-
Notifications
You must be signed in to change notification settings - Fork 42
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Future direction of Graphene Shielded Containers #13
Comments
Some thoughts on this list, coming from January 2021 (after GSC rework): GSC uses insecure environment variablesThis is not even true. GSC doesn't do anything about environment variables (which is a bug). in Graphene, there must be one of the following manifest options: This means that the final Graphenized Docker image created by GSC has no environment variables other than hard-coded Refactor testsGSC has a |
gramineproject/graphene#2195 -- secure environment variables were added to GSC. |
Does GSC support remote attestation? Can we convert gramine shielded container images to oci compliant and run using cri-o/containerd apart from docker? |
Yes, you can look at this pending PR on how it can be done: #11. At some point, we'll merge this PR as an example in GSC.
There is no such tooling in GSC currently. Note that GSC itself creates a normal Docker image. So if there are some tools to make normal Docker images OCI compliant, then one can use such tools. (I'll be honest, I don't know much about the exact details of what "OCI compliant" means, so I may be wrong in my comment.) |
FWIW, I've run GSC images using both |
Thats awesome, thanks |
Is there a way, where can we use container images based out of image other than ubuntu as base image. I see limitation mentioned over here https://gramine.readthedocs.io/projects/gsc/en/latest/#dependency-on-ubuntu |
You can check this work in progress, for CentOS/RHEL support: #43 |
UPDATE:
This was fixed some time ago with gramineproject/gramine#722, and is available in Gramine v1.3. |
Description of the problem
The first version of Graphene Shielded Containers (PR gramineproject/graphene#1430) is limited in scope and we've frozen the feature list. This issue lists limitations and possible future features, and should serve as a discussion forum for others to highlight which features are a priority.
Security issues:
--insecure-args
during build.Minor features:
build
arguments such asbuild_args
ornetwork_mode
in the configuration filedocker build parameter
docker_api.build(path='gsc-' + image, tag=gsc_image_name(image), nocache=True)
gsc build
into two commands,gsc build-graphene
andgsc build
.gsc build-graphene
is the first stage of currentgsc build
building a Graphene runtime Docker image. This is independent of the application image and can be generalized and does not require to be rebuild for every image.gsc build
depends on the previous commandgsc build-graphene
and copies the runtime over to the application image.gsc build-graphene
on dockerhub for supported Distributions (e.g. graphene:ubuntu18.04-sgx1.9)Major features:
The text was updated successfully, but these errors were encountered: