Skip to content

Commit 17032ed

Browse files
committed
kata.runtime: 3.24 -> 3.25
1 parent 7d4055d commit 17032ed

21 files changed

+45
-742
lines changed

nodeinstaller/internal/kataconfig/configuration-qemu-tdx.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,11 +66,11 @@ valid_hypervisor_paths = ["PLACEHOLDER_FOR_DISTRO_QEMU_WITH_TDX_SUPPORT"]
6666
# may stop the virtual machine from booting.
6767
# To see the list of default parameters, enable hypervisor debug, create a
6868
# container and look for 'default-kernel-parameters' log entries.
69-
kernel_params = "cgroup_no_v1=all systemd.unified_cgroup_hierarchy=1 rootfs_verity.scheme=dm-verity rootfs_verity.hash=9039a1ddadc85236751679de6d4bb224259cab18ab72141bbb788afc16bb4aec"
69+
kernel_params = "cgroup_no_v1=all systemd.unified_cgroup_hierarchy=1 rootfs_verity.scheme=dm-verity rootfs_verity.hash=47ff03ed804abbe55399b73b220f21e1ac87e27b6e0cd8b8a9f16ea472d1b7f4"
7070

7171
# Path to the firmware.
7272
# If you want that qemu uses the default firmware leave this option empty
73-
firmware = "/opt/kata/share/ovmf/OVMF.fd"
73+
firmware = "/opt/kata/share/ovmf/OVMF.inteltdx.fd"
7474

7575
# Path to the firmware volume.
7676
# firmware TDVF or OVMF can be split into FIRMWARE_VARS.fd (UEFI variables

packages/by-name/kata/release-tarball/package.nix

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ let
1212
in
1313
fetchzip {
1414
url = "https://github.com/kata-containers/kata-containers/releases/download/${version}/kata-static-${version}-amd64.tar.zst";
15-
hash = "sha256-IDQxIyfQspZY12qRIg1kUvfJr7+/pMXAqNkqU9tVfgo=";
15+
hash = "sha256-esYl9anGN4KJ3qsxzpvGhfZTFPxJK8tnOyxmv6TGPmg=";
1616
stripRoot = false;
1717
nativeBuildInputs = [ zstd ];
1818

packages/by-name/kata/runtime/0004-genpolicy-allow-image_guest_pull.patch

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -250,7 +250,7 @@ index abee6de92049bd9dfbdd3437218c6790a247c14d..c014d9e4248174cc3d55f7e28ab1ed87
250250
# ExecProcessRequest.process.Capabilities
251251
allow_exec_caps(i_caps) if {
252252
diff --git a/src/tools/genpolicy/src/yaml.rs b/src/tools/genpolicy/src/yaml.rs
253-
index 7fb078b34043ed6c6cc04c6e4bd8596fa2d46419..c640694c22404b8501f843dfc3dcfb2ee7bd5c6d 100644
253+
index 776ae3b9bce31e87d7073a7aadeeb2f172593993..a53a4bb9abae414fb5eb47e179aca7ad9f6f7b8f 100644
254254
--- a/src/tools/genpolicy/src/yaml.rs
255255
+++ b/src/tools/genpolicy/src/yaml.rs
256256
@@ -321,6 +321,17 @@ pub fn get_container_mounts_and_storages(

packages/by-name/kata/runtime/0005-runtime-agent-mounts-Mount-configfs-into-the-contain.patch

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Signed-off-by: Fabiano Fidêncio <fabiano.fidencio@intel.com>
2323
1 file changed, 20 insertions(+)
2424

2525
diff --git a/src/agent/rustjail/src/mount.rs b/src/agent/rustjail/src/mount.rs
26-
index 27c363bf6ad4e6031ecd012fa388a83c8504e2bb..b38a2a35a3284900615b23c1896bff98f712c11a 100644
26+
index e0271e53b62a1fe8b063facf8f70a80bd1f71182..6d39c981a9352739a454161e2b2ff0291d7babc4 100644
2727
--- a/src/agent/rustjail/src/mount.rs
2828
+++ b/src/agent/rustjail/src/mount.rs
2929
@@ -294,6 +294,26 @@ pub fn init_rootfs(

packages/by-name/kata/runtime/0006-genpolicy-support-mount-propagation-and-ro-mounts.patch

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,10 @@ index c014d9e4248174cc3d55f7e28ab1ed8709d2acf1..aed30f2bbedf6b8bf8bf2732def6d7ca
2323
is_null(i_linux.IntelRdt)
2424
is_null(i_linux.Resources.BlockIO)
2525
diff --git a/src/tools/genpolicy/src/mount_and_storage.rs b/src/tools/genpolicy/src/mount_and_storage.rs
26-
index 04d0ef196a5da3ab56091e94ff6d845a35b29f03..d89d7a961ade93a532b2bdbebdde4d075cf3075b 100644
26+
index b73470cc0ecfbba96d8a1910bc05aed00c93d2f3..efa1126bf1a39d88bfe9d412b0c62e68dd86b21b 100644
2727
--- a/src/tools/genpolicy/src/mount_and_storage.rs
2828
+++ b/src/tools/genpolicy/src/mount_and_storage.rs
29-
@@ -185,13 +185,19 @@ fn get_empty_dir_mount_and_storage(
29+
@@ -202,13 +202,19 @@ fn get_empty_dir_mount_and_storage(
3030
_ => "rw",
3131
};
3232

packages/by-name/kata/runtime/0009-genpolicy-support-ephemeral-volume-source.patch

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,13 +15,13 @@ Signed-off-by: Markus Rudy <mr@edgeless.systems>
1515
3 files changed, 21 insertions(+), 2 deletions(-)
1616

1717
diff --git a/src/tools/genpolicy/src/mount_and_storage.rs b/src/tools/genpolicy/src/mount_and_storage.rs
18-
index d89d7a961ade93a532b2bdbebdde4d075cf3075b..03c39eba6b2c417df06f8eb4c1d5b8bd134c4f8b 100644
18+
index efa1126bf1a39d88bfe9d412b0c62e68dd86b21b..5f7127351670b850113a362b601f5dfbb4462cff 100644
1919
--- a/src/tools/genpolicy/src/mount_and_storage.rs
2020
+++ b/src/tools/genpolicy/src/mount_and_storage.rs
21-
@@ -126,7 +126,7 @@ pub fn get_mount_and_storage(
22-
}
23-
24-
get_empty_dir_mount_and_storage(settings, p_mounts, storages, yaml_mount, volume.unwrap());
21+
@@ -134,7 +134,7 @@ pub fn get_mount_and_storage(
22+
volume.unwrap(),
23+
pod_security_context,
24+
);
2525
- } else if yaml_volume.persistentVolumeClaim.is_some() || yaml_volume.azureFile.is_some() {
2626
+ } else if yaml_volume.persistentVolumeClaim.is_some() || yaml_volume.azureFile.is_some() || yaml_volume.ephemeral.is_some() {
2727
get_shared_bind_mount(yaml_mount, p_mounts, "rprivate", "rw");

packages/by-name/kata/runtime/0010-genpolicy-allow-RO-and-RW-for-sysfs-with-privileged-.patch

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,10 +35,10 @@ index aed30f2bbedf6b8bf8bf2732def6d7ca62d66d07..30cbd65f54ee0a5ba6f6f4d2c1a09a01
3535
mount_source_allows(p_mount, i_mount, bundle_id, sandbox_id) if {
3636
regex1 := p_mount.source
3737
diff --git a/src/tools/genpolicy/src/policy.rs b/src/tools/genpolicy/src/policy.rs
38-
index 7380687554cf9fce492a543a8183cd620c97ad64..f7372000d445667689180d6f71c8e2e9378e36db 100644
38+
index 957fd85d66ee70b629275fee83045d0bb7f74d25..f1f74e56bb25b83e339d06ee5123b5d4518b762b 100644
3939
--- a/src/tools/genpolicy/src/policy.rs
4040
+++ b/src/tools/genpolicy/src/policy.rs
41-
@@ -654,6 +654,9 @@ impl AgentPolicy {
41+
@@ -657,6 +657,9 @@ impl AgentPolicy {
4242
);
4343

4444
let is_privileged = yaml_container.is_privileged();
@@ -48,7 +48,7 @@ index 7380687554cf9fce492a543a8183cd620c97ad64..f7372000d445667689180d6f71c8e2e9
4848
let process = self.get_container_process(
4949
resource,
5050
yaml_container,
51-
@@ -663,7 +666,7 @@ impl AgentPolicy {
51+
@@ -666,7 +669,7 @@ impl AgentPolicy {
5252
is_privileged,
5353
);
5454

packages/by-name/kata/runtime/0011-genpolicy-don-t-allow-mount-storage-for-declared-VOL.patch

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -35,10 +35,10 @@ index 76ad6bed30c81e131ed637ed1f4e87cf03813d12..88171e1c40f271be9468c6c8b9b87c87
3535
},
3636
"device_annotations": {
3737
diff --git a/src/tools/genpolicy/src/mount_and_storage.rs b/src/tools/genpolicy/src/mount_and_storage.rs
38-
index 03c39eba6b2c417df06f8eb4c1d5b8bd134c4f8b..acbaef81826caef4aad9ee21d99712c83d6b651a 100644
38+
index 5f7127351670b850113a362b601f5dfbb4462cff..3186617e07b59e498c5baec763da253fedbe00aa 100644
3939
--- a/src/tools/genpolicy/src/mount_and_storage.rs
4040
+++ b/src/tools/genpolicy/src/mount_and_storage.rs
41-
@@ -370,46 +370,3 @@ fn get_downward_api_mount(yaml_mount: &pod::VolumeMount, p_mounts: &mut Vec<poli
41+
@@ -387,46 +387,3 @@ fn get_downward_api_mount(yaml_mount: &pod::VolumeMount, p_mounts: &mut Vec<poli
4242
});
4343
}
4444
}
@@ -86,7 +86,7 @@ index 03c39eba6b2c417df06f8eb4c1d5b8bd134c4f8b..acbaef81826caef4aad9ee21d99712c8
8686
- });
8787
-}
8888
diff --git a/src/tools/genpolicy/src/settings.rs b/src/tools/genpolicy/src/settings.rs
89-
index d839812b5b0f1b4a4419d8b884ff890d101c31a1..14c09aaefebf0a8594aa2b904cab6bfae39f2a9e 100644
89+
index 65e1b82857282618cfb0719ef3fe9bd87760d333..21a02a483499a68513a6b86db042631d37c4d9db 100644
9090
--- a/src/tools/genpolicy/src/settings.rs
9191
+++ b/src/tools/genpolicy/src/settings.rs
9292
@@ -34,7 +34,6 @@ pub struct Volumes {
@@ -98,28 +98,28 @@ index d839812b5b0f1b4a4419d8b884ff890d101c31a1..14c09aaefebf0a8594aa2b904cab6bfa
9898

