Skip to content

Conversation

@cYKatherine cYKatherine self-assigned this Feb 3, 2025
@cYKatherine cYKatherine force-pushed the kcc-UID2-4808-add-enclave-id-aks branch from 71335dc to 79b38c1 Compare February 4, 2025 00:19
@cYKatherine cYKatherine force-pushed the kcc-UID2-4808-add-enclave-id-aks branch from 79b38c1 to 25ef824 Compare February 4, 2025 02:46

@Test
public void testHappyPath() throws AttestationException {
var provider = new AzureCCAksCoreAttestationService(alwaysPassTokenValidator, alwaysPassPolicyValidator);
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This file is exactly the same as src/test/java/com/uid2/shared/secure/AzureCCCoreAttestationServiceTest.java, except testing on AzureCCAksCoreAttestationService

.vmDebuggable(false)
.runtimeData(generateBasicRuntimeData())
.ccePolicyDigest(CCE_POLICY_DIGEST)
.azureProtocol("azure-cc")
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

By default set it to be azure-cc. Test AKS in the tests below.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we use MaaTokenPayload.AZURE_CC_ACI_PROTOCOL here?


// CC stands for Confidential Container
@Slf4j
public class AzureCCAksCoreAttestationService extends AzureCCCoreAttestationServiceBase {
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we actually need child classes for these? Could they just be one class that takes in the AZURE_CC_PROTOCOL?

@cYKatherine cYKatherine changed the title UID2-4808 Add paraent class for AzureCCCoreAttestationService UID2-4808 Add AKS protocol for AzureCCCoreAttestationService Feb 4, 2025
* @throws AttestationException
*/
MaaTokenPayload validate(String tokenString) throws AttestationException;
MaaTokenPayload validate(String tokenString, String protocol) throws AttestationException;
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we introduce an enum for the protocols instead of using a String?

@cYKatherine cYKatherine force-pushed the kcc-UID2-4808-add-enclave-id-aks branch 3 times, most recently from c0056d8 to 8b3af91 Compare February 5, 2025 22:35
@cYKatherine cYKatherine force-pushed the kcc-UID2-4808-add-enclave-id-aks branch from 8b3af91 to a34056a Compare February 5, 2025 22:38
.vmDebuggable(false)
.runtimeData(generateBasicRuntimeData())
.ccePolicyDigest(CCE_POLICY_DIGEST)
.azureProtocol("azure-cc")
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we use MaaTokenPayload.AZURE_CC_ACI_PROTOCOL here?

@cYKatherine cYKatherine force-pushed the kcc-UID2-4808-add-enclave-id-aks branch from ffeb876 to ed3c07d Compare February 6, 2025 02:39
@cYKatherine cYKatherine merged commit 4d8dd46 into main Feb 6, 2025
3 checks passed
@cYKatherine cYKatherine deleted the kcc-UID2-4808-add-enclave-id-aks branch February 6, 2025 02:58
mcollins-ttd added a commit that referenced this pull request Mar 18, 2025
mcollins-ttd added a commit that referenced this pull request Mar 18, 2025
…-aks-attestation

Revert "UID2-4808 Add AKS protocol for `AzureCCCoreAttestationService`" (#374)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants