mirror of
https://github.com/matter-labs/teepot.git
synced 2025-07-21 07:03:56 +02:00

- Updated multiple Rust dependencies, including `opentelemetry`, `const-oid`, and `webpki-roots` for enhanced features and bug fixes. - Upgraded `nixpkgs` and `crane` in the nix flake configuration. - Removed unused dependencies and introduced missing dependencies for improved build integrity. Signed-off-by: Harald Hoyer <harald@matterlabs.dev>
110 lines
3.6 KiB
Rust
110 lines
3.6 KiB
Rust
// SPDX-License-Identifier: Apache-2.0
|
|
// Copyright (c) 2024-2025 Matter Labs
|
|
|
|
//! Pre-exec for binary running in a TEE needing attestation of a secret signing key
|
|
|
|
#![deny(missing_docs)]
|
|
#![deny(clippy::all)]
|
|
|
|
use anyhow::Result;
|
|
use clap::Parser;
|
|
use std::ffi::OsString;
|
|
use tracing::error;
|
|
|
|
#[derive(Parser, Debug)]
|
|
#[command(author, version, about, long_about = None)]
|
|
struct Args {
|
|
/// environment variable prefix to use
|
|
#[arg(long, default_value = "")]
|
|
env_prefix: String,
|
|
/// program to exec [args...] (required)
|
|
#[arg(required = true, allow_hyphen_values = true, last = true)]
|
|
cmd_args: Vec<OsString>,
|
|
}
|
|
|
|
#[cfg(all(target_os = "linux", target_arch = "x86_64"))]
|
|
fn main_with_error() -> Result<()> {
|
|
use anyhow::Context;
|
|
use secp256k1::{rand, Secp256k1};
|
|
use std::{os::unix::process::CommandExt, process::Command};
|
|
use teepot::{
|
|
ethereum::public_key_to_ethereum_address, prover::reportdata::ReportDataV1,
|
|
quote::get_quote, tdx::rtmr::TdxRtmrEvent,
|
|
};
|
|
use tracing_log::LogTracer;
|
|
use tracing_subscriber::{fmt, prelude::*, EnvFilter, Registry};
|
|
|
|
const TEE_QUOTE_FILE: &str = "/tmp/tee_quote";
|
|
|
|
LogTracer::init().context("Failed to set logger")?;
|
|
|
|
let subscriber = Registry::default()
|
|
.with(EnvFilter::from_default_env())
|
|
.with(fmt::layer().with_writer(std::io::stderr));
|
|
tracing::subscriber::set_global_default(subscriber).context("Failed to set logger")?;
|
|
|
|
let args = Args::parse();
|
|
let mut rng = rand::rng();
|
|
let secp = Secp256k1::new();
|
|
let (signing_key, verifying_key) = secp.generate_keypair(&mut rng);
|
|
let ethereum_address = public_key_to_ethereum_address(&verifying_key);
|
|
let report_data = ReportDataV1 { ethereum_address };
|
|
let report_data_bytes: [u8; 64] = report_data.into();
|
|
let tee_type = match get_quote(&report_data_bytes) {
|
|
Ok((teepot::quote::TEEType::TDX, quote)) => {
|
|
// In the case of TDX, we want to advance RTMR 3 after getting the quote,
|
|
// so that any breach can't generate a new attestation with the expected RTMRs
|
|
TdxRtmrEvent::default()
|
|
.with_rtmr_index(3)
|
|
.with_extend_data(teepot::tdx::UEFI_MARKER_DIGEST_BYTES)
|
|
.extend()?;
|
|
|
|
// save quote to file
|
|
std::fs::write(TEE_QUOTE_FILE, quote).context(TEE_QUOTE_FILE)?;
|
|
teepot::quote::TEEType::TDX.to_string()
|
|
}
|
|
Ok((tee_type, quote)) => {
|
|
// save quote to file
|
|
std::fs::write(TEE_QUOTE_FILE, quote).context(TEE_QUOTE_FILE)?;
|
|
tee_type.to_string()
|
|
}
|
|
Err(e) => {
|
|
error!("Failed to get quote: {}", e);
|
|
std::fs::write(TEE_QUOTE_FILE, []).context(TEE_QUOTE_FILE)?;
|
|
"none".to_string()
|
|
}
|
|
};
|
|
|
|
let err = Command::new(&args.cmd_args[0])
|
|
.args(&args.cmd_args[1..])
|
|
.env(
|
|
format!("{}SIGNING_KEY", args.env_prefix),
|
|
signing_key.display_secret().to_string(),
|
|
)
|
|
.env(
|
|
format!("{}ATTESTATION_QUOTE_FILE_PATH", args.env_prefix),
|
|
TEE_QUOTE_FILE,
|
|
)
|
|
.env(format!("{}TEE_TYPE", args.env_prefix), tee_type)
|
|
.exec();
|
|
|
|
Err(err).with_context(|| {
|
|
format!(
|
|
"exec of `{cmd}` failed",
|
|
cmd = args.cmd_args[0].to_string_lossy()
|
|
)
|
|
})
|
|
}
|
|
|
|
#[cfg(not(all(target_os = "linux", target_arch = "x86_64")))]
|
|
fn main_with_error() -> Result<()> {
|
|
anyhow::bail!("OS or architecture not supported");
|
|
}
|
|
|
|
fn main() -> Result<()> {
|
|
let ret = main_with_error();
|
|
if let Err(e) = &ret {
|
|
error!("Error: {}", e);
|
|
}
|
|
ret
|
|
}
|