mirror of
https://github.com/kata-containers/kata-containers.git
synced 2025-07-04 19:16:23 +00:00
Merge pull request #8046 from fitzthum/clean-config
runtime: remove unimplemented CoCo configurations
This commit is contained in:
commit
b3acbe0b7f
@ -224,10 +224,6 @@ $ diff ${runtime_config_path}.old ${runtime_config_path}
|
|||||||
< dial_timeout = 45
|
< dial_timeout = 45
|
||||||
---
|
---
|
||||||
> dial_timeout = 90
|
> dial_timeout = 90
|
||||||
679c679
|
|
||||||
< #service_offload = true
|
|
||||||
---
|
|
||||||
> service_offload = true
|
|
||||||
```
|
```
|
||||||
|
|
||||||
### Verification
|
### Verification
|
||||||
|
@ -700,30 +700,3 @@ experimental=@DEFAULTEXPFEATURES@
|
|||||||
# If enabled, user can run pprof tools with shim v2 process through kata-monitor.
|
# If enabled, user can run pprof tools with shim v2 process through kata-monitor.
|
||||||
# (default: false)
|
# (default: false)
|
||||||
# enable_pprof = true
|
# enable_pprof = true
|
||||||
|
|
||||||
# WARNING: All the options in the following section have not been implemented yet.
|
|
||||||
# This section was added as a placeholder. DO NOT USE IT!
|
|
||||||
[image]
|
|
||||||
# Container image service.
|
|
||||||
#
|
|
||||||
# Offload the CRI image management service to the Kata agent.
|
|
||||||
# (default: false)
|
|
||||||
#service_offload = true
|
|
||||||
|
|
||||||
# Container image decryption keys provisioning.
|
|
||||||
# Applies only if service_offload is true.
|
|
||||||
# Keys can be provisioned locally (e.g. through a special command or
|
|
||||||
# a local file) or remotely (usually after the guest is remotely attested).
|
|
||||||
# The provision setting is a complete URL that lets the Kata agent decide
|
|
||||||
# which method to use in order to fetch the keys.
|
|
||||||
#
|
|
||||||
# Keys can be stored in a local file, in a measured and attested initrd:
|
|
||||||
#provision=data:///local/key/file
|
|
||||||
#
|
|
||||||
# Keys could be fetched through a special command or binary from the
|
|
||||||
# initrd (guest) image, e.g. a firmware call:
|
|
||||||
#provision=file:///path/to/bin/fetcher/in/guest
|
|
||||||
#
|
|
||||||
# Keys can be remotely provisioned. The Kata agent fetches them from e.g.
|
|
||||||
# a HTTPS URL:
|
|
||||||
#provision=https://my-key-broker.foo/tenant/<tenant-id>
|
|
||||||
|
@ -262,9 +262,6 @@ DEFSTATICRESOURCEMGMT_TEE = true
|
|||||||
|
|
||||||
DEFBINDMOUNTS := []
|
DEFBINDMOUNTS := []
|
||||||
|
|
||||||
# Image Service Offload
|
|
||||||
DEFSERVICEOFFLOAD ?= false
|
|
||||||
|
|
||||||
# Create Container Timeout in seconds
|
# Create Container Timeout in seconds
|
||||||
DEFCREATECONTAINERTIMEOUT ?= 60
|
DEFCREATECONTAINERTIMEOUT ?= 60
|
||||||
|
|
||||||
@ -681,7 +678,6 @@ USER_VARS += DEFSTATICRESOURCEMGMT_FC
|
|||||||
USER_VARS += DEFSTATICRESOURCEMGMT_STRATOVIRT
|
USER_VARS += DEFSTATICRESOURCEMGMT_STRATOVIRT
|
||||||
USER_VARS += DEFSTATICRESOURCEMGMT_TEE
|
USER_VARS += DEFSTATICRESOURCEMGMT_TEE
|
||||||
USER_VARS += DEFBINDMOUNTS
|
USER_VARS += DEFBINDMOUNTS
|
||||||
USER_VARS += DEFSERVICEOFFLOAD
|
|
||||||
USER_VARS += DEFCREATECONTAINERTIMEOUT
|
USER_VARS += DEFCREATECONTAINERTIMEOUT
|
||||||
USER_VARS += DEFVFIOMODE
|
USER_VARS += DEFVFIOMODE
|
||||||
USER_VARS += BUILDFLAGS
|
USER_VARS += BUILDFLAGS
|
||||||
|
@ -456,30 +456,3 @@ experimental=@DEFAULTEXPFEATURES@
|
|||||||
# (https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet/#:~:text=runtime%2Drequest%2Dtimeout) and create_container_timeout.
|
# (https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet/#:~:text=runtime%2Drequest%2Dtimeout) and create_container_timeout.
|
||||||
# In essence, the timeout used for guest pull=runtime-request-timeout<create_container_timeout?runtime-request-timeout:create_container_timeout.
|
# In essence, the timeout used for guest pull=runtime-request-timeout<create_container_timeout?runtime-request-timeout:create_container_timeout.
|
||||||
create_container_timeout = @DEFCREATECONTAINERTIMEOUT@
|
create_container_timeout = @DEFCREATECONTAINERTIMEOUT@
|
||||||
|
|
||||||
# WARNING: All the options in the following section have not been implemented yet.
|
|
||||||
# This section was added as a placeholder. DO NOT USE IT!
|
|
||||||
[image]
|
|
||||||
# Container image service.
|
|
||||||
#
|
|
||||||
# Offload the CRI image management service to the Kata agent.
|
|
||||||
# (default: false)
|
|
||||||
#service_offload = true
|
|
||||||
|
|
||||||
# Container image decryption keys provisioning.
|
|
||||||
# Applies only if service_offload is true.
|
|
||||||
# Keys can be provisioned locally (e.g. through a special command or
|
|
||||||
# a local file) or remotely (usually after the guest is remotely attested).
|
|
||||||
# The provision setting is a complete URL that lets the Kata agent decide
|
|
||||||
# which method to use in order to fetch the keys.
|
|
||||||
#
|
|
||||||
# Keys can be stored in a local file, in a measured and attested initrd:
|
|
||||||
#provision=data:///local/key/file
|
|
||||||
#
|
|
||||||
# Keys could be fetched through a special command or binary from the
|
|
||||||
# initrd (guest) image, e.g. a firmware call:
|
|
||||||
#provision=file:///path/to/bin/fetcher/in/guest
|
|
||||||
#
|
|
||||||
# Keys can be remotely provisioned. The Kata agent fetches them from e.g.
|
|
||||||
# a HTTPS URL:
|
|
||||||
#provision=https://my-key-broker.foo/tenant/<tenant-id>
|
|
||||||
|
@ -687,30 +687,3 @@ experimental=@DEFAULTEXPFEATURES@
|
|||||||
# (https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet/#:~:text=runtime%2Drequest%2Dtimeout) and create_container_timeout.
|
# (https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet/#:~:text=runtime%2Drequest%2Dtimeout) and create_container_timeout.
|
||||||
# In essence, the timeout used for guest pull=runtime-request-timeout<create_container_timeout?runtime-request-timeout:create_container_timeout.
|
# In essence, the timeout used for guest pull=runtime-request-timeout<create_container_timeout?runtime-request-timeout:create_container_timeout.
|
||||||
create_container_timeout = @DEFCREATECONTAINERTIMEOUT@
|
create_container_timeout = @DEFCREATECONTAINERTIMEOUT@
|
||||||
|
|
||||||
# WARNING: All the options in the following section have not been implemented yet.
|
|
||||||
# This section was added as a placeholder. DO NOT USE IT!
|
|
||||||
[image]
|
|
||||||
# Container image service.
|
|
||||||
#
|
|
||||||
# Offload the CRI image management service to the Kata agent.
|
|
||||||
# (default: false)
|
|
||||||
#service_offload = true
|
|
||||||
|
|
||||||
# Container image decryption keys provisioning.
|
|
||||||
# Applies only if service_offload is true.
|
|
||||||
# Keys can be provisioned locally (e.g. through a special command or
|
|
||||||
# a local file) or remotely (usually after the guest is remotely attested).
|
|
||||||
# The provision setting is a complete URL that lets the Kata agent decide
|
|
||||||
# which method to use in order to fetch the keys.
|
|
||||||
#
|
|
||||||
# Keys can be stored in a local file, in a measured and attested initrd:
|
|
||||||
#provision=data:///local/key/file
|
|
||||||
#
|
|
||||||
# Keys could be fetched through a special command or binary from the
|
|
||||||
# initrd (guest) image, e.g. a firmware call:
|
|
||||||
#provision=file:///path/to/bin/fetcher/in/guest
|
|
||||||
#
|
|
||||||
# Keys can be remotely provisioned. The Kata agent fetches them from e.g.
|
|
||||||
# a HTTPS URL:
|
|
||||||
#provision=https://my-key-broker.foo/tenant/<tenant-id>
|
|
||||||
|
@ -652,30 +652,3 @@ experimental=@DEFAULTEXPFEATURES@
|
|||||||
# (https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet/#:~:text=runtime%2Drequest%2Dtimeout) and create_container_timeout.
|
# (https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet/#:~:text=runtime%2Drequest%2Dtimeout) and create_container_timeout.
|
||||||
# In essence, the timeout used for guest pull=runtime-request-timeout<create_container_timeout?runtime-request-timeout:create_container_timeout.
|
# In essence, the timeout used for guest pull=runtime-request-timeout<create_container_timeout?runtime-request-timeout:create_container_timeout.
|
||||||
create_container_timeout = @DEFCREATECONTAINERTIMEOUT@
|
create_container_timeout = @DEFCREATECONTAINERTIMEOUT@
|
||||||
|
|
||||||
# WARNING: All the options in the following section have not been implemented yet.
|
|
||||||
# This section was added as a placeholder. DO NOT USE IT!
|
|
||||||
[image]
|
|
||||||
# Container image service.
|
|
||||||
#
|
|
||||||
# Offload the CRI image management service to the Kata agent.
|
|
||||||
# (default: false)
|
|
||||||
service_offload = @DEFSERVICEOFFLOAD@
|
|
||||||
|
|
||||||
# Container image decryption keys provisioning.
|
|
||||||
# Applies only if service_offload is true.
|
|
||||||
# Keys can be provisioned locally (e.g. through a special command or
|
|
||||||
# a local file) or remotely (usually after the guest is remotely attested).
|
|
||||||
# The provision setting is a complete URL that lets the Kata agent decide
|
|
||||||
# which method to use in order to fetch the keys.
|
|
||||||
#
|
|
||||||
# Keys can be stored in a local file, in a measured and attested initrd:
|
|
||||||
#provision=data:///local/key/file
|
|
||||||
#
|
|
||||||
# Keys could be fetched through a special command or binary from the
|
|
||||||
# initrd (guest) image, e.g. a firmware call:
|
|
||||||
#provision=file:///path/to/bin/fetcher/in/guest
|
|
||||||
#
|
|
||||||
# Keys can be remotely provisioned. The Kata agent fetches them from e.g.
|
|
||||||
# a HTTPS URL:
|
|
||||||
#provision=https://my-key-broker.foo/tenant/<tenant-id>
|
|
||||||
|
@ -630,30 +630,3 @@ experimental=@DEFAULTEXPFEATURES@
|
|||||||
# (https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet/#:~:text=runtime%2Drequest%2Dtimeout) and create_container_timeout.
|
# (https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet/#:~:text=runtime%2Drequest%2Dtimeout) and create_container_timeout.
|
||||||
# In essence, the timeout used for guest pull=runtime-request-timeout<create_container_timeout?runtime-request-timeout:create_container_timeout.
|
# In essence, the timeout used for guest pull=runtime-request-timeout<create_container_timeout?runtime-request-timeout:create_container_timeout.
|
||||||
create_container_timeout = @DEFCREATECONTAINERTIMEOUT@
|
create_container_timeout = @DEFCREATECONTAINERTIMEOUT@
|
||||||
|
|
||||||
# WARNING: All the options in the following section have not been implemented yet.
|
|
||||||
# This section was added as a placeholder. DO NOT USE IT!
|
|
||||||
[image]
|
|
||||||
# Container image service.
|
|
||||||
#
|
|
||||||
# Offload the CRI image management service to the Kata agent.
|
|
||||||
# (default: false)
|
|
||||||
service_offload = @DEFSERVICEOFFLOAD@
|
|
||||||
|
|
||||||
# Container image decryption keys provisioning.
|
|
||||||
# Applies only if service_offload is true.
|
|
||||||
# Keys can be provisioned locally (e.g. through a special command or
|
|
||||||
# a local file) or remotely (usually after the guest is remotely attested).
|
|
||||||
# The provision setting is a complete URL that lets the Kata agent decide
|
|
||||||
# which method to use in order to fetch the keys.
|
|
||||||
#
|
|
||||||
# Keys can be stored in a local file, in a measured and attested initrd:
|
|
||||||
#provision=data:///local/key/file
|
|
||||||
#
|
|
||||||
# Keys could be fetched through a special command or binary from the
|
|
||||||
# initrd (guest) image, e.g. a firmware call:
|
|
||||||
#provision=file:///path/to/bin/fetcher/in/guest
|
|
||||||
#
|
|
||||||
# Keys can be remotely provisioned. The Kata agent fetches them from e.g.
|
|
||||||
# a HTTPS URL:
|
|
||||||
#provision=https://my-key-broker.foo/tenant/<tenant-id>
|
|
||||||
|
@ -670,30 +670,3 @@ experimental=@DEFAULTEXPFEATURES@
|
|||||||
# (https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet/#:~:text=runtime%2Drequest%2Dtimeout) and create_container_timeout.
|
# (https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet/#:~:text=runtime%2Drequest%2Dtimeout) and create_container_timeout.
|
||||||
# In essence, the timeout used for guest pull=runtime-request-timeout<create_container_timeout?runtime-request-timeout:create_container_timeout.
|
# In essence, the timeout used for guest pull=runtime-request-timeout<create_container_timeout?runtime-request-timeout:create_container_timeout.
|
||||||
create_container_timeout = @DEFCREATECONTAINERTIMEOUT@
|
create_container_timeout = @DEFCREATECONTAINERTIMEOUT@
|
||||||
|
|
||||||
# WARNING: All the options in the following section have not been implemented yet.
|
|
||||||
# This section was added as a placeholder. DO NOT USE IT!
|
|
||||||
[image]
|
|
||||||
# Container image service.
|
|
||||||
#
|
|
||||||
# Offload the CRI image management service to the Kata agent.
|
|
||||||
# (default: false)
|
|
||||||
#service_offload = true
|
|
||||||
|
|
||||||
# Container image decryption keys provisioning.
|
|
||||||
# Applies only if service_offload is true.
|
|
||||||
# Keys can be provisioned locally (e.g. through a special command or
|
|
||||||
# a local file) or remotely (usually after the guest is remotely attested).
|
|
||||||
# The provision setting is a complete URL that lets the Kata agent decide
|
|
||||||
# which method to use in order to fetch the keys.
|
|
||||||
#
|
|
||||||
# Keys can be stored in a local file, in a measured and attested initrd:
|
|
||||||
#provision=data:///local/key/file
|
|
||||||
#
|
|
||||||
# Keys could be fetched through a special command or binary from the
|
|
||||||
# initrd (guest) image, e.g. a firmware call:
|
|
||||||
#provision=file:///path/to/bin/fetcher/in/guest
|
|
||||||
#
|
|
||||||
# Keys can be remotely provisioned. The Kata agent fetches them from e.g.
|
|
||||||
# a HTTPS URL:
|
|
||||||
#provision=https://my-key-broker.foo/tenant/<tenant-id>
|
|
||||||
|
@ -666,30 +666,3 @@ experimental=@DEFAULTEXPFEATURES@
|
|||||||
# (https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet/#:~:text=runtime%2Drequest%2Dtimeout) and create_container_timeout.
|
# (https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet/#:~:text=runtime%2Drequest%2Dtimeout) and create_container_timeout.
|
||||||
# In essence, the timeout used for guest pull=runtime-request-timeout<create_container_timeout?runtime-request-timeout:create_container_timeout.
|
# In essence, the timeout used for guest pull=runtime-request-timeout<create_container_timeout?runtime-request-timeout:create_container_timeout.
|
||||||
create_container_timeout = @DEFCREATECONTAINERTIMEOUT@
|
create_container_timeout = @DEFCREATECONTAINERTIMEOUT@
|
||||||
|
|
||||||
# WARNING: All the options in the following section have not been implemented yet.
|
|
||||||
# This section was added as a placeholder. DO NOT USE IT!
|
|
||||||
[image]
|
|
||||||
# Container image service.
|
|
||||||
#
|
|
||||||
# Offload the CRI image management service to the Kata agent.
|
|
||||||
# (default: false)
|
|
||||||
#service_offload = true
|
|
||||||
|
|
||||||
# Container image decryption keys provisioning.
|
|
||||||
# Applies only if service_offload is true.
|
|
||||||
# Keys can be provisioned locally (e.g. through a special command or
|
|
||||||
# a local file) or remotely (usually after the guest is remotely attested).
|
|
||||||
# The provision setting is a complete URL that lets the Kata agent decide
|
|
||||||
# which method to use in order to fetch the keys.
|
|
||||||
#
|
|
||||||
# Keys can be stored in a local file, in a measured and attested initrd:
|
|
||||||
#provision=data:///local/key/file
|
|
||||||
#
|
|
||||||
# Keys could be fetched through a special command or binary from the
|
|
||||||
# initrd (guest) image, e.g. a firmware call:
|
|
||||||
#provision=file:///path/to/bin/fetcher/in/guest
|
|
||||||
#
|
|
||||||
# Keys can be remotely provisioned. The Kata agent fetches them from e.g.
|
|
||||||
# a HTTPS URL:
|
|
||||||
#provision=https://my-key-broker.foo/tenant/<tenant-id>
|
|
||||||
|
@ -699,30 +699,3 @@ experimental=@DEFAULTEXPFEATURES@
|
|||||||
# (https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet/#:~:text=runtime%2Drequest%2Dtimeout) and create_container_timeout.
|
# (https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet/#:~:text=runtime%2Drequest%2Dtimeout) and create_container_timeout.
|
||||||
# In essence, the timeout used for guest pull=runtime-request-timeout<create_container_timeout?runtime-request-timeout:create_container_timeout.
|
# In essence, the timeout used for guest pull=runtime-request-timeout<create_container_timeout?runtime-request-timeout:create_container_timeout.
|
||||||
create_container_timeout = @DEFCREATECONTAINERTIMEOUT@
|
create_container_timeout = @DEFCREATECONTAINERTIMEOUT@
|
||||||
|
|
||||||
# WARNING: All the options in the following section have not been implemented yet.
|
|
||||||
# This section was added as a placeholder. DO NOT USE IT!
|
|
||||||
[image]
|
|
||||||
# Container image service.
|
|
||||||
#
|
|
||||||
# Offload the CRI image management service to the Kata agent.
|
|
||||||
# (default: false)
|
|
||||||
#service_offload = true
|
|
||||||
|
|
||||||
# Container image decryption keys provisioning.
|
|
||||||
# Applies only if service_offload is true.
|
|
||||||
# Keys can be provisioned locally (e.g. through a special command or
|
|
||||||
# a local file) or remotely (usually after the guest is remotely attested).
|
|
||||||
# The provision setting is a complete URL that lets the Kata agent decide
|
|
||||||
# which method to use in order to fetch the keys.
|
|
||||||
#
|
|
||||||
# Keys can be stored in a local file, in a measured and attested initrd:
|
|
||||||
#provision=data:///local/key/file
|
|
||||||
#
|
|
||||||
# Keys could be fetched through a special command or binary from the
|
|
||||||
# initrd (guest) image, e.g. a firmware call:
|
|
||||||
#provision=file:///path/to/bin/fetcher/in/guest
|
|
||||||
#
|
|
||||||
# Keys can be remotely provisioned. The Kata agent fetches them from e.g.
|
|
||||||
# a HTTPS URL:
|
|
||||||
#provision=https://my-key-broker.foo/tenant/<tenant-id>
|
|
||||||
|
@ -296,31 +296,3 @@ experimental=@DEFAULTEXPFEATURES@
|
|||||||
# (https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet/#:~:text=runtime%2Drequest%2Dtimeout) and create_container_timeout.
|
# (https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet/#:~:text=runtime%2Drequest%2Dtimeout) and create_container_timeout.
|
||||||
# In essence, the timeout used for guest pull=runtime-request-timeout<create_container_timeout?runtime-request-timeout:create_container_timeout.
|
# In essence, the timeout used for guest pull=runtime-request-timeout<create_container_timeout?runtime-request-timeout:create_container_timeout.
|
||||||
create_container_timeout = @DEFCREATECONTAINERTIMEOUT@
|
create_container_timeout = @DEFCREATECONTAINERTIMEOUT@
|
||||||
|
|
||||||
# WARNING: All the options in the following section have not been implemented yet.
|
|
||||||
# This section was added as a placeholder. DO NOT USE IT!
|
|
||||||
[image]
|
|
||||||
# Container image service.
|
|
||||||
#
|
|
||||||
# Offload the CRI image management service to the Kata agent.
|
|
||||||
# (default: false)
|
|
||||||
# Note: The remote hypervisor offloads the pulling on images on the peer pod VM, so requries this to be true
|
|
||||||
service_offload = true
|
|
||||||
|
|
||||||
# Container image decryption keys provisioning.
|
|
||||||
# Applies only if service_offload is true.
|
|
||||||
# Keys can be provisioned locally (e.g. through a special command or
|
|
||||||
# a local file) or remotely (usually after the guest is remotely attested).
|
|
||||||
# The provision setting is a complete URL that lets the Kata agent decide
|
|
||||||
# which method to use in order to fetch the keys.
|
|
||||||
#
|
|
||||||
# Keys can be stored in a local file, in a measured and attested initrd:
|
|
||||||
#provision=data:///local/key/file
|
|
||||||
#
|
|
||||||
# Keys could be fetched through a special command or binary from the
|
|
||||||
# initrd (guest) image, e.g. a firmware call:
|
|
||||||
#provision=file:///path/to/bin/fetcher/in/guest
|
|
||||||
#
|
|
||||||
# Keys can be remotely provisioned. The Kata agent fetches them from e.g.
|
|
||||||
# a HTTPS URL:
|
|
||||||
#provision=https://my-key-broker.foo/tenant/<tenant-id>
|
|
||||||
|
@ -64,16 +64,10 @@ const (
|
|||||||
type tomlConfig struct {
|
type tomlConfig struct {
|
||||||
Hypervisor map[string]hypervisor
|
Hypervisor map[string]hypervisor
|
||||||
Agent map[string]agent
|
Agent map[string]agent
|
||||||
Image image
|
|
||||||
Factory factory
|
Factory factory
|
||||||
Runtime runtime
|
Runtime runtime
|
||||||
}
|
}
|
||||||
|
|
||||||
type image struct {
|
|
||||||
Provision string `toml:"provision"`
|
|
||||||
ServiceOffload bool `toml:"service_offload"`
|
|
||||||
}
|
|
||||||
|
|
||||||
type factory struct {
|
type factory struct {
|
||||||
TemplatePath string `toml:"template_path"`
|
TemplatePath string `toml:"template_path"`
|
||||||
VMCacheEndpoint string `toml:"vm_cache_endpoint"`
|
VMCacheEndpoint string `toml:"vm_cache_endpoint"`
|
||||||
|
@ -26,7 +26,6 @@ EXTRA_OPTS="${EXTRA_OPTS:-""}"
|
|||||||
|
|
||||||
[ "${CROSS_BUILD}" == "true" ] && container_image_bk="${container_image}" && container_image="${container_image}-cross-build"
|
[ "${CROSS_BUILD}" == "true" ] && container_image_bk="${container_image}" && container_image="${container_image}-cross-build"
|
||||||
if [ "${MEASURED_ROOTFS}" == "yes" ]; then
|
if [ "${MEASURED_ROOTFS}" == "yes" ]; then
|
||||||
EXTRA_OPTS+=" DEFSERVICEOFFLOAD=true"
|
|
||||||
info "Enable rootfs measurement config"
|
info "Enable rootfs measurement config"
|
||||||
|
|
||||||
root_hash_file="${repo_root_dir}/tools/osbuilder/root_hash.txt"
|
root_hash_file="${repo_root_dir}/tools/osbuilder/root_hash.txt"
|
||||||
|
Loading…
Reference in New Issue
Block a user