Base Docker image used for Python web application launched with MSE.
The Docker image is built and released with GitHub Actions as below:
$ export BUILD_DATE="$(date "+%Y%m%d%H%M%S")"
$ docker build -t mse-base:$BUILD_DATE .
You should use images released on pkgs/mse-base as base layer.
As an example, mse-base
can be extended with Flask:
FROM ghcr.io/cosmian/mse-base:LAST_DATE_ON_GH_PACKAGES
RUN pip3 install "flask==2.2.2"
replace LAST_DATE_ON_GH_PACKAGES
with the last one on pkgs/mse-base, then:
$ docker build -t mse-flask:2.2.2
First compress your Python flask application:
$ tree mse_src/
mse_src
└── app.py
0 directories, 2 files
$ cat mse_src/app.py
from flask import Flask
app = Flask(__name__)
@app.route('/')
def hello():
return "Hello World!"
$ tar -cvf /tmp/app.tar --directory=mse_src app.py
then generate a signer RSA key for the enclave:
$ openssl genrsa -3 -out enclave-key.pem 3072
and finally run the Docker container with:
- Enclave signer key mounted to
/root/.config/gramine/enclave-key.pem
- Tar of the python application mounted anywhere (
/tmp/app.tar
can be used) mse-run
binary as Docker entrypoint- Enclave size in
--size
(could be2G
,4G
,8G
) - Path of the tar mounted previously in
--code
- Module path of your Flask application in
--application
(usuallyapp:app
) - Random UUID v4 in
--uuid
- Expiration date of the certificate as unix epoch time in
--self-signed
$ docker run -p 8080:443 \
--device /dev/sgx_enclave \
--device /dev/sgx_provision \
--device /dev/sgx/enclave \
--device /dev/sgx/provision \
-v /var/run/aesmd:/var/run/aesmd \
-v "$(realpath enclave-key.pem)":/root/.config/gramine/enclave-key.pem \
-v /tmp/app.tar:/tmp/app.tar \
--entrypoint mse-run \
mse-flask:2.2.2 --size 8G \
--code /tmp/app.tar \
--host localhost \
--application app:app \
--uuid 533a2b83-4bc5-4a9c-955e-208c530bfd15 \
--self-signed 1769155711
$ # get self-signed certificate with OpenSSL
$ openssl s_client -showcerts -connect localhost:8080 </dev/null 2>/dev/null | openssl x509 -outform PEM >/tmp/cert.pem
$ # force self-signed certificate as CA bundle
$ curl https://localhost:8080 --cacert /tmp/cert.pem
The integrity of the application running in mse-flask
is reflected in the MRENCLAVE
value which is a SHA-256 hash digest of code, data, heap, stack, and other attributes of an enclave.
Use --dry-run
parameter with the exact same other parameters as above to output MRENCLAVE
value:
$ docker run --rm \
-v /tmp/app.tar:/tmp/app.tar \
--entrypoint mse-run \
mse-flask:2.2.2 --size 8G \
--code /tmp/app.tar \
--host localhost \
--application app:app \
--uuid 533a2b83-4bc5-4a9c-955e-208c530bfd15 \
--self-signed 1769155711 \
--dry-run
Note: MRSIGNER
value should be ignored because it is randomly generated at each dry run.
If you want to test that your docker image contains all the dependencies needed, mse-test
wraps flask run
command for you if you mount your code directory to /mse-app
:
$ docker run --rm -ti \
--entrypoint mse-test \
--net host \
-v mse_src:/mse-app \
mse-flask:2.2.2 \
--application app:app \
--debug
$ # default host and port of flask developement server
$ curl http://127.0.0.1:5000
To use your secrets.json
, just add -v secrets.json:/root/.cache/mse/secrets.json
to mount the file.
Some files contained in the docker are mounted into the enclave: libs, etc. These files takes some memory spaces from the enclave size you have declared. The remaining space is the effective memory your app can use.
You can compute the effective memory by adding --memory
in the previous commands. For example:
$ docker run --rm \
-v /tmp/app.tar:/tmp/app.tar \
--entrypoint mse-run \
mse-flask:2.2.2 --size 8G \
--code /tmp/app.tar \
--host localhost \
--application app:app \
--uuid 533a2b83-4bc5-4a9c-955e-208c530bfd15 \
--self-signed 1769155711 \
--dry-run \
--memory