Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SecureComms: Add support daemonConfig #2065

Merged

Conversation

davidhadas
Copy link
Member

@davidhadas davidhadas commented Sep 26, 2024

See:

Support configuring the APF Secure Comms from the CAA side including:

  • WN public Key
  • PP private key
  • Activating Secure Comms
  • inbouns and outbounds of th PP

This is useful for activating Secure Comms from the CAA and without Trustee. It can be used for Testing without producing dedicated podvms which activate Secure Comms and set Inbounds/Outbounds by default. It can also be used for non-Coco peerpods.

@davidhadas davidhadas requested a review from a team as a code owner September 26, 2024 17:10
@davidhadas davidhadas force-pushed the secComms_daemonConfig branch from c04060f to fb0eee2 Compare September 26, 2024 17:33
@bpradipt bpradipt requested a review from yoheiueda September 27, 2024 05:58
@davidhadas davidhadas force-pushed the secComms_daemonConfig branch from fb0eee2 to 540bcff Compare September 30, 2024 10:07
@davidhadas
Copy link
Member Author

/hold
This is WIP.

@davidhadas davidhadas force-pushed the secComms_daemonConfig branch from 540bcff to 2a572ab Compare September 30, 2024 11:25
@davidhadas
Copy link
Member Author

/unhold
Added necessary CAA support to work without Trustee-Operator

@davidhadas davidhadas force-pushed the secComms_daemonConfig branch 4 times, most recently from f464fe6 to aadaddc Compare October 6, 2024 11:53
@davidhadas davidhadas force-pushed the secComms_daemonConfig branch 2 times, most recently from 688ee74 to 88f14cd Compare October 7, 2024 12:35
@davidhadas
Copy link
Member Author

cc: @bpradipt

@davidhadas davidhadas force-pushed the secComms_daemonConfig branch 3 times, most recently from 8c7eb3c to d9a4dac Compare October 30, 2024 13:05
@davidhadas davidhadas force-pushed the secComms_daemonConfig branch 2 times, most recently from fb72ef1 to 6fd8d61 Compare November 8, 2024 15:44
@davidhadas davidhadas self-assigned this Nov 9, 2024
@davidhadas
Copy link
Member Author

@yoheiueda, @stevenhorsman, @bpradipt

This PR adds the ability to configure SecureComms by auto-generating secrets, the same way it is done today by TLS.
This is a necessary step to merge #2089 which is our first e2e test for SecureComms.

Since it is aligned with the existing TLS mechanisms and follow the same design and footsteps for the delivery of the secrets, I hope we can merge it without delay.

@bpradipt has indicated that this PR aligns SecureComms with TLS such that all TLS use cases apparently are now also covered by SecureComms. This may lead to a further discussion about moving away from the less secure TLS option for maintainability (maybe best to do after we merge #2089).

@davidhadas davidhadas force-pushed the secComms_daemonConfig branch from 6fd8d61 to 5224bc4 Compare November 17, 2024 16:25
@davidhadas davidhadas force-pushed the secComms_daemonConfig branch 2 times, most recently from 24bbd2d to 1895a0b Compare November 21, 2024 10:38
@davidhadas davidhadas force-pushed the secComms_daemonConfig branch 2 times, most recently from 603b4b9 to 918fad4 Compare November 26, 2024 16:51
@davidhadas davidhadas requested a review from bpradipt November 27, 2024 06:32
@davidhadas davidhadas force-pushed the secComms_daemonConfig branch 2 times, most recently from 10c6630 to cf46204 Compare November 27, 2024 10:33
@stevenhorsman
Copy link
Member

@davidhadas - can you rebase this PR please to pick up the check links fix. Thanks!

@davidhadas davidhadas force-pushed the secComms_daemonConfig branch from cf46204 to 1604f7b Compare November 28, 2024 12:09
@stevenhorsman stevenhorsman added the test_e2e_libvirt Run Libvirt e2e tests label Nov 28, 2024
Support configuring the APF Secure Comms from the CAA side including:
 - WN public Key
 - PP private key
 - Activating Secure Comms
 - inbouns and outbounds of th PP

This is useful for activating Secure Comms from the CAA and without
Trustee. It can be used for Testing without producing dedicated podvms
which activate Secure Comms and set Inbounds/Outbounds by default.
It can also be used for non-Coco peerpods.

Signed-off-by: David Hadas <david.hadas@gmail.com>
Copy link
Member

@stevenhorsman stevenhorsman left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This looks okay to me and all the tests on the PR pass, so I'm okay with it being merged.

Copy link
Member

@bpradipt bpradipt left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@davidhadas davidhadas merged commit 711a542 into confidential-containers:main Nov 28, 2024
30 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
test_e2e_libvirt Run Libvirt e2e tests
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants