mirror of
https://github.com/kata-containers/kata-containers.git
synced 2025-08-13 21:56:32 +00:00
Merge pull request #4023 from fidencio/wip/expose-service-offload-option-to-clh
clh: Expose service offload configuration
This commit is contained in:
commit
8980d04e25
@ -324,3 +324,30 @@ experimental=@DEFAULTEXPFEATURES@
|
|||||||
# If enabled, user can run pprof tools with shim v2 process through kata-monitor.
|
# If enabled, user can run pprof tools with shim v2 process through kata-monitor.
|
||||||
# (default: false)
|
# (default: false)
|
||||||
# enable_pprof = true
|
# enable_pprof = true
|
||||||
|
|
||||||
|
# WARNING: All the options in the following section have not been implemented yet.
|
||||||
|
# This section was added as a placeholder. DO NOT USE IT!
|
||||||
|
[image]
|
||||||
|
# Container image service.
|
||||||
|
#
|
||||||
|
# Offload the CRI image management service to the Kata agent.
|
||||||
|
# (default: false)
|
||||||
|
#service_offload = true
|
||||||
|
|
||||||
|
# Container image decryption keys provisioning.
|
||||||
|
# Applies only if service_offload is true.
|
||||||
|
# Keys can be provisioned locally (e.g. through a special command or
|
||||||
|
# a local file) or remotely (usually after the guest is remotely attested).
|
||||||
|
# The provision setting is a complete URL that lets the Kata agent decide
|
||||||
|
# which method to use in order to fetch the keys.
|
||||||
|
#
|
||||||
|
# Keys can be stored in a local file, in a measured and attested initrd:
|
||||||
|
#provision=data:///local/key/file
|
||||||
|
#
|
||||||
|
# Keys could be fetched through a special command or binary from the
|
||||||
|
# initrd (guest) image, e.g. a firmware call:
|
||||||
|
#provision=file:///path/to/bin/fetcher/in/guest
|
||||||
|
#
|
||||||
|
# Keys can be remotely provisioned. The Kata agent fetches them from e.g.
|
||||||
|
# a HTTPS URL:
|
||||||
|
#provision=https://my-key-broker.foo/tenant/<tenant-id>
|
||||||
|
Loading…
Reference in New Issue
Block a user