You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/openshift/confidential-containers-deploy.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -726,7 +726,7 @@ You can overwrite the default attestation policy by creating your own attestatio
726
726
}
727
727
```
728
728
729
-
For `package policy`, The attestation policy follows the Open Policy Agent specification. In this example, the attestation policy compares the claims provided in the attestation report to the reference values registered in the RVPS database. The attestation process is successful only if all the values match.
729
+
For the `package policy`, the attestation policy follows the Open Policy Agent specification. In this example, the attestation policy compares the claims provided in the attestation report to the reference values registered in the RVPS database. The attestation process is successful only if all the values match.
730
730
731
731
1. Create the attestation policy config map by running the following command:
732
732
@@ -905,13 +905,13 @@ If your TEE is Intel Trust Domain Extensions (TDX), you must configure the Provi
905
905
906
906
**Create a secret for container image signature verification**
907
907
908
-
If you use container image signature verification, you must create a secret that contains the public container image signing key. The Key Broker Service on the Trustee cluster uses the secret to verify the signature, ensuring that only trusted and authenticated container images are deployed in your environment.
908
+
If you use container image signature verification, you must create a secret that contains the public container image signing key. The Trustee Operator uses the secret to verify the signature, ensuring that only trusted and authenticated container images are deployed in your environment.
909
909
910
910
1. Create a secret for container image signature verification by running the following command:
911
911
912
912
```
913
-
$ oc apply secret generic <type>
914
-
--from-file=<tag>=./<public_key_file>
913
+
$ oc apply secret generic <type> \
914
+
--from-file=<tag>=./<public_key_file> \
915
915
-n trustee-operator-system
916
916
```
917
917
@@ -1003,17 +1003,17 @@ You must create the KbsConfig custom resource to launch Trustee.
- Specify the type value of the container image signature verification secret you created, for example, `img-sig`.
1014
-
- `tdxConfigSpec.kbsTdxConfigMapName:` tdx-config is required for Intel Trust Domain Extensions.
1015
-
- `kbsAttestationPolicyConfigMapName:` attestation-policy is required if you create a customized attestation policy.
1016
-
- `kbsServiceType: <service_type>` is required if you created a service type. Specify NodePort, LoadBalancer, or ExternalName. The default service type is ClusterIP.
1013
+
- Specify the `type` value of the container image signature verification secret if you created the secret, for example, `img-sig`.
1014
+
- Uncomment `tdxConfigSpec.kbsTdxConfigMapName: tdx-config` for Intel Trust Domain Extensions.
1015
+
- Uncomment `kbsAttestationPolicyConfigMapName: attestation-policy` if you create a customized attestation policy.
1016
+
- Uncomment `kbsServiceType: <service_type>` if you create a service type, other than the default ClusterIP service, to expose applications within the cluster external traffic. You can specify `NodePort`, `LoadBalancer`, or `ExternalName`.
1017
1017
1018
1018
1. Create the KbsConfig custom resource by running the following command:
0 commit comments