@super-protocol/addons-tee 2.0.0 → 2.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/bindings/amd-sev-snp-napi-rs/amd-sev-snp-napi-rs.linux-x64-gnu.node +0 -0
- package/bindings/amd-sev-snp-napi-rs/index.d.ts +51 -0
- package/bindings/amd-sev-snp-napi-rs/index.js +339 -0
- package/bindings/nvidia-native/build/Release/libnvat.so.1.1.0 +0 -0
- package/bindings/nvidia-native/build/Release/nvidia_native.node +0 -0
- package/bindings/sgx-native/build/Release/libmbedcrypto_gramine.so.15 +0 -0
- package/bindings/sgx-native/build/Release/libmbedx509_gramine.so.6 +0 -0
- package/bindings/sgx-native/build/Release/libsgx_dcap_quoteverify.so.1 +0 -0
- package/bindings/sgx-native/build/Release/libtdx_attest.so.1 +0 -0
- package/bindings/sgx-native/build/Release/sgx_native.node +0 -0
- package/bindings/usr/lib/node_modules/node-addon-api/node_api.Makefile +6 -0
- package/bindings/usr/lib/node_modules/node-addon-api/nothing.target.mk +159 -0
- package/bindings/utils/virtee/LICENSE +201 -0
- package/bindings/utils/virtee/libsev.so +0 -0
- package/bindings/utils/virtee/snpguest +0 -0
- package/dist/index.d.ts +2 -1
- package/dist/index.js +29 -1
- package/dist/nvidia-native-module/nvidia-attestation.d.ts +146 -0
- package/dist/nvidia-native-module/nvidia-attestation.js +374 -0
- package/dist/nvidia-native-module/nvidia-debug-state-policy.rego +45 -0
- package/dist/nvidia-native-module/nvidia-detailed-policy.rego +205 -0
- package/dist/proto/AmdSevSnp.d.ts +194 -0
- package/dist/proto/AmdSevSnp.js +363 -0
- package/dist/sgx-native-module/consts.d.ts +24 -0
- package/dist/sgx-native-module/consts.js +38 -0
- package/dist/sgx-native-module/dcap-quote-verify.service.d.ts +12 -0
- package/dist/sgx-native-module/dcap-quote-verify.service.js +84 -0
- package/dist/sgx-native-module/enclave.service.d.ts +93 -0
- package/dist/sgx-native-module/enclave.service.js +211 -0
- package/dist/sgx-native-module/errors.d.ts +19 -0
- package/dist/sgx-native-module/errors.js +69 -0
- package/dist/sgx-native-module/helpers.d.ts +1 -0
- package/dist/sgx-native-module/helpers.js +50 -0
- package/dist/sgx-native-module/index.d.ts +9 -0
- package/dist/sgx-native-module/index.js +26 -0
- package/dist/sgx-native-module/pki.service.d.ts +50 -0
- package/dist/sgx-native-module/pki.service.js +74 -0
- package/dist/sgx-native-module/sev-snp-mrenclave.d.ts +59 -0
- package/dist/sgx-native-module/sev-snp-mrenclave.js +322 -0
- package/dist/sgx-native-module/sev-snp-schema.d.ts +22 -0
- package/dist/sgx-native-module/sev-snp-schema.js +24 -0
- package/dist/sgx-native-module/sev-snp.d.ts +127 -0
- package/dist/sgx-native-module/sev-snp.js +513 -0
- package/package.json +1 -1
|
@@ -0,0 +1,74 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.PkiService = exports.ECPCurve = exports.CertificateFormat = exports.CertificateKeyType = void 0;
|
|
4
|
+
const { CryptoPrimitives } = require("../../bindings/sgx-native/build/Release/sgx_native.node");
|
|
5
|
+
var CertificateKeyType;
|
|
6
|
+
(function (CertificateKeyType) {
|
|
7
|
+
CertificateKeyType["RSA"] = "RSA";
|
|
8
|
+
CertificateKeyType["ECP"] = "ECP";
|
|
9
|
+
})(CertificateKeyType || (exports.CertificateKeyType = CertificateKeyType = {}));
|
|
10
|
+
var CertificateFormat;
|
|
11
|
+
(function (CertificateFormat) {
|
|
12
|
+
CertificateFormat["PEM"] = "PEM";
|
|
13
|
+
CertificateFormat["DER"] = "DER";
|
|
14
|
+
})(CertificateFormat || (exports.CertificateFormat = CertificateFormat = {}));
|
|
15
|
+
var ECPCurve;
|
|
16
|
+
(function (ECPCurve) {
|
|
17
|
+
ECPCurve["SECP192R1"] = "SECP192R1"; /*!< Domain parameters for the 192-bit curve defined by FIPS 186-4 and SEC1. */
|
|
18
|
+
ECPCurve["SECP224R1"] = "SECP224R1"; /*!< Domain parameters for the 224-bit curve defined by FIPS 186-4 and SEC1. */
|
|
19
|
+
ECPCurve["SECP256R1"] = "SECP256R1"; /*!< Domain parameters for the 256-bit curve defined by FIPS 186-4 and SEC1. */
|
|
20
|
+
ECPCurve["SECP384R1"] = "SECP384R1"; /*!< Domain parameters for the 384-bit curve defined by FIPS 186-4 and SEC1. */
|
|
21
|
+
ECPCurve["SECP521R1"] = "SECP521R1"; /*!< Domain parameters for the 521-bit curve defined by FIPS 186-4 and SEC1. */
|
|
22
|
+
ECPCurve["BP256R1"] = "BP256R1"; /*!< Domain parameters for 256-bit Brainpool curve. */
|
|
23
|
+
ECPCurve["BP384R1"] = "BP384R1"; /*!< Domain parameters for 384-bit Brainpool curve. */
|
|
24
|
+
ECPCurve["BP512R1"] = "BP512R1"; /*!< Domain parameters for 512-bit Brainpool curve. */
|
|
25
|
+
// @TODO: MBEDTLS NOT SUPPORT EXRPORT CURVE25519 = "CURVE25519", /*!< Domain parameters for Curve25519. */
|
|
26
|
+
ECPCurve["SECP192K1"] = "SECP192K1"; /*!< Domain parameters for 192-bit "Koblitz" curve. */
|
|
27
|
+
ECPCurve["SECP224K1"] = "SECP224K1"; /*!< Domain parameters for 224-bit "Koblitz" curve. */
|
|
28
|
+
ECPCurve["SECP256K1"] = "SECP256K1"; /*!< Domain parameters for 256-bit "Koblitz" curve. */
|
|
29
|
+
// @TODO: MBEDTLS NOT SUPPORT EXRPORT CURVE448 = "CURVE448", /*!< Domain parameters for Curve448. */
|
|
30
|
+
})(ECPCurve || (exports.ECPCurve = ECPCurve = {}));
|
|
31
|
+
class PkiService {
|
|
32
|
+
constructor() {
|
|
33
|
+
this.cryptoPrimitives = new CryptoPrimitives();
|
|
34
|
+
}
|
|
35
|
+
async generateTlsCertificate(params = {}) {
|
|
36
|
+
const subject = {
|
|
37
|
+
commonName: params.subject?.commonName ?? "localhost",
|
|
38
|
+
countryName: params.subject?.countryName ?? "US",
|
|
39
|
+
state: params.subject?.state ?? "New York",
|
|
40
|
+
localityName: params.subject?.localityName ?? "New York",
|
|
41
|
+
organizationName: params.subject?.organizationName ?? "SuperProtocol",
|
|
42
|
+
organizationUnit: params.subject?.organizationUnit ?? "TEE",
|
|
43
|
+
};
|
|
44
|
+
const format = params.format ?? CertificateFormat.PEM;
|
|
45
|
+
const keyType = params.keyType ?? CertificateKeyType.RSA;
|
|
46
|
+
let rsaKeyBits;
|
|
47
|
+
let ecpCurve;
|
|
48
|
+
if (keyType === CertificateKeyType.RSA) {
|
|
49
|
+
rsaKeyBits = params.rsaKeyBits ?? 3072;
|
|
50
|
+
}
|
|
51
|
+
else if (keyType === CertificateKeyType.ECP) {
|
|
52
|
+
ecpCurve = params.ecpCurve ?? ECPCurve.SECP384R1;
|
|
53
|
+
}
|
|
54
|
+
const withQuote = params.withQuote ?? false;
|
|
55
|
+
const serialNumber = params.serialNumber ?? "01";
|
|
56
|
+
const days = params.days ?? 365;
|
|
57
|
+
const dnsNames = params.dnsNames ?? [];
|
|
58
|
+
const ips = params.ips ?? [];
|
|
59
|
+
return this.cryptoPrimitives.GenerateTlsCertificate({
|
|
60
|
+
format,
|
|
61
|
+
subject,
|
|
62
|
+
keyType,
|
|
63
|
+
withQuote,
|
|
64
|
+
rsaKeyBits,
|
|
65
|
+
ecpCurve,
|
|
66
|
+
serialNumber,
|
|
67
|
+
days,
|
|
68
|
+
dnsNames,
|
|
69
|
+
ips,
|
|
70
|
+
});
|
|
71
|
+
}
|
|
72
|
+
}
|
|
73
|
+
exports.PkiService = PkiService;
|
|
74
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,59 @@
|
|
|
1
|
+
/// <reference types="node" />
|
|
2
|
+
/// <reference types="node" />
|
|
3
|
+
import { StorageAccess } from "@super-protocol/sdk-js";
|
|
4
|
+
import { Transform } from "stream";
|
|
5
|
+
import { SNPReport } from "../proto/AmdSevSnp";
|
|
6
|
+
interface VMCommon {
|
|
7
|
+
kernelHash: Buffer;
|
|
8
|
+
initrdHash: Buffer | undefined;
|
|
9
|
+
ovmfHash: Buffer;
|
|
10
|
+
}
|
|
11
|
+
interface VMConfig extends VMCommon {
|
|
12
|
+
ovmfBucket: string;
|
|
13
|
+
ovmfPrefix: string;
|
|
14
|
+
ovmfFilename: string;
|
|
15
|
+
}
|
|
16
|
+
interface VMMeasure extends VMCommon {
|
|
17
|
+
ovmfFilePath: string;
|
|
18
|
+
}
|
|
19
|
+
export interface SNPMrEnclaveCalculatorArgs {
|
|
20
|
+
cacheFolder?: string;
|
|
21
|
+
rmPrevCache?: boolean;
|
|
22
|
+
vmRepoOwner?: string;
|
|
23
|
+
vmRepo?: string;
|
|
24
|
+
releaseAsset?: string;
|
|
25
|
+
downloadAssetRetryInterval?: number;
|
|
26
|
+
downloadAssetRetryMax?: number;
|
|
27
|
+
storageAccess?: StorageAccess;
|
|
28
|
+
cacheRecordsTTL?: number;
|
|
29
|
+
}
|
|
30
|
+
export declare class SNPMrEnclaveCalculator {
|
|
31
|
+
private readonly cacheFolder;
|
|
32
|
+
private readonly vmRepoOwner;
|
|
33
|
+
private readonly vmRepo;
|
|
34
|
+
private readonly releaseAsset;
|
|
35
|
+
private readonly axiosInstance;
|
|
36
|
+
private readonly retryInterval;
|
|
37
|
+
private readonly retryMax;
|
|
38
|
+
private readonly storageAccess;
|
|
39
|
+
private readonly vmInfoCache;
|
|
40
|
+
private readonly defaultCredentials;
|
|
41
|
+
constructor(config: SNPMrEnclaveCalculatorArgs);
|
|
42
|
+
/**
|
|
43
|
+
* The method allows to obtain expected mrenclave if the virtual machine for which the report is
|
|
44
|
+
* submitted was running on one core and a Milan processor
|
|
45
|
+
* @param report - @see CalcSnpMrEnclaveParams
|
|
46
|
+
*/
|
|
47
|
+
getSingleCoreMrEnclave(report: SNPReport): Promise<Buffer>;
|
|
48
|
+
protected downloadAsset(assetUrl: string): Promise<Buffer>;
|
|
49
|
+
protected extractVMData(data: Buffer): VMConfig;
|
|
50
|
+
protected static calcHashStream(alg?: string): {
|
|
51
|
+
process: Transform;
|
|
52
|
+
get: () => Buffer;
|
|
53
|
+
};
|
|
54
|
+
protected static fileExist(filePath: string): Promise<boolean>;
|
|
55
|
+
protected getAssetUrl(build: string): Promise<string>;
|
|
56
|
+
protected downloadVM(build: string): Promise<VMMeasure>;
|
|
57
|
+
protected downloadOvmf(vmFiles: VMConfig, ovmfPath: string): Promise<void>;
|
|
58
|
+
}
|
|
59
|
+
export {};
|
|
@@ -0,0 +1,322 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
+
if (k2 === undefined) k2 = k;
|
|
4
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
+
}
|
|
8
|
+
Object.defineProperty(o, k2, desc);
|
|
9
|
+
}) : (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
o[k2] = m[k];
|
|
12
|
+
}));
|
|
13
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
+
}) : function(o, v) {
|
|
16
|
+
o["default"] = v;
|
|
17
|
+
});
|
|
18
|
+
var __importStar = (this && this.__importStar) || function (mod) {
|
|
19
|
+
if (mod && mod.__esModule) return mod;
|
|
20
|
+
var result = {};
|
|
21
|
+
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
22
|
+
__setModuleDefault(result, mod);
|
|
23
|
+
return result;
|
|
24
|
+
};
|
|
25
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
26
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
27
|
+
};
|
|
28
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
29
|
+
exports.SNPMrEnclaveCalculator = void 0;
|
|
30
|
+
const typebox_1 = require("@sinclair/typebox");
|
|
31
|
+
const value_1 = require("@sinclair/typebox/value");
|
|
32
|
+
const fs = __importStar(require("fs"));
|
|
33
|
+
const fsAsync = __importStar(require("fs/promises"));
|
|
34
|
+
const path = __importStar(require("path"));
|
|
35
|
+
const os = __importStar(require("os"));
|
|
36
|
+
const sev_snp_1 = require("./sev-snp");
|
|
37
|
+
const axios_1 = __importDefault(require("axios"));
|
|
38
|
+
const sdk_js_1 = require("@super-protocol/sdk-js");
|
|
39
|
+
const dto_js_1 = require("@super-protocol/dto-js");
|
|
40
|
+
const crypto_1 = require("crypto");
|
|
41
|
+
const stream_1 = require("stream");
|
|
42
|
+
const helpers_1 = require("./helpers");
|
|
43
|
+
const amd_sev_snp_napi_rs_1 = require("../../bindings/amd-sev-snp-napi-rs/");
|
|
44
|
+
const VMJsonSchema = typebox_1.Type.Object({
|
|
45
|
+
kernel: typebox_1.Type.Object({ sha256: typebox_1.Type.String() }),
|
|
46
|
+
initrd: typebox_1.Type.Optional(typebox_1.Type.Object({ sha256: typebox_1.Type.String() })),
|
|
47
|
+
bios_amd: typebox_1.Type.Optional(typebox_1.Type.Object({
|
|
48
|
+
sha256: typebox_1.Type.String(),
|
|
49
|
+
bucket: typebox_1.Type.String(),
|
|
50
|
+
prefix: typebox_1.Type.String(),
|
|
51
|
+
filename: typebox_1.Type.String(),
|
|
52
|
+
})),
|
|
53
|
+
bios: typebox_1.Type.Optional(typebox_1.Type.Object({
|
|
54
|
+
sha256: typebox_1.Type.String(),
|
|
55
|
+
bucket: typebox_1.Type.String(),
|
|
56
|
+
prefix: typebox_1.Type.String(),
|
|
57
|
+
filename: typebox_1.Type.String(),
|
|
58
|
+
})),
|
|
59
|
+
});
|
|
60
|
+
class VMConfigCache {
|
|
61
|
+
constructor(ttl = 5 * 60 * 1000) {
|
|
62
|
+
this.cache = {};
|
|
63
|
+
this.ttl = ttl;
|
|
64
|
+
}
|
|
65
|
+
set(key, value) {
|
|
66
|
+
const timestamp = Date.now();
|
|
67
|
+
this.cache[key] = {
|
|
68
|
+
value,
|
|
69
|
+
timestamp,
|
|
70
|
+
};
|
|
71
|
+
}
|
|
72
|
+
get(key, force = false) {
|
|
73
|
+
const record = this.cache[key];
|
|
74
|
+
if (record) {
|
|
75
|
+
if (force === false) {
|
|
76
|
+
const now = Date.now();
|
|
77
|
+
if (now - record.timestamp > this.ttl) {
|
|
78
|
+
return null;
|
|
79
|
+
}
|
|
80
|
+
}
|
|
81
|
+
return record.value;
|
|
82
|
+
}
|
|
83
|
+
return null;
|
|
84
|
+
}
|
|
85
|
+
clear() {
|
|
86
|
+
this.cache = {};
|
|
87
|
+
}
|
|
88
|
+
}
|
|
89
|
+
class SNPMrEnclaveCalculator {
|
|
90
|
+
constructor(config) {
|
|
91
|
+
this.axiosInstance = axios_1.default.create();
|
|
92
|
+
this.defaultCredentials = {
|
|
93
|
+
storageType: dto_js_1.StorageType.S3,
|
|
94
|
+
credentials: {
|
|
95
|
+
endpoint: "https://gateway.storjshare.io",
|
|
96
|
+
accessKeyId: "jxekrow2wxmjps6pr2jv22hamtha",
|
|
97
|
+
secretKey: "jztnpl532njcljtdolnpbszq66lgqmwmgkbh747342hwc72grkohi",
|
|
98
|
+
// prefix and bucket can be any, as it will be filled later
|
|
99
|
+
bucket: "",
|
|
100
|
+
prefix: "",
|
|
101
|
+
},
|
|
102
|
+
};
|
|
103
|
+
this.cacheFolder = config.cacheFolder || fs.mkdtempSync(path.join(os.tmpdir(), "snp-mrenclave-cache-"));
|
|
104
|
+
const rmPrevCache = config.rmPrevCache ?? false;
|
|
105
|
+
this.vmRepoOwner = config.vmRepoOwner || "Super-Protocol";
|
|
106
|
+
this.vmRepo = config.vmRepo || "sp-vm";
|
|
107
|
+
this.releaseAsset = config.releaseAsset || "vm.json";
|
|
108
|
+
this.retryInterval = config.downloadAssetRetryInterval ?? 1000;
|
|
109
|
+
this.retryMax = config.downloadAssetRetryMax ?? 3;
|
|
110
|
+
this.storageAccess = config.storageAccess ?? this.defaultCredentials;
|
|
111
|
+
const cacheRecordsTTL = config.cacheRecordsTTL ?? 5 * 60 * 1000;
|
|
112
|
+
if (rmPrevCache) {
|
|
113
|
+
(0, helpers_1.gramineCompatibleRmDir)(this.cacheFolder);
|
|
114
|
+
}
|
|
115
|
+
if (!fs.existsSync(this.cacheFolder)) {
|
|
116
|
+
fs.mkdirSync(this.cacheFolder, { recursive: true });
|
|
117
|
+
}
|
|
118
|
+
this.vmInfoCache = new VMConfigCache(cacheRecordsTTL);
|
|
119
|
+
}
|
|
120
|
+
/**
|
|
121
|
+
* The method allows to obtain expected mrenclave if the virtual machine for which the report is
|
|
122
|
+
* submitted was running on one core and a Milan processor
|
|
123
|
+
* @param report - @see CalcSnpMrEnclaveParams
|
|
124
|
+
*/
|
|
125
|
+
async getSingleCoreMrEnclave(report) {
|
|
126
|
+
const mrEnclave = await sev_snp_1.SevSNP.getMrEnclave(Buffer.from(report.rawReport));
|
|
127
|
+
const vmMeasure = await this.downloadVM(report.build);
|
|
128
|
+
const expectedMrEnclave = await sev_snp_1.SevSNP.calcSnpMrEnclave({
|
|
129
|
+
ovmfPath: vmMeasure.ovmfFilePath,
|
|
130
|
+
kernelHash: vmMeasure.kernelHash,
|
|
131
|
+
initrdHash: vmMeasure.initrdHash,
|
|
132
|
+
cmdLineHash: Buffer.from(report.cmdLineHash),
|
|
133
|
+
vcpuSig: report.cpuSig,
|
|
134
|
+
vcpuCount: report.cores,
|
|
135
|
+
vmpl: await (0, amd_sev_snp_napi_rs_1.getReportVmpl)(Buffer.from(report.rawReport)),
|
|
136
|
+
policy: await (0, amd_sev_snp_napi_rs_1.getReportPolicy)(Buffer.from(report.rawReport)),
|
|
137
|
+
});
|
|
138
|
+
if (!mrEnclave.equals(expectedMrEnclave))
|
|
139
|
+
throw new Error(`Expected mrEnclave does not match the calculated one.\n` +
|
|
140
|
+
`mrEnclave: ${mrEnclave.toString("hex")}\n` +
|
|
141
|
+
`expectedMrEnclave: ${expectedMrEnclave.toString("hex")}\n` +
|
|
142
|
+
`report.build: ${report.build}\n` +
|
|
143
|
+
`vmMeasure: ${JSON.stringify(vmMeasure)}`);
|
|
144
|
+
const singleCoreMrEnclave = await sev_snp_1.SevSNP.calcSnpMrEnclave({
|
|
145
|
+
ovmfPath: vmMeasure.ovmfFilePath,
|
|
146
|
+
kernelHash: vmMeasure.kernelHash,
|
|
147
|
+
initrdHash: vmMeasure.initrdHash,
|
|
148
|
+
cmdLineHash: Buffer.from(report.cmdLineHash),
|
|
149
|
+
vcpuSig: sev_snp_1.SevSNP.getCpuSig(sev_snp_1.AMD_EPYC_MILAN_CPUINFO),
|
|
150
|
+
vcpuCount: 1,
|
|
151
|
+
});
|
|
152
|
+
return singleCoreMrEnclave;
|
|
153
|
+
}
|
|
154
|
+
async downloadAsset(assetUrl) {
|
|
155
|
+
const { retryInterval, retryMax } = this;
|
|
156
|
+
const response = await sdk_js_1.helpers.tryWithInterval({
|
|
157
|
+
checkResult(response) {
|
|
158
|
+
return { isResultOk: response.status === 200 };
|
|
159
|
+
},
|
|
160
|
+
handler: async () => {
|
|
161
|
+
return this.axiosInstance.get(assetUrl, {
|
|
162
|
+
responseType: "arraybuffer",
|
|
163
|
+
});
|
|
164
|
+
},
|
|
165
|
+
checkError(err) {
|
|
166
|
+
if (axios_1.default.isAxiosError(err) && err.response) {
|
|
167
|
+
const status = err.response.status;
|
|
168
|
+
return { retryable: status < 400 || status >= 500 || status === 429 };
|
|
169
|
+
}
|
|
170
|
+
return { retryable: axios_1.default.isAxiosError(err) };
|
|
171
|
+
},
|
|
172
|
+
retryInterval,
|
|
173
|
+
retryMax,
|
|
174
|
+
});
|
|
175
|
+
return response.data;
|
|
176
|
+
}
|
|
177
|
+
extractVMData(data) {
|
|
178
|
+
const vmRaw = data.toString("utf-8");
|
|
179
|
+
const parsed = JSON.parse(vmRaw);
|
|
180
|
+
const { isValid } = (0, sdk_js_1.validateBySchema)(parsed, VMJsonSchema);
|
|
181
|
+
if (!isValid) {
|
|
182
|
+
const validationErrors = Array.from(value_1.Value.Errors(VMJsonSchema, parsed));
|
|
183
|
+
const details = validationErrors.map((e) => e.message).join(", ");
|
|
184
|
+
throw new Error(`Failed to validate VM JSON:${details ? `: ${details}` : ""}`);
|
|
185
|
+
}
|
|
186
|
+
const vm = parsed;
|
|
187
|
+
const kernelHash = vm.kernel.sha256;
|
|
188
|
+
const initrdHash = vm.initrd?.sha256;
|
|
189
|
+
const OVMF = vm.bios_amd || vm.bios;
|
|
190
|
+
if (!OVMF) {
|
|
191
|
+
throw new Error("Neither bios_amd nor bios is available");
|
|
192
|
+
}
|
|
193
|
+
const { sha256, bucket, prefix, filename } = OVMF;
|
|
194
|
+
if (!sha256 || !bucket || !prefix || !filename) {
|
|
195
|
+
throw new Error("Missing one or more required fields in OVMF");
|
|
196
|
+
}
|
|
197
|
+
return {
|
|
198
|
+
kernelHash: Buffer.from(kernelHash, "hex"),
|
|
199
|
+
initrdHash: initrdHash ? Buffer.from(initrdHash, "hex") : undefined,
|
|
200
|
+
ovmfHash: Buffer.from(sha256, "hex"),
|
|
201
|
+
ovmfBucket: bucket,
|
|
202
|
+
ovmfPrefix: prefix,
|
|
203
|
+
ovmfFilename: filename,
|
|
204
|
+
};
|
|
205
|
+
}
|
|
206
|
+
static calcHashStream(alg = "sha256") {
|
|
207
|
+
const hash = (0, crypto_1.createHash)(alg);
|
|
208
|
+
return {
|
|
209
|
+
process: new stream_1.Transform({
|
|
210
|
+
transform: (data, encoding, done) => {
|
|
211
|
+
hash.update(data);
|
|
212
|
+
done(null, data);
|
|
213
|
+
},
|
|
214
|
+
}),
|
|
215
|
+
get: () => hash.digest(),
|
|
216
|
+
};
|
|
217
|
+
}
|
|
218
|
+
static async fileExist(filePath) {
|
|
219
|
+
try {
|
|
220
|
+
await fsAsync.access(filePath, fs.constants.F_OK);
|
|
221
|
+
return true;
|
|
222
|
+
}
|
|
223
|
+
catch (err) {
|
|
224
|
+
return false;
|
|
225
|
+
}
|
|
226
|
+
}
|
|
227
|
+
async getAssetUrl(build) {
|
|
228
|
+
const { retryInterval, retryMax } = this;
|
|
229
|
+
const response = await sdk_js_1.helpers.tryWithInterval({
|
|
230
|
+
checkResult(response) {
|
|
231
|
+
return { isResultOk: response.status === 200 };
|
|
232
|
+
},
|
|
233
|
+
handler: async () => {
|
|
234
|
+
return this.axiosInstance.get(`https://api.github.com/repos/${this.vmRepoOwner}/${this.vmRepo}/releases/tags/${build}`);
|
|
235
|
+
},
|
|
236
|
+
checkError(err) {
|
|
237
|
+
if (axios_1.default.isAxiosError(err) && err.response) {
|
|
238
|
+
const status = err.response.status;
|
|
239
|
+
return { retryable: status < 400 || status >= 500 || status === 429 };
|
|
240
|
+
}
|
|
241
|
+
return { retryable: axios_1.default.isAxiosError(err) };
|
|
242
|
+
},
|
|
243
|
+
retryInterval,
|
|
244
|
+
retryMax,
|
|
245
|
+
});
|
|
246
|
+
const { data } = response;
|
|
247
|
+
const asset = data.assets.find((asset) => asset.name === this.releaseAsset);
|
|
248
|
+
if (!asset) {
|
|
249
|
+
throw new Error(`Failed to find asset named ${this.releaseAsset} for build ${build}.`);
|
|
250
|
+
}
|
|
251
|
+
return asset.browser_download_url;
|
|
252
|
+
}
|
|
253
|
+
async downloadVM(build) {
|
|
254
|
+
let fromCache = false;
|
|
255
|
+
let vmFiles;
|
|
256
|
+
const vmInfo = this.vmInfoCache.get(build);
|
|
257
|
+
if (vmInfo) {
|
|
258
|
+
fromCache = true;
|
|
259
|
+
vmFiles = vmInfo;
|
|
260
|
+
}
|
|
261
|
+
else {
|
|
262
|
+
try {
|
|
263
|
+
const assetUrl = await this.getAssetUrl(build);
|
|
264
|
+
const vm = await this.downloadAsset(assetUrl);
|
|
265
|
+
vmFiles = this.extractVMData(vm);
|
|
266
|
+
}
|
|
267
|
+
catch (error) {
|
|
268
|
+
const vmInfo = this.vmInfoCache.get(build, true);
|
|
269
|
+
if (vmInfo) {
|
|
270
|
+
fromCache = true;
|
|
271
|
+
vmFiles = vmInfo;
|
|
272
|
+
}
|
|
273
|
+
else {
|
|
274
|
+
throw error;
|
|
275
|
+
}
|
|
276
|
+
}
|
|
277
|
+
}
|
|
278
|
+
const ovmfPath = path.join(this.cacheFolder, `${vmFiles.ovmfHash.toString("hex")}_OVMF.fd`);
|
|
279
|
+
let fileExistAndCorrect = false;
|
|
280
|
+
if (await SNPMrEnclaveCalculator.fileExist(ovmfPath)) {
|
|
281
|
+
const fileStream = fs.createReadStream(ovmfPath);
|
|
282
|
+
const hash = await sdk_js_1.Crypto.createHash(fileStream, {
|
|
283
|
+
algo: dto_js_1.HashAlgorithm.SHA256,
|
|
284
|
+
encoding: dto_js_1.Encoding.hex,
|
|
285
|
+
});
|
|
286
|
+
if (vmFiles.ovmfHash.toString("hex") === hash.hash) {
|
|
287
|
+
fileExistAndCorrect = true;
|
|
288
|
+
}
|
|
289
|
+
}
|
|
290
|
+
if (fileExistAndCorrect !== true) {
|
|
291
|
+
await this.downloadOvmf(vmFiles, ovmfPath);
|
|
292
|
+
}
|
|
293
|
+
if (fromCache !== true) {
|
|
294
|
+
this.vmInfoCache.set(build, vmFiles);
|
|
295
|
+
}
|
|
296
|
+
return {
|
|
297
|
+
initrdHash: vmFiles.initrdHash,
|
|
298
|
+
kernelHash: vmFiles.kernelHash,
|
|
299
|
+
ovmfFilePath: ovmfPath,
|
|
300
|
+
ovmfHash: vmFiles.ovmfHash,
|
|
301
|
+
};
|
|
302
|
+
}
|
|
303
|
+
async downloadOvmf(vmFiles, ovmfPath) {
|
|
304
|
+
const access = {
|
|
305
|
+
...this.storageAccess,
|
|
306
|
+
credentials: {
|
|
307
|
+
...this.storageAccess.credentials,
|
|
308
|
+
bucket: vmFiles.ovmfBucket,
|
|
309
|
+
prefix: vmFiles.ovmfPrefix.endsWith("/") ? vmFiles.ovmfPrefix : `${vmFiles.ovmfPrefix}/`,
|
|
310
|
+
},
|
|
311
|
+
};
|
|
312
|
+
const storageProvider = (0, sdk_js_1.getStorageProvider)(access);
|
|
313
|
+
const downloaderStream = await storageProvider.downloadFile(vmFiles.ovmfFilename, {});
|
|
314
|
+
const { process: hashStream, get: getStreamHash } = SNPMrEnclaveCalculator.calcHashStream("sha256");
|
|
315
|
+
await stream_1.promises.pipeline(downloaderStream, hashStream, fs.createWriteStream(ovmfPath));
|
|
316
|
+
if (!vmFiles.ovmfHash.equals(getStreamHash())) {
|
|
317
|
+
throw new Error("The downloaded OVMF-file does not match the expected checksum");
|
|
318
|
+
}
|
|
319
|
+
}
|
|
320
|
+
}
|
|
321
|
+
exports.SNPMrEnclaveCalculator = SNPMrEnclaveCalculator;
|
|
322
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"sev-snp-mrenclave.js","sourceRoot":"","sources":["../../src/sgx-native-module/sev-snp-mrenclave.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,+CAAiD;AACjD,mDAAgD;AAChD,uCAAyB;AACzB,qDAAuC;AACvC,2CAA6B;AAC7B,uCAAyB;AACzB,uCAA2D;AAC3D,kDAA6C;AAC7C,mDAMgC;AAChC,mDAA8E;AAC9E,mCAAoC;AACpC,mCAA6C;AAC7C,uCAAmD;AAEnD,6EAAqF;AAkBrF,MAAM,YAAY,GAAG,cAAI,CAAC,MAAM,CAAC;IAC7B,MAAM,EAAE,cAAI,CAAC,MAAM,CAAC,EAAE,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE,EAAE,CAAC;IAC9C,MAAM,EAAE,cAAI,CAAC,QAAQ,CAAC,cAAI,CAAC,MAAM,CAAC,EAAE,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC;IAC7D,QAAQ,EAAE,cAAI,CAAC,QAAQ,CACnB,cAAI,CAAC,MAAM,CAAC;QACR,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,QAAQ,EAAE,cAAI,CAAC,MAAM,EAAE;KAC1B,CAAC,CACL;IACD,IAAI,EAAE,cAAI,CAAC,QAAQ,CACf,cAAI,CAAC,MAAM,CAAC;QACR,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,MAAM,EAAE,cAAI,CAAC,MAAM,EAAE;QACrB,QAAQ,EAAE,cAAI,CAAC,MAAM,EAAE;KAC1B,CAAC,CACL;CACJ,CAAC,CAAC;AAGH,MAAM,aAAa;IAIf,YAAY,MAAc,CAAC,GAAG,EAAE,GAAG,IAAI;QAH/B,UAAK,GAA8D,EAAE,CAAC;QAI1E,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;IACnB,CAAC;IAED,GAAG,CAAC,GAAW,EAAE,KAAe;QAC5B,MAAM,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QAC7B,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG;YACd,KAAK;YACL,SAAS;SACZ,CAAC;IACN,CAAC;IAED,GAAG,CAAC,GAAW,EAAE,QAAiB,KAAK;QACnC,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QAE/B,IAAI,MAAM,EAAE,CAAC;YACT,IAAI,KAAK,KAAK,KAAK,EAAE,CAAC;gBAClB,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;gBACvB,IAAI,GAAG,GAAG,MAAM,CAAC,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;oBACpC,OAAO,IAAI,CAAC;gBAChB,CAAC;YACL,CAAC;YAED,OAAO,MAAM,CAAC,KAAK,CAAC;QACxB,CAAC;QAED,OAAO,IAAI,CAAC;IAChB,CAAC;IAED,KAAK;QACD,IAAI,CAAC,KAAK,GAAG,EAAE,CAAC;IACpB,CAAC;CACJ;AAcD,MAAa,sBAAsB;IAsB/B,YAAY,MAAkC;QAjB7B,kBAAa,GAAG,eAAK,CAAC,MAAM,EAAE,CAAC;QAK/B,uBAAkB,GAAkB;YACjD,WAAW,EAAE,oBAAW,CAAC,EAAE;YAC3B,WAAW,EAAE;gBACT,QAAQ,EAAE,+BAA+B;gBACzC,WAAW,EAAE,8BAA8B;gBAC3C,SAAS,EAAE,uDAAuD;gBAClE,2DAA2D;gBAC3D,MAAM,EAAE,EAAE;gBACV,MAAM,EAAE,EAAE;aACb;SACJ,CAAC;QAGE,IAAI,CAAC,WAAW,GAAG,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,MAAM,EAAE,EAAE,sBAAsB,CAAC,CAAC,CAAC;QACxG,MAAM,WAAW,GAAG,MAAM,CAAC,WAAW,IAAI,KAAK,CAAC;QAChD,IAAI,CAAC,WAAW,GAAG,MAAM,CAAC,WAAW,IAAI,gBAAgB,CAAC;QAC1D,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC,MAAM,IAAI,OAAO,CAAC;QACvC,IAAI,CAAC,YAAY,GAAG,MAAM,CAAC,YAAY,IAAI,SAAS,CAAC;QACrD,IAAI,CAAC,aAAa,GAAG,MAAM,CAAC,0BAA0B,IAAI,IAAI,CAAC;QAC/D,IAAI,CAAC,QAAQ,GAAG,MAAM,CAAC,qBAAqB,IAAI,CAAC,CAAC;QAElD,IAAI,CAAC,aAAa,GAAG,MAAM,CAAC,aAAa,IAAI,IAAI,CAAC,kBAAkB,CAAC;QAErE,MAAM,eAAe,GAAG,MAAM,CAAC,eAAe,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC;QAEhE,IAAI,WAAW,EAAE,CAAC;YACd,IAAA,gCAAsB,EAAC,IAAI,CAAC,WAAW,CAAC,CAAC;QAC7C,CAAC;QAED,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC;YACnC,EAAE,CAAC,SAAS,CAAC,IAAI,CAAC,WAAW,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QACxD,CAAC;QAED,IAAI,CAAC,WAAW,GAAG,IAAI,aAAa,CAAC,eAAe,CAAC,CAAC;IAC1D,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,sBAAsB,CAAC,MAAiB;QACjD,MAAM,SAAS,GAAG,MAAM,gBAAM,CAAC,YAAY,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,CAAC;QAC3E,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;QACtD,MAAM,iBAAiB,GAAG,MAAM,gBAAM,CAAC,gBAAgB,CAAC;YACpD,QAAQ,EAAE,SAAS,CAAC,YAAY;YAChC,UAAU,EAAE,SAAS,CAAC,UAAU;YAChC,UAAU,EAAE,SAAS,CAAC,UAAU;YAChC,WAAW,EAAE,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC;YAC5C,OAAO,EAAE,MAAM,CAAC,MAAM;YACtB,SAAS,EAAE,MAAM,CAAC,KAAK;YACvB,IAAI,EAAE,MAAM,IAAA,mCAAa,EAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;YACxD,MAAM,EAAE,MAAM,IAAA,qCAAe,EAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;SAC/D,CAAC,CAAC;QAEH,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,iBAAiB,CAAC;YACpC,MAAM,IAAI,KAAK,CACX,yDAAyD;gBACrD,cAAc,SAAS,CAAC,QAAQ,CAAC,KAAK,CAAC,IAAI;gBAC3C,sBAAsB,iBAAiB,CAAC,QAAQ,CAAC,KAAK,CAAC,IAAI;gBAC3D,iBAAiB,MAAM,CAAC,KAAK,IAAI;gBACjC,cAAc,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,EAAE,CAChD,CAAC;QAEN,MAAM,mBAAmB,GAAG,MAAM,gBAAM,CAAC,gBAAgB,CAAC;YACtD,QAAQ,EAAE,SAAS,CAAC,YAAY;YAChC,UAAU,EAAE,SAAS,CAAC,UAAU;YAChC,UAAU,EAAE,SAAS,CAAC,UAAU;YAChC,WAAW,EAAE,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC;YAC5C,OAAO,EAAE,gBAAM,CAAC,SAAS,CAAC,gCAAsB,CAAC;YACjD,SAAS,EAAE,CAAC;SACf,CAAC,CAAC;QAEH,OAAO,mBAAmB,CAAC;IAC/B,CAAC;IAES,KAAK,CAAC,aAAa,CAAC,QAAgB;QAC1C,MAAM,EAAE,aAAa,EAAE,QAAQ,EAAE,GAAG,IAAI,CAAC;QACzC,MAAM,QAAQ,GAAG,MAAM,gBAAU,CAAC,eAAe,CAAgB;YAC7D,WAAW,CAAC,QAAQ;gBAChB,OAAO,EAAE,UAAU,EAAE,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE,CAAC;YACnD,CAAC;YACD,OAAO,EAAE,KAAK,IAAI,EAAE;gBAChB,OAAO,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,QAAQ,EAAE;oBACpC,YAAY,EAAE,aAAa;iBAC9B,CAAC,CAAC;YACP,CAAC;YACD,UAAU,CAAC,GAAG;gBACV,IAAI,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,IAAI,GAAG,CAAC,QAAQ,EAAE,CAAC;oBAC1C,MAAM,MAAM,GAAG,GAAG,CAAC,QAAQ,CAAC,MAAM,CAAC;oBAEnC,OAAO,EAAE,SAAS,EAAE,MAAM,GAAG,GAAG,IAAI,MAAM,IAAI,GAAG,IAAI,MAAM,KAAK,GAAG,EAAE,CAAC;gBAC1E,CAAC;gBAED,OAAO,EAAE,SAAS,EAAE,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,EAAE,CAAC;YAClD,CAAC;YACD,aAAa;YACb,QAAQ;SACX,CAAC,CAAC;QAEH,OAAO,QAAQ,CAAC,IAAI,CAAC;IACzB,CAAC;IAES,aAAa,CAAC,IAAY;QAChC,MAAM,KAAK,GAAG,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;QAErC,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;QACjC,MAAM,EAAE,OAAO,EAAE,GAAG,IAAA,yBAAgB,EAAC,MAAM,EAAE,YAAY,CAAC,CAAC;QAC3D,IAAI,CAAC,OAAO,EAAE,CAAC;YACX,MAAM,gBAAgB,GAAG,KAAK,CAAC,IAAI,CAAC,aAAK,CAAC,MAAM,CAAC,YAAY,EAAE,MAAM,CAAC,CAAC,CAAC;YACxE,MAAM,OAAO,GAAG,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YAClE,MAAM,IAAI,KAAK,CAAC,8BAA8B,OAAO,CAAC,CAAC,CAAC,KAAK,OAAO,EAAE,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;QACnF,CAAC;QAED,MAAM,EAAE,GAAG,MAAgB,CAAC;QAE5B,MAAM,UAAU,GAAG,EAAE,CAAC,MAAM,CAAC,MAAM,CAAC;QACpC,MAAM,UAAU,GAAG,EAAE,CAAC,MAAM,EAAE,MAAM,CAAC;QAErC,MAAM,IAAI,GAAG,EAAE,CAAC,QAAQ,IAAI,EAAE,CAAC,IAAI,CAAC;QACpC,IAAI,CAAC,IAAI,EAAE,CAAC;YACR,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;QAC9D,CAAC;QAED,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,QAAQ,EAAE,GAAG,IAAI,CAAC;QAElD,IAAI,CAAC,MAAM,IAAI,CAAC,MAAM,IAAI,CAAC,MAAM,IAAI,CAAC,QAAQ,EAAE,CAAC;YAC7C,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;QACnE,CAAC;QAED,OAAO;YACH,UAAU,EAAE,MAAM,CAAC,IAAI,CAAC,UAAU,EAAE,KAAK,CAAC;YAC1C,UAAU,EAAE,UAAU,CAAC,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS;YACnE,QAAQ,EAAE,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,KAAK,CAAC;YACpC,UAAU,EAAE,MAAM;YAClB,UAAU,EAAE,MAAM;YAClB,YAAY,EAAE,QAAQ;SACzB,CAAC;IACN,CAAC;IAES,MAAM,CAAC,cAAc,CAAC,GAAG,GAAG,QAAQ;QAC1C,MAAM,IAAI,GAAG,IAAA,mBAAU,EAAC,GAAG,CAAC,CAAC;QAE7B,OAAO;YACH,OAAO,EAAE,IAAI,kBAAS,CAAC;gBACnB,SAAS,EAAE,CAAC,IAAI,EAAE,QAAQ,EAAE,IAAI,EAAQ,EAAE;oBACtC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;oBAClB,IAAI,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;gBACrB,CAAC;aACJ,CAAC;YACF,GAAG,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,MAAM,EAAE;SAC3B,CAAC;IACN,CAAC;IAES,MAAM,CAAC,KAAK,CAAC,SAAS,CAAC,QAAgB;QAC7C,IAAI,CAAC;YACD,MAAM,OAAO,CAAC,MAAM,CAAC,QAAQ,EAAE,EAAE,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC;YAElD,OAAO,IAAI,CAAC;QAChB,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACX,OAAO,KAAK,CAAC;QACjB,CAAC;IACL,CAAC;IAES,KAAK,CAAC,WAAW,CAAC,KAAa;QACrC,MAAM,EAAE,aAAa,EAAE,QAAQ,EAAE,GAAG,IAAI,CAAC;QACzC,MAAM,QAAQ,GAAG,MAAM,gBAAU,CAAC,eAAe,CAAgB;YAC7D,WAAW,CAAC,QAAQ;gBAChB,OAAO,EAAE,UAAU,EAAE,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE,CAAC;YACnD,CAAC;YACD,OAAO,EAAE,KAAK,IAAI,EAAE;gBAChB,OAAO,IAAI,CAAC,aAAa,CAAC,GAAG,CACzB,gCAAgC,IAAI,CAAC,WAAW,IAAI,IAAI,CAAC,MAAM,kBAAkB,KAAK,EAAE,CAC3F,CAAC;YACN,CAAC;YACD,UAAU,CAAC,GAAG;gBACV,IAAI,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,IAAI,GAAG,CAAC,QAAQ,EAAE,CAAC;oBAC1C,MAAM,MAAM,GAAG,GAAG,CAAC,QAAQ,CAAC,MAAM,CAAC;oBAEnC,OAAO,EAAE,SAAS,EAAE,MAAM,GAAG,GAAG,IAAI,MAAM,IAAI,GAAG,IAAI,MAAM,KAAK,GAAG,EAAE,CAAC;gBAC1E,CAAC;gBAED,OAAO,EAAE,SAAS,EAAE,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,EAAE,CAAC;YAClD,CAAC;YACD,aAAa;YACb,QAAQ;SACX,CAAC,CAAC;QACH,MAAM,EAAE,IAAI,EAAE,GAAG,QAAQ,CAAC;QAC1B,MAAM,KAAK,GAAG,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAuB,EAAE,EAAE,CAAC,KAAK,CAAC,IAAI,KAAK,IAAI,CAAC,YAAY,CAAC,CAAC;QAE9F,IAAI,CAAC,KAAK,EAAE,CAAC;YACT,MAAM,IAAI,KAAK,CAAC,8BAA8B,IAAI,CAAC,YAAY,cAAc,KAAK,GAAG,CAAC,CAAC;QAC3F,CAAC;QAED,OAAO,KAAK,CAAC,oBAAoB,CAAC;IACtC,CAAC;IAES,KAAK,CAAC,UAAU,CAAC,KAAa;QACpC,IAAI,SAAS,GAAG,KAAK,CAAC;QACtB,IAAI,OAAiB,CAAC;QAEtB,MAAM,MAAM,GAAG,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC;QAC3C,IAAI,MAAM,EAAE,CAAC;YACT,SAAS,GAAG,IAAI,CAAC;YACjB,OAAO,GAAG,MAAM,CAAC;QACrB,CAAC;aAAM,CAAC;YACJ,IAAI,CAAC;gBACD,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,KAAK,CAAC,CAAC;gBAC/C,MAAM,EAAE,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,CAAC;gBAC9C,OAAO,GAAG,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,CAAC;YACrC,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACb,MAAM,MAAM,GAAG,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;gBACjD,IAAI,MAAM,EAAE,CAAC;oBACT,SAAS,GAAG,IAAI,CAAC;oBACjB,OAAO,GAAG,MAAM,CAAC;gBACrB,CAAC;qBAAM,CAAC;oBACJ,MAAM,KAAK,CAAC;gBAChB,CAAC;YACL,CAAC;QACL,CAAC;QAED,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,GAAG,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC;QAE5F,IAAI,mBAAmB,GAAG,KAAK,CAAC;QAChC,IAAI,MAAM,sBAAsB,CAAC,SAAS,CAAC,QAAQ,CAAC,EAAE,CAAC;YACnD,MAAM,UAAU,GAAG,EAAE,CAAC,gBAAgB,CAAC,QAAQ,CAAC,CAAC;YACjD,MAAM,IAAI,GAAG,MAAM,eAAM,CAAC,UAAU,CAAC,UAAU,EAAE;gBAC7C,IAAI,EAAE,sBAAa,CAAC,MAAM;gBAC1B,QAAQ,EAAE,iBAAQ,CAAC,GAAG;aACzB,CAAC,CAAC;YAEH,IAAI,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC,KAAK,CAAC,KAAK,IAAI,CAAC,IAAI,EAAE,CAAC;gBACjD,mBAAmB,GAAG,IAAI,CAAC;YAC/B,CAAC;QACL,CAAC;QAED,IAAI,mBAAmB,KAAK,IAAI,EAAE,CAAC;YAC/B,MAAM,IAAI,CAAC,YAAY,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;QAC/C,CAAC;QAED,IAAI,SAAS,KAAK,IAAI,EAAE,CAAC;YACrB,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;QACzC,CAAC;QAED,OAAO;YACH,UAAU,EAAE,OAAO,CAAC,UAAU;YAC9B,UAAU,EAAE,OAAO,CAAC,UAAU;YAC9B,YAAY,EAAE,QAAQ;YACtB,QAAQ,EAAE,OAAO,CAAC,QAAQ;SAC7B,CAAC;IACN,CAAC;IAES,KAAK,CAAC,YAAY,CAAC,OAAiB,EAAE,QAAgB;QAC5D,MAAM,MAAM,GAAkB;YAC1B,GAAG,IAAI,CAAC,aAAa;YACrB,WAAW,EAAE;gBACT,GAAG,IAAI,CAAC,aAAa,CAAC,WAAW;gBACjC,MAAM,EAAE,OAAO,CAAC,UAAU;gBAC1B,MAAM,EAAE,OAAO,CAAC,UAAU,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC,GAAG,OAAO,CAAC,UAAU,GAAG;aAC3F;SACJ,CAAC;QAEF,MAAM,eAAe,GAAG,IAAA,2BAAkB,EAAC,MAAM,CAAC,CAAC;QACnD,MAAM,gBAAgB,GAAG,MAAM,eAAe,CAAC,YAAY,CAAC,OAAO,CAAC,YAAY,EAAE,EAAE,CAAC,CAAC;QACtF,MAAM,EAAE,OAAO,EAAE,UAAU,EAAE,GAAG,EAAE,aAAa,EAAE,GAAG,sBAAsB,CAAC,cAAc,CAAC,QAAQ,CAAC,CAAC;QACpG,MAAM,iBAAQ,CAAC,QAAQ,CAAC,gBAAgB,EAAE,UAAU,EAAE,EAAE,CAAC,iBAAiB,CAAC,QAAQ,CAAC,CAAC,CAAC;QAEtF,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAC,aAAa,EAAE,CAAC,EAAE,CAAC;YAC5C,MAAM,IAAI,KAAK,CAAC,+DAA+D,CAAC,CAAC;QACrF,CAAC;IACL,CAAC;CACJ;AAzRD,wDAyRC"}
|
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
import { Static, TLiteral } from "@sinclair/typebox";
|
|
2
|
+
import { ImportantSecurityFields } from "../../bindings/amd-sev-snp-napi-rs";
|
|
3
|
+
export declare const CommonPolicyKeyName = "Common";
|
|
4
|
+
export declare const importantFieldNames: (keyof ImportantSecurityFields)[];
|
|
5
|
+
export declare enum RuleOperator {
|
|
6
|
+
Le = "le",
|
|
7
|
+
Eq = "eq",
|
|
8
|
+
Ge = "ge"
|
|
9
|
+
}
|
|
10
|
+
declare const PolicyRuleSchema: import("@sinclair/typebox").TObject<{
|
|
11
|
+
name: import("@sinclair/typebox").TUnion<[TLiteral<string>, ...TLiteral<string>[]]>;
|
|
12
|
+
operator: import("@sinclair/typebox").TUnion<TLiteral<RuleOperator>[]>;
|
|
13
|
+
value: import("@sinclair/typebox").TUnion<[import("@sinclair/typebox").TNumber, import("@sinclair/typebox").TBoolean]>;
|
|
14
|
+
}>;
|
|
15
|
+
export declare const PolicySetSchema: import("@sinclair/typebox").TObject<{
|
|
16
|
+
[x: string]: any;
|
|
17
|
+
}>;
|
|
18
|
+
export type PolicySet = Static<typeof PolicySetSchema>;
|
|
19
|
+
export type PolicyRule = Static<typeof PolicyRuleSchema> & {
|
|
20
|
+
name: keyof ImportantSecurityFields;
|
|
21
|
+
};
|
|
22
|
+
export {};
|
|
@@ -0,0 +1,24 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.PolicySetSchema = exports.RuleOperator = exports.importantFieldNames = exports.CommonPolicyKeyName = void 0;
|
|
4
|
+
const typebox_1 = require("@sinclair/typebox");
|
|
5
|
+
const amd_sev_snp_napi_rs_1 = require("../../bindings/amd-sev-snp-napi-rs");
|
|
6
|
+
exports.CommonPolicyKeyName = "Common";
|
|
7
|
+
exports.importantFieldNames = Object.keys(amd_sev_snp_napi_rs_1.IMPORTANT_SECURITY_FIELDS_DUMMY);
|
|
8
|
+
const importantFieldLiterals = exports.importantFieldNames.map((k) => typebox_1.Type.Literal(k));
|
|
9
|
+
var RuleOperator;
|
|
10
|
+
(function (RuleOperator) {
|
|
11
|
+
RuleOperator["Le"] = "le";
|
|
12
|
+
RuleOperator["Eq"] = "eq";
|
|
13
|
+
RuleOperator["Ge"] = "ge";
|
|
14
|
+
})(RuleOperator || (exports.RuleOperator = RuleOperator = {}));
|
|
15
|
+
const PolicyRuleSchema = typebox_1.Type.Object({
|
|
16
|
+
name: typebox_1.Type.Union(importantFieldLiterals),
|
|
17
|
+
operator: typebox_1.Type.Union(Object.values(RuleOperator).map((op) => typebox_1.Type.Literal(op))),
|
|
18
|
+
value: typebox_1.Type.Union([typebox_1.Type.Number(), typebox_1.Type.Boolean()]),
|
|
19
|
+
});
|
|
20
|
+
exports.PolicySetSchema = typebox_1.Type.Partial(typebox_1.Type.Object(Object.fromEntries([
|
|
21
|
+
...Object.values(amd_sev_snp_napi_rs_1.WellKnownSnpCodeNames).map((key) => [key, typebox_1.Type.Array(PolicyRuleSchema)]),
|
|
22
|
+
[exports.CommonPolicyKeyName, typebox_1.Type.Array(PolicyRuleSchema)],
|
|
23
|
+
])), { additionalProperties: false });
|
|
24
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,127 @@
|
|
|
1
|
+
/// <reference types="node" />
|
|
2
|
+
import { CpuInfo, ImportantSecurityFields, WellKnownSnpCodeNames } from "../../bindings/amd-sev-snp-napi-rs/";
|
|
3
|
+
import { SnpCert, SevSnpCertificateFormat, SNPReport, SNPReportWithChain } from "../proto/AmdSevSnp";
|
|
4
|
+
import { PolicySet } from "./sev-snp-schema";
|
|
5
|
+
export interface CalcSnpMrEnclaveParams {
|
|
6
|
+
ovmfPath: string;
|
|
7
|
+
kernelHash: Buffer;
|
|
8
|
+
initrdHash?: Buffer;
|
|
9
|
+
cmdLineHash: Buffer;
|
|
10
|
+
vcpuSig: number;
|
|
11
|
+
vcpuCount: number;
|
|
12
|
+
vmpl?: number;
|
|
13
|
+
policy?: bigint;
|
|
14
|
+
}
|
|
15
|
+
export declare const AMD_EPYC_MILAN_CPUINFO: CpuInfo;
|
|
16
|
+
export declare const EMPTY_INITRD_SHA256_HASH: Buffer;
|
|
17
|
+
export type ArkHashes = {
|
|
18
|
+
[key: string]: Buffer;
|
|
19
|
+
};
|
|
20
|
+
export declare function getDefaultArkHashes(): ArkHashes;
|
|
21
|
+
export declare class SevSNP {
|
|
22
|
+
static serializeSNPReport(report: SNPReportWithChain): Buffer;
|
|
23
|
+
static deserializeSNPReport(serialized: Buffer): SNPReportWithChain;
|
|
24
|
+
protected static convertCertToPem(cert: Buffer): string;
|
|
25
|
+
protected static convertPemToDer(cert: string): Buffer;
|
|
26
|
+
protected static splitCerts(certsPem: string): string[];
|
|
27
|
+
protected static readCmdLine(): Promise<string>;
|
|
28
|
+
/**
|
|
29
|
+
* Method for generation AMD SEV-SNP Report
|
|
30
|
+
* @param userData - The data that will be included in the report and will be signed
|
|
31
|
+
* @param vmpl - Optional VMPL value to pass to the firmware when requesting a report (default: 0)
|
|
32
|
+
*/
|
|
33
|
+
static generateSNPReport(userData: Buffer, vmpl?: number): Promise<SNPReport>;
|
|
34
|
+
/**
|
|
35
|
+
* Method for fetch certificates from AMD KDS
|
|
36
|
+
* @param report - report generated by the `generateSNPReport` method
|
|
37
|
+
* @param options - options for working with HTTP, allows you to configure repetitions and the interval between them,
|
|
38
|
+
* as well as the format of the returned certificates
|
|
39
|
+
*/
|
|
40
|
+
static getReportChain(report: SNPReport, options?: {
|
|
41
|
+
retryMax?: number;
|
|
42
|
+
retryInterval?: number;
|
|
43
|
+
certFormat?: SevSnpCertificateFormat;
|
|
44
|
+
httpTimeoutMs?: number;
|
|
45
|
+
}): Promise<SnpCert[]>;
|
|
46
|
+
/**
|
|
47
|
+
* Method for generation AMD SEV-SNP Report and fetching certificates
|
|
48
|
+
* @param userData - @see generateSNPReport
|
|
49
|
+
* @param options - @see getReportChain
|
|
50
|
+
*/
|
|
51
|
+
static generateSNPReportWithChain(userData: Buffer, options?: {
|
|
52
|
+
retryMax?: number;
|
|
53
|
+
retryInterval?: number;
|
|
54
|
+
certFormat?: SevSnpCertificateFormat;
|
|
55
|
+
}): Promise<SNPReportWithChain>;
|
|
56
|
+
protected static runSubProcess(binaryPath: string, args?: string[], options?: {
|
|
57
|
+
cwd?: string;
|
|
58
|
+
timeoutMs?: number;
|
|
59
|
+
}): Promise<{
|
|
60
|
+
exitCode: number;
|
|
61
|
+
stdout: string;
|
|
62
|
+
stderr: string;
|
|
63
|
+
}>;
|
|
64
|
+
static getCertHash(cert: SnpCert): Buffer;
|
|
65
|
+
protected static isValidArk(ARK: SnpCert, trustedHashes: ArkHashes): boolean;
|
|
66
|
+
/**
|
|
67
|
+
* AMD SEV-SNP verification method
|
|
68
|
+
* @param report - report with full certificate chain
|
|
69
|
+
* @param options - trustedHashes - map of trusted AMD ARK Certificates (CommonName as Key, Sha256 Hash of Der Certificate as Value) - optional
|
|
70
|
+
* timeoutMs - timeout of the utility snpnost in ms
|
|
71
|
+
* snpGuestBinaryPath - path for snpguest util
|
|
72
|
+
*/
|
|
73
|
+
static verifyReport(report: SNPReportWithChain, options?: {
|
|
74
|
+
trustedHashes?: ArkHashes;
|
|
75
|
+
timeoutMs?: number;
|
|
76
|
+
snpGuestBinaryPath?: string;
|
|
77
|
+
tmpDirTemplate?: string;
|
|
78
|
+
}): Promise<void>;
|
|
79
|
+
protected static calcMrEnclave(measure: Buffer, vmpl: number, policy: bigint): Buffer;
|
|
80
|
+
/**
|
|
81
|
+
* Method for obtaining mrEnclave from report. MrEnclave includes report measure, report vmpl and report policy
|
|
82
|
+
* @param report - report without certificates
|
|
83
|
+
*/
|
|
84
|
+
static getMrEnclave(report: Buffer): Buffer;
|
|
85
|
+
/**
|
|
86
|
+
* Method for obtaining reportData. This data was passed when generating the report
|
|
87
|
+
* @param report - report without certificates
|
|
88
|
+
*/
|
|
89
|
+
static getReportData(report: Buffer): Promise<Buffer>;
|
|
90
|
+
/**
|
|
91
|
+
* Method for obtaining measure. Please do not confuse with mrenclave. Report measure is part of mrEnclave.
|
|
92
|
+
* @param report - report without certificates
|
|
93
|
+
*/
|
|
94
|
+
static getReportMeasure(report: Buffer): Promise<Buffer>;
|
|
95
|
+
protected static calculateFileSha256(filePath: string): Promise<Buffer>;
|
|
96
|
+
protected static calculateCmdlineHash(cmdLine: string): Buffer;
|
|
97
|
+
/**
|
|
98
|
+
* The method allows to get the expected mrEnclave without generating a report
|
|
99
|
+
* @param params - @see CalcSnpMrEnclaveParams
|
|
100
|
+
*/
|
|
101
|
+
static calcSnpMrEnclave(params: CalcSnpMrEnclaveParams): Promise<Buffer>;
|
|
102
|
+
protected static extractBuildFromCmdline(cmdLine: string, paramName?: string): string;
|
|
103
|
+
/**
|
|
104
|
+
* Compute the 32-bit CPUID signature from family, model, and stepping.
|
|
105
|
+
* This computation is described in AMD's CPUID Specification, publication #25481
|
|
106
|
+
* https://www.amd.com/system/files/TechDocs/25481.pdf
|
|
107
|
+
* See section: CPUID Fn0000_0001_EAX Family, Model, Stepping Identifiers
|
|
108
|
+
* @param cpuInfo - Structure containing family, model and stepping @see CpuInfo
|
|
109
|
+
*/
|
|
110
|
+
static getCpuSig(cpuInfo: CpuInfo): number;
|
|
111
|
+
static getReportImportantSecurityFields(report: Buffer): Promise<ImportantSecurityFields>;
|
|
112
|
+
static getReportCpuInfo(report: Buffer): Promise<CpuInfo>;
|
|
113
|
+
static getCpuGeneration(cpuInfo: CpuInfo): Promise<WellKnownSnpCodeNames>;
|
|
114
|
+
/**
|
|
115
|
+
* Parse and validate policy
|
|
116
|
+
* @param input - Raw policy as json-text or object
|
|
117
|
+
*/
|
|
118
|
+
static parsePolicySet(input: string | Record<string, unknown>): PolicySet;
|
|
119
|
+
private static checkRule;
|
|
120
|
+
/**
|
|
121
|
+
* Verify SNP report against a PolicySet.
|
|
122
|
+
* Throws an error if any rule fails.
|
|
123
|
+
* @param report - SNPReport
|
|
124
|
+
* @param policySet - PolicySet containing rules
|
|
125
|
+
*/
|
|
126
|
+
static verifyPolicy(report: Buffer, policySet: PolicySet): Promise<void>;
|
|
127
|
+
}
|