You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This repository contains configuration files used for running Trustee services docker containers with CCA attestation support as a simple cluster.
53
51
The config files are based on the recommended configurations from [KBS Cluster](https://github.com/confidential-containers/trustee/blob/main/kbs/docs/cluster.md)
54
52
55
-
In addition to the recommended configuration we also made the following changes for this Learning Path:
53
+
In addition to the recommended configuration, the following changes were also made for this Learning Path:
56
54
- Included the external Linaro CCA verifier into AS configuration
57
-
- Included an attesation policy with CCA rules
55
+
- Included an attestation policy with CCA rules
58
56
- Defined an "affirming" resource policy
59
57
- Created a secret demo message.
60
58
- Defined a docker network shared by all containers in this demo.
61
59
62
-
Go into `cca-trustee` directory and start Trustee services docker containers (as detached services):
60
+
Go into the `cca-trustee` directory and start the Trustee services docker containers (as detached services):
63
61
```bash { output_lines = "3-9" }
64
62
cd cca-trustee
65
63
docker compose up -d
@@ -100,7 +98,7 @@ launch the `run-cca-fvp.sh` script to run the Arm CCA pre-built binaries on the
100
98
./run-cca-fvp.sh
101
99
```
102
100
103
-
The `run-cca-fvp.sh` script uses screen command to connect to the different UARTs in the FVP.
101
+
The `run-cca-fvp.sh` script uses the screen command to connect to the different UARTs in the FVP.
104
102
105
103
You should see the host Linux kernel boot on your terminal. You will be prompted to log in to the host.
106
104
@@ -134,11 +132,11 @@ realm login: root
134
132
(realm) #
135
133
```
136
134
137
-
### Try to run attestation and request a secret
135
+
### Try to use attestation to request a secret
138
136
139
137
In this step, you will go through the process of using attestation to request
140
138
a secret from the KBS. This will not work on the first attempt.
141
-
But don't worry. We will explain why, and how to rectify the problem.
139
+
But don't worry. You will learn why that is the case, and how to rectify the problem.
142
140
You will have a better understanding of the attestation process as a result.
143
141
144
142
Change directory to `/cca` and use `openssl` to create a realm RSA key:
@@ -147,19 +145,19 @@ cd /cca
147
145
openssl genrsa -traditional -out realm.key
148
146
```
149
147
150
-
Run attestation command and save EAT Attestation Result (EAR) message in JWT (JSON Web Token) format in `ear.jwt` file.
148
+
Run the attestation command and save the EAT Attestation Result (EAR) message in JWT (JSON Web Token) format in a file named `ear.jwt`:
The request would fail with `Access denied by policy` and `Token Verifier` errors:
160
+
The request will fail with `Access denied by policy` and `Token Verifier` errors:
163
161
```output
164
162
[2025-07-23T14:42:55Z WARN kbs_protocol::client::token_client] Authenticating with KBS failed. Get a new token from the token provider: ErrorInformation {
0 commit comments