@@ -7,8 +7,10 @@ use crate::{
77} ;
88use config_types:: TrustedExecutionEnvironmentConfig ;
99use ic_sev:: guest:: custom_data:: SevCustomDataNamespace ;
10- use ic_sev:: guest:: firmware:: { MockSevGuestFirmware , SevGuestFirmware } ;
11- use ic_sev:: guest:: testing:: { FakeAttestationReportSigner , MockSevGuestFirmwareBuilder } ;
10+ use ic_sev:: guest:: firmware:: MockSevGuestFirmware ;
11+ use ic_sev:: guest:: testing:: {
12+ AttestationReportBuilder , FakeAttestationReportSigner , MockSevGuestFirmwareBuilder ,
13+ } ;
1214use sev:: firmware:: guest:: AttestationReport ;
1315use sev:: parser:: ByteParser ;
1416
@@ -284,18 +286,14 @@ fn test_legacy_custom_data_accepted() {
284286 . encode_for_sev_legacy ( )
285287 . expect ( "Failed to encode custom data in legacy format" ) ;
286288
287- let mut sev_firmware = MockSevGuestFirmwareBuilder :: new ( )
288- . with_chip_id ( CHIP_ID )
289- . with_measurement ( MEASUREMENT )
290- . with_signer ( Some ( signer. clone ( ) ) )
291- . build ( ) ;
292-
293- let attestation_report_bytes = sev_firmware
294- . get_report ( None , Some ( legacy_custom_data) , None )
295- . expect ( "Failed to get attestation report" ) ;
289+ let attestation_report_bytes = AttestationReportBuilder :: new ( )
290+ . with_custom_data ( legacy_custom_data)
291+ . build_signed ( & signer)
292+ . to_bytes ( )
293+ . unwrap ( ) ;
296294
297295 let attestation_package = SevAttestationPackage {
298- attestation_report : Some ( attestation_report_bytes) ,
296+ attestation_report : Some ( attestation_report_bytes. to_vec ( ) ) ,
299297 certificate_chain : Some ( SevCertificateChain {
300298 vcek_pem : Some ( signer. get_vcek_pem ( ) ) ,
301299 ask_pem : Some ( signer. get_ask_pem ( ) ) ,
0 commit comments