|
1 | 1 | %global runtime_make_vars DEFMEMSZ=256 \\\ |
2 | | - DEFSHAREDFS_CLH_SNP_VIRTIOFS=none \\\ |
3 | 2 | DEFSTATICSANDBOXWORKLOADMEM=1792 \\\ |
| 3 | + DEFSNPGUEST=true \\\ |
4 | 4 | SKIP_GO_VERSION_CHECK=1 |
5 | 5 |
|
6 | 6 | %global agent_make_vars LIBC=gnu \\\ |
|
9 | 9 | %global debug_package %{nil} |
10 | 10 |
|
11 | 11 | Name: kata-containers-cc |
12 | | -Version: 0.6.3 |
13 | | -Release: 4%{?dist} |
| 12 | +Version: 3.2.0.azl0 |
| 13 | +Release: 1%{?dist} |
14 | 14 | Summary: Kata Confidential Containers package developed for Confidential Containers on AKS |
15 | 15 | License: ASL 2.0 |
16 | 16 | Vendor: Microsoft Corporation |
17 | 17 | URL: https://github.com/microsoft/kata-containers |
18 | | -Source0: https://github.com/microsoft/kata-containers/archive/refs/tags/cc-%{version}.tar.gz#/%{name}-%{version}.tar.gz |
19 | | -Source1: https://github.com/microsoft/kata-containers/archive/refs/tags/%{name}-%{version}.tar.gz |
20 | | -Source2: %{name}-%{version}-cargo.tar.gz |
21 | | -Source3: mariner-coco-build-uvm.sh |
| 18 | +Source0: https://github.com/microsoft/kata-containers/archive/refs/tags/%{version}.tar.gz#/%{name}-%{version}.tar.gz |
| 19 | +Source1: %{name}-%{version}-cargo.tar.gz |
| 20 | +Source2: mariner-coco-build-uvm.sh |
22 | 21 |
|
23 | 22 | ExclusiveArch: x86_64 |
24 | 23 |
|
@@ -70,7 +69,7 @@ This package contains the the tooling and files required to build the UVM |
70 | 69 | %prep |
71 | 70 | %autosetup -p1 -n %{name}-%{version} |
72 | 71 | pushd %{_builddir}/%{name}-%{version} |
73 | | -tar -xf %{SOURCE2} |
| 72 | +tar -xf %{SOURCE1} |
74 | 73 | popd |
75 | 74 |
|
76 | 75 | %build |
@@ -138,7 +137,7 @@ pushd %{_builddir}/%{name}-%{version} |
138 | 137 | rm tools/osbuilder/.gitignore |
139 | 138 | rm tools/osbuilder/rootfs-builder/.gitignore |
140 | 139 |
|
141 | | -install -D -m 0755 %{SOURCE3} %{buildroot}%{osbuilder}/mariner-coco-build-uvm.sh |
| 140 | +install -D -m 0755 %{SOURCE2} %{buildroot}%{osbuilder}/mariner-coco-build-uvm.sh |
142 | 141 | install -D -m 0644 VERSION %{buildroot}%{osbuilder}/VERSION |
143 | 142 | install -D -m 0644 ci/install_yq.sh %{buildroot}%{osbuilder}/ci/install_yq.sh |
144 | 143 | install -D -m 0644 versions.yaml %{buildroot}%{osbuilder}/versions.yaml |
@@ -185,14 +184,27 @@ install -D -m 0755 kata-monitor %{buildroot}%{coco_bin}/kata-monitor |
185 | 184 | install -D -m 0755 kata-runtime %{buildroot}%{coco_bin}/kata-runtime |
186 | 185 | install -D -m 0755 data/kata-collect-data.sh %{buildroot}%{coco_bin}/kata-collect-data.sh |
187 | 186 |
|
188 | | -# Note: we deploy two configurations - the additional one is for policy/snapshotter testing w/o SEV SNP or IGVM |
189 | | -install -D -m 0644 config/configuration-clh.toml %{buildroot}/%{defaults_kata}/configuration-clh.toml |
| 187 | +# We deploy 3 configurations: |
| 188 | +# configuration-clh-snp: production Kata-CC - IGVM & image, confidential_guest=true, sev_snp_guest=true |
| 189 | +# configuration-clh-snp-debug: debug Kata-CC - kernel & image, confidential_guest=true, sev_snp_guest=false |
| 190 | +# configuration-clh (symlinked to by configuration.toml): vanilla Kata - kernel & initrd, confidential_guest=false, sev_snp_guest=false |
190 | 191 | install -D -m 0644 config/configuration-clh-snp.toml %{buildroot}/%{defaults_kata}/configuration-clh-snp.toml |
| 192 | +install -D -m 0644 config/configuration-clh.toml %{buildroot}/%{defaults_kata}/configuration-clh-snp-debug.toml |
| 193 | +install -D -m 0644 config/configuration-clh.toml %{buildroot}/%{defaults_kata}/configuration-clh.toml |
191 | 194 |
|
192 | | -# adapt upstream config files |
193 | | -# change paths with locations specific to our distribution |
194 | | -sed -i 's|/usr|/opt/confidential-containers|g' %{buildroot}/%{defaults_kata}/configuration-clh.toml |
195 | | -sed -i 's|/usr|/opt/confidential-containers|g' %{buildroot}/%{defaults_kata}/configuration-clh-snp.toml |
| 195 | +# Adapt configuration files: |
| 196 | +# - Change paths with locations specific to our distribution. |
| 197 | +sed --follow-symlinks -i 's|/usr|/opt/confidential-containers|g' %{buildroot}/%{defaults_kata}/configuration-clh*.toml |
| 198 | +# - Set up configuration-clh-snp-debug. Note that kernel and image are already |
| 199 | +# set through configuration-clh.toml.in. |
| 200 | +sed -i 's|-igvm.img|-igvm-debug.img|g' %{buildroot}/%{defaults_kata}/configuration-clh-snp-debug.toml |
| 201 | +sed -i '/^#confidential_guest =/s|^#||g' %{buildroot}/%{defaults_kata}/configuration-clh-snp-debug.toml |
| 202 | +sed -i '/^#enable_debug =/s|^#||g' %{buildroot}/%{defaults_kata}/configuration-clh-snp-debug.toml |
| 203 | +sed -i '/^#debug_console_enabled =/s|^#||g' %{buildroot}/%{defaults_kata}/configuration-clh-snp-debug.toml |
| 204 | +sed -i 's|shared_fs = "virtio-fs"|shared_fs = "none"|g' %{buildroot}/%{defaults_kata}/configuration-clh-snp-debug.toml |
| 205 | +# - Set up configuration-clh. |
| 206 | +sed -i '/^#initrd =/s|^#||g' %{buildroot}/%{defaults_kata}/configuration-clh.toml |
| 207 | +sed -i '/^image =/s|^|#|g' %{buildroot}/%{defaults_kata}/configuration-clh.toml |
196 | 208 | popd |
197 | 209 |
|
198 | 210 | # tardev-snapshotter |
@@ -275,8 +287,11 @@ install -D -m 0755 %{_builddir}/%{name}-%{version}/tools/osbuilder/image-builder |
275 | 287 | %exclude %{osbuilder}/tools/osbuilder/rootfs-builder/ubuntu |
276 | 288 |
|
277 | 289 | %changelog |
278 | | -* Fri Feb 02 2024 CBL-Mariner Servicing Account <cblmargh@microsoft.com> - 0.6.3-4 |
279 | | -- Bump release to rebuild with go 1.21.6 |
| 290 | +* Mon Feb 12 2024 Aurelien Bombo <abombo@microsoft.com> - 3.2.0.azl0-1 |
| 291 | +- Use Microsoft sources based on upstream Kata version 3.2.0. |
| 292 | + |
| 293 | +* Fri Feb 02 2024 CBL-Mariner Servicing Account <cblmargh@microsoft.com> - 0.6.3-4 |
| 294 | +- Bump release to rebuild with go 1.21.6 |
280 | 295 |
|
281 | 296 | * Tue Jan 30 2024 Archana Choudhary <archana1@microsoft.com> - 0.6.3-3 |
282 | 297 | - Remove kernel-uvm-cvm(-devel) dependency |
|
0 commit comments