames: (keyof ImportantSecurityFields)[];
5
+ export declare enum RuleOperator {
6
+ Le = "le",
7
+ Eq = "eq",
8
+ Ge = "ge"
9
+ }
10
+ declare const PolicyRuleSchema: import("@sinclair/typebox").TObject<{
11
+ name: import("@sinclair/typebox").TUnion<[TLiteral<string>, ...TLiteral<string>[]]>;
12
+ operator: import("@sinclair/typebox").TUnion<TLiteral<RuleOperator>[]>;
13
+ value: import("@sinclair/typebox").TUnion<[import("@sinclair/typebox").TNumber, import("@sinclair/typebox").TBoolean]>;
14
+ }>;
15
+ export declare const PolicySetSchema: import("@sinclair/typebox").TObject<{
16
+ [x: string]: any;
17
+ }>;
18
+ export type PolicySet = Static<typeof PolicySetSchema>;
19
+ export type PolicyRule = Static<typeof PolicyRuleSchema> & {
20
+ name: keyof ImportantSecurityFields;
21
+ };
22
+ export {};
@@ -0,0 +1,24 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.PolicySetSchema = exports.RuleOperator = exports.importantFieldNames = exports.CommonPolicyKeyName = void 0;
4
+ const typebox_1 = require("@sinclair/typebox");
5
+ const amd_sev_snp_napi_rs_1 = require("../../bindings/amd-sev-snp-napi-rs");
6
+ exports.CommonPolicyKeyName = "Common";
7
+ exports.importantFieldNames = Object.keys(amd_sev_snp_napi_rs_1.IMPORTANT_SECURITY_FIELDS_DUMMY);
8
+ const importantFieldLiterals = exports.importantFieldNames.map((k) => typebox_1.Type.Literal(k));
9
+ var RuleOperator;
10
+ (function (RuleOperator) {
11
+ RuleOperator["Le"] = "le";
12
+ RuleOperator["Eq"] = "eq";
13
+ RuleOperator["Ge"] = "ge";
14
+ })(RuleOperator || (exports.RuleOperator = RuleOperator = {}));
15
+ const PolicyRuleSchema = typebox_1.Type.Object({
16
+ name: typebox_1.Type.Union(importantFieldLiterals),
17
+ operator: typebox_1.Type.Union(Object.values(RuleOperator).map((op) => typebox_1.Type.Literal(op))),
18
+ value: typebox_1.Type.Union([typebox_1.Type.Number(), typebox_1.Type.Boolean()]),
19
+ });
20
+ exports.PolicySetSchema = typebox_1.Type.Partial(typebox_1.Type.Object(Object.fromEntries([
21
+ ...Object.values(amd_sev_snp_napi_rs_1.WellKnownSnpCodeNames).map((key) => [key, typebox_1.Type.Array(PolicyRuleSchema)]),
22
+ [exports.CommonPolicyKeyName, typebox_1.Type.Array(PolicyRuleSchema)],
23
+ ])), { additionalProperties: false });
24
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoic2V2LXNucC1zY2hlbWEuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvc2d4LW5hdGl2ZS1tb2R1bGUvc2V2LXNucC1zY2hlbWEudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7O0FBQUEsK0NBQTJEO0FBQzNELDRFQUk0QztBQUUvQixRQUFBLG1CQUFtQixHQUFHLFFBQVEsQ0FBQztBQUUvQixRQUFBLG1CQUFtQixHQUFHLE1BQU0sQ0FBQyxJQUFJLENBQUMscURBQStCLENBQXNDLENBQUM7QUFFckgsTUFBTSxzQkFBc0IsR0FBRywyQkFBbUIsQ0FBQyxHQUFHLENBQUMsQ0FBQyxDQUFDLEVBQUUsRUFBRSxDQUFDLGNBQUksQ0FBQyxPQUFPLENBQUMsQ0FBQyxDQUFDLENBRzVFLENBQUM7QUFFRixJQUFZLFlBSVg7QUFKRCxXQUFZLFlBQVk7SUFDcEIseUJBQVMsQ0FBQTtJQUNULHlCQUFTLENBQUE7SUFDVCx5QkFBUyxDQUFBO0FBQ2IsQ0FBQyxFQUpXLFlBQVksNEJBQVosWUFBWSxRQUl2QjtBQUVELE1BQU0sZ0JBQWdCLEdBQUcsY0FBSSxDQUFDLE1BQU0sQ0FBQztJQUNqQyxJQUFJLEVBQUUsY0FBSSxDQUFDLEtBQUssQ0FBQyxzQkFBc0IsQ0FBQztJQUN4QyxRQUFRLEVBQUUsY0FBSSxDQUFDLEtBQUssQ0FBQyxNQUFNLENBQUMsTUFBTSxDQUFDLFlBQVksQ0FBQyxDQUFDLEdBQUcsQ0FBQyxDQUFDLEVBQUUsRUFBRSxFQUFFLENBQUMsY0FBSSxDQUFDLE9BQU8sQ0FBQyxFQUFFLENBQUMsQ0FBQyxDQUFDO0lBQy9FLEtBQUssRUFBRSxjQUFJLENBQUMsS0FBSyxDQUFDLENBQUMsY0FBSSxDQUFDLE1BQU0sRUFBRSxFQUFFLGNBQUksQ0FBQyxPQUFPLEVBQUUsQ0FBQyxDQUFDO0NBQ3JELENBQUMsQ0FBQztBQUVVLFFBQUEsZUFBZSxHQUFHLGNBQUksQ0FBQyxPQUFPLENBQ3ZDLGNBQUksQ0FBQyxNQUFNLENBQ1AsTUFBTSxDQUFDLFdBQVcsQ0FBQztJQUNmLEdBQUcsTUFBTSxDQUFDLE1BQU0sQ0FBQywyQ0FBcUIsQ0FBQyxDQUFDLEdBQUcsQ0FBQyxDQUFDLEdBQUcsRUFBRSxFQUFFLENBQUMsQ0FBQyxHQUFHLEVBQUUsY0FBSSxDQUFDLEtBQUssQ0FBQyxnQkFBZ0IsQ0FBQyxDQUFDLENBQUM7SUFDekYsQ0FBQywyQkFBbUIsRUFBRSxjQUFJLENBQUMsS0FBSyxDQUFDLGdCQUFnQixDQUFDLENBQUM7Q0FDdEQsQ0FBQyxDQUNMLEVBQ0QsRUFBRSxvQkFBb0IsRUFBRSxLQUFLLEVBQUUsQ0FDbEMsQ0FBQyJ9
@@ -0,0 +1,127 @@
1
+ /// <reference types="node" />
2
+ import { CpuInfo, ImportantSecurityFields, WellKnownSnpCodeNames } from "../../bindings/amd-sev-snp-napi-rs/";
3
+ import { SnpCert, SevSnpCertificateFormat, SNPReport, SNPReportWithChain } from "../proto/AmdSevSnp";
4
+ import { PolicySet } from "./sev-snp-schema";
5
+ export interface CalcSnpMrEnclaveParams {
6
+ ovmfPath: string;
7
+ kernelHash: Buffer;
8
+ initrdHash?: Buffer;
9
+ cmdLineHash: Buffer;
10
+ vcpuSig: number;
11
+ vcpuCount: number;
12
+ vmpl?: number;
13
+ policy?: bigint;
14
+ }
15
+ export declare const AMD_EPYC_MILAN_CPUINFO: CpuInfo;
16
+ export declare const EMPTY_INITRD_SHA256_HASH: Buffer;
17
+ export type ArkHashes = {
18
+ [key: string]: Buffer;
19
+ };
20
+ export declare function getDefaultArkHashes(): ArkHashes;
21
+ export declare class SevSNP {
22
+ static serializeSNPReport(report: SNPReportWithChain): Buffer;
23
+ static deserializeSNPReport(serialized: Buffer): SNPReportWithChain;
24
+ protected static convertCertToPem(cert: Buffer): string;
25
+ protected static convertPemToDer(cert: string): Buffer;
26
+ protected static splitCerts(certsPem: string): string[];
27
+ protected static readCmdLine(): Promise<string>;
28
+ /**
29
+ * Method for generation AMD SEV-SNP Report
30
+ * @param userData - The data that will be included in the report and will be signed
31
+ * @param vmpl - Optional VMPL value to pass to the firmware when requesting a report (default: 0)
32
+ */
33
+ static generateSNPReport(userData: Buffer, vmpl?: number): Promise<SNPReport>;
34
+ /**
35
+ * Method for fetch certificates from AMD KDS
36
+ * @param report - report generated by the `generateSNPReport` method
37
+ * @param options - options for working with HTTP, allows you to configure repetitions and the interval between them,
38
+ * as well as the format of the returned certificates
39
+ */
40
+ static getReportChain(report: SNPReport, options?: {
41
+ retryMax?: number;
42
+ retryInterval?: number;
43
+ certFormat?: SevSnpCertificateFormat;
44
+ httpTimeoutMs?: number;
45
+ }): Promise<SnpCert[]>;
46
+ /**
47
+ * Method for generation AMD SEV-SNP Report and fetching certificates
48
+ * @param userData - @see generateSNPReport
49
+ * @param options - @see getReportChain
50
+ */
51
+ static generateSNPReportWithChain(userData: Buffer, options?: {
52
+ retryMax?: number;
53
+ retryInterval?: number;
54
+ certFormat?: SevSnpCertificateFormat;
55
+ }): Promise<SNPReportWithChain>;
56
+ protected static runSubProcess(binaryPath: string, args?: string[], options?: {
57
+ cwd?: string;
58
+ timeoutMs?: number;
59
+ }): Promise<{
60
+ exitCode: number;
61
+ stdout: string;
62
+ stderr: string;
63
+ }>;
64
+ static getCertHash(cert: SnpCert): Buffer;
65
+ protected static isValidArk(ARK: SnpCert, trustedHashes: ArkHashes): boolean;
66
+ /**
67
+ * AMD SEV-SNP verification method
68
+ * @param report - report with full certificate chain
69
+ * @param options - trustedHashes - map of trusted AMD ARK Certificates (CommonName as Key, Sha256 Hash of Der Certificate as Value) - optional
70
+ * timeoutMs - timeout of the utility snpnost in ms
71
+ * snpGuestBinaryPath - path for snpguest util
72
+ */
73
+ static verifyReport(report: SNPReportWithChain, options?: {
74
+ trustedHashes?: ArkHashes;
75
+ timeoutMs?: number;
76
+ snpGuestBinaryPath?: string;
77
+ tmpDirTemplate?: string;
78
+ }): Promise<void>;
79
+ protected static calcMrEnclave(measure: Buffer, vmpl: number, policy: bigint): Buffer;
80
+ /**
81
+ * Method for obtaining mrEnclave from report. MrEnclave includes report measure, report vmpl and report policy
82
+ * @param report - report without certificates
83
+ */
84
+ static getMrEnclave(report: Buffer): Buffer;
85
+ /**
86
+ * Method for obtaining reportData. This data was passed when generating the report
87
+ * @param report - report without certificates
88
+ */
89
+ static getReportData(report: Buffer): Promise<Buffer>;
90
+ /**
91
+ * Method for obtaining measure. Please do not confuse with mrenclave. Report measure is part of mrEnclave.
92
+ * @param report - report without certificates
93
+ */
94
+ static getReportMeasure(report: Buffer): Promise<Buffer>;
95
+ protected static calculateFileSha256(filePath: string): Promise<Buffer>;
96
+ protected static calculateCmdlineHash(cmdLine: string): Buffer;
97
+ /**
98
+ * The method allows to get the expected mrEnclave without generating a report
99
+ * @param params - @see CalcSnpMrEnclaveParams
100
+ */
101
+ static calcSnpMrEnclave(params: CalcSnpMrEnclaveParams): Promise<Buffer>;
102
+ protected static extractBuildFromCmdline(cmdLine: string, paramName?: string): string;
103
+ /**
104
+ * Compute the 32-bit CPUID signature from family, model, and stepping.
105
+ * This computation is described in AMD's CPUID Specification, publication #25481
106
+ * https://www.amd.com/system/files/TechDocs/25481.pdf
107
+ * See section: CPUID Fn0000_0001_EAX Family, Model, Stepping Identifiers
108
+ * @param cpuInfo - Structure containing family, model and stepping @see CpuInfo
109
+ */
110
+ static getCpuSig(cpuInfo: CpuInfo): number;
111
+ static getReportImportantSecurityFields(report: Buffer): Promise<ImportantSecurityFields>;
112
+ static getReportCpuInfo(report: Buffer): Promise<CpuInfo>;
113
+ static getCpuGeneration(cpuInfo: CpuInfo): Promise<WellKnownSnpCodeNames>;
114
+ /**
115
+ * Parse and validate policy
116
+ * @param input - Raw policy as json-text or object
117
+ */
118
+ static parsePolicySet(input: string | Record<string, unknown>): PolicySet;
119
+ private static checkRule;
120
+ /**
121
+ * Verify SNP report against a PolicySet.
122
+ * Throws an error if any rule fails.
123
+ * @param report - SNPReport
124
+ * @param policySet - PolicySet containing rules
125
+ */
126
+ static verifyPolicy(report: Buffer, policySet: PolicySet): Promise<void>;
127
+ }