mirror of
https://github.com/corda/corda.git
synced 2025-01-18 02:39:51 +00:00
Fixing md formatting sphinixification issues (#3510)
This commit is contained in:
parent
2ab5a4cf12
commit
df198acf59
@ -12,5 +12,5 @@ Nodes
|
||||
clientrpc
|
||||
shell
|
||||
node-database
|
||||
node-administration
|
||||
out-of-process-verification
|
||||
node-database-access-h2
|
||||
node-administration
|
Before Width: | Height: | Size: 74 KiB After Width: | Height: | Size: 74 KiB |
@ -10,34 +10,34 @@ Kubernetes for parts specific to that.
|
||||
|
||||
The main idea behind the infrastructure is to provide a highly available cluster of enclave services (hosts) which can
|
||||
serve enclaves on demand. It provides an interface for enclave business logic that's agnostic with regards to the
|
||||
infrastructure, similar to [serverless architectures](details/serverless.md). The enclaves will use an opaque reference
|
||||
to other enclaves or services in the form of [enclave channels](details/channels.md). Channels hides attestation details
|
||||
infrastructure, similar to serverless architectures. The enclaves will use an opaque reference
|
||||
to other enclaves or services in the form of enclave channels. Channels hides attestation details
|
||||
and provide a loose coupling between enclave/non-enclave functionality and specific enclave images/services implementing
|
||||
it. This loose coupling allows easier upgrade of enclaves, relaxed trust (whitelisting), dynamic deployment, and
|
||||
horizontal scaling as we can spin up enclaves dynamically on demand when a channel is requested.
|
||||
|
||||
For more information see:
|
||||
|
||||
.. toctree::
|
||||
:maxdepth: 1
|
||||
|
||||
details/serverless.md
|
||||
details/channels.md
|
||||
|
||||
## Infrastructure components
|
||||
|
||||
Here are the major components of the infrastructure. Note that this doesn't include business logic specific
|
||||
infrastructure pieces (like ORAM blob storage for Corda privacy model integration).
|
||||
|
||||
* [**Distributed key-value store**](details/kv-store.md):
|
||||
Responsible for maintaining metadata about enclaves, hosts, sealed secrets and CPU locality.
|
||||
|
||||
* [**Discovery service**](details/discovery.md)
|
||||
Responsible for resolving an enclave channel to a specific enclave image and a host that can serve it using the
|
||||
metadata in the key-value store.
|
||||
|
||||
* [**Enclave host**](details/host.md):
|
||||
This is a service capable of serving enclaves and driving the underlying traffic. Third party components like Intel's
|
||||
SGX driver and aesmd also belong here.
|
||||
|
||||
* [**Enclave storage**](details/enclave-storage.md):
|
||||
Responsible for serving enclave images to hosts. This is a simple static content server.
|
||||
|
||||
* [**IAS proxy**](details/ias-proxy.md):
|
||||
This is an unfortunate necessity because of Intel's requirement to do mutual TLS with their services.
|
||||
|
||||
.. toctree::
|
||||
:maxdepth: 1
|
||||
|
||||
details/kv-store.md
|
||||
details/discovery.md
|
||||
details/host.md
|
||||
details/enclave-storage.md
|
||||
details/ias-proxy.md
|
||||
|
||||
## Infrastructure interactions
|
||||
|
||||
* **Enclave deployment**:
|
||||
@ -54,17 +54,23 @@ infrastructure pieces (like ORAM blob storage for Corda privacy model integratio
|
||||
|
||||
## Decisions to be made
|
||||
|
||||
* [**Strategic roadmap**](decisions/roadmap.md)
|
||||
* [**CPU certification method**](decisions/certification.md)
|
||||
* [**Enclave language of choice**](decisions/enclave-language.md)
|
||||
* [**Key-value store**](decisions/kv-store.md)
|
||||
.. toctree::
|
||||
:maxdepth: 1
|
||||
|
||||
decisions/roadmap.md
|
||||
decisions/certification.md
|
||||
decisions/enclave-language.md
|
||||
decisions/kv-store.md
|
||||
|
||||
## Further details
|
||||
|
||||
* [**Attestation**](details/attestation.md)
|
||||
* [**Calendar time for data at rest**](details/time.md)
|
||||
* [**Enclave deployment**](details/enclave-deployment.md)
|
||||
|
||||
.. toctree::
|
||||
:maxdepth: 1
|
||||
|
||||
details/attestation.md
|
||||
details/time.md
|
||||
details/enclave-deployment.md
|
||||
|
||||
## Example deployment
|
||||
|
||||
This is an example of how two Corda parties may use the above infrastructure. In this example R3 is hosting the IAS
|
||||
@ -75,4 +81,4 @@ the enclave image store (although R3 will need to have a repository of the signe
|
||||
We may also decide to go the other way and have R3 host the enclave hosts and the discovery service, shared between
|
||||
parties (if e.g. they don't have access to/want to maintain SGX capable boxes).
|
||||
|
||||
![Example SGX deployment](Example%20SGX%20deployment.png)
|
||||
![Example SGX deployment](ExampleSGXdeployment.png)
|
@ -78,6 +78,7 @@ We look forward to seeing what you can do with Corda!
|
||||
design/kafka-notary/design.md
|
||||
design/monitoring-management/design.md
|
||||
design/sgx-integration/design.md
|
||||
design/sgx-infrastructure/design.md
|
||||
|
||||
.. toctree::
|
||||
:caption: Participate
|
||||
|
@ -2,7 +2,6 @@ Serialization
|
||||
=============
|
||||
|
||||
.. toctree::
|
||||
|
||||
:caption: Other docs
|
||||
:maxdepth: 1
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user