-
Notifications
You must be signed in to change notification settings - Fork 55
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make SEV-SNP the default attestation variant on GCP #3267
Conversation
✅ Deploy Preview for constellation-docs ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
1861f5d
to
d6d86da
Compare
@msanft does this TODO need to be resolved before we can make SNP the default? constellation/.github/workflows/on-release.yml Lines 158 to 166 in 3f6e7f9
|
Need to talk to the business side to clarify this, but I think it should not be too much work altogether. I'll have a look at this PR generally on Monday. My mind isn't fresh enough anymore today 😄 |
should we change it here too?
is this done?
let's switch the order here: constellation/terraform-provider-constellation/internal/provider/shared_attributes.go Line 34 in 913b09a
|
d6d86da
to
30307e1
Compare
30307e1
to
59dd625
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM. Marketplace images should not be critical for this PR, we'll just have to add them until we release a version containing the SEV-SNP default.
docs/docs/overview/clouds.md
Outdated
The [CVMs Generally Available in GCP](https://cloud.google.com/confidential-computing/confidential-vm/docs/confidential-vm-overview#amd_sev) are based on AMD SEV but don't have SNP features enabled. | ||
CVMs with [SEV-SNP enabled are in public preview](https://cloud.google.com/confidential-computing/confidential-vm/docs/confidential-vm-overview#amd_sev-snp). Regarding (3), with their SEV-SNP offering Google provides direct access to remote-attestation statements. | ||
The [CVMs Generally Available in GCP](https://cloud.google.com/confidential-computing/confidential-vm/docs/confidential-vm-overview#technologies) are based on AMD SEV-ES or SEV-SNP. | ||
Regarding (3), with their SEV-SNP offering Google provides direct access to remote-attestation statements. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Regarding (3), with their SEV-SNP offering Google provides direct access to remote-attestation statements. | |
Regarding (3), with their SEV-SNP offering Google provides direct access to attestation statements. |
nit
Coverage report
|
Context
SNP on GCP is GA
Proposed change(s)
Checklist