@super-protocol/addons-tee 2.0.0 → 2.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (44) hide show
  1. package/bindings/amd-sev-snp-napi-rs/amd-sev-snp-napi-rs.linux-x64-gnu.node +0 -0
  2. package/bindings/amd-sev-snp-napi-rs/index.d.ts +51 -0
  3. package/bindings/amd-sev-snp-napi-rs/index.js +339 -0
  4. package/bindings/nvidia-native/build/Release/libnvat.so.1.1.0 +0 -0
  5. package/bindings/nvidia-native/build/Release/nvidia_native.node +0 -0
  6. package/bindings/sgx-native/build/Release/libmbedcrypto_gramine.so.15 +0 -0
  7. package/bindings/sgx-native/build/Release/libmbedx509_gramine.so.6 +0 -0
  8. package/bindings/sgx-native/build/Release/libsgx_dcap_quoteverify.so.1 +0 -0
  9. package/bindings/sgx-native/build/Release/libtdx_attest.so.1 +0 -0
  10. package/bindings/sgx-native/build/Release/sgx_native.node +0 -0
  11. package/bindings/usr/lib/node_modules/node-addon-api/node_api.Makefile +6 -0
  12. package/bindings/usr/lib/node_modules/node-addon-api/nothing.target.mk +159 -0
  13. package/bindings/utils/virtee/LICENSE +201 -0
  14. package/bindings/utils/virtee/libsev.so +0 -0
  15. package/bindings/utils/virtee/snpguest +0 -0
  16. package/dist/index.d.ts +2 -1
  17. package/dist/index.js +29 -1
  18. package/dist/nvidia-native-module/nvidia-attestation.d.ts +146 -0
  19. package/dist/nvidia-native-module/nvidia-attestation.js +374 -0
  20. package/dist/nvidia-native-module/nvidia-debug-state-policy.rego +45 -0
  21. package/dist/nvidia-native-module/nvidia-detailed-policy.rego +205 -0
  22. package/dist/proto/AmdSevSnp.d.ts +194 -0
  23. package/dist/proto/AmdSevSnp.js +363 -0
  24. package/dist/sgx-native-module/consts.d.ts +24 -0
  25. package/dist/sgx-native-module/consts.js +38 -0
  26. package/dist/sgx-native-module/dcap-quote-verify.service.d.ts +12 -0
  27. package/dist/sgx-native-module/dcap-quote-verify.service.js +84 -0
  28. package/dist/sgx-native-module/enclave.service.d.ts +93 -0
  29. package/dist/sgx-native-module/enclave.service.js +211 -0
  30. package/dist/sgx-native-module/errors.d.ts +19 -0
  31. package/dist/sgx-native-module/errors.js +69 -0
  32. package/dist/sgx-native-module/helpers.d.ts +1 -0
  33. package/dist/sgx-native-module/helpers.js +50 -0
  34. package/dist/sgx-native-module/index.d.ts +9 -0
  35. package/dist/sgx-native-module/index.js +26 -0
  36. package/dist/sgx-native-module/pki.service.d.ts +50 -0
  37. package/dist/sgx-native-module/pki.service.js +74 -0
  38. package/dist/sgx-native-module/sev-snp-mrenclave.d.ts +59 -0
  39. package/dist/sgx-native-module/sev-snp-mrenclave.js +322 -0
  40. package/dist/sgx-native-module/sev-snp-schema.d.ts +22 -0
  41. package/dist/sgx-native-module/sev-snp-schema.js +24 -0
  42. package/dist/sgx-native-module/sev-snp.d.ts +127 -0
  43. package/dist/sgx-native-module/sev-snp.js +513 -0
  44. package/package.json +1 -1
@@ -0,0 +1,513 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
15
+ }) : function(o, v) {
16
+ o["default"] = v;
17
+ });
18
+ var __importStar = (this && this.__importStar) || function (mod) {
19
+ if (mod && mod.__esModule) return mod;
20
+ var result = {};
21
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
+ __setModuleDefault(result, mod);
23
+ return result;
24
+ };
25
+ var __importDefault = (this && this.__importDefault) || function (mod) {
26
+ return (mod && mod.__esModule) ? mod : { "default": mod };
27
+ };
28
+ Object.defineProperty(exports, "__esModule", { value: true });
29
+ exports.SevSNP = exports.getDefaultArkHashes = exports.EMPTY_INITRD_SHA256_HASH = exports.AMD_EPYC_MILAN_CPUINFO = void 0;
30
+ const amd_sev_snp_napi_rs_1 = require("../../bindings/amd-sev-snp-napi-rs/");
31
+ const sdk_js_1 = require("@super-protocol/sdk-js");
32
+ const axios_1 = __importDefault(require("axios"));
33
+ const forge = __importStar(require("node-forge"));
34
+ const fs = __importStar(require("fs/promises"));
35
+ const path = __importStar(require("path"));
36
+ const os = __importStar(require("os"));
37
+ const child_process_1 = require("child_process");
38
+ const crypto_1 = require("crypto");
39
+ const helpers_1 = require("./helpers");
40
+ const AmdSevSnp_1 = require("../proto/AmdSevSnp");
41
+ const sev_snp_schema_1 = require("./sev-snp-schema");
42
+ const value_1 = require("@sinclair/typebox/value");
43
+ exports.AMD_EPYC_MILAN_CPUINFO = {
44
+ family: 25,
45
+ model: 1,
46
+ stepping: 1,
47
+ };
48
+ exports.EMPTY_INITRD_SHA256_HASH = Buffer.from("e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "hex");
49
+ function getDefaultArkHashes() {
50
+ const ark_hashes = {};
51
+ ark_hashes["ARK-Milan"] = SevSNP.getCertHash({
52
+ format: AmdSevSnp_1.SevSnpCertificateFormat.PEM,
53
+ cert: Buffer.from(amd_sev_snp_napi_rs_1.ARK_MILAN_PEM),
54
+ type: AmdSevSnp_1.SevSNPCertType.ARK,
55
+ });
56
+ ark_hashes["ARK-Genoa"] = SevSNP.getCertHash({
57
+ format: AmdSevSnp_1.SevSnpCertificateFormat.PEM,
58
+ cert: Buffer.from(amd_sev_snp_napi_rs_1.ARK_GENOA_PEM),
59
+ type: AmdSevSnp_1.SevSNPCertType.ARK,
60
+ });
61
+ ark_hashes["ARK-Turin"] = SevSNP.getCertHash({
62
+ format: AmdSevSnp_1.SevSnpCertificateFormat.PEM,
63
+ cert: Buffer.from(amd_sev_snp_napi_rs_1.ARK_TURIN_PEM),
64
+ type: AmdSevSnp_1.SevSNPCertType.ARK,
65
+ });
66
+ return ark_hashes;
67
+ }
68
+ exports.getDefaultArkHashes = getDefaultArkHashes;
69
+ class SevSNP {
70
+ static serializeSNPReport(report) {
71
+ return Buffer.from(AmdSevSnp_1.SNPReportWithChain.encode(report).finish());
72
+ }
73
+ static deserializeSNPReport(serialized) {
74
+ return AmdSevSnp_1.SNPReportWithChain.decode(serialized);
75
+ }
76
+ static convertCertToPem(cert) {
77
+ const pemHeader = "-----BEGIN CERTIFICATE-----\n";
78
+ const pemFooter = "\n-----END CERTIFICATE-----";
79
+ if (cert.slice(0, pemHeader.length).compare(Buffer.from(pemHeader)) === 0) {
80
+ return cert.toString();
81
+ }
82
+ const formattedBase64 = cert
83
+ .toString("base64")
84
+ .match(/.{1,64}/g)
85
+ ?.join("\n");
86
