-
Notifications
You must be signed in to change notification settings - Fork 99
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
🌱 Run enclave-cc
on Kairos
#1114
Comments
The installation instructions fail on this step: https://github.com/confidential-containers/operator/blob/main/docs/INSTALL.md#create-custom-resource-cr I'm using a k3d cluster and when the
I think it has to do with this script trying to run systemctl: https://github.com/confidential-containers/operator/blob/a0fbbf40ad0848aee6c9ed90fbf7d001e50396c4/install/pre-install-payload/scripts/container-engine-for-cc-deploy.sh#L55 the failing container is running with:
so I don't see how this could be a permissions issue. |
The Pod assumes which is not the case for the k3d container. |
I'd suggest to try on a real cluster with kairos and k3s as assumes you have services running, you might hit several limitations along the way with k3d that might block you differently |
From the script you are linking: https://github.com/confidential-containers/operator/blob/a0fbbf40ad0848aee6c9ed90fbf7d001e50396c4/install/pre-install-payload/scripts/container-engine-for-cc-deploy.sh#LL48C8-L48C36 I'm assuming we should also add that |
I switched to a kairos cluster. This is the next error:
|
K3s is containerd based: https://docs.k3s.io/advanced#using-docker-as-the-container-runtime |
I think the issue is it tries to restart a service and gives for guaranteed there is one. maybe we can slightly adapt their script to work on k3s? |
After inspecting how the operator installs the needed binaries, we came up with this plan (cc @mudler ):
|
Some notes for manual steps so far:
|
There is one part of the k3s containerd config that we copy which makes the custom containerd break:
(if I remove this from Some usefule links:
What I don't understand is how can it be that k3s kubelet flags don't match the config k3s generated (which is the one we copied). Maybe when we set |
@mauromorales let's remember that forcing the systemd cgroup driver might not work on alpine: https://kubernetes.io/docs/setup/production-environment/container-runtimes/#systemd-cgroup-driver
|
I summarized all the steps to reproduce what we achieved so far: Steps to deploy coco on kairos
The enclave-cc bundle is built from this directory: https://github.com/kairos-io/community-bundles/tree/1114-enclave-cc/coco
(We need to package it an ship it)
(wait until they are all running:
|
Will wait for feedback from the enclave-cc team and if all is ok, will document this and close the issue. |
Fixes #1114 Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Add instructions on how to use the `coco` bundle Fixes #1114 Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me> * Address PR comments Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me> --------- Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
https://github.com/confidential-containers/enclave-cc
Acceptance criteria
Useful docs links:
The text was updated successfully, but these errors were encountered: