Skip to content

Commit a23f88d

Browse files
committed
docs: update links and references in iApp guides
- Replaced outdated protocol documentation links with updated internal paths for better navigation. - Enhanced clarity in the iApp build documentation by linking to relevant advanced guides and resources. - Removed redundant sections to streamline content and improve user experience.
1 parent 44feb95 commit a23f88d

File tree

10 files changed

+14
-35
lines changed

10 files changed

+14
-35
lines changed

src/get-started/helloWorld/1-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ lifecycle - during storage, transfer, and even while **being processed by
7070
applications.**
7171

7272
This is made possible thanks to
73-
<span class="text-fuchsia-700 font-semibold"><a target="_blank" href="https://protocol.docs.iex.ec/for-developers/confidential-computing/intel-sgx-technology">Trusted
73+
<span class="text-fuchsia-700 font-semibold"><a href="/get-started/protocol/tee/introduction">Trusted
7474
Execution Environment (TEE)</a></span> and
7575
<span class="text-fuchsia-700 font-semibold"><a target="_blank" href="https://www.iex.ec/academy/iexec-decentralized-confidential-computing">Confidential
7676
Computing</a></span> technologies.

src/get-started/helloWorld/3-buildIApp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -394,8 +394,8 @@ iapp run <my-iapp-address>
394394

395395
To sum up the process, we take the **iApp** and wrap it in the iExec framework,
396396
allowing it to run securely in a **Trusted Execution Environment (TEE)** for
397-
**confidential computing**. If you want to explore further, you can check the
398-
protocol documentation [here](https://protocol.docs.iex.ec/).
397+
**confidential computing**. To learn more, check out the
398+
[advanced iApp build documentation](guides/build-iapp/advanced/quick-start).
399399

400400
<div class="bg-gradient-to-r from-green-400/10 to-green-400/5 rounded-[6px] p-6 border-l-4 border-green-600 mb-6">
401401
<p class="m-0!">🎉 Congratulations! You've successfully deployed and run your first iApp on iExec. This is a significant milestone - your application is now ready to securely process confidential data in a trusted environment.</p>

src/guides/build-iapp/inputs-and-outputs.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -605,9 +605,3 @@ Continue building with these guides:
605605
execution issues
606606
- **[How to Get and Decrypt Results](/guides/build-iapp/inputs-and-outputs)** -
607607
User-side result handling
608-
609-
### Technical Deep Dive
610-
611-
- **[SDK Deep Dive](/references/sdk)** - Advanced SDK concepts
612-
- **[Application I/O Protocol Docs](https://protocol.docs.iex.ec/for-developers/application-io)** -
613-
Low-level protocol details

src/guides/build-iapp/manage-access.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -306,8 +306,6 @@ Next steps:
306306

307307
- **[iExec SDK Documentation](https://github.com/iExecBlockchainComputing/iexec-sdk)** -
308308
Complete CLI reference
309-
- **[Official Orders Documentation](https://protocol.docs.iex.ec/for-developers/advanced/manage-your-apporders)** -
310-
Protocol-level order management
311309

312310
<script setup>
313311
import { computed } from 'vue';

src/references/dataProtector/advanced/apps-whitelist.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ In order to consume a protected data, an iExec TEE iApp needs to be provided.
1313
::: tip
1414

1515
**TEE** stands for Trusted Execution Environment. Find more details
16-
[here](https://protocol.docs.iex.ec/help/glossary#trusted-execution-environment-tee)
16+
[here](get-started/protocol/tee/introduction)
1717

1818
:::
1919

src/references/dataProtector/dataProtectorCore/processProtectedData.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -243,7 +243,7 @@ stored in the secrets manager needed for the application's execution.
243243

244244
Secrets are accessible during the application's execution as environment
245245
variables. For more details, see
246-
[Access requester secrets](https://protocol.docs.iex.ec/for-developers/confidential-computing/access-confidential-assets/requester-secrets).
246+
[Access requester secrets](/guides/build-iapp/advanced/access-confidential-assets).
247247

248248
<!-- prettier-ignore-start -->
249249
```ts twoslash

src/references/dataProtector/dataProtectorSharing/consume/consumeProtectedData.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ This method does a few things under the hood:
1515
- Generate an RSA key pair and save it to indexedDB (if available)
1616
- Push the public key to iExec SMS (Secret Management Service) (For more info,
1717
see
18-
[iExec Protocol documentation](https://protocol.docs.iex.ec/for-developers/confidential-computing/access-confidential-assets#secret-management-service-sms))
18+
[iExec Advanced documentation](/guides/build-iapp/advanced/access-confidential-assets))
1919
- Wait for the consuming task to be executed by a worker. The iExec TEE iApp
2020
being executed is the one given with the `app` parameter. The iExec TEE iApp
2121
will get the protected data from IPFS, encrypt it with the public key

src/references/dataProtector/types.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -106,8 +106,8 @@ Types in DataProtector.
106106
_Hash example:_ `0xc9c2d58fc01fe54149b7daf49a0026d4ab1fdd3d10fb7c76350790fff03fe24d`
107107
<!-- prettier-ignore-end -->
108108

109-
You can read more about he iExec Explorer
110-
[here](https://protocol.docs.iex.ec/for-developers/toolbox/iexec-explorer).
109+
You can read more about the
110+
[iExec Explorer](get-started/tooling-and-explorers/iexec-explorer).
111111

112112
## ✅ SuccessWithTransactionHash
113113

@@ -121,5 +121,5 @@ You can read more about he iExec Explorer
121121
_Hash example:_ `0xc9c2d58fc01fe54149b7daf49a0026d4ab1fdd3d10fb7c76350790fff03fe24d`
122122
<!-- prettier-ignore-end -->
123123

124-
You can read more about he iExec Explorer
125-
[here](https://protocol.docs.iex.ec/for-developers/toolbox/iexec-explorer).
124+
You can read more about the [iExec Explorer]
125+
(get-started/tooling-and-explorers/iexec-explorer).

src/references/iapp-generator.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -100,8 +100,6 @@ applications:
100100
- **[Complete Guides](/guides/build-iapp/build-&-test)** - All development
101101
guides
102102
- **[iExec Discord](https://discord.com/invite/pbt9m98wnU)** - Community support
103-
- **[Protocol Documentation](https://protocol.docs.iex.ec)** - Technical deep
104-
dive
105103

106104
---
107105

src/references/iapp-generator/building-your-iexec-app.md

Lines changed: 4 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -81,19 +81,8 @@ You'll set up:
8181
- **Protected Data** – Encrypted data accessible only inside the TEE.
8282
- **App Secret** – Immutable secret provisioned by the iApp owner.
8383

84-
::: tip 💡
85-
86-
The Secret Management Service (SMS) securely stores application developer
87-
secrets. Once set, the App Secret is immutable and cannot be updated. Use with
88-
caution.
89-
90-
For more information on **App Secrets**, refer to
91-
[Access confidential assets from your app](https://protocol.docs.iex.ec/for-developers/confidential-computing/access-confidential-assets)
92-
93-
:::
94-
9584
For more details and to learn how to use them in your application, refer here
96-
[Application I/O](https://protocol.docs.iex.ec/for-developers/application-io)
85+
[Inputs and Outputs](guides/build-iapp/inputs-and-outputs)
9786

9887
## 🚀 Launch your iApp
9988

@@ -196,7 +185,7 @@ templates through interactive prompts.
196185
**Usage**: `iapp mock <inputType> [options]`
197186
**Positional arguments**:
198187

199-
- `<inputType>` – Type of input to mock (e.g., `default`, `custom`)
188+
- `<inputType>` – Type of input to mock (e.g., `default`, `custom`)
200189

201190
**Options**:
202191

@@ -211,7 +200,7 @@ templates through interactive prompts.
211200
**Usage**: `iapp wallet <action> [options]`
212201
**Positional arguments**:
213202

214-
- `<action>` – Wallet action to perform (e.g., `balance`, `address`, `sign`)
203+
- `<action>` – Wallet action to perform (e.g., `balance`, `address`, `sign`)
215204

216205
**Options**:
217206

@@ -251,7 +240,7 @@ discontinuity.
251240
Your iApp is now running on iExec!
252241

253242
Once your application is **stable** and **functional**, you can learn how to
254-
[manage orders](https://protocol.docs.iex.ec/for-developers/advanced/manage-your-apporders)
243+
[manage access to your iApp](guides/build-iapp/manage-access)
255244

256245
<script setup>
257246
import CLIDemo from '@/components/CLIDemo.vue';

0 commit comments

Comments
 (0)