You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: quick-start-guides/Foundational & Workload Security - Containerization.md
+9-19
Original file line number
Diff line number
Diff line change
@@ -380,33 +380,23 @@ systemctl restart docker
380
380
* On each worker node with `TXT/BTG` enabled and registered to K8s control-plane, the following pre-req needs to be done on `RHEL-8.3`/`Ubuntu-18.04` systems
381
381
382
382
* Foundational Security
383
-
383
+
384
+
*`Tboot-1.10.1` or later to be installed for non `SUEFI` servers. [Tboot installation Details](https://github.com/intel-secl/docs/blob/master/product-guides/Foundational%20%26%20Workload%20Security.md#tboot-installation)
385
+
384
386
* Only for `Ubuntu-18.04`, run the following commands
385
-
387
+
386
388
```shell
387
389
$ modprobe msr
388
390
```
391
+
389
392
* Workload Security
390
-
* Container Confidentiality with Docker runtime
391
-
* Copy `container-runtime` directory to each of the `TXT/BTG` enabled physical servers
392
-
393
-
* Run the `install-prereqs-docker.sh` script on the physical servers from `container-runtime`
394
-
395
-
>**Note:**`container-runtime` scripts need to be run on `TXT/BTG/SUEFI` enabled services
396
-
397
-
* Reboot the server
398
-
399
-
* Only for`Ubuntu-18.04`, run the following command
400
-
401
-
```shell
402
-
$ modprobe msr
403
-
```
404
-
405
393
* Container Confidentiality with CRIO runtime
406
394
407
-
* Copy `container-runtime` directory to each of the `TXT/BTG` enabled physical servers
395
+
*`Tboot-1.10.1` or later to be installed for non `SUEFI` servers. [Tboot installation Details](https://github.com/intel-secl/docs/blob/master/product-guides/Foundational%20%26%20Workload%20Security.md#tboot-installation)
396
+
397
+
* Copy `container-runtime` directory to each of the physical servers
408
398
409
-
* Run the `install-prereqs-crio.sh` script on the physical servers from `container-runtime`
399
+
* Run the `install-prereqs-crio.sh` script on the physical servers from `container-runtime`
410
400
411
401
>**Note:**`container-runtime` scripts need to be run on `TXT/BTG/SUEFI` enabled services
If the Trusted Platform Module(TPM) is already owned, the owner secret(SRK) can be provided directly during runtime in the playbook:
437
+
Tboot needs to be built by the user from tboot source and the `tboot.gz` & `tboot-syms` files needs to be copied under the `binaries` folder. The supported version of Tboot as of 4.0 release is `tboot-1.10.1`.The options must then be provided during runtime in the playbook:
435
438
436
439
```shell
437
440
ansible-playbook <playbook-name> \
438
441
--extra-vars setup=<setup var from supported usecases> \
439
442
--extra-vars binaries_path=<path where built binaries are copied to> \
440
-
--extra-vars tpm_secret=<tpm owner secret>
443
+
--extra-vars tboot_gz_file=<path where built binaries are copied to>/tboot.gz
444
+
--extra-vars tboot_syms_file=<path where built binaries are copied to>/tboot-syms
441
445
```
442
-
or
443
446
444
-
Update the following vars in `vars/main.yml`
447
+
or
448
+
449
+
Update the following in `vars/main.yml`
445
450
446
451
```yaml
447
452
# The TPM Storage Root Key(SRK) Password to be used if TPM is already owned
448
-
tpm_owner_secret: <tpm_secret>
453
+
tboot_gz_file: "<binaries_path>/tboot.gz"
454
+
tboot_syms_file: "<binaries_path>/tboot-syms"
449
455
```
450
456
451
-
#### GRUB Default option for Booting into MLE
452
-
453
-
The grub2_default option would vary from OEM to OEM for booting after installing tboot. The grub option to be selected for booting into TBOOT/MLE mode, use `grubby --info <option:0/1...>` to determine which one has no boot menu assigned to it during runtime in the playbook as below. Default is 3.
457
+
#### TPM is already owned
454
458
455
-
> **NOTE:** This is not required in case of UEFI Secure boot mode
459
+
If the Trusted Platform Module(TPM) is already owned, the owner secret(SRK) can be provided directly during runtime in the playbook:
456
460
457
461
```shell
458
462
ansible-playbook <playbook-name> \
459
463
--extra-vars setup=<setup var from supported usecases> \
460
464
--extra-vars binaries_path=<path where built binaries are copied to> \
0 commit comments