mirror of
https://github.com/confidential-containers/confidential-containers.git
synced 2025-10-21 15:31:13 +00:00
update according to comments
Signed-off-by: hairongchen <hairong.chen@intel.com>
This commit is contained in:
committed by
Fabiano Fidêncio
parent
934a9e1ed9
commit
372bd93a5a
@@ -187,8 +187,17 @@ root@cluster01-master-0:/home/ubuntu# crictl -r unix:///run/containerd/contain
|
||||
## Creating a sample Coco workload using enclave-cc
|
||||
|
||||
Following the previous example that used the `kata` runtime class, we setup a sample *hello world*
|
||||
workload with an encrypted and cosign signed image using the `enclave-cc` runtime class for process based TEEs. The deployment below assumes
|
||||
the hardware SGX mode build (`ccruntime-enclave-cc.yaml`) is installed by the operator. To try on a non-TEE system, please use (`ccruntime-enclave-cc-sim.yaml`).
|
||||
workload with an encrypted and cosign signed image using the `enclave-cc` runtime class.
|
||||
For the process based CoCo TEE (aka. `enclave-cc`) the operator setup steps are the same and the custom resources
|
||||
can be deployed using either
|
||||
```
|
||||
kubectl apply -k github.com/confidential-containers/operator/config/samples/enclave-cc/sim?ref=<RELEASE_VERSION>
|
||||
```
|
||||
or
|
||||
```
|
||||
kubectl apply -k github.com/confidential-containers/operator/config/samples/enclave-cc/hw?ref=
|
||||
```
|
||||
for the **simulated** SGX mode build or **hardware** SGX mode build, respectively.
|
||||
|
||||
The example uses a trivial hello world C application:
|
||||
```
|
||||
|
Reference in New Issue
Block a user