Quickstart: Simulation mode
This guide will show you how to set up EdgelessDB with a minimal manifest and connect to it with the mysql
client.
Simulation mode is only suitable for evaluating EdgelessDB. The setup isn't secure in terms of confidential computing. For a setup in production, continue with SGX mode.
Start EdgelessDB
Run the EdgelessDB Docker image:
docker run -t --name my-edb -p3306:3306 -p8080:8080 -e OE_SIMULATION=1 ghcr.io/edgelesssys/edgelessdb-sgx-1gb
This should give the following output:
[erthost] running in simulation mode
[erthost] loading enclave ...
[erthost] entering enclave ...
[EDB] 2021/09/13 10:34:42 DB has not been initialized, waiting for manifest.
ERROR: can't get report in simulation mode (oe_result_t=OE_UNSUPPORTED) [openenclave-src/enclave/sgx/report.c:oe_get_report_v2:182]
[EDB] 2021/09/13 10:34:42 Failed to get quote: OE_UNSUPPORTED
[EDB] 2021/09/13 10:34:42 Attestation will not be available.
[EDB] 2021/09/13 10:34:42 HTTP REST API listening on :8080
The error is expected, because EdgelessDB can't get an SGX attestation quote in simulation mode. EdgelessDB is now waiting for the manifest.
Generate certificates and create a manifest
You will now create a manifest that defines a root user. This user is authenticated by an X.509 certificate.
Generate a certificate authority (CA) and a corresponding user certificate:
openssl req -x509 -newkey rsa -nodes -days 3650 -subj '/CN=My CA' -keyout ca-key.pem -out ca-cert.pem
openssl req -newkey rsa -nodes -subj '/CN=rootuser' -keyout key.pem -out csr.pem
openssl x509 -req -days 3650 -CA ca-cert.pem -CAkey ca-key.pem -CAcreateserial -in csr.pem -out cert.pem
Escape the line breaks of the CA certificate:
awk 1 ORS='\\n' ca-cert.pem
Create a file manifest.json
with the following contents:
{
"sql": [
"CREATE USER root REQUIRE ISSUER '/CN=My CA' SUBJECT '/CN=rootuser'",
"GRANT ALL ON *.* TO root WITH GRANT OPTION"
],
"ca": "-----BEGIN CERTIFICATE-----\n...\n-----END CERTIFICATE-----\n"
}
sql
is a list of SQL statements that define the initial state of the database. The two statements above create a root user that's authenticated by the user certificate you just generated.
Replace the value of ca
with the escaped content of ca-cert.pem
.
Verify your EdgelessDB instance
Before you can trust your EdgelessDB instance, you first need to verify its confidentiality. You can use the Edgeless Remote Attestation (era) tool for this. If you're just getting started, you may also skip this part.
Once you've installed era
, you can get the attested root certificate of your EdgelessDB instance as follows:
wget https://github.com/edgelesssys/edgelessdb/releases/latest/download/edgelessdb-sgx.json
era -c edgelessdb-sgx.json -h localhost:8080 -output-root edb.pem -skip-quote
Here, edgelessdb-sgx.json
contains the expected properties of your EdgelessDB instance. However, in simulation mode, you need to skip the actual verification of the properties via the -skip-quote
option.
WARNING: Skipping quote verification
Root certificate written to edb.pem
Set the manifest
You're now ready to send the manifest over a secure TLS connection based on the attested root certificate of your EdgelessDB instance:
curl --cacert edb.pem --data-binary @manifest.json https://localhost:8080/manifest
In case you skipped the verification step, just replace --cacert edb.pem
with -k
in the curl
command.
Use EdgelessDB
Now you can use EdgelessDB like any other SQL database:
mysql -h127.0.0.1 -uroot --ssl-ca edb.pem --ssl-cert cert.pem --ssl-key key.pem
In case you skipped the verification step, omit --ssl-ca edb.pem
in the mysql
command.
For an example of EdgelessDB's confidential-computing features, see the demo of a secure multi-party data processing app.