Skip to content

Commit 343d0a1

Browse files
authored
Merge pull request #2294 from pareenaverma/content_review
Spell fixes
2 parents f009b48 + 324815c commit 343d0a1

File tree

5 files changed

+26
-7
lines changed

5 files changed

+26
-7
lines changed

.wordlist.txt

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4702,5 +4702,24 @@ GDM
47024702
LPI
47034703
nsec
47044704
shortcode
4705-
4705+
BSON
4706+
joedog
4707+
Seige
4708+
Antonov
4709+
jwt
4710+
kbs
4711+
Nfpl
4712+
ZjnAMjLk
4713+
hCpeYsarnnGv
4714+
kbs
4715+
rvps
4716+
xcbTMTBX
4717+
CDH
4718+
RVPS
4719+
Attester
4720+
attester
4721+
ATtestation
4722+
CoCo
4723+
procedureS
4724+
NIC’s
47064725

content/learning-paths/servers-and-cloud-computing/cca-trustee/cca-trustee.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ A verifier driver parses the attestation evidence provided by the hardware TEE.
8686
1. Verifies the hardware TEE signature of the TEE quote and report provided in the evidence
8787
2. Receives the evidence and organizes the status into a JSON format to be returned
8888

89-
In this Learning Path, the AS is configured to use an external CCA verifer.
89+
In this Learning Path, the AS is configured to use an external CCA verifier.
9090

9191
[Linaro](https://www.linaro.org) provides such an attestation verifier for use with pre-silicon Arm CCA platforms.
9292
This verifier is built from the Open-Source [Veraison project](https://github.com/veraison).
@@ -138,8 +138,8 @@ FVP and the reference software stack, see the
138138
Learning Path.
139139

140140
When the AS receives an attestation token from the realm via KBS:
141-
- it calls an external CCA verifer (the Linaro attestation verifier service) to obtain an attestation result.
142-
- the external CCA verifer checks the token's cryptographic signature,
141+
- it calls an external CCA verifier (the Linaro attestation verifier service) to obtain an attestation result.
142+
- the external CCA verifier checks the token's cryptographic signature,
143143
verifies that it denotes a confidential computing platform and provides an attestation result.
144144
- it also checks the token evidences against its own attestation policies and updates attestation result status and trustworthiness vectors.
145145

content/learning-paths/servers-and-cloud-computing/cca-trustee/flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -199,7 +199,7 @@ Using JWK key from JWT header
199199
Error: verifying signed EAR from "ear.jwt" using "JWK header" key: failed verifying JWT message: jwt.Parse: failed to parse token: jwt.Validate: validation failed: "exp" not satisfied: token is expired
200200
```
201201

202-
Please obtain a new EAR message by re-runing the attestation command.
202+
Please obtain a new EAR message by re-running the attestation command.
203203
{{% /notice %}}
204204

205205

content/learning-paths/servers-and-cloud-computing/envoy-gcp/background.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ The C4A series provides a cost-effective alternative to x86 virtual machines whi
1414

1515
To learn more about Google Axion, refer to the [Introducing Google Axion Processors, our new Arm-based CPUs](https://cloud.google.com/blog/products/compute/introducing-googles-new-arm-based-cpu) blog.
1616

17-
## Envoy for service proxying and traffic management on Arm
17+
## Envoy for service proxy and traffic management on Arm
1818

1919
Envoy is an open-source, high-performance edge and service proxy designed for cloud-native applications.
2020

content/learning-paths/servers-and-cloud-computing/envoy-gcp/benchmarking.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ This runs the Envoy proxy with your configuration file (envoy_config.yaml) so it
6161
```
6262
curl -v http://127.0.0.1:10000/get
6363
```
64-
Running from another terminal returns a **200 OK** status, confirming that Envoy is running and successfully proxying requests.
64+
Running from another terminal returns a **200 OK** status, confirming that Envoy is running and successfully processing requests.
6565

6666
3. Run a Time-based Load Test
6767

0 commit comments

Comments
 (0)