Skip to content
This repository was archived by the owner on Jul 20, 2023. It is now read-only.

Commit f688f82

Browse files
committed
quickstart: How to use a different KBC with enclave-cc
Let's add a small piece of documentation about what the users should do in case they want to try enclave-cc with a different KBC. Signed-off-by: Fabiano Fidêncio <fabiano.fidencio@intel.com>
1 parent 8a8ff5a commit f688f82

File tree

1 file changed

+19
-0
lines changed

1 file changed

+19
-0
lines changed

quickstart.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -146,6 +146,25 @@ NAME HANDLER AGE
146146
enclave-cc enclave-cc 9m55s
147147
```
148148

149+
### Configuring enclave-cc custom resource to use a different KBC
150+
151+
**Note** The KBC configuration changes to the enclave-cc custom resource yaml
152+
must be made **before** deploying it.
153+
154+
Enclave CC supports Verdictd and in order to use it, users will have to
155+
properly configure a decrypt_config.conf, in order to set the `KBC` (`sample_kbc`
156+
or `eaa_kbc`) `IP`,`PORT`, and the `SECURITY_VALIDATE` (`false` or `true`)
157+
```
158+
{
159+
"key_provider": "provider:attestation-agent:KBC::IP:PORT",
160+
"security_validate": SECURITY_VALIDATE
161+
}
162+
```
163+
164+
Once that's set according to the users needs, the user will then have to run:
165+
`cat decrypt_config.conf | base64 -w 0` in order to get the data encoded and
166+
set it accordingly [here](https://github.com/confidential-containers/operator/blob/6f241fbc056f0a5d9e1bd2c10b2cedc0782b99ff/config/samples/enclave-cc/base/ccruntime-enclave-cc.yaml#L124).
167+
149168
# Running a workload
150169

151170
## Creating a sample CoCo workload

0 commit comments

Comments
 (0)