Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

packaging: Add confidential image / initrd #8983

Merged

Conversation

fidencio
Copy link
Member

Let's use a single rootfs image / initrd for confidential workloads,
instead of having those split for different TEEs.

We can easily do this now as the soon-to-be-added guest-components can
be built in a generic way.

Fixes: #8982

NOTE: This is rebased atop of #8978

@katacontainersbot katacontainersbot added the size/medium Average sized task label Jan 31, 2024
@@ -38,9 +38,7 @@ jobs:
- kata-ctl
- kernel
- kernel-confidential
- kernel-sev
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

tools/packaging/kata-deploy/local-build/kata-deploy-binaries.sh still has some references to them. Should we remove there too?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Very good point, @beraldoleal, and I should have written this as part of a note in the PR.
If we remove those right now, we'll break the build as:

  • removing from the yaml file will only take effect after the PR is merged
  • removong from the kata-deploy-binaries.sh will take effect during the tests

With this in mind, I'd like to remove those bits in a follow-up PR.

Does it sound reasonable?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sounds acceptable! :) Thanks.

Copy link
Contributor

@portersrc portersrc left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good to me. I had the same comment as @beraldoleal but your point about a follow-up PR sounds good.

Copy link
Member

@beraldoleal beraldoleal left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM.

@fidencio fidencio marked this pull request as draft February 2, 2024 11:09
@fidencio
Copy link
Member Author

fidencio commented Feb 2, 2024

I've moved this to a draft to ensure it doesn't get merged before its dependency.

@fidencio fidencio changed the title packaging: Add confidential image / initrd packaging: Add confidential image Feb 2, 2024
@fidencio fidencio changed the title packaging: Add confidential image packaging: Add confidential image / initrd Feb 2, 2024
@fidencio
Copy link
Member Author

fidencio commented Feb 2, 2024

I've updated this one dropping the AMD changes.

Copy link
Member

@stevenhorsman stevenhorsman left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This LGTM.

@stevenhorsman
Copy link
Member

One thing that occurred to me whilst reviewing this (that is out of scope for this PR, but I thought might be needed to think about before we close #8183), is what are we going to do about SE image. It's not being made through this as it's only creating the confidential image in the amd64 payload, which makes sense, as the SE initrd needs to go through genprotimg tool and requires a host key document of the machine it will run on, so I'm not too sure how we want to integrate that into CI pipeline? In CCv0 I think we just built the image from scratch during the CI phase, which I guess we could do, but I'm not sure if there is a better idea?

Anyway, that's not for this PR, so I'll try not to derail it

@katacontainersbot katacontainersbot added size/small Small and simple task and removed size/medium Average sized task labels Feb 2, 2024
Let's use a single rootfs image / initrd for confidential workloads,
instead of having those split for different TEEs.

We can easily do this now as the soon-to-be-added guest-components can
be built in a generic way.

Fixes: kata-containers#8982

Signed-off-by: Fabiano Fidêncio <fabiano.fidencio@intel.com>
@fidencio
Copy link
Member Author

fidencio commented Feb 3, 2024

/test

@fidencio fidencio marked this pull request as ready for review February 3, 2024 10:06
@fidencio fidencio merged commit e0bb632 into kata-containers:main Feb 3, 2024
285 of 293 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
ok-to-test size/small Small and simple task
Projects
None yet
Development

Successfully merging this pull request may close these issues.

packaging: Build the a single confidential rootfs image / initrd
5 participants