Skip to content

Commit

Permalink
docs: fix repo name from kbs to Trustee
Browse files Browse the repository at this point in the history
This commit is for the name-changing of kbs repo.

Signed-off-by: Xynnn007 <xynnn@linux.alibaba.com>
  • Loading branch information
Xynnn007 authored and fitzthum committed Feb 29, 2024
1 parent 497a63a commit 9b8ef6c
Show file tree
Hide file tree
Showing 10 changed files with 20 additions and 20 deletions.
2 changes: 1 addition & 1 deletion .github/workflows/as-e2e.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ jobs:
matrix:
include:
# TODO: Add real HW-TEE test
# See https://github.com/confidential-containers/kbs/issues/223
# See https://github.com/confidential-containers/trustee/issues/223
# - runner: self-hosted
# generate_evidence: true
# grpc_tee_enum: 3
Expand Down
8 changes: 4 additions & 4 deletions attestation-service/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@ The AS can be built and imported as a Rust crate into any project providing atte
As the AS API is not yet fully stable, the AS crate needs to be imported from GitHub directly:

```toml
attestation-service = { git = "https://github.com/confidential-containers/kbs" }
attestation-service = { git = "https://github.com/confidential-containers/trustee" }
```

## Server
Expand All @@ -67,8 +67,8 @@ This project provides the Attestation Service binary program that can be run as
Build and install AS as a standalone server

```shell
git clone https://github.com/confidential-containers/kbs
cd kbs/attestation-service
git clone https://github.com/confidential-containers/trustee
cd trustee/attestation-service
make && make install
```

Expand All @@ -86,7 +86,7 @@ The AS should be queried with a request containing
- `init_data_hash_algorithm` - the hasing algorithm used with the other above field
- `policy_ids` - a list of policies which the AS will use to evaluate the evidence claims

For more details see [gRPC proto](https://github.com/confidential-containers/kbs/blob/main/attestation-service/protos/attestation.proto)
For more details see [gRPC proto](https://github.com/confidential-containers/trustee/blob/main/attestation-service/protos/attestation.proto)

### Evidence format:

Expand Down
8 changes: 4 additions & 4 deletions attestation-service/docs/grpc-as.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,16 +14,16 @@ Here are the steps of building and running gRPC Attestation Service:

Build and install binary
```shell
git clone https://github.com/confidential-containers/kbs
cd kbs/attestation-service
git clone https://github.com/confidential-containers/trustee
cd trustee/attestation-service
WORKDIR=$(pwd)
make && make install
```

Build and run container image
```shell
git clone https://github.com/confidential-containers/kbs
cd kbs
git clone https://github.com/confidential-containers/trustee
cd trustee
docker build -t coco-as:grpc -f attestation-service/Dockerfile.as-grpc .
```

Expand Down
8 changes: 4 additions & 4 deletions attestation-service/docs/restful-as.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,16 +10,16 @@ Here are the steps of building and running RESTful Attestation Service:

Build and install binary
```shell
git clone https://github.com/confidential-containers/kbs
cd kbs/attestation-service
git clone https://github.com/confidential-containers/trustee
cd trustee/attestation-service
WORKDIR=$(pwd)
make && make install
```

Build and run container image
```shell
git clone https://github.com/confidential-containers/kbs
cd kbs
git clone https://github.com/confidential-containers/trustee
cd trustee
docker build -t coco-as:restful -f attestation-service/Dockerfile.as-restful .
```

Expand Down
2 changes: 1 addition & 1 deletion attestation-service/rvps/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ RUN cargo install --bin rvps --path attestation-service/rvps

FROM debian

LABEL org.opencontainers.image.source="https://github.com/confidential-containers/kbs"
LABEL org.opencontainers.image.source="https://github.com/confidential-containers/trustee/attestation-service"

COPY --from=builder /usr/local/cargo/bin/rvps /usr/local/bin/rvps

Expand Down
4 changes: 2 additions & 2 deletions attestation-service/rvps/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -55,8 +55,8 @@ In this way, the RVPS can run as a single service. The [gRPC protos](../protos/r
We can run using the following command

```bash
git clone https://github.com/confidential-containers/kbs
cd kbs/attestation-service/rvps
git clone https://github.com/confidential-containers/trustee
cd trustee/attestation-service/rvps
make build && sudo make install
```

Expand Down
2 changes: 1 addition & 1 deletion attestation-service/verifier/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -145,7 +145,7 @@ pub trait Verifier {
/// There will be two claims by default regardless of architectures:
/// - `init_data_hash`: init data hash of the evidence
/// - `report_data`: report data of the evidence
/// TODO: See https://github.com/confidential-containers/kbs/issues/228
/// TODO: See https://github.com/confidential-containers/trustee/issues/228
async fn evaluate(
&self,
evidence: &[u8],
Expand Down
2 changes: 1 addition & 1 deletion kbs/docker/Dockerfile.coco-as-grpc
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,6 @@ RUN cargo install --path kbs/src/kbs --no-default-features --features coco-as-gr

FROM ubuntu:22.04

LABEL org.opencontainers.image.source="https://github.com/confidential-containers/kbs"
LABEL org.opencontainers.image.source="https://github.com/confidential-containers/trustee/kbs"

COPY --from=builder /usr/local/cargo/bin/kbs /usr/local/bin/kbs
2 changes: 1 addition & 1 deletion kbs/docker/Dockerfile.intel-trust-authority
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ RUN cargo install --path kbs/src/kbs --no-default-features --features intel-trus

FROM ubuntu:22.04

LABEL org.opencontainers.image.source="https://github.com/confidential-containers/kbs"
LABEL org.opencontainers.image.source="https://github.com/confidential-containers/trustee/kbs"

RUN apt update && apt install -y ca-certificates

Expand Down
2 changes: 1 addition & 1 deletion kbs/docs/cluster.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# KBS Cluster

KBS provides a simple cluster defined by `docker-compose`, include itself, [Attestation Service](https://github.com/confidential-containers/kbs/tree/main/attestation-service), [Reference Value Provider Service](https://github.com/confidential-containers/kbs/tree/main/attestation-service/rvps) and [CoCo Keyprovider](https://github.com/confidential-containers/guest-components/tree/main/attestation-agent/coco_keyprovider)
KBS provides a simple cluster defined by `docker-compose`, include itself, [Attestation Service](https://github.com/confidential-containers/trustee/tree/main/attestation-service), [Reference Value Provider Service](https://github.com/confidential-containers/trustee/tree/main/attestation-service/rvps) and [CoCo Keyprovider](https://github.com/confidential-containers/guest-components/tree/main/attestation-agent/coco_keyprovider)

Users can use very simple command to:
- launch KBS service.
Expand Down

0 comments on commit 9b8ef6c

Please sign in to comment.