+ return pemHeader + formattedBase64 + pemFooter;
87
+ }
88
+ static convertPemToDer(cert) {
89
+ return Buffer.from(forge.pki.pemToDer(cert).getBytes(), "binary");
90
+ }
91
+ static splitCerts(certsPem) {
92
+ const certRegex = /-----BEGIN CERTIFICATE-----(?:\s|.)*?-----END CERTIFICATE-----/g;
93
+ const matches = certsPem.match(certRegex);
94
+ return Array.from(matches || []);
95
+ }
96
+ static async readCmdLine() {
97
+ const data = await fs.readFile("/proc/cmdline", "utf-8");
98
+ // Workaround: VM in direct boot mode sometimes adds to the end of the cmdline initrd=initrd, need to remove it
99
+ return data.replace(/initrd=initrd\s*/, "");
100
+ }
101
+ /**
102
+ * Method for generation AMD SEV-SNP Report
103
+ * @param userData - The data that will be included in the report and will be signed
104
+ * @param vmpl - Optional VMPL value to pass to the firmware when requesting a report (default: 0)
105
+ */
106
+ static async generateSNPReport(userData, vmpl = 0) {
107
+ if (userData.length > amd_sev_snp_napi_rs_1.SNP_REPORT_DATA_SIZE) {
108
+ throw new Error(`userData cannot exceed ${amd_sev_snp_napi_rs_1.SNP_REPORT_DATA_SIZE} bytes.`);
109
+ }
110
+ if (vmpl < 0 || vmpl > 3) {
111
+ throw new Error(`vmpl must be in range [0..3], got: ${vmpl}`);
112
+ }
113
+ const paddedUserData = Buffer.alloc(amd_sev_snp_napi_rs_1.SNP_REPORT_DATA_SIZE);
114
+ userData.copy(paddedUserData);
115
+ const rawReport = (0, amd_sev_snp_napi_rs_1.getSnpReport)(paddedUserData, vmpl);
116
+ const cpuInfo = (0, amd_sev_snp_napi_rs_1.getCpuInfo)();
117
+ const cpuSig = (0, amd_sev_snp_napi_rs_1.getCpuSig)(cpuInfo);
118
+ const cores = (0, amd_sev_snp_napi_rs_1.getLogicalCoresCount)();
119
+ const cmdLine = await SevSNP.readCmdLine();
120
+ return {
121
+ rawReport,
122
+ cpuSig,
123
+ cores,
124
+ cmdLineHash: SevSNP.calculateCmdlineHash(cmdLine),
125
+ build: SevSNP.extractBuildFromCmdline(cmdLine),
126
+ };
127
+ }
128
+ /**
129
+ * Method for fetch certificates from AMD KDS
130
+ * @param report - report generated by the `generateSNPReport` method
131
+ * @param options - options for working with HTTP, allows you to configure repetitions and the interval between them,
132
+ * as well as the format of the returned certificates
133
+ */
134
+ static async getReportChain(report, options) {
135
+ const retryMax = options?.retryMax ?? 50;
136
+ const retryInterval = options?.retryInterval ?? Math.floor(Math.random() * 10000) + 5000;
137
+ const certFormat = options?.certFormat ?? AmdSevSnp_1.SevSnpCertificateFormat.DER;
138
+ const certs = [];
139
+ const axiosInstance = axios_1.default.create({ timeout: options?.httpTimeoutMs ?? 10000 });
140
+ let vcek = Buffer.alloc(0);
141
+ let cpuGeneration = amd_sev_snp_napi_rs_1.WellKnownSnpCodeNames.Milan;
142
+ let generations = Object.values(amd_sev_snp_napi_rs_1.WellKnownSnpCodeNames);
143
+ // Try to detect CPU generation from the report itself. If detection
144
+ // succeeds, only attempt to fetch VCEK for the detected generation.
145
+ try {
146
+ const cpuInfo = await SevSNP.getReportCpuInfo(Buffer.from(report.rawReport));
147
+ const detected = await SevSNP.getCpuGeneration(cpuInfo);
148
+ generations = [detected];
149
+ }
150
+ catch (err) {
151
+ // Detection failed or report doesn't contain CPU info; fall back to
152
+ // trying all known generations.
153
+ }
154
+ for (const generation of generations) {
155
+ cpuGeneration = generation;
156
+ const vcekUrl = (0, amd_sev_snp_napi_rs_1.getVcekKdsUrl)(Buffer.from(report.rawReport), generation);
157
+ try {
158
+ const response = await sdk_js_1.helpers.tryWithInterval({
159
+ checkResult(response) {
160
+ return { isResultOk: response.status === 200 };
161
+ },
162
+ handler() {
163
+ return axiosInstance.get(vcekUrl, {
164
+ responseType: "arraybuffer",
165
+ });
166
+ },
167
+ checkError(err) {
168
+ if (axios_1.default.isAxiosError(err) && err.response) {
169
+ const status = err.response.status;
170
+ return { retryable: status == 429 };
171
+ }
172
+ return { retryable: axios_1.default.isAxiosError(err) };
173
+ },
174
+ retryInterval,
175
+ retryMax,
176
+ });
177
+ vcek = response.data;
178
+ break;
179
+ }
180
+ catch (err) {
181
+ const isLast = generation === generations[generations.length - 1];
182
+ if (isLast) {
183
+ throw err;
184
+ }
185
+ }
186
+ }
187
+ const pemVcek = SevSNP.convertCertToPem(vcek);
188
+ certs.push({
189
+ type: AmdSevSnp_1.SevSNPCertType.VCEK,
190
+ format: certFormat,
191
+ cert: certFormat === AmdSevSnp_1.SevSnpCertificateFormat.PEM ? Buffer.from(pemVcek) : SevSNP.convertPemToDer(pemVcek),
192
+ });
193
+ const caUrl = `${amd_sev_snp_napi_rs_1.KDS_CERT_SITE}/${amd_sev_snp_napi_rs_1.KDS_VCEK}/${cpuGeneration}/cert_chain`;
194
+ const response = await sdk_js_1.helpers.tryWithInterval({
195
+ checkResult(response) {
196
+ return { isResultOk: response.status === 200 };
197
+ },
198
+ handler() {
199
+ return axiosInstance.get(caUrl, {
200
+ responseType: "arraybuffer",
201
+ });
202
+ },
203
+ checkError(err) {
204
+ if (axios_1.default.isAxiosError(err) && err.response) {
205
+ const status = err.response.status;
206
+ return { retryable: status == 429 };
207
+ }
208
+ return { retryable: axios_1.default.isAxiosError(err) };
209
+ },
210
+ retryInterval,
211
+ retryMax,
212
+ });
213
+ const CAChain = SevSNP.splitCerts(response.data.toString());
214
+ if (CAChain.length !== 2) {
215
+ throw new Error("Cert chain must have 2 certificates");
216
+ }
217
+ certs.push({
218
+ type: AmdSevSnp_1.SevSNPCertType.ARK,
219
+ format: certFormat,
220
+ cert: certFormat === AmdSevSnp_1.SevSnpCertificateFormat.PEM
221
+ ? Buffer.from(CAChain[1])
222
+ : SevSNP.convertPemToDer(CAChain[1]),
223
+ });
224
+ certs.push({
225
+ type: AmdSevSnp_1.SevSNPCertType.ASK,
226
+ format: certFormat,
227
+ cert: certFormat === AmdSevSnp_1.SevSnpCertificateFormat.PEM
228
+ ? Buffer.from(CAChain[0])
229
+ : SevSNP.convertPemToDer(CAChain[0]),
230
+ });
231
+ return certs;
232
+ }
233
+ /**
234
