Skip to content

General Technical Review: Confidential Containers - Incubation#2051

Draft
halcyondude wants to merge 2 commits intocncf:mainfrom
halcyondude:my-coco-incubation-tech-review
Draft

General Technical Review: Confidential Containers - Incubation#2051
halcyondude wants to merge 2 commits intocncf:mainfrom
halcyondude:my-coco-incubation-tech-review

Conversation

@halcyondude
Copy link
Contributor

@halcyondude halcyondude commented Feb 25, 2026

This PR contains the General Technical Review for the Confidential Containers project, following the template (general-technical-questions.md), covering Day 0 and Day 1 questions for Incubation:

"human-friendly" reading link:

https://github.com/halcyondude/toc/blob/my-coco-incubation-tech-review/projects/confidential-containers/tech-review/2026-02-24-gtr-coco-incubation.md

There are a few questions remaining (marked with TODO) where input from project maintainers would be appreciated.

Marking as a draft PR to solicit feedback from the TOC and Project Reviews Community.

Further resources:

Feedback heartily welcomed!

Related-to: #1504
Resolves: #2032

Signed-off-by: Matt Young <halcyondude@gmail.com>
@halcyondude halcyondude requested a review from GenPage February 25, 2026 03:37
@halcyondude halcyondude self-assigned this Feb 25, 2026
@halcyondude halcyondude added the review/tech Project Tech Review label Feb 25, 2026
@github-project-automation github-project-automation bot moved this to New - Pending Review in Project Reviews Feb 25, 2026
Signed-off-by: Matt Young <halcyondude@gmail.com>
Copy link

@fitzthum fitzthum left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Made a few notes. Looks good generally.


* Describe how the project is handling certificate rotation and mitigates any issues with certificates.

**TODO (Maintainers):** Please describe the mechanisms for rotating the internal TLS/mTLS certificates used between Trustee, the CDH, and the Attestation Agent.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As mentioned below the trustee operator uses cert manager for this. Users may also have their own approach or infrastructure depending on how Trustee is tied into their network. Also, keep in mind that the KBS protocol is designed to be secure even without HTTPS.

While we're here, there are several other places where we can talk about rotation. For example, the attestation token. For this, the token is short-lived (usually 5 minutes) and the guest will automatically try to re-attest when it expires. For individual resources stored in the KBS, rotation is out of scope of Trustee, and should be driven by the owner of those resources. For hardware evidence, revocation is platform specific. Refer to cert chain / collateral documentation for the various hw platforms.

|[JDCloud](https://www.jdcloud.com)|JoyScale |Beta |End-User / Service Provider | JoyScale leverages CoCo to protect the AI data privacy in the process of the company's business and end user. (For details: huoqifeng1@jd.com)|
|[Kubermatic](https://www.kubermatic.com/)| Kubeone | Beta | Service Provider / Consultancy | Running confidential containers on baremetal kubeone clusters. |

**TODO (Maintainers):** Please provide a brief summary or links to any additional adopter interviews, user surveys, or formal UX research (if any) conducted during the Sandbox phase.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Some additional adopters were shared with the toc. These are not listed here due to privacy concerns or pending internal approvals.


* How can a rollout or rollback fail? Describe any impact to already running workloads.

**TODO (Maintainers):** Describe any specific failure modes during upgrades/downgrades. For instance, do existing VMs keep running if the host-level `kata-shim` or `containerd` drops connection? Are there state-migration issues with Trustee CRDs during a rollback?

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As you mention the runtime can be upgraded via kata. Trustee upgrades are wip, but are in the domain of the Trustee operator and the upcoming Trustee helm chart. @fidencio and @bpradipt can probably give more details here.


* Describe how the project is following and implementing [secure software supply chain best practices](https://project.linuxfoundation.org/hubfs/CNCF\_SSCP\_v1.pdf)

The project has achieved SLSA Build Level 2 (see [blog](https://confidentialcontainers.org/blog/2025/02/17/confidential-containerscoco-and-supply-chain-levels-for-software-artifacts-slsa), automatically generating signed provenance in `in-toto` format via GitHub Actions for components like `kata-containers`, `guest-components`, and `cloud-api-adaptor`.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's also worth noting that supply chain security itself is a use case that is in coco's orbit. Artifacts and reference values are very important in confidential computing. Ultimately, we would like to build confidential containers itself inside of confidential containers.


* Describe the project’s resource requirements, including CPU, Network and Memory.

Worker nodes require virtualization support and a recommended minimum of 8GB RAM and 4 CPUs to accommodate the hypervisor/Kata overhead.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Note that your worker node should also have confidential computing support unless you are using the dev/test runtime.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

review/tech Project Tech Review

Projects

Status: New - Pending Review

Development

Successfully merging this pull request may close these issues.

[Tech Review]: Confidential Containers

2 participants