Skip to content

Commit 508212f

Browse files
MGMT-16631: Dev/QE review
1 parent eeb9a39 commit 508212f

File tree

2 files changed

+10
-3
lines changed

2 files changed

+10
-3
lines changed

hardware_enablement/kmm-kernel-module-management.adoc

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,10 +51,13 @@ include::modules/kmm-replacing-in-tree-modules-with-out-of-tree-modules.adoc[lev
5151
5252
[role="_additional-resources"]
5353
.Additional resources
54-
5554
* link:https://fastbitlab.com/building-a-linux-kernel-module/[Building a linux kernel module]
5655
5756
include::modules/kmm-example-module-cr.adoc[leveloffset=+2]
57+
// Added for MGMT-16631
58+
[role="_additional-resources"]
59+
.Additional resources
60+
* xref:../security/certificates/updating-ca-bundle.adoc#ca-bundle-replacing_updating-ca-bundle[Replacing the CA Bundle certificate]
5861
5962
// Added for TELCODOCS-1827
6063
include::modules/kmm-symbolic-links-for-in-tree-dependencies.adoc[leveloffset=+1]
@@ -64,7 +67,6 @@ include::modules/kmm-running-depmod.adoc[leveloffset=+2]
6467
6568
[role="_additional-resources"]
6669
.Additional resources
67-
6870
* xref:../hardware_enablement/psap-driver-toolkit.adoc#driver-toolkit[Driver Toolkit]
6971
7072
include::modules/kmm-building-in-cluster.adoc[leveloffset=+2]

modules/kmm-example-module-cr.adoc

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,12 @@ spec:
8181
<7> For any other kernel, build the image using the Dockerfile in the `my-kmod` ConfigMap.
8282
<8> Optional.
8383
<9> Optional: A value for `some-kubernetes-secret` can be obtained from the build environment at `/run/secrets/some-kubernetes-secret`.
84-
<10> Optional: Avoid using this parameter. If set to `true`, the build is allowed to pull the image in the Dockerfile `FROM` instruction using plain HTTP.
84+
<10> This field has no effect. When building kmod images or signing kmods within a kmod image,
85+
you might sometimes need to pull base images from a registry that serves a certificate signed by an
86+
untrusted Certificate Authority (CA). In order for KMM to trust that CA, it must also trust the new CA
87+
by replacing the cluster's CA bundle.
88+
+
89+
See "Additional resources" to learn how to replace the cluster's CA bundle.
8590
<11> Optional: Avoid using this parameter. If set to `true`, the build will skip any TLS server certificate validation when pulling the image in the Dockerfile `FROM` instruction using plain HTTP.
8691
<12> Required.
8792
<13> Required: A secret holding the public secureboot key with the key 'cert'.

0 commit comments

Comments
 (0)