Use another method of FIPS validation (fips-detect) (#3363)

* Use another method of FIPS validation (fips-detect)
This commit is contained in:
Amber Brown 2024-02-01 13:21:34 +11:00 коммит произвёл GitHub
Родитель d11a633a2e
Коммит b6e1b07fe8
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: B5690EEEBB952194
5 изменённых файлов: 20 добавлений и 28 удалений

Просмотреть файл

@ -22,7 +22,7 @@ pr:
resources:
containers:
- container: golang
image: registry.access.redhat.com/ubi8/go-toolset:1.18
image: registry.access.redhat.com/ubi8/go-toolset:1.18.10
options: --user=0
- container: python
image: registry.access.redhat.com/ubi8/python-39:latest
@ -82,12 +82,6 @@ jobs:
displayName: 🧪 Run Golang unit tests
target: golang
- script: |
set -xe
make validate-fips
displayName: 🕵️ Validate FIPS
target: golang
- task: PublishTestResults@2
displayName: 📊 Publish tests results
inputs:

Просмотреть файл

@ -9,7 +9,7 @@ RUN mkdir -p /app
WORKDIR /app
COPY . /app
RUN make aro RELEASE=${IS_OFFICIAL_RELEASE} -o generate && make e2e.test e2etools
RUN make aro RELEASE=${IS_OFFICIAL_RELEASE} -o generate && make validate-fips && make e2e.test e2etools
FROM ${REGISTRY}/ubi8/ubi-minimal
RUN microdnf update && microdnf clean all

Просмотреть файл

@ -9,7 +9,7 @@ RUN mkdir -p /app
WORKDIR /app
COPY . /app
RUN make aro RELEASE=${IS_OFFICIAL_RELEASE} -o generate && make e2e.test
RUN make aro RELEASE=${IS_OFFICIAL_RELEASE} -o generate && make validate-fips && make e2e.test
FROM ${REGISTRY}/ubi8/ubi-minimal
RUN microdnf update && microdnf clean all

Просмотреть файл

@ -210,7 +210,7 @@ validate-go-action:
@sha256sum --quiet -c .sha256sum || (echo error: client library is stale, please run make client; exit 1)
validate-fips:
hack/fips/validate-fips.sh
hack/fips/validate-fips.sh ./aro
unit-test-go:
go run gotest.tools/gotestsum@v1.9.0 --format pkgname --junitfile report.xml -- -coverprofile=cover.out ./...

Просмотреть файл

@ -1,24 +1,22 @@
#!/bin/bash
# The small go program below will validate that a
# FIPS validated crypto lib
cat > ./hack/fips/main.go << 'EOF'
package main
set -xe
// Copyright (c) Microsoft Corporation.
// Licensed under the Apache License 2.0.
# check if we can build and have built a valid FIPS-compatible binary
res=$(go run github.com/acardace/fips-detect@v0.0.0-20230309083406-7157dae5bafd ${1} -j)
import (
_ "crypto/tls/fipsonly"
binary=$(echo $res | go run ./hack/jq -r '.goBinaryFips.value')
lib=$(echo $res | go run ./hack/jq -r '.cryptoLibFips.value')
utillog "github.com/Azure/ARO-RP/pkg/util/log"
)
if [[ $binary == "false" ]]; then
echo "binary is not FIPS compatible"
exit 1
fi
func main() {
log := utillog.GetLogger()
log.Println("FIPS mode enabled")
}
EOF
trap "rm ./hack/fips/main.go" EXIT
echo "Attempting to run program that requires FIPS crypto"
go run ./hack/fips/main.go
if [[ $lib == "false" ]]; then
echo "lib is not FIPS compatible"
exit 1
fi
tool=$(go tool nm ${1} | grep FIPS)
echo $tool