9999
/// EmptyDir volume settings loaded from genpolicy-settings.json.
100100
diff --git a/src/tools/genpolicy/src/yaml.rs b/src/tools/genpolicy/src/yaml.rs
101-
index c640694c22404b8501f843dfc3dcfb2ee7bd5c6d..25b67abec217316e22b337f5dfcae88f3b345034 100644
101+
index a53a4bb9abae414fb5eb47e179aca7ad9f6f7b8f..55ac5afdf809297213414394e15183d63b45c8f4 100644
102102
--- a/src/tools/genpolicy/src/yaml.rs
103103
+++ b/src/tools/genpolicy/src/yaml.rs
104-
@@ -28,6 +28,7 @@ use crate::volume;
104+
@@ -27,6 +27,7 @@ use crate::utils::Config;
105105
use async_trait::async_trait;
106106
use core::fmt::Debug;
107107
use kata_types::annotations::KATA_ANNO_CFG_HYPERVISOR_INIT_DATA;
108108
+use std::collections::BTreeSet;
109109
use log::debug;
110110
use protocols::agent;
111111
use serde::{Deserialize, Serialize};
112-
@@ -294,6 +295,7 @@ pub fn get_container_mounts_and_storages(
112+
@@ -293,6 +294,7 @@ pub fn get_container_mounts_and_storages(
113113
settings: &settings::Settings,
114-
volumes_option: &Option<Vec<volume::Volume>>,
114+
podSpec: &pod::PodSpec,
115115
) {
116116
+ let mut mountPaths = BTreeSet::new();
117-
if let Some(volumes) = volumes_option {
117+
if let Some(volumes) = &podSpec.volumes {
118118
if let Some(volume_mounts) = &container.volumeMounts {
119119
for volume in volumes {
120120
@@ -306,19 +308,19 @@ pub fn get_container_mounts_and_storages(
121-
volume,
122121
volume_mount,
122+
&podSpec.securityContext,
123123
);
124124
+ mountPaths.insert(volume_mount.mountPath.clone());
125125
}

packages/by-name/kata/runtime/0012-agent-use-custom-implementation-for-image-pulling.patch

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ Signed-off-by: Charlotte Hartmann Paludo <git@charlotteharludo.com>
99
1 file changed, 22 insertions(+), 8 deletions(-)
1010

1111
diff --git a/src/agent/src/confidential_data_hub/mod.rs b/src/agent/src/confidential_data_hub/mod.rs
12-
index 85b47c682d3bb18b5ce77d6715e8819c200499c6..c27294b5f9dae13fb2e0a02d3a6d979a6b660439 100644
12+
index 24879f81e9996d3646fc93d7f09d3ddfff42434b..943e24e2407c6db183944c98429f082a7999ce7a 100644
1313
--- a/src/agent/src/confidential_data_hub/mod.rs
1414
+++ b/src/agent/src/confidential_data_hub/mod.rs
1515
@@ -8,7 +8,7 @@

packages/by-name/kata/runtime/0013-agent-use-separate-unix-socket-for-image-pulling.patch

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ Signed-off-by: Charlotte Hartmann Paludo <git@charlotteharludo.com>
99
1 file changed, 3 insertions(+), 1 deletion(-)
1010

1111
diff --git a/src/agent/src/confidential_data_hub/mod.rs b/src/agent/src/confidential_data_hub/mod.rs
12-
index c27294b5f9dae13fb2e0a02d3a6d979a6b660439..6a486fe183fb51670ab39cb67f5bae039640d5d6 100644
12+
index 943e24e2407c6db183944c98429f082a7999ce7a..64db843a5953e7176420274bc65b99974534e407 100644
1313
--- a/src/agent/src/confidential_data_hub/mod.rs
1414
+++ b/src/agent/src/confidential_data_hub/mod.rs
1515
@@ -191,7 +191,9 @@ pub async fn pull_image(image: &str, bundle_path: PathBuf) -> Result<String> {

0 commit comments

Comments
 (0)