Commit 0e325c1
committed
feat(kms): make self-authorization enforcement configurable
Add core.enforce_self_authorization (default true) so trusted RPCs and
the onboard bootstrap path can skip the local self-attestation step
when KMS is intentionally run outside a TEE — e.g. local dev/testing
where there is no /var/run/dstack(.sock) to dial.
Default stays strict (true) so production deployments are unchanged.
When set to false, both RpcHandler::ensure_self_allowed and the free
ensure_self_kms_allowed return early without attempting to attest.
Why: the strict-by-default check (introduced in 06d89a2) makes any
non-TEE host KMS instance unable to serve a single request because
the OnceCell-cached self_boot_info can never initialize. This blocks
local CVM testing setups that previously relied on an unauthenticated
host KMS process.1 parent a673ab7 commit 0e325c1
4 files changed
Lines changed: 21 additions & 0 deletions
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
26 | 26 | | |
27 | 27 | | |
28 | 28 | | |
| 29 | + | |
| 30 | + | |
| 31 | + | |
| 32 | + | |
| 33 | + | |
29 | 34 | | |
30 | 35 | | |
31 | 36 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
40 | 40 | | |
41 | 41 | | |
42 | 42 | | |
| 43 | + | |
| 44 | + | |
| 45 | + | |
| 46 | + | |
| 47 | + | |
| 48 | + | |
| 49 | + | |
| 50 | + | |
| 51 | + | |
| 52 | + | |
43 | 53 | | |
44 | 54 | | |
45 | 55 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
102 | 102 | | |
103 | 103 | | |
104 | 104 | | |
| 105 | + | |
| 106 | + | |
| 107 | + | |
105 | 108 | | |
106 | 109 | | |
107 | 110 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
206 | 206 | | |
207 | 207 | | |
208 | 208 | | |
| 209 | + | |
| 210 | + | |
| 211 | + | |
209 | 212 | | |
210 | 213 | | |
211 | 214 | | |
| |||
0 commit comments