Skip to content

Commit 8e0fff7

Browse files
committed
chore(docs): update the documentation
Signed-off-by: Chris Butler <[email protected]>
1 parent 22a42c2 commit 8e0fff7

File tree

4 files changed

+17
-14
lines changed

4 files changed

+17
-14
lines changed

README.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2,28 +2,30 @@
22

33
This is a validated pattern for deploying confidential containers on OpenShift.
44

5-
The target operating model has two clusters:
5+
There are two topologies for deploying this pattern:
66

7-
- One in a "trusted" zone where the remote attestation, KMS and Key Broker infrastructure are deployed.
8-
- A second where a subset of workloads are deployed in confidential containers.
7+
1. *Default* using a single cluster. This breaks the RACI expected in a remote attestation architecture, however, makes it easier to test. This uses the `simple` `clusterGroup`.
8+
2. A more secure operating model that has two clusters:
9+
- One in a "trusted" zone where the remote attestation, KMS and Key Broker infrastructure are deployed. This is also the Advanced Cluster Manager Hub cluster. It uses the `trusted-hub` `clusterGroup`.
10+
- A second where a subset of workloads are deployed in confidential containers. It uses the `spoke` `clusterGroup`
911

1012
The current version of this application the confidential containers assumes deployment to Azure.
1113

12-
On the platform a sample workload is deployed:
14+
On the cluster where confidential workloads are deployed two sample applications are deployed:
1315

1416
1. Sample hello world applications to allow users to experiment with the policies for CoCo and the KBS (trustee).
1517
2. A sample application `kbs-access` which presents secrets obtained from trustee to a web service. This is designed to allow users to test locked down environments.
1618

1719
Future work includes:
1820

19-
1. Supporting a multiple cluster deployment
20-
2. Supporting multiple infrastructure providers
21-
3. Supporting a more sophisticated workload such as confidential AI inference with protected GPUs.
21+
1. ~~Supporting a multiple cluster deployment~~ Done
22+
2. Supporting multiple infrastructure providers - Work in Progress.
23+
3. Supporting air-gapped deployments - Work in Progress.
24+
4. Supporting a more sophisticated workload such as confidential AI inference with protected GPUs.
2225

2326
## Current constraints and assumptions
2427

2528
- Only currently is known to work with `azure` as the provider of confidential vms via peer-pods.
26-
- Only known to work today with everything on one cluster. The work to expand this is in flight.
2729
- Below version 3.1, if not using ARO you must either provide your own CA signed certs, or use let's encrypt.
2830
- Must be on 4.16.14 or later.
2931

@@ -61,8 +63,6 @@ The pattern has been tested on Azure for two installation methods:
6163
1. Installing onto an ARO cluster
6264
2. Self managed OpenShift install using the `openshift-install` CLI.
6365

64-
> [!IMPORTANT]
65-
> You need an external CA signed certificate for to be added (e.g. with let's encrypt) to a self-managed install
6666

6767
### `1.0.0`
6868

@@ -75,7 +75,7 @@ The pattern has been tested on Azure for one installation method:
7575

7676
## Validated pattern flavours
7777

78-
**Today the demo has one flavour**.
78+
**Today the demo has two flavour**.
7979
A number are planned based on various different hub cluster-groups.
8080
You can change between behaviour by configuring [`global.main.clusterGroupName`](https://validatedpatterns.io/learn/values-files/) key in the `values-global.yaml` file.
8181

overrides/values-trustee.yaml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
# Override the default values for the trustee chart
2-
# add your secret resources here :-)
2+
# This lists the secret resources that are uploaded to your chosen ESO backend (today by default, Vault).
3+
# it does not contain the secrets themselves
34
kbs:
45
secretResources:
5-
- name: "kbsres1"
6-
key: "secret/data/hub/kbsres1"
6+
- name: "kbsres1" # name is the name of the k8s secret that will be presented to trustee and accessible via the CDH
7+
key: "secret/data/hub/kbsres1" # this is the path to the secret in vault.
78
- name: "passphrase"
89
key: "secret/data/hub/passphrase"

values-simple.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,7 @@ clusterGroup:
8080
project: trustee
8181
chart: trustee
8282
chartVersion: 0.1.*
83+
# Use the override file to specify the list of secrets accessible to trustee from the ESO backend (today by default, Vault).
8384
extraValueFiles:
8485
- '$patternref/overrides/values-trustee.yaml'
8586
sandbox:

values-trusted-hub.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,7 @@ clusterGroup:
6868
project: trustee
6969
chart: trustee
7070
chartVersion: 0.1.*
71+
# Use the override file to specify the list of secrets accessible to trustee from the ESO backend (today by default, Vault).
7172
extraValueFiles:
7273
- '$patternref/overrides/values-trustee.yaml'
7374
sandbox-policies:

0 commit comments

Comments
 (0)