generated from kubernetes/kubernetes-template-project
-
Notifications
You must be signed in to change notification settings - Fork 39
Open
Labels
lifecycle/staleDenotes an issue or PR has remained open with no activity and has become stale.Denotes an issue or PR has remained open with no activity and has become stale.
Description
https://kmm.sigs.k8s.io/documentation/secure_boot/ described the process of how to automate the signing process of kernel modules, but there is a field called filesToSign, and it is saying we must provide full path to the kernel modules that we want to sign.
The problems are:
- Given a specific kernel module, we may also need to sign the dependent kernel modules if the host node doesn't have those dependent kernel modules.
- With different Linux kernels the dependency graph may differ a lot.
So I'm asking a feature, can we just provide a folder path or some kind of wildcard match template, so that the KMM image signing pod could auto detect the .ko files within the folder, or matched the template and sign all of them ?
Metadata
Metadata
Assignees
Labels
lifecycle/staleDenotes an issue or PR has remained open with no activity and has become stale.Denotes an issue or PR has remained open with no activity and has become stale.