Skip to content

Commit bb83d71

Browse files
Merge pull request #2156 from anta5010/veraison_fix
Small fixes in Get Started with CCA Attestation and Veraison LP
2 parents bfc4a5a + 424cda0 commit bb83d71

File tree

3 files changed

+5
-5
lines changed

3 files changed

+5
-5
lines changed

content/learning-paths/servers-and-cloud-computing/cca-veraison/attestation-token.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,10 +13,10 @@ In this section, you will obtain an example CCA attestation token. To set up the
1313
First, start by removing any existing Go installation. Next, obtain the install files and run the following command:
1414

1515
```bash
16-
rm -rf /usr/local/go
16+
sudo rm -rf /usr/local/go
1717

1818
wget https://go.dev/dl/go1.23.3.linux-$(dpkg --print-architecture).tar.gz
19-
tar -C /usr/local -xzf go1.23.3.linux-$(dpkg --print-architecture).tar.gz
19+
sudo tar -C /usr/local -xzf go1.23.3.linux-$(dpkg --print-architecture).tar.gz
2020
```
2121

2222
Export the installation path and add it to your `$PATH environment` variable:

content/learning-paths/servers-and-cloud-computing/cca-veraison/attestation-verification.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ The URL for reaching this experimental verifier service is https://veraison.test
1616
To check that you can reach the Linaro attestation verifier service, run the following command:
1717

1818
```bash
19-
curl https://veraison.test.linaro.org:8443/.well-known/veraison/verification
19+
curl https://veraison.test.linaro.org:8443/.well-known/veraison/verification | jq
2020
```
2121

2222
This is a simple call to query the well-known characteristics of the verification service. If it succeeds, it will return a JSON response that looks something like this:
@@ -63,7 +63,7 @@ If you can reach the verification service, you are now ready to use it to evalua
6363

6464
One of the properties that was returned in the previous step was the public key of the verification service. This key will be needed later to check the signature on the attestation results. All that is needed in this step is to copy the contents of the `ear-verification-key` field from the previous step and save it to a separate JSON file.
6565

66-
The easiest way to do this is to use the `jq` utility.
66+
The easiest way to do this is to use the `jq` utility.
6767
You can save the public key by repeating the curl command from the previous step and use `jq` to filter the response down to just the public key part. Save it into a file called `pkey.json`:
6868

6969
```bash

content/learning-paths/servers-and-cloud-computing/cca-veraison/evaluate-result.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ The attestation result is a JWT file, which stands for JSON Web Token. This mean
3434
The following command will use the `arc` tool, which you built in the previous step, to verify the cryptographic signature on the attestation result, and display the result in a human-readable format:
3535

3636
```bash
37-
./arc verify --pkey $HOME/pkey.json --color $HOME/attestation_result.jwt
37+
./arc verify --pkey $HOME/pkey.json $HOME/attestation_result.jwt
3838
```
3939

4040
This command produces quite a lot of output. However, you will notice that a large amount of the output simply reflects the contents of the CCA attestation token that you inspected earlier with the evcli tool. The most interesting part of the output is towards the bottom, and should look like this:

0 commit comments

Comments
 (0)