Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

gcloud: Enable SEV_SNP_CAPABLE #3547

Merged
merged 1 commit into from
Jul 27, 2023
Merged

Conversation

@cgwalters
Copy link
Member

It looks to me like this isn't present for the traditional RHEL images: https://github.com/osbuild/osbuild-composer/blob/2e7afcffe15adc5ca0f99c1a9ee39a5eca9456a4/internal/cloud/gcp/compute.go#L22

Should we fix that there too?

@cgwalters
Copy link
Member

/approve

@travier
Copy link
Member Author

travier commented Jul 26, 2023

It looks to me like this isn't present for the traditional RHEL images: osbuild/osbuild-composer@2e7afcf/internal/cloud/gcp/compute.go#L22

Should we fix that there too?

Yes, we'll have to do it there too.

@travier
Copy link
Member Author

travier commented Jul 26, 2023

Jul 26 11:01:17 qemu0 kola-runext-validate-symlinks[15260]: + fatal 'Error: /etc/pki/tls/fips_local.cnf symlink to /etc/crypto-policies/back-ends/openssl_fips.config which does not exist'
Jul 26 11:01:17 qemu0 kola-runext-validate-symlinks[15260]: + echo 'Error: /etc/pki/tls/fips_local.cnf symlink to /etc/crypto-policies/back-ends/openssl_fips.config which does not exist'
Jul 26 11:01:17 qemu0 kola-runext-validate-symlinks[15260]: Error: /etc/pki/tls/fips_local.cnf symlink to /etc/crypto-policies/back-ends/openssl_fips.config which does not exist

Seems unrelated. Wondering where this comes from.

Edit: Found in openshift/os#1328 as well.

PR: coreos/fedora-coreos-config#2525

@travier
Copy link
Member Author

travier commented Jul 27, 2023

/retest

@travier
Copy link
Member Author

travier commented Jul 27, 2023

osbuild-composer PR in osbuild/osbuild-composer#3579

@travier travier merged commit 74c6108 into coreos:main Jul 27, 2023
@travier travier deleted the gcloud-sev-snp-capable branch July 27, 2023 11:08
@dustymabe
Copy link
Member

Hmm. We added support for confidential compute stuff to kola in #3474 and added tests for confidential compute VMs in coreos/fedora-coreos-tracker#1202 (comment). Was any of that wrong or unnecessary?

@travier
Copy link
Member Author

travier commented Jul 28, 2023

All the previous work is still valid. This change adds another Guest OS Feature for GCP images to let them run on a newer type of hardware (AMD SEV-SNP) that is "more confidential" than the previous one (AMD SEV only).

The blog post has the details of the differences between the SEV and SEV-SNP VM types: https://cloud.google.com/blog/products/identity-security/rsa-snp-vm-more-confidential

@dustymabe
Copy link
Member

Can you add a test that runs against the new instance type in the pipeline so we can confirm that it's working?

@travier
Copy link
Member Author

travier commented Jul 28, 2023

This is a private preview right now so we likely won't be able to do that in our pipeline yet but I'll file an issue to track this.

Edit: coreos/fedora-coreos-tracker#1531

@dustymabe
Copy link
Member

This is a private preview right now so we likely won't be able to do that in our pipeline yet but I'll file an issue to track this.

Edit: coreos/fedora-coreos-tracker#1531

Sounds good. We can add the test and test it with an account that does have access and then snooze the test for 6 months or so (and re-snooze later if it's still not public in 6 months).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants