SecretVM Attest REST Server is a lightweight REST server implemented in Go. It provides attestation reports for confidential virtual machines (VMs) over HTTPS. The server exposes multiple endpoints to return different attestation reports, including:
- /status – Returns the server status.
- /attestation – Executes an internal process (e.g.,
attest_tool
) and returns a JSON attestation report. - /gpu – Returns the NVIDIA confidential GPU attestation report.
- /cpu – Returns the Intel TDX attestation report.
- /self – Returns self attestation data (e.g., TDX measurement registers).
- Secure Communication: Supports HTTPS with TLS certificates.
- Configuration via Environment Variables: Defaults are defined in a configuration package and can be overridden by a
.env
file. - Modular Structure: Uses a command-line interface and a dedicated package (
pkg
) for configuration, handlers, and middleware. - Command-Line Flags: Allows overriding defaults (secure mode, port, and IP address) using flags.
- Enhanced Security Headers: Implements best practice security headers for all responses.
- CORS Support: Built-in CORS middleware for cross-origin requests.
- Graceful Shutdown: Handles in-flight requests properly during server shutdown.
- Improved Logging: Detailed logging including request methods, status codes, and response times.
- Context Support: Uses Go contexts for timeout and cancellation management.
- Method Validation: All endpoints validate HTTP methods to ensure proper usage.
- Standardized Error Responses: Consistent JSON error responses across all endpoints.
secret-vm-attest-rest-server/
├── .env # Environment variables file.
├── go.mod # Go module definition.
├── cmd/
│ └── main.go # Main entry point for the server.
└── pkg/
├── config.go # Configuration: loads .env and sets global variables.
├── handlers.go # HTTP handlers for endpoints (/status, /attestation, etc.).
└── middleware.go # Logging middleware.
The server configuration is managed in the pkg/config.go
file. It uses godotenv to load environment variables from a .env
file. Key configuration variables include:
- SECRETVM_REPORT_DIR: Directory where attestation report files are stored (default:
reports
). - SECRETVM_REST_SERVER_IP: The IP address on which the server listens (default:
0.0.0.0
). - SECRETVM_SECURE: Boolean indicating whether to enable HTTPS (default:
true
). - SECRETVM_REST_SERVER_PORT: Port for the server (default:
29343
). - SECRETVM_CERT_PATH: Path to SSL certificate file (default:
cert/ssl_cert.pem
). - SECRETVM_KEY_PATH: Path to SSL key file (default:
cert/ssl_key.pem
).
- SECRETVM_ATTEST_TOOL: Command name for the attestation tool (default:
attest_tool
). - SECRETVM_ATTEST_TIMEOUT_SEC: Timeout in seconds for attestation command execution (default:
10
).
- SECRETVM_GPU_ATTESTATION_FILE: Filename for GPU attestation reports (default:
gpu_attestation.txt
). - SECRETVM_CPU_ATTESTATION_FILE: Filename for CPU (TDX) attestation reports (default:
tdx_attestation.txt
). - SECRETVM_SELF_ATTESTATION_FILE: Filename for self attestation reports (default:
self_report.txt
).
For example, your .env
file might look like this:
SECRETVM_REPORT_DIR=reports
SECRETVM_REST_SERVER_IP=0.0.0.0
SECRETVM_SECURE=true
SECRETVM_REST_SERVER_PORT=29343
SECRETVM_CERT_PATH=cert/ssl_cert.pem
SECRETVM_KEY_PATH=cert/ssl_key.pem
SECRETVM_ATTEST_TOOL=attest_tool
SECRETVM_ATTEST_TIMEOUT_SEC=10
-
Clone the repository:
git clone https://github.com/scrtlabs/secret-vm-attest-rest-server.git cd secret-vm-attest-rest-server
-
Set up your environment:
Make sure you have a valid
.env
file in the project root with your desired settings. -
Build and run the server:
To run using the Go command-line tool, execute:
go run cmd/main.go
Alternatively, build the binary:
go build -o secret-vm-attest-rest-server cmd/main.go ./secret-vm-attest-rest-server --secure=true --port=29343 --ip=0.0.0.0
-
Run tests:
To run all tests:
go test ./...
To run a specific test:
go test -run TestStatusHandler ./pkg
With verbose output:
go test -v ./pkg
-
Method: GET
-
Description: Returns a JSON object indicating that the server is alive.
-
Response Example:
{ "status": "server is alive" }
- Method: GET
- Description: Reads the corresponding attestation file from the configured report directory and returns its content as plain text.
- Error Handling:
- Returns a JSON error if the file is missing or cannot be read.