Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

k8s: remove token signer from k8s config #654

Merged
merged 1 commit into from
Jan 7, 2025

Conversation

fitzthum
Copy link
Member

@fitzthum fitzthum commented Jan 7, 2025

The Kata CI does not setup the attestation token signing keys. This causes the KBS to break when we bump the repo version and pick up this new config which had the signing key specified.

In the future we can change the CI to setup the signing keys (although we are already testing this in our Makefile test), but for now let's stick with the existing behavior.

The Kata CI does not setup the attestation token signing keys. This
causes the KBS to break when we bump the repo version and pick up this
new config which had the signing key specified.

In the future we can change the CI to setup the signing keys (although
we are already testing this in our Makefile test), but for now let's
stick with the existing behavior.

Signed-off-by: Tobin Feldman-Fitzthum <[email protected]>
Copy link
Member

@fidencio fidencio left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm, thanks @fitzthum!

@fitzthum fitzthum merged commit cc57384 into confidential-containers:main Jan 7, 2025
21 checks passed
@mythi
Copy link
Contributor

mythi commented Jan 8, 2025

The Kata CI does not setup the attestation token signing keys

perhaps we should have some simple kind based k8s deployment tests similar to kbs-docker-e2e.yml to check the kubernetes setup works too. WDYT?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants