-
Notifications
You must be signed in to change notification settings - Fork 259
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fragment COSE Sign1 support. #1575
Conversation
The PR title is too long for one line. Can you please format it so the title is a short description, and the PR body has a more detailed description. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I haven't gotten to resolver yet... now that we figured out what's up with the kernel, I'd really suggest splitting either into multiple commits or PRs...
Test cases are not useful when you want to know why your encrypted UVM does not start.
WPA is not at all nice and it is hard/impossible to find the entries and always impossible to grep them. I did try that ahead of all the various logging hacking I have done on this project. In the end the most effective way is to set the initial vsockexec to target an entirely different port and run a listener on that. I guess you all take the startup of the UVM for granted so don't really understand how fiddly that part is.
@@ -178,7 +178,7 @@ func main() {
uint(kmsg.Warning),
"Log all kmsg entries with a priority less than or equal to the supplied level.")
logFile := flag.String("logfile",
- "",
+ "/tmp/gcs.log",
wpa using the ContainerPlatform.wprp file in our package should do it, as will TV++ using the adjacent ContainerPlatform.tvpp file
You can also create test cases in test/functional or test/gcs and run those, since they should output to stdout by default
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Overall, LGTM
Feel free to ignore nits for a later PR
}, | ||
cli.StringFlag{ | ||
Name: "salt", | ||
Usage: "salt type [rand|zero] (default: rand)", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nit: we should probably add error checking for the salt
and policy
flags in a future PR, to make sure the values provided are valid.
|
||
When adding an option here which must match some security policy by default, make sure that the correct default (ie matches | ||
a default security policy) is applied in handleSecurityPolicy. Inadvertantly adding an "option" which defaults to false but MUST be | ||
true for a default security policy to work will force the annotation to have be set by the team that owns the box. That will |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: tab instead of space
to be checked for a good cert chain and a valid issuer DID that matches the certs and so the signature. Includes DID and COSE Sign1 packages and tooling. Support extracting a DID directly from a COSE Sign1 document and also support single cert COSE Sign document checking, but not DID generation. `signutil` is a debug tool that allows generating valid DID given a COSE Sign1 document and provides other utility functions like printing cert chain, leaf certs, displaying COSE Sign1 document content etc. Signed-off-by: Ken Gordon <ken.gordon@microsoft.com>
…ost (microsoft#1575) to be checked for a good cert chain and a valid issuer DID that matches the certs and so the signature. Includes DID and COSE Sign1 packages and tooling. Support extracting a DID directly from a COSE Sign1 document and also support single cert COSE Sign document checking, but not DID generation. `signutil` is a debug tool that allows generating valid DID given a COSE Sign1 document and provides other utility functions like printing cert chain, leaf certs, displaying COSE Sign1 document content etc. Signed-off-by: Ken Gordon <ken.gordon@microsoft.com>
…ost (microsoft#1575) to be checked for a good cert chain and a valid issuer DID that matches the certs and so the signature. Includes DID and COSE Sign1 packages and tooling. Support extracting a DID directly from a COSE Sign1 document and also support single cert COSE Sign document checking, but not DID generation. `signutil` is a debug tool that allows generating valid DID given a COSE Sign1 document and provides other utility functions like printing cert chain, leaf certs, displaying COSE Sign1 document content etc. Signed-off-by: Ken Gordon <ken.gordon@microsoft.com>
…ost (microsoft#1575) to be checked for a good cert chain and a valid issuer DID that matches the certs and so the signature. Includes DID and COSE Sign1 packages and tooling. Support extracting a DID directly from a COSE Sign1 document and also support single cert COSE Sign document checking, but not DID generation. `signutil` is a debug tool that allows generating valid DID given a COSE Sign1 document and provides other utility functions like printing cert chain, leaf certs, displaying COSE Sign1 document content etc. Signed-off-by: Ken Gordon <ken.gordon@microsoft.com>
Fragment COSE Sign1 support. Allows for a fragment presented by the host to be checked for a good cert chain and a valid issuer DID that matches the certs and so the signature. Includes DID and COSE Sign1 packages and tooling.
Signed-off-by: Ken Gordon ken.gordon@microsoft.com