Skip to content

Commit 873e4d0

Browse files
committed
More SME edits from Avital
1 parent 11384ec commit 873e4d0

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/openshift/confidential-containers-deploy.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -726,7 +726,7 @@ You can overwrite the default attestation policy by creating your own attestatio
726726
}
727727
```
728728
729-
For `package policy`, The attestation policy follows the Open Policy Agent specification. In this example, the attestation policy compares the claims provided in the attestation report to the reference values registered in the RVPS database. The attestation process is successful only if all the values match.
729+
For the `package policy`, the attestation policy follows the Open Policy Agent specification. In this example, the attestation policy compares the claims provided in the attestation report to the reference values registered in the RVPS database. The attestation process is successful only if all the values match.
730730
731731
1. Create the attestation policy config map by running the following command:
732732
@@ -905,13 +905,13 @@ If your TEE is Intel Trust Domain Extensions (TDX), you must configure the Provi
905905
906906
**Create a secret for container image signature verification**
907907
908-
If you use container image signature verification, you must create a secret that contains the public container image signing key. The Key Broker Service on the Trustee cluster uses the secret to verify the signature, ensuring that only trusted and authenticated container images are deployed in your environment.
908+
If you use container image signature verification, you must create a secret that contains the public container image signing key. The Trustee Operator uses the secret to verify the signature, ensuring that only trusted and authenticated container images are deployed in your environment.
909909
910910
1. Create a secret for container image signature verification by running the following command:
911911
912912
```
913-
$ oc apply secret generic <type>
914-
--from-file=<tag>=./<public_key_file>
913+
$ oc apply secret generic <type> \
914+
--from-file=<tag>=./<public_key_file> \
915915
-n trustee-operator-system
916916
```
917917
@@ -1003,17 +1003,17 @@ You must create the KbsConfig custom resource to launch Trustee.
10031003
kbsAuthSecretName: kbs-auth-public-key
10041004
kbsDeploymentType: AllInOneDeployment
10051005
kbsRvpsRefValuesConfigMapName: rvps-reference-values
1006-
kbsSecretResources: ["kbsres1"]
1006+
kbsSecretResources: ["kbsres1", "security-policy", "<type>"]
10071007
kbsResourcePolicyConfigMapName: resource-policy
10081008
# tdxConfigSpec:
10091009
# kbsTdxConfigMapName: tdx-config
10101010
# kbsAttestationPolicyConfigMapName: attestation-policy
10111011
# kbsServiceType: <service_type>
10121012
```
1013-
- Specify the type value of the container image signature verification secret you created, for example, `img-sig`.
1014-
- `tdxConfigSpec.kbsTdxConfigMapName:` tdx-config is required for Intel Trust Domain Extensions.
1015-
- `kbsAttestationPolicyConfigMapName:` attestation-policy is required if you create a customized attestation policy.
1016-
- `kbsServiceType: <service_type>` is required if you created a service type. Specify NodePort, LoadBalancer, or ExternalName. The default service type is ClusterIP.
1013+
- Specify the `type` value of the container image signature verification secret if you created the secret, for example, `img-sig`.
1014+
- Uncomment `tdxConfigSpec.kbsTdxConfigMapName: tdx-config` for Intel Trust Domain Extensions.
1015+
- Uncomment `kbsAttestationPolicyConfigMapName: attestation-policy` if you create a customized attestation policy.
1016+
- Uncomment `kbsServiceType: <service_type>` if you create a service type, other than the default ClusterIP service, to expose applications within the cluster external traffic. You can specify `NodePort`, `LoadBalancer`, or `ExternalName`.
10171017
10181018
1. Create the KbsConfig custom resource by running the following command:
10191019

0 commit comments

Comments
 (0)