Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs: fix repo name from kbs to Trustee #337

Merged
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .github/workflows/as-e2e.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ jobs:
matrix:
include:
# TODO: Add real HW-TEE test
# See https://github.com/confidential-containers/kbs/issues/223
# See https://github.com/confidential-containers/trustee/issues/223
# - runner: self-hosted
# generate_evidence: true
# grpc_tee_enum: 3
Expand Down
8 changes: 4 additions & 4 deletions attestation-service/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@ The AS can be built and imported as a Rust crate into any project providing atte
As the AS API is not yet fully stable, the AS crate needs to be imported from GitHub directly:

```toml
attestation-service = { git = "https://github.com/confidential-containers/kbs" }
attestation-service = { git = "https://github.com/confidential-containers/trustee" }
```

## Server
Expand All @@ -67,8 +67,8 @@ This project provides the Attestation Service binary program that can be run as
Build and install AS as a standalone server

```shell
git clone https://github.com/confidential-containers/kbs
cd kbs/attestation-service
git clone https://github.com/confidential-containers/trustee
cd trustee/attestation-service
make && make install
```

Expand All @@ -86,7 +86,7 @@ The AS should be queried with a request containing
- `init_data_hash_algorithm` - the hasing algorithm used with the other above field
- `policy_ids` - a list of policies which the AS will use to evaluate the evidence claims

For more details see [gRPC proto](https://github.com/confidential-containers/kbs/blob/main/attestation-service/protos/attestation.proto)
For more details see [gRPC proto](https://github.com/confidential-containers/trustee/blob/main/attestation-service/protos/attestation.proto)

### Evidence format:

Expand Down
8 changes: 4 additions & 4 deletions attestation-service/docs/grpc-as.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,16 +14,16 @@ Here are the steps of building and running gRPC Attestation Service:

Build and install binary
```shell
git clone https://github.com/confidential-containers/kbs
cd kbs/attestation-service
git clone https://github.com/confidential-containers/trustee
cd trustee/attestation-service
WORKDIR=$(pwd)
make && make install
```

Build and run container image
```shell
git clone https://github.com/confidential-containers/kbs
cd kbs
git clone https://github.com/confidential-containers/trustee
cd trustee
docker build -t coco-as:grpc -f attestation-service/Dockerfile.as-grpc .
```

Expand Down
8 changes: 4 additions & 4 deletions attestation-service/docs/restful-as.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,16 +10,16 @@ Here are the steps of building and running RESTful Attestation Service:

Build and install binary
```shell
git clone https://github.com/confidential-containers/kbs
cd kbs/attestation-service
git clone https://github.com/confidential-containers/trustee
cd trustee/attestation-service
WORKDIR=$(pwd)
make && make install
```

Build and run container image
```shell
git clone https://github.com/confidential-containers/kbs
cd kbs
git clone https://github.com/confidential-containers/trustee
cd trustee
docker build -t coco-as:restful -f attestation-service/Dockerfile.as-restful .
```

Expand Down
2 changes: 1 addition & 1 deletion attestation-service/rvps/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ RUN cargo install --bin rvps --path attestation-service/rvps

FROM debian

LABEL org.opencontainers.image.source="https://github.com/confidential-containers/kbs"
LABEL org.opencontainers.image.source="https://github.com/confidential-containers/trustee/attestation-service"

COPY --from=builder /usr/local/cargo/bin/rvps /usr/local/bin/rvps

Expand Down
4 changes: 2 additions & 2 deletions attestation-service/rvps/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -55,8 +55,8 @@ In this way, the RVPS can run as a single service. The [gRPC protos](../protos/r
We can run using the following command

```bash
git clone https://github.com/confidential-containers/kbs
cd kbs/attestation-service/rvps
git clone https://github.com/confidential-containers/trustee
cd trustee/attestation-service/rvps
make build && sudo make install
```

Expand Down
2 changes: 1 addition & 1 deletion attestation-service/verifier/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -145,7 +145,7 @@ pub trait Verifier {
/// There will be two claims by default regardless of architectures:
/// - `init_data_hash`: init data hash of the evidence
/// - `report_data`: report data of the evidence
/// TODO: See https://github.com/confidential-containers/kbs/issues/228
/// TODO: See https://github.com/confidential-containers/trustee/issues/228
async fn evaluate(
&self,
evidence: &[u8],
Expand Down
2 changes: 1 addition & 1 deletion kbs/docker/Dockerfile.coco-as-grpc
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,6 @@ RUN cargo install --path kbs/src/kbs --no-default-features --features coco-as-gr

FROM ubuntu:22.04

LABEL org.opencontainers.image.source="https://github.com/confidential-containers/kbs"
LABEL org.opencontainers.image.source="https://github.com/confidential-containers/trustee/kbs"

COPY --from=builder /usr/local/cargo/bin/kbs /usr/local/bin/kbs
2 changes: 1 addition & 1 deletion kbs/docker/Dockerfile.intel-trust-authority
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ RUN cargo install --path kbs/src/kbs --no-default-features --features intel-trus

FROM ubuntu:22.04

LABEL org.opencontainers.image.source="https://github.com/confidential-containers/kbs"
LABEL org.opencontainers.image.source="https://github.com/confidential-containers/trustee/kbs"

RUN apt update && apt install -y ca-certificates

Expand Down
2 changes: 1 addition & 1 deletion kbs/docs/cluster.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# KBS Cluster

KBS provides a simple cluster defined by `docker-compose`, include itself, [Attestation Service](https://github.com/confidential-containers/kbs/tree/main/attestation-service), [Reference Value Provider Service](https://github.com/confidential-containers/kbs/tree/main/attestation-service/rvps) and [CoCo Keyprovider](https://github.com/confidential-containers/guest-components/tree/main/attestation-agent/coco_keyprovider)
KBS provides a simple cluster defined by `docker-compose`, include itself, [Attestation Service](https://github.com/confidential-containers/trustee/tree/main/attestation-service), [Reference Value Provider Service](https://github.com/confidential-containers/trustee/tree/main/attestation-service/rvps) and [CoCo Keyprovider](https://github.com/confidential-containers/guest-components/tree/main/attestation-agent/coco_keyprovider)

Users can use very simple command to:
- launch KBS service.
Expand Down
Loading