You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Support windows platform images
* Pull specific versions of integrity-vhd instead of latest
* Set version to be wcow
* Make version compliant
* Make the policy windows shaped
* Support --debug-mode
* Make lib a module
* Only add platform flag on windows
* Use updated integrity-vhd for fixed C-WCOW policy gen
* Support windows images also in the new "containers from_image" command
* [confcom]: acipolicygen: Fix missing platform field in generated policy config for vn2
* Update tooling to consume json
* Bump framework version for windows
* Update dll requirements
And add a fix to framework for rw_mount
* Bump confcom version 2.0.0 and pick v2.0 dmverity-vhd release
* [confcom] Update policy api version for "new style" command too
* [confcom] Make the to-be-released version 2.0.0b1 instead of an actual 2.0.0
Suggested-by: Ken Gordon <kegordo@microsoft.com>
* Update azext_confcom/data/README
* Update all sample policies to the new api version and add the rw_mount_device enforcement point
This fixes unit tests
* Remove misleading comment
This is not, in fact, where parameters and variables are populated. That happens
in the constructor for AciPolicy.
* [confcom] Fix trying to fetch image with a name containing unresolved parameters/variables
* [confcom] Fix lint errors
* [confcom] Add --platform commandline option
* [confcom] fix Virtual Node bug
* [confcom] Derive image platform and add --platform validation
* [confcom] update help text and README
* [confcom] Do not use inspect, just use image pull
* [confcom] Address copilot reviews
* [confcom] regenerate golden policies
---------
Co-authored-by: Dominic Ayre <dominicayre@microsoft.com>
Co-authored-by: Dominic Ayre <domayre@outlook.com>
Co-authored-by: Tingmao Wang <tingmaowang@microsoft.com>
Copy file name to clipboardExpand all lines: src/confcom/azext_confcom/_help.py
+7-1Lines changed: 7 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -105,6 +105,10 @@
105
105
type: boolean
106
106
short-summary: 'When enabled, the default fragments are not included in the generated policy. This includes containers needed to mount azure files, mount secrets, mount git repos, and other common ACI features'
107
107
108
+
- name: --platform
109
+
type: string
110
+
short-summary: 'Target platform for policy generation (linux/amd64 or windows/amd64). Defaults to linux/amd64. Docker Desktop must be running in the matching container mode to produce correct layer hashes.'
111
+
108
112
examples:
109
113
- name: Input an ARM Template file to inject a base64 encoded Confidential Container Security Policy into the ARM Template
110
114
text: az confcom acipolicygen --template-file "./template.json"
@@ -116,6 +120,8 @@
116
120
text: az confcom acipolicygen --template-file "./template.json" --tar "./image.tar"
117
121
- name: Input an ARM Template file and use a fragments JSON file to generate a policy
118
122
text: az confcom acipolicygen --template-file "./template.json" --fragments-json "./fragments.json" --include-fragments
123
+
- name: Generate a Windows container policy (requires Docker Desktop in Windows containers mode)
124
+
text: az confcom acipolicygen --template-file "./template.json" --platform windows/amd64 --outraw-pretty-print
119
125
"""
120
126
121
127
helps[
@@ -340,7 +346,7 @@
340
346
parameters:
341
347
- name: --platform
342
348
type: str
343
-
short-summary: 'The name of the platform the container definition will run on'
349
+
short-summary: 'The name of the platform the container definition will run on. Must be either "aci" or "vn2".'
0 commit comments