+ * Method for generation AMD SEV-SNP Report and fetching certificates
235
+ * @param userData - @see generateSNPReport
236
+ * @param options - @see getReportChain
237
+ */
238
+ static async generateSNPReportWithChain(userData, options) {
239
+ const snpReport = await SevSNP.generateSNPReport(userData);
240
+ const certs = await SevSNP.getReportChain(snpReport, options);
241
+ return {
242
+ snpReport,
243
+ certs: certs,
244
+ };
245
+ }
246
+ static async runSubProcess(binaryPath, args = [], options = {}) {
247
+ return new Promise((resolve, reject) => {
248
+ const subprocess = (0, child_process_1.spawn)(binaryPath, args, {
249
+ cwd: options.cwd,
250
+ stdio: "pipe",
251
+ });
252
+ let stdout = "";
253
+ let stderr = "";
254
+ subprocess.stdout?.on("data", (chunk) => (stdout += chunk.toString()));
255
+ subprocess.stderr?.on("data", (chunk) => (stderr += chunk.toString()));
256
+ let timeoutId;
257
+ if (options.timeoutMs && options.timeoutMs > 0) {
258
+ timeoutId = setTimeout(() => {
259
+ subprocess.kill();
260
+ reject(new Error(`Process timed out after ${options.timeoutMs}ms`));
261
+ }, options.timeoutMs);
262
+ }
263
+ subprocess.on("close", (exitCode) => {
264
+ if (timeoutId)
265
+ clearTimeout(timeoutId);
266
+ resolve({
267
+ exitCode: exitCode || 0,
268
+ stdout,
269
+ stderr,
270
+ });
271
+ });
272
+ subprocess.on("error", (error) => {
273
+ if (timeoutId)
274
+ clearTimeout(timeoutId);
275
+ reject(new Error(`Failed to start process: ${error.message}`));
276
+ });
277
+ });
278
+ }
279
+ static getCertHash(cert) {
280
+ const hash = (0, crypto_1.createHash)("sha256");
281
+ if (cert.format === AmdSevSnp_1.SevSnpCertificateFormat.PEM) {
282
+ hash.update(SevSNP.convertPemToDer(cert.cert.toString()));
283
+ }
284
+ else {
285
+ hash.update(cert.cert);
286
+ }
287
+ return hash.digest();
288
+ }
289
+ static isValidArk(ARK, trustedHashes) {
290
+ const ArkCert = forge.pki.certificateFromPem(ARK.format === AmdSevSnp_1.SevSnpCertificateFormat.PEM
291
+ ? ARK.cert.toString()
292
+ : SevSNP.convertCertToPem(Buffer.from(ARK.cert)));
293
+ const ArkCN = ArkCert.subject.attributes.find((attr) => attr.name === "commonName")?.value;
294
+ if (!ArkCN) {
295
+ throw new Error("Can't extract CN from ARK certificate");
296
+ }
297
+ const ArkHash = SevSNP.getCertHash(ARK);
298
+ const TrustedHash = (trustedHashes && trustedHashes[ArkCN]) || Buffer.alloc(0);
299
+ return ArkHash.equals(TrustedHash);
300
+ }
301
+ /**
302
+ * AMD SEV-SNP verification method
303
+ * @param report - report with full certificate chain
304
+ * @param options - trustedHashes - map of trusted AMD ARK Certificates (CommonName as Key, Sha256 Hash of Der Certificate as Value) - optional
305
+ * timeoutMs - timeout of the utility snpnost in ms
306
+ * snpGuestBinaryPath - path for snpguest util
307
+ */
308
+ static async verifyReport(report, options) {
309
+ const trustedHashes = options?.trustedHashes ?? getDefaultArkHashes();
310
+ const timeoutMs = options?.timeoutMs ?? 10000;
311
+ const snpGuestBinaryPath = options?.snpGuestBinaryPath ?? path.resolve(__dirname, "../../bindings/utils/virtee/snpguest");
312
+ const tmpDirTemplate = options?.tmpDirTemplate ?? path.join(os.tmpdir(), "temp-");
313
+ if (!path.isAbsolute(snpGuestBinaryPath)) {
314
+ throw new Error("snpGuestBinaryPath must be an absolute path");
315
+ }
316
+ const ARK = report.certs.find((cert) => cert.type === AmdSevSnp_1.SevSNPCertType.ARK);
317
+ if (!ARK) {
318
+ throw new Error("Can't find ARK certificate in certificate chain");
319
+ }
320
+ if (!SevSNP.isValidArk(ARK, trustedHashes)) {
321
+ throw new Error("The supplied certificate chain contains an untrusted root certificate");
322
+ }
323
+ const tempDir = await fs.mkdtemp(tmpDirTemplate);
324
+ try {
325
+ for (const certEntry of report.certs) {
326
+ const fileName = (0, AmdSevSnp_1.sevSNPCertTypeToJSON)(certEntry.type).toLowerCase();
327
+ const extension = certEntry.format === AmdSevSnp_1.SevSnpCertificateFormat.PEM ? "pem" : "der";
328
+ await fs.writeFile(`${tempDir}/${fileName}.${extension}`, certEntry.cert, certEntry.format === AmdSevSnp_1.SevSnpCertificateFormat.PEM ? "utf8" : undefined);
329
+ }
330
+ const reportPath = `${tempDir}/report.bin`;
331
+ await fs.writeFile(reportPath, Buffer.from(report.snpReport.rawReport));
332
+ const snpguestRes = await SevSNP.runSubProcess(snpGuestBinaryPath, ["verify", "attestation", tempDir, reportPath], { timeoutMs });
333
+ if (snpguestRes.exitCode != 0) {
334
+ throw new Error(`Error validating report. Output: ${snpguestRes.stdout}\n${snpguestRes.stderr}`);
335
+ }
336
+ }
337
+ finally {
338
+ await (0, helpers_1.gramineCompatibleRmDir)(tempDir);
339
+ }
340
+ }
341
+ static calcMrEnclave(measure, vmpl, policy) {
342
+ const hash = (0, crypto_1.createHash)("sha256");
343
+ hash.update(measure);
344
+ const vmplBuf = Buffer.alloc(4);
345
+ vmplBuf.writeUInt32LE(vmpl, 0);
346
+ hash.update(vmplBuf);
347
+ const policyBuf = Buffer.alloc(8);
348
+ policyBuf.writeBigUint64LE(policy, 0);
349
+ hash.update(policyBuf);
350
+ return hash.digest();
351
+ }
352
+ /**
353
+ * Method for obtaining mrEnclave from report. MrEnclave includes report measure, report vmpl and report policy
354
+ * @param report - report without certificates
355
+ */
356
+ static getMrEnclave(report) {
357
+ const measure = (0, amd_sev_snp_napi_rs_1.getReportMeasure)(report);
358
+ const vmpl = (0, amd_sev_snp_napi_rs_1.getReportVmpl)(report);
359
+ const policy = (0, amd_sev_snp_napi_rs_1.getReportPolicy)(report);
360
+ return SevSNP.calcMrEnclave(measure, vmpl, policy);
361
+ }
362
+ /**
363
+ * Method for obtaining reportData. This data was passed when generating the report
364
+ * @param report - report without certificates
365
+ */
366
+ static async getReportData(report) {
367
+ return (0, amd_sev_snp_napi_rs_1.getReportData)(report);
368
+ }
369
+ /**
370
+ * Method for obtaining measure. Please do not confuse with mrenclave. Report measure is part of mrEnclave.
371
+ * @param report - report without certificates
372
+ */
373
+ static async getReportMeasure(report) {
374
+ return (0, amd_sev_snp_napi_rs_1.getReportMeasure)(report);
375
+ }
376
+ static async calculateFileSha256(filePath) {
377
+ const fileData = await fs.readFile(filePath);
378
+ const hash = (0, crypto_1.createHash)("sha256");
379
+ hash.update(fileData);
380
+ return hash.digest();
381
+ }
382
+ static calculateCmdlineHash(cmdLine) {
383
+ const cmdLineBytes = Buffer.concat([Buffer.from(cmdLine.trim(), "utf-8"), Buffer.from([0])]);
384
+ const hash = (0, crypto_1.createHash)("sha256");
385
+ hash.update(cmdLineBytes);
386
+ return hash.digest();
387
+ }
388
+ /**
389
+ * The method allows to get the expected mrEnclave without generating a report
390
+ * @param params - @see CalcSnpMrEnclaveParams
391
+ */
392
+ static async calcSnpMrEnclave(params) {
393
+ const measure = (0, amd_sev_snp_napi_rs_1.calcSnpMeasure)(params.ovmfPath, params.kernelHash, params.initrdHash ?? exports.EMPTY_INITRD_SHA256_HASH, params.cmdLineHash, params.vcpuSig, params.vcpuCount);
394
+ return SevSNP.calcMrEnclave(measure, params.vmpl ?? 0, params.policy ?? BigInt(0x30000));
395
+ }
396
+ static extractBuildFromCmdline(cmdLine, paramName = "build") {
397
+ const regex = new RegExp(`${paramName}=([^\\s]+)`);
398
+ const match = cmdLine.match(regex);
399
+ if (match) {
400
+ return match[1];
401
+ }
402
+ else {
403
+ throw new Error(`${paramName} parameter not found`);
404
+ }
405
+ }
406
+ /**
407
+ * Compute the 32-bit CPUID signature from family, model, and stepping.
408
+ * This computation is described in AMD's CPUID Specification, publication #25481
409
+ * https://www.amd.com/system/files/TechDocs/25481.pdf
410
+ * See section: CPUID Fn0000_0001_EAX Family, Model, Stepping Identifiers
411
+ * @param cpuInfo - Structure containing family, model and stepping @see CpuInfo
412
+ */
413
+ static getCpuSig(cpuInfo) {
414
+ return (0, amd_sev_snp_napi_rs_1.getCpuSig)(cpuInfo);
415
+ }
416
+ static async getReportImportantSecurityFields(report) {
417
+ return (0, amd_sev_snp_napi_rs_1.getReportImportantSecurityFields)(report);
418
+ }
419
+ static async getReportCpuInfo(report) {
420
+ return (0, amd_sev_snp_napi_rs_1.getReportCpuInfo)(report);
421
+ }
422
+ static async getCpuGeneration(cpuInfo) {
423
+ return (0, amd_sev_snp_napi_rs_1.getCpuGeneration)(cpuInfo);
424
+ }
425
+ /**
426
+ * Parse and validate policy
427
+ * @param input - Raw policy as json-text or object
428
+ */
429
+ static parsePolicySet(input) {
430
+ let parsed;
431
+ if (typeof input === "string") {
432
+ if (input.trim().length === 0) {
433
+ return {};
434
+ }
435
+ try {
436
+ parsed = JSON.parse(input);
437
+ }
438
+ catch (error) {
439
+ throw new Error(`Failed to parse policy JSON: ${error instanceof Error ? error.message : String(error)}`);
440
+ }
441
+ }
442
+ else {
443
+ parsed = input;
444
+ }
445
+ const { isValid } = (0, sdk_js_1.validateBySchema)(parsed, sev_snp_schema_1.PolicySetSchema);
446
+ if (!isValid) {
447
+ const validationErrors = Array.from(value_1.Value.Errors(sev_snp_schema_1.PolicySetSchema, parsed));
448
+ const details = validationErrors.map((e) => e.message).join(", ");
449
+ throw new Error(`Failed to validate policy JSON${details ? `: ${details}` : ""}`);
450
+ }
451
+ return parsed;
452
+ }
453
+ static checkRule(rule, fields) {
454
+ const fieldValue = fields[rule.name];
455
+ const isBoolean = typeof fieldValue === "boolean";
456
+ const isNumber = typeof fieldValue === "number";
457
+ if (isBoolean) {
458
+ if (rule.operator !== sev_snp_schema_1.RuleOperator.Eq) {
459
+ throw new Error(`Invalid operator "${rule.operator}" for boolean field "${rule.name}". Only "eq" is allowed for boolean fields.`);
460
+ }
461
+ const expectedBoolean = typeof rule.value === "boolean" ? rule.value : Boolean(rule.value);
462
+ return fieldValue === expectedBoolean;
463
+ }
464
+ if (isNumber) {
465
+ switch (rule.operator) {
466
+ case sev_snp_schema_1.RuleOperator.Le:
467
+ return fieldValue <= rule.value;
468
+ case sev_snp_schema_1.RuleOperator.Eq:
469
+ return fieldValue === rule.value;
470
+ case sev_snp_schema_1.RuleOperator.Ge:
471
+ return fieldValue >= rule.value;
472
+ default:
473
+ throw new Error(`Unknown rule operator: ${rule.operator}`);
474
+ }
475
+ }
476
+ throw new Error(`Unsupported field type for "${rule.name}": ${typeof fieldValue}`);
477
+ }
478
+ /**
479
+ * Verify SNP report against a PolicySet.
480
+ * Throws an error if any rule fails.
481
+ * @param report - SNPReport
482
+ * @param policySet - PolicySet containing rules
483
+ */
484
+ static async verifyPolicy(report, policySet) {
485
+ if (Object.keys(policySet).length === 0) {
486
+ return; // No policy set provided, consider it valid
487
+ }
488
+ const fields = await this.getReportImportantSecurityFields(report);
489
+ const commonPolicy = policySet[sev_snp_schema_1.CommonPolicyKeyName];
490
+ if (commonPolicy) {
491
+ for (const rule of commonPolicy) {
492
+ if (!this.checkRule(rule, fields)) {
493
+ const fieldValue = fields[rule.name];
494
+ throw new Error(`Policy violation in "commonPolicy": field "${rule.name}" has value ${JSON.stringify(fieldValue)}, ` +
495
+ `expected ${rule.operator} ${JSON.stringify(rule.value)}`);
496
+ }
497
+ }
498
+ }
499
+ const cpuGen = await this.getCpuGeneration(await this.getReportCpuInfo(report));
500
+ const cpuPolicy = policySet[cpuGen];
501
+ if (cpuPolicy) {
502
+ for (const rule of cpuPolicy) {
503
+ if (!this.checkRule(rule, fields)) {
504
+ const fieldValue = fields[rule.name];
505
+ throw new Error(`Policy violation in "${cpuGen}": field "${rule.name}" has value ${JSON.stringify(fieldValue)}, ` +
506
+ `expected ${rule.operator} ${JSON.stringify(rule.value)}`);
507
+ }
508
+ }
509
+ }
510
+ }
511
+ }
512
+ exports.SevSNP = SevSNP;
513
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"sev-snp.js","sourceRoot":"","sources":["../../src/sgx-native-module/sev-snp.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,6EAuB6C;AAE7C,mDAAiF;AACjF,kDAA6C;AAC7C,kDAAoC;AAEpC,gDAAkC;AAClC,2CAA6B;AAC7B,uCAAyB;AACzB,iDAAsC;AACtC,mCAAoC;AACpC,uCAAmD;AACnD,kDAO4B;AAC5B,qDAA6G;AAC7G,mDAAgD;AAanC,QAAA,sBAAsB,GAAY;IAC3C,MAAM,EAAE,EAAE;IACV,KAAK,EAAE,CAAC;IACR,QAAQ,EAAE,CAAC;CACd,CAAC;AAEW,QAAA,wBAAwB,GAAG,MAAM,CAAC,IAAI,CAC/C,kEAAkE,EAClE,KAAK,CACR,CAAC;AAIF,SAAgB,mBAAmB;IAC/B,MAAM,UAAU,GAA8B,EAAE,CAAC;IAEjD,UAAU,CAAC,WAAW,CAAC,GAAG,MAAM,CAAC,WAAW,CAAC;QACzC,MAAM,EAAE,mCAAuB,CAAC,GAAG;QACnC,IAAI,EAAE,MAAM,CAAC,IAAI,CAAC,mCAAa,CAAC;QAChC,IAAI,EAAE,0BAAc,CAAC,GAAG;KAC3B,CAAC,CAAC;IAEH,UAAU,CAAC,WAAW,CAAC,GAAG,MAAM,CAAC,WAAW,CAAC;QACzC,MAAM,EAAE,mCAAuB,CAAC,GAAG;QACnC,IAAI,EAAE,MAAM,CAAC,IAAI,CAAC,mCAAa,CAAC;QAChC,IAAI,EAAE,0BAAc,CAAC,GAAG;KAC3B,CAAC,CAAC;IAEH,UAAU,CAAC,WAAW,CAAC,GAAG,MAAM,CAAC,WAAW,CAAC;QACzC,MAAM,EAAE,mCAAuB,CAAC,GAAG;QACnC,IAAI,EAAE,MAAM,CAAC,IAAI,CAAC,mCAAa,CAAC;QAChC,IAAI,EAAE,0BAAc,CAAC,GAAG;KAC3B,CAAC,CAAC;IAEH,OAAO,UAAU,CAAC;AACtB,CAAC;AAtBD,kDAsBC;AAED,MAAa,MAAM;IACR,MAAM,CAAC,kBAAkB,CAAC,MAA0B;QACvD,OAAO,MAAM,CAAC,IAAI,CAAC,8BAAkB,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC;IACnE,CAAC;IAEM,MAAM,CAAC,oBAAoB,CAAC,UAAkB;QACjD,OAAO,8BAAkB,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC;IACjD,CAAC;IAES,MAAM,CAAC,gBAAgB,CAAC,IAAY;QAC1C,MAAM,SAAS,GAAG,+BAA+B,CAAC;QAClD,MAAM,SAAS,GAAG,6BAA6B,CAAC;QAEhD,IAAI,IAAI,CAAC,KAAK,CAAC,CAAC,EAAE,SAAS,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,EAAE,CAAC;YACxE,OAAO,IAAI,CAAC,QAAQ,EAAE,CAAC;QAC3B,CAAC;QACD,MAAM,eAAe,GAAG,IAAI;aACvB,QAAQ,CAAC,QAAQ,CAAC;aAClB,KAAK,CAAC,UAAU,CAAC;YAClB,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;QAEjB,OAAO,SAAS,GAAG,eAAe,GAAG,SAAS,CAAC;IACnD,CAAC;IAES,MAAM,CAAC,eAAe,CAAC,IAAY;QACzC,OAAO,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,QAAQ,EAAE,EAAE,QAAQ,CAAC,CAAC;IACtE,CAAC;IAES,MAAM,CAAC,UAAU,CAAC,QAAgB;QACxC,MAAM,SAAS,GAAG,iEAAiE,CAAC;QACpF,MAAM,OAAO,GAAG,QAAQ,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC;QAE1C,OAAO,KAAK,CAAC,IAAI,CAAC,OAAO,IAAI,EAAE,CAAC,CAAC;IACrC,CAAC;IAES,MAAM,CAAC,KAAK,CAAC,WAAW;QAC9B,MAAM,IAAI,GAAG,MAAM,EAAE,CAAC,QAAQ,CAAC,eAAe,EAAE,OAAO,CAAC,CAAC;QACzD,+GAA+G;QAC/G,OAAO,IAAI,CAAC,OAAO,CAAC,kBAAkB,EAAE,EAAE,CAAC,CAAC;IAChD,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,KAAK,CAAC,iBAAiB,CAAC,QAAgB,EAAE,OAAe,CAAC;QACpE,IAAI,QAAQ,CAAC,MAAM,GAAG,0CAAoB,EAAE,CAAC;YACzC,MAAM,IAAI,KAAK,CAAC,0BAA0B,0CAAoB,SAAS,CAAC,CAAC;QAC7E,CAAC;QAED,IAAI,IAAI,GAAG,CAAC,IAAI,IAAI,GAAG,CAAC,EAAE,CAAC;YACvB,MAAM,IAAI,KAAK,CAAC,sCAAsC,IAAI,EAAE,CAAC,CAAC;QAClE,CAAC;QAED,MAAM,cAAc,GAAG,MAAM,CAAC,KAAK,CAAC,0CAAoB,CAAC,CAAC;QAC1D,QAAQ,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC;QAE9B,MAAM,SAAS,GAAG,IAAA,kCAAY,EAAC,cAAc,EAAE,IAAI,CAAC,CAAC;QACrD,MAAM,OAAO,GAAG,IAAA,gCAAU,GAAE,CAAC;QAC7B,MAAM,MAAM,GAAG,IAAA,+BAAS,EAAC,OAAO,CAAC,CAAC;QAClC,MAAM,KAAK,GAAG,IAAA,0CAAoB,GAAE,CAAC;QACrC,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,WAAW,EAAE,CAAC;QAE3C,OAAO;YACH,SAAS;YACT,MAAM;YACN,KAAK;YACL,WAAW,EAAE,MAAM,CAAC,oBAAoB,CAAC,OAAO,CAAC;YACjD,KAAK,EAAE,MAAM,CAAC,uBAAuB,CAAC,OAAO,CAAC;SACjD,CAAC;IACN,CAAC;IAED;;;;;OAKG;IACI,MAAM,CAAC,KAAK,CAAC,cAAc,CAC9B,MAAiB,EACjB,OAKC;QAED,MAAM,QAAQ,GAAG,OAAO,EAAE,QAAQ,IAAI,EAAE,CAAC;QACzC,MAAM,aAAa,GAAG,OAAO,EAAE,aAAa,IAAI,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,GAAG,KAAK,CAAC,GAAG,IAAI,CAAC;QACzF,MAAM,UAAU,GAAG,OAAO,EAAE,UAAU,IAAI,mCAAuB,CAAC,GAAG,CAAC;QACtE,MAAM,KAAK,GAAc,EAAE,CAAC;QAE5B,MAAM,aAAa,GAAG,eAAK,CAAC,MAAM,CAAC,EAAE,OAAO,EAAE,OAAO,EAAE,aAAa,IAAI,KAAK,EAAE,CAAC,CAAC;QACjF,IAAI,IAAI,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;QAC3B,IAAI,aAAa,GAAG,2CAAqB,CAAC,KAAK,CAAC;QAChD,IAAI,WAAW,GAAG,MAAM,CAAC,MAAM,CAAC,2CAAqB,CAAC,CAAC;QAEvD,oEAAoE;QACpE,oEAAoE;QACpE,IAAI,CAAC;YACD,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,gBAAgB,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,CAAC;YAC7E,MAAM,QAAQ,GAAG,MAAM,MAAM,CAAC,gBAAgB,CAAC,OAAO,CAAC,CAAC;YACxD,WAAW,GAAG,CAAC,QAAQ,CAAC,CAAC;QAC7B,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACX,oEAAoE;YACpE,gCAAgC;QACpC,CAAC;QAED,KAAK,MAAM,UAAU,IAAI,WAAW,EAAE,CAAC;YACnC,aAAa,GAAG,UAAU,CAAC;YAC3B,MAAM,OAAO,GAAG,IAAA,mCAAa,EAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,UAAU,CAAC,CAAC;YACzE,IAAI,CAAC;gBACD,MAAM,QAAQ,GAAG,MAAM,gBAAU,CAAC,eAAe,CAAgB;oBAC7D,WAAW,CAAC,QAAQ;wBAChB,OAAO,EAAE,UAAU,EAAE,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE,CAAC;oBACnD,CAAC;oBACD,OAAO;wBACH,OAAO,aAAa,CAAC,GAAG,CAAC,OAAO,EAAE;4BAC9B,YAAY,EAAE,aAAa;yBAC9B,CAAC,CAAC;oBACP,CAAC;oBACD,UAAU,CAAC,GAAG;wBACV,IAAI,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,IAAI,GAAG,CAAC,QAAQ,EAAE,CAAC;4BAC1C,MAAM,MAAM,GAAG,GAAG,CAAC,QAAQ,CAAC,MAAM,CAAC;4BAEnC,OAAO,EAAE,SAAS,EAAE,MAAM,IAAI,GAAG,EAAE,CAAC;wBACxC,CAAC;wBAED,OAAO,EAAE,SAAS,EAAE,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,EAAE,CAAC;oBAClD,CAAC;oBACD,aAAa;oBACb,QAAQ;iBACX,CAAC,CAAC;gBACH,IAAI,GAAG,QAAQ,CAAC,IAAI,CAAC;gBACrB,MAAM;YACV,CAAC;YAAC,OAAO,GAAG,EAAE,CAAC;gBACX,MAAM,MAAM,GAAG,UAAU,KAAK,WAAW,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;gBAClE,IAAI,MAAM,EAAE,CAAC;oBACT,MAAM,GAAG,CAAC;gBACd,CAAC;YACL,CAAC;QACL,CAAC;QACD,MAAM,OAAO,GAAG,MAAM,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;QAC9C,KAAK,CAAC,IAAI,CAAC;YACP,IAAI,EAAE,0BAAc,CAAC,IAAI;YACzB,MAAM,EAAE,UAAU;YAClB,IAAI,EAAE,UAAU,KAAK,mCAAuB,CAAC,GAAG,CAAC,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC;SAC5G,CAAC,CAAC;QAEH,MAAM,KAAK,GAAG,GAAG,mCAAa,IAAI,8BAAQ,IAAI,aAAa,aAAa,CAAC;QACzE,MAAM,QAAQ,GAAG,MAAM,gBAAU,CAAC,eAAe,CAAgB;YAC7D,WAAW,CAAC,QAAQ;gBAChB,OAAO,EAAE,UAAU,EAAE,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE,CAAC;YACnD,CAAC;YACD,OAAO;gBACH,OAAO,aAAa,CAAC,GAAG,CAAC,KAAK,EAAE;oBAC5B,YAAY,EAAE,aAAa;iBAC9B,CAAC,CAAC;YACP,CAAC;YACD,UAAU,CAAC,GAAG;gBACV,IAAI,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,IAAI,GAAG,CAAC,QAAQ,EAAE,CAAC;oBAC1C,MAAM,MAAM,GAAG,GAAG,CAAC,QAAQ,CAAC,MAAM,CAAC;oBAEnC,OAAO,EAAE,SAAS,EAAE,MAAM,IAAI,GAAG,EAAE,CAAC;gBACxC,CAAC;gBAED,OAAO,EAAE,SAAS,EAAE,eAAK,CAAC,YAAY,CAAC,GAAG,CAAC,EAAE,CAAC;YAClD,CAAC;YACD,aAAa;YACb,QAAQ;SACX,CAAC,CAAC;QAEH,MAAM,OAAO,GAAG,MAAM,CAAC,UAAU,CAAC,QAAQ,CAAC,IAAI,CAAC,QAAQ,EAAE,CAAC,CAAC;QAC5D,IAAI,OAAO,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACvB,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;QAC3D,CAAC;QAED,KAAK,CAAC,IAAI,CAAC;YACP,IAAI,EAAE,0BAAc,CAAC,GAAG;YACxB,MAAM,EAAE,UAAU;YAClB,IAAI,EACA,UAAU,KAAK,mCAAuB,CAAC,GAAG;gBACtC,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;gBACzB,CAAC,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;SAC/C,CAAC,CAAC;QACH,KAAK,CAAC,IAAI,CAAC;YACP,IAAI,EAAE,0BAAc,CAAC,GAAG;YACxB,MAAM,EAAE,UAAU;YAClB,IAAI,EACA,UAAU,KAAK,mCAAuB,CAAC,GAAG;gBACtC,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;gBACzB,CAAC,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;SAC/C,CAAC,CAAC;QAEH,OAAO,KAAK,CAAC;IACjB,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,KAAK,CAAC,0BAA0B,CAC1C,QAAgB,EAChB,OAIC;QAED,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,iBAAiB,CAAC,QAAQ,CAAC,CAAC;QAC3D,MAAM,KAAK,GAAG,MAAM,MAAM,CAAC,cAAc,CAAC,SAAS,EAAE,OAAO,CAAC,CAAC;QAE9D,OAAO;YACH,SAAS;YACT,KAAK,EAAE,KAAK;SACf,CAAC;IACN,CAAC;IAES,MAAM,CAAC,KAAK,CAAC,aAAa,CAChC,UAAkB,EAClB,OAAiB,EAAE,EACnB,UAAgD,EAAE;QAElD,OAAO,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;YACnC,MAAM,UAAU,GAAG,IAAA,qBAAK,EAAC,UAAU,EAAE,IAAI,EAAE;gBACvC,GAAG,EAAE,OAAO,CAAC,GAAG;gBAChB,KAAK,EAAE,MAAM;aAChB,CAAC,CAAC;YAEH,IAAI,MAAM,GAAG,EAAE,CAAC;YAChB,IAAI,MAAM,GAAG,EAAE,CAAC;YAEhB,UAAU,CAAC,MAAM,EAAE,EAAE,CAAC,MAAM,EAAE,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC,MAAM,IAAI,KAAK,CAAC,QAAQ,EAAE,CAAC,CAAC,CAAC;YACvE,UAAU,CAAC,MAAM,EAAE,EAAE,CAAC,MAAM,EAAE,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC,MAAM,IAAI,KAAK,CAAC,QAAQ,EAAE,CAAC,CAAC,CAAC;YAEvE,IAAI,SAAqC,CAAC;YAC1C,IAAI,OAAO,CAAC,SAAS,IAAI,OAAO,CAAC,SAAS,GAAG,CAAC,EAAE,CAAC;gBAC7C,SAAS,GAAG,UAAU,CAAC,GAAG,EAAE;oBACxB,UAAU,CAAC,IAAI,EAAE,CAAC;oBAClB,MAAM,CAAC,IAAI,KAAK,CAAC,2BAA2B,OAAO,CAAC,SAAS,IAAI,CAAC,CAAC,CAAC;gBACxE,CAAC,EAAE,OAAO,CAAC,SAAS,CAAC,CAAC;YAC1B,CAAC;YAED,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE,EAAE;gBAChC,IAAI,SAAS;oBAAE,YAAY,CAAC,SAAS,CAAC,CAAC;gBACvC,OAAO,CAAC;oBACJ,QAAQ,EAAE,QAAQ,IAAI,CAAC;oBACvB,MAAM;oBACN,MAAM;iBACT,CAAC,CAAC;YACP,CAAC,CAAC,CAAC;YAEH,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,EAAE;gBAC7B,IAAI,SAAS;oBAAE,YAAY,CAAC,SAAS,CAAC,CAAC;gBACvC,MAAM,CAAC,IAAI,KAAK,CAAC,4BAA4B,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC,CAAC;YACnE,CAAC,CAAC,CAAC;QACP,CAAC,CAAC,CAAC;IACP,CAAC;IAEM,MAAM,CAAC,WAAW,CAAC,IAAa;QACnC,MAAM,IAAI,GAAG,IAAA,mBAAU,EAAC,QAAQ,CAAC,CAAC;QAClC,IAAI,IAAI,CAAC,MAAM,KAAK,mCAAuB,CAAC,GAAG,EAAE,CAAC;YAC9C,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,CAAC,CAAC,CAAC;QAC9D,CAAC;aAAM,CAAC;YACJ,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,IAAc,CAAC,CAAC;QACrC,CAAC;QAED,OAAO,IAAI,CAAC,MAAM,EAAE,CAAC;IACzB,CAAC;IAES,MAAM,CAAC,UAAU,CAAC,GAAY,EAAE,aAAwB;QAC9D,MAAM,OAAO,GAAG,KAAK,CAAC,GAAG,CAAC,kBAAkB,CACxC,GAAG,CAAC,MAAM,KAAK,mCAAuB,CAAC,GAAG;YACtC,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,QAAQ,EAAE;YACrB,CAAC,CAAC,MAAM,CAAC,gBAAgB,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,CACvD,CAAC;QACF,MAAM,KAAK,GAAG,OAAO,CAAC,OAAO,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,IAAI,KAAK,YAAY,CAAC,EAAE,KAEtE,CAAC;QAChB,IAAI,CAAC,KAAK,EAAE,CAAC;YACT,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;QAC7D,CAAC;QAED,MAAM,OAAO,GAAG,MAAM,CAAC,WAAW,CAAC,GAAG,CAAC,CAAC;QACxC,MAAM,WAAW,GAAG,CAAC,aAAa,IAAI,aAAa,CAAC,KAAK,CAAC,CAAC,IAAI,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;QAE/E,OAAO,OAAO,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC;IACvC,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,KAAK,CAAC,YAAY,CAC5B,MAA0B,EAC1B,OAKC;QAED,MAAM,aAAa,GAAG,OAAO,EAAE,aAAa,IAAI,mBAAmB,EAAE,CAAC;QACtE,MAAM,SAAS,GAAG,OAAO,EAAE,SAAS,IAAI,KAAK,CAAC;QAC9C,MAAM,kBAAkB,GACpB,OAAO,EAAE,kBAAkB,IAAI,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,sCAAsC,CAAC,CAAC;QACnG,MAAM,cAAc,GAAG,OAAO,EAAE,cAAc,IAAI,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,MAAM,EAAE,EAAE,OAAO,CAAC,CAAC;QAElF,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,kBAAkB,CAAC,EAAE,CAAC;YACvC,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;QACnE,CAAC;QACD,MAAM,GAAG,GAAG,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,IAAI,KAAK,0BAAc,CAAC,GAAG,CAAC,CAAC;QAC1E,IAAI,CAAC,GAAG,EAAE,CAAC;YACP,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACvE,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,GAAG,EAAE,aAAa,CAAC,EAAE,CAAC;YACzC,MAAM,IAAI,KAAK,CAAC,uEAAuE,CAAC,CAAC;QAC7F,CAAC;QAED,MAAM,OAAO,GAAG,MAAM,EAAE,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC;QAEjD,IAAI,CAAC;YACD,KAAK,MAAM,SAAS,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;gBACnC,MAAM,QAAQ,GAAG,IAAA,gCAAoB,EAAC,SAAS,CAAC,IAAI,CAAC,CAAC,WAAW,EAAE,CAAC;gBACpE,MAAM,SAAS,GAAG,SAAS,CAAC,MAAM,KAAK,mCAAuB,CAAC,GAAG,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC;gBACnF,MAAM,EAAE,CAAC,SAAS,CACd,GAAG,OAAO,IAAI,QAAQ,IAAI,SAAS,EAAE,EACrC,SAAS,CAAC,IAAI,EACd,SAAS,CAAC,MAAM,KAAK,mCAAuB,CAAC,GAAG,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CACxE,CAAC;YACN,CAAC;YACD,MAAM,UAAU,GAAG,GAAG,OAAO,aAAa,CAAC;YAE3C,MAAM,EAAE,CAAC,SAAS,CAAC,UAAU,EAAE,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,SAAU,CAAC,SAAS,CAAC,CAAC,CAAC;YAEzE,MAAM,WAAW,GAAG,MAAM,MAAM,CAAC,aAAa,CAC1C,kBAAkB,EAClB,CAAC,QAAQ,EAAE,aAAa,EAAE,OAAO,EAAE,UAAU,CAAC,EAC9C,EAAE,SAAS,EAAE,CAChB,CAAC;YACF,IAAI,WAAW,CAAC,QAAQ,IAAI,CAAC,EAAE,CAAC;gBAC5B,MAAM,IAAI,KAAK,CAAC,oCAAoC,WAAW,CAAC,MAAM,KAAK,WAAW,CAAC,MAAM,EAAE,CAAC,CAAC;YACrG,CAAC;QACL,CAAC;gBAAS,CAAC;YACP,MAAM,IAAA,gCAAsB,EAAC,OAAO,CAAC,CAAC;QAC1C,CAAC;IACL,CAAC;IAES,MAAM,CAAC,aAAa,CAAC,OAAe,EAAE,IAAY,EAAE,MAAc;QACxE,MAAM,IAAI,GAAG,IAAA,mBAAU,EAAC,QAAQ,CAAC,CAAC;QAClC,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;QAErB,MAAM,OAAO,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;QAChC,OAAO,CAAC,aAAa,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;QAC/B,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;QAErB,MAAM,SAAS,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;QAClC,SAAS,CAAC,gBAAgB,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;QACtC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;QAEvB,OAAO,IAAI,CAAC,MAAM,EAAE,CAAC;IACzB,CAAC;IAED;;;OAGG;IACI,MAAM,CAAC,YAAY,CAAC,MAAc;QACrC,MAAM,OAAO,GAAG,IAAA,sCAAgB,EAAC,MAAM,CAAC,CAAC;QACzC,MAAM,IAAI,GAAG,IAAA,mCAAa,EAAC,MAAM,CAAC,CAAC;QACnC,MAAM,MAAM,GAAG,IAAA,qCAAe,EAAC,MAAM,CAAC,CAAC;QAEvC,OAAO,MAAM,CAAC,aAAa,CAAC,OAAO,EAAE,IAAI,EAAE,MAAM,CAAC,CAAC;IACvD,CAAC;IAED;;;OAGG;IACI,MAAM,CAAC,KAAK,CAAC,aAAa,CAAC,MAAc;QAC5C,OAAO,IAAA,mCAAa,EAAC,MAAM,CAAC,CAAC;IACjC,CAAC;IAED;;;OAGG;IACI,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAAC,MAAc;QAC/C,OAAO,IAAA,sCAAgB,EAAC,MAAM,CAAC,CAAC;IACpC,CAAC;IAES,MAAM,CAAC,KAAK,CAAC,mBAAmB,CAAC,QAAgB;QACvD,MAAM,QAAQ,GAAG,MAAM,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;QAC7C,MAAM,IAAI,GAAG,IAAA,mBAAU,EAAC,QAAQ,CAAC,CAAC;QAClC,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;QAEtB,OAAO,IAAI,CAAC,MAAM,EAAE,CAAC;IACzB,CAAC;IAES,MAAM,CAAC,oBAAoB,CAAC,OAAe;QACjD,MAAM,YAAY,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,EAAE,OAAO,CAAC,EAAE,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QAC7F,MAAM,IAAI,GAAG,IAAA,mBAAU,EAAC,QAAQ,CAAC,CAAC;QAClC,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;QAE1B,OAAO,IAAI,CAAC,MAAM,EAAE,CAAC;IACzB,CAAC;IAED;;;OAGG;IACI,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAAC,MAA8B;QAC/D,MAAM,OAAO,GAAG,IAAA,oCAAc,EAC1B,MAAM,CAAC,QAAQ,EACf,MAAM,CAAC,UAAU,EACjB,MAAM,CAAC,UAAU,IAAI,gCAAwB,EAC7C,MAAM,CAAC,WAAW,EAClB,MAAM,CAAC,OAAO,EACd,MAAM,CAAC,SAAS,CACnB,CAAC;QAEF,OAAO,MAAM,CAAC,aAAa,CAAC,OAAO,EAAE,MAAM,CAAC,IAAI,IAAI,CAAC,EAAE,MAAM,CAAC,MAAM,IAAI,MAAM,CAAC,OAAO,CAAC,CAAC,CAAC;IAC7F,CAAC;IAES,MAAM,CAAC,uBAAuB,CAAC,OAAe,EAAE,SAAS,GAAG,OAAO;QACzE,MAAM,KAAK,GAAG,IAAI,MAAM,CAAC,GAAG,SAAS,YAAY,CAAC,CAAC;QACnD,MAAM,KAAK,GAAG,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;QACnC,IAAI,KAAK,EAAE,CAAC;YACR,OAAO,KAAK,CAAC,CAAC,CAAC,CAAC;QACpB,CAAC;aAAM,CAAC;YACJ,MAAM,IAAI,KAAK,CAAC,GAAG,SAAS,sBAAsB,CAAC,CAAC;QACxD,CAAC;IACL,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,SAAS,CAAC,OAAgB;QACpC,OAAO,IAAA,+BAAS,EAAC,OAAO,CAAC,CAAC;IAC9B,CAAC;IAEM,MAAM,CAAC,KAAK,CAAC,gCAAgC,CAAC,MAAc;QAC/D,OAAO,IAAA,sDAAgC,EAAC,MAAM,CAAC,CAAC;IACpD,CAAC;IAEM,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAAC,MAAc;QAC/C,OAAO,IAAA,sCAAgB,EAAC,MAAM,CAAC,CAAC;IACpC,CAAC;IAEM,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAAC,OAAgB;QACjD,OAAO,IAAA,sCAAgB,EAAC,OAAO,CAAC,CAAC;IACrC,CAAC;IACD;;;OAGG;IACI,MAAM,CAAC,cAAc,CAAC,KAAuC;QAChE,IAAI,MAA+B,CAAC;QACpC,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC5B,IAAI,KAAK,CAAC,IAAI,EAAE,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBAC5B,OAAO,EAAe,CAAC;YAC3B,CAAC;YACD,IAAI,CAAC;gBACD,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;YAC/B,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACb,MAAM,IAAI,KAAK,CACX,gCAAgC,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAC3F,CAAC;YACN,CAAC;QACL,CAAC;aAAM,CAAC;YACJ,MAAM,GAAG,KAAK,CAAC;QACnB,CAAC;QAED,MAAM,EAAE,OAAO,EAAE,GAAG,IAAA,yBAAgB,EAAC,MAAM,EAAE,gCAAe,CAAC,CAAC;QAC9D,IAAI,CAAC,OAAO,EAAE,CAAC;YACX,MAAM,gBAAgB,GAAG,KAAK,CAAC,IAAI,CAAC,aAAK,CAAC,MAAM,CAAC,gCAAe,EAAE,MAAM,CAAC,CAAC,CAAC;YAC3E,MAAM,OAAO,GAAG,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YAClE,MAAM,IAAI,KAAK,CAAC,iCAAiC,OAAO,CAAC,CAAC,CAAC,KAAK,OAAO,EAAE,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;QACtF,CAAC;QAED,OAAO,MAAmB,CAAC;IAC/B,CAAC;IAEO,MAAM,CAAC,SAAS,CAAC,IAAgB,EAAE,MAA+B;QACtE,MAAM,UAAU,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QACrC,MAAM,SAAS,GAAG,OAAO,UAAU,KAAK,SAAS,CAAC;QAClD,MAAM,QAAQ,GAAG,OAAO,UAAU,KAAK,QAAQ,CAAC;QAEhD,IAAI,SAAS,EAAE,CAAC;YACZ,IAAI,IAAI,CAAC,QAAQ,KAAK,6BAAY,CAAC,EAAE,EAAE,CAAC;gBACpC,MAAM,IAAI,KAAK,CACX,qBAAqB,IAAI,CAAC,QAAQ,wBAAwB,IAAI,CAAC,IAAI,6CAA6C,CACnH,CAAC;YACN,CAAC;YACD,MAAM,eAAe,GAAG,OAAO,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;YAE3F,OAAO,UAAU,KAAK,eAAe,CAAC;QAC1C,CAAC;QAED,IAAI,QAAQ,EAAE,CAAC;YACX,QAAQ,IAAI,CAAC,QAAQ,EAAE,CAAC;gBACpB,KAAK,6BAAY,CAAC,EAAE;oBAChB,OAAO,UAAU,IAAK,IAAI,CAAC,KAAgB,CAAC;gBAChD,KAAK,6BAAY,CAAC,EAAE;oBAChB,OAAO,UAAU,KAAK,IAAI,CAAC,KAAK,CAAC;gBACrC,KAAK,6BAAY,CAAC,EAAE;oBAChB,OAAO,UAAU,IAAK,IAAI,CAAC,KAAgB,CAAC;gBAChD;oBACI,MAAM,IAAI,KAAK,CAAC,0BAA0B,IAAI,CAAC,QAAQ,EAAE,CAAC,CAAC;YACnE,CAAC;QACL,CAAC;QAED,MAAM,IAAI,KAAK,CAAC,+BAA+B,IAAI,CAAC,IAAI,MAAM,OAAO,UAAU,EAAE,CAAC,CAAC;IACvF,CAAC;IAED;;;;;OAKG;IACI,MAAM,CAAC,KAAK,CAAC,YAAY,CAAC,MAAc,EAAE,SAAoB;QACjE,IAAI,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACtC,OAAO,CAAC,4CAA4C;QACxD,CAAC;QAED,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAAC,MAAM,CAAC,CAAC;QACnE,MAAM,YAAY,GAAG,SAAS,CAAC,oCAAmB,CAAiB,CAAC;QACpE,IAAI,YAAY,EAAE,CAAC;YACf,KAAK,MAAM,IAAI,IAAI,YAAY,EAAE,CAAC;gBAC9B,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,IAAI,EAAE,MAAM,CAAC,EAAE,CAAC;oBAChC,MAAM,UAAU,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;oBACrC,MAAM,IAAI,KAAK,CACX,8CAA8C,IAAI,CAAC,IAAI,eAAe,IAAI,CAAC,SAAS,CAAC,UAAU,CAAC,IAAI;wBAChG,YAAY,IAAI,CAAC,QAAQ,IAAI,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,KAAK,CAAC,EAAE,CAChE,CAAC;gBACN,CAAC;YACL,CAAC;QACL,CAAC;QAED,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC,MAAM,IAAI,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC,CAAC;QAChF,MAAM,SAAS,GAAG,SAAS,CAAC,MAAM,CAAiB,CAAC;QACpD,IAAI,SAAS,EAAE,CAAC;YACZ,KAAK,MAAM,IAAI,IAAI,SAAS,EAAE,CAAC;gBAC3B,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,IAAI,EAAE,MAAM,CAAC,EAAE,CAAC;oBAChC,MAAM,UAAU,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;oBACrC,MAAM,IAAI,KAAK,CACX,wBAAwB,MAAM,aAAa,IAAI,CAAC,IAAI,eAAe,IAAI,CAAC,SAAS,CAAC,UAAU,CAAC,IAAI;wBAC7F,YAAY,IAAI,CAAC,QAAQ,IAAI,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,KAAK,CAAC,EAAE,CAChE,CAAC;gBACN,CAAC;YACL,CAAC;QACL,CAAC;IACL,CAAC;CACJ;AApjBD,wBAojBC"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@super-protocol/addons-tee",
3
- "version": "2.0.0",
3
+ "version": "2.0.1",
4
4
  "description": "The TEE trusted loader addons",
5
5
  "tags": [
6
6
  "tee"