mirror of
https://github.com/fleetdm/fleet
synced 2026-04-21 21:47:20 +00:00
For #30476 Contributor doc updates: https://github.com/fleetdm/fleet/pull/31371 # Checklist for submitter If some of the following don't apply, delete the relevant line. - [x] Changes file added for user-visible changes in `changes/`, `orbit/changes/` or `ee/fleetd-chrome/changes`. See [Changes files](https://github.com/fleetdm/fleet/blob/main/docs/Contributing/guides/committing-changes.md#changes-files) for more information. ## Testing - [x] Added/updated automated tests - [x] Where appropriate, [automated tests simulate multiple hosts and test for host isolation](https://github.com/fleetdm/fleet/blob/main/docs/Contributing/reference/patterns-backend.md#unit-testing) (updates to one hosts's records do not affect another) - [x] QA'd all new/changed functionality manually ## fleetd/orbit/Fleet Desktop - [x] Verified compatibility with the latest released version of Fleet (see [Must rule](https://github.com/fleetdm/fleet/blob/main/docs/Contributing/workflows/fleetd-development-and-release-strategy.md)) - [x] If the change applies to only one platform, confirmed that `runtime.GOOS` is used as needed to isolate changes - [x] Verified that fleetd runs on macOS, Linux and Windows - [x] Verified auto-update works from the released version of component to the new version (see [tools/tuf/test](../tools/tuf/test/README.md)) <!-- This is an auto-generated comment: release notes by coderabbit.ai --> ## Summary by CodeRabbit * **New Features** * Automated certificate renewal is now supported, including proof-of-possession for enhanced security. * Certificate renewal can be triggered when the existing certificate is within 180 days of expiration. * Dynamic configuration of certificate validity period via environment variable. * Improved TPM hardware integration for certificate management. * **Bug Fixes** * Enhanced error handling and logging for TPM device closure and certificate operations. * **Tests** * Extended integration tests to cover certificate renewal flows, host deletion, and TPM-based scenarios for improved reliability. <!-- end of auto-generated comment: release notes by coderabbit.ai -->
43 lines
1.4 KiB
Go
43 lines
1.4 KiB
Go
//go:build linux
|
|
|
|
package securehw
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"path/filepath"
|
|
|
|
"github.com/fleetdm/fleet/v4/orbit/pkg/constant"
|
|
"github.com/google/go-tpm/tpm2/transport/linuxtpm"
|
|
"github.com/rs/zerolog"
|
|
)
|
|
|
|
const tpm20DevicePath = "/dev/tpmrm0"
|
|
|
|
// Creates a new SecureHW instance using TPM 2.0 for Linux.
|
|
// It attempts to open the TPM device using the provided configuration.
|
|
func newSecureHW(metadataDir string, logger zerolog.Logger) (SecureHW, error) {
|
|
if metadataDir == "" {
|
|
return nil, errors.New("required metadata directory not set")
|
|
}
|
|
|
|
logger.Info().Msg("opening TPM 2.0 resource manager")
|
|
|
|
// Open the TPM 2.0 resource manager, which
|
|
// - Provides managed access to TPM resources, allowing multiple applications to share the TPM safely.
|
|
// - Used by the TPM2 Access Broker and Resource Manager (tpm2-abrmd or the kernel resource manager).
|
|
device, err := linuxtpm.Open(tpm20DevicePath)
|
|
if err != nil {
|
|
return nil, ErrSecureHWUnavailable{
|
|
Message: fmt.Sprintf("failed to open TPM 2.0 device %q: %s", tpm20DevicePath, err.Error()),
|
|
}
|
|
}
|
|
|
|
logger.Info().Str("device_path", tpm20DevicePath).Msg("successfully opened TPM 2.0 resource manager")
|
|
|
|
return &tpm2SecureHW{
|
|
device: device,
|
|
logger: logger.With().Str("component", "securehw-tpm").Logger(),
|
|
keyFilePath: filepath.Join(metadataDir, constant.FleetHTTPSignatureTPMKeyFileName),
|
|
}, nil
|
|
}
|