Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for production signing with Azure Key Vault #108

Closed
wants to merge 1 commit into from

Conversation

svenkata9
Copy link

@svenkata9 svenkata9 commented Nov 2, 2022

Signed-off-by: Sankaranarayanan Venkatasubramanian [email protected]

Description of the changes

This change enables production signing with Azure Key Vault's Managed HSM. The gsc.py script is modified to take a keytype parameter that will use pem for local private key and akv for Azure Key Vault.

Please also see gramineproject/gramine#1020 for the changes to gramine-sgx-sign

This change replaces the Dockerfile template used for signing with two different templates - one for local signing (default) and the other one for signing with Azure Key Vault.

In case of Azure Key Vault, we currently enable signing only for login with az-cli. So, the corresponding Dockerfile installs the AKV related packages and invokes az login. This will prompt an authentication during the signing stage and will wait until the authentication succeeds (or fails) - please see below. (This will be revisited later once we have managed identity working with Azure subscription).

image

Related issues in Gramine:

How to test this PR?

Please apply gramineproject/gramine#1020 and build Gramine with the corresponding changes. And, run ./gsc sign-image --keytype akv --key vault_url:keyname <unsigned gramine image> to test.


This change is Reviewable

Signed-off-by: Sankaranarayanan Venkatasubramanian <[email protected]>
@svenkata9
Copy link
Author

This PR is now obsolete since we decided to make integration related scripts available in the contrib. I will close this PR and open a new one adding the templates to contrib repo.

@svenkata9 svenkata9 closed this Dec 9, 2022
@svenkata9 svenkata9 deleted the svenkat9/akv_sign branch December 9, 2022 03:16
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant