Merge pull request #3788 from fidencio/wip/update-clh-confidential-guest-comments

Update `confidential_guest` comments
This commit is contained in:
GabyCT 2022-02-28 15:11:01 -06:00 committed by GitHub
commit ccb063b848
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 8 additions and 3 deletions

View File

@ -19,7 +19,8 @@ image = "@IMAGEPATH@"
# Toggling that setting may trigger different hardware features, ranging # Toggling that setting may trigger different hardware features, ranging
# from memory encryption to both memory and CPU-state encryption and integrity. # from memory encryption to both memory and CPU-state encryption and integrity.
# The Kata Containers runtime dynamically detects the available feature set and # The Kata Containers runtime dynamically detects the available feature set and
# aims at enabling the largest possible one. # aims at enabling the largest possible one, returning an error if none is
# available, or none is supported by the hypervisor.
# #
# Known limitations: # Known limitations:
# * Does not work by design: # * Does not work by design:
@ -28,6 +29,9 @@ image = "@IMAGEPATH@"
# - Memory Hotplug # - Memory Hotplug
# - NVDIMM devices # - NVDIMM devices
# #
# Supported TEEs:
# * Intel TDX
#
# Default false # Default false
# confidential_guest = true # confidential_guest = true
@ -37,7 +41,7 @@ image = "@IMAGEPATH@"
# #
# For more information about firmwared that can be used with specific TEEs, # For more information about firmwared that can be used with specific TEEs,
# please, refer to: # please, refer to:
# * TDX: # * Intel TDX:
# - td-shim: https://github.com/confidential-containers/td-shim # - td-shim: https://github.com/confidential-containers/td-shim
# #
# firmware = "@FIRMWAREPATH@" # firmware = "@FIRMWAREPATH@"

View File

@ -20,7 +20,8 @@ machine_type = "@MACHINETYPE@"
# Toggling that setting may trigger different hardware features, ranging # Toggling that setting may trigger different hardware features, ranging
# from memory encryption to both memory and CPU-state encryption and integrity. # from memory encryption to both memory and CPU-state encryption and integrity.
# The Kata Containers runtime dynamically detects the available feature set and # The Kata Containers runtime dynamically detects the available feature set and
# aims at enabling the largest possible one. # aims at enabling the largest possible one, returning an error if none is
# available, or none is supported by the hypervisor.
# #
# Known limitations: # Known limitations:
# * Does not work by design: # * Does not work by design: