You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat(secret_registration_client): add secret registration client service creation
The secret registration client service is the counterpart of the server service.
It does 1. register the trustee client with server by an attestation.
2. fetch the key created by server service and mount the encrypted disk.
Signed-off-by: Li Tian <litian@redhat.com>
Copy file name to clipboardExpand all lines: README.md
+38-36Lines changed: 38 additions & 36 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,50 +7,28 @@
7
7
Ansible role for deploying Trustee Guest Components using Podman Quadlets for
8
8
confidential virtual machine deployments. The role downloads quadlet files and
9
9
configuration files from a GitHub repository, installs them, and manages them as
10
-
systemd services. The role also supports optional disk encryption functionality for
11
-
securing additional storage devices.
12
-
13
-
The role will:
14
-
15
-
1. Install Podman and Git if not already present
16
-
2. Download Trustee Guest Components quadlet files and config files from the
17
-
specified GitHub repository
18
-
3. Copy quadlet files (`.container`, `.volume`, `.network`, `.kube`) to the
19
-
install directory (`/etc/containers/systemd` by default)
20
-
4. Copy config files from the repository's `configs` directory to `/etc/trustee-gc/`
21
-
5. Replace `KBS_URL` and `KBS_CERT` placeholders in `/etc/trustee-gc/cdh/config.toml`
22
-
with the values from `trustee_attestation_client_trustee_kbs_url` and `trustee_attestation_client_trustee_kbs_cert`
23
-
variables (if provided)
24
-
6. Reload systemd daemon
25
-
7. Enable and start the Trustee Guest Components services
26
-
8. (Optional) If `trustee_attestation_client_encrypt_disk` is `true`:
27
-
- Find an unpartitioned and unmounted disk
28
-
- Create a GPT partition table and partition on the disk
29
-
- Generate an encryption key and encrypt the partition using LUKS
30
-
- Format the encrypted partition with ext4
31
-
- Mount the encrypted disk at the specified mount point
32
-
- Store the encryption key in the `encrypted_disk_key` fact
10
+
systemd services. The role also supports an optional secret registration client
11
+
for disk key registration and optional disk encryption for securing additional
12
+
storage devices.
13
+
14
+
## Features
15
+
16
+
-**Trustee Client (Quadlet)**: Deploys Trustee guest components Attestation Agent(AA), Confidential Data Hub(CDH) and API Server REST(ASR) using Podman Quadlets from a Github repository
17
+
-**Secret Registration Client**: Utility script and service which registers to Secret Registration Server on Trustee Server. It acquires the encryption key from Trustee and decrypts the designated disk upon boot
18
+
-**Encrypt Disk**: Does LUKS2 encryption of the found empty data disk. The encryption key is provided by Secret Registration Client.
0 commit comments