Fixing md formatting sphinixification issues (#3510)

This commit is contained in:
Anthony Keenan 2018-07-05 09:40:36 +01:00 committed by GitHub
parent 2ab5a4cf12
commit df198acf59
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
5 changed files with 37 additions and 31 deletions

View File

@ -12,5 +12,5 @@ Nodes
clientrpc
shell
node-database
node-administration
out-of-process-verification
node-database-access-h2
node-administration

View File

Before

Width:  |  Height:  |  Size: 74 KiB

After

Width:  |  Height:  |  Size: 74 KiB

View File

@ -10,34 +10,34 @@ Kubernetes for parts specific to that.
The main idea behind the infrastructure is to provide a highly available cluster of enclave services (hosts) which can
serve enclaves on demand. It provides an interface for enclave business logic that's agnostic with regards to the
infrastructure, similar to [serverless architectures](details/serverless.md). The enclaves will use an opaque reference
to other enclaves or services in the form of [enclave channels](details/channels.md). Channels hides attestation details
infrastructure, similar to serverless architectures. The enclaves will use an opaque reference
to other enclaves or services in the form of enclave channels. Channels hides attestation details
and provide a loose coupling between enclave/non-enclave functionality and specific enclave images/services implementing
it. This loose coupling allows easier upgrade of enclaves, relaxed trust (whitelisting), dynamic deployment, and
horizontal scaling as we can spin up enclaves dynamically on demand when a channel is requested.
For more information see:
.. toctree::
:maxdepth: 1
details/serverless.md
details/channels.md
## Infrastructure components
Here are the major components of the infrastructure. Note that this doesn't include business logic specific
infrastructure pieces (like ORAM blob storage for Corda privacy model integration).
* [**Distributed key-value store**](details/kv-store.md):
Responsible for maintaining metadata about enclaves, hosts, sealed secrets and CPU locality.
* [**Discovery service**](details/discovery.md)
Responsible for resolving an enclave channel to a specific enclave image and a host that can serve it using the
metadata in the key-value store.
* [**Enclave host**](details/host.md):
This is a service capable of serving enclaves and driving the underlying traffic. Third party components like Intel's
SGX driver and aesmd also belong here.
* [**Enclave storage**](details/enclave-storage.md):
Responsible for serving enclave images to hosts. This is a simple static content server.
* [**IAS proxy**](details/ias-proxy.md):
This is an unfortunate necessity because of Intel's requirement to do mutual TLS with their services.
.. toctree::
:maxdepth: 1
details/kv-store.md
details/discovery.md
details/host.md
details/enclave-storage.md
details/ias-proxy.md
## Infrastructure interactions
* **Enclave deployment**:
@ -54,17 +54,23 @@ infrastructure pieces (like ORAM blob storage for Corda privacy model integratio
## Decisions to be made
* [**Strategic roadmap**](decisions/roadmap.md)
* [**CPU certification method**](decisions/certification.md)
* [**Enclave language of choice**](decisions/enclave-language.md)
* [**Key-value store**](decisions/kv-store.md)
.. toctree::
:maxdepth: 1
decisions/roadmap.md
decisions/certification.md
decisions/enclave-language.md
decisions/kv-store.md
## Further details
* [**Attestation**](details/attestation.md)
* [**Calendar time for data at rest**](details/time.md)
* [**Enclave deployment**](details/enclave-deployment.md)
.. toctree::
:maxdepth: 1
details/attestation.md
details/time.md
details/enclave-deployment.md
## Example deployment
This is an example of how two Corda parties may use the above infrastructure. In this example R3 is hosting the IAS
@ -75,4 +81,4 @@ the enclave image store (although R3 will need to have a repository of the signe
We may also decide to go the other way and have R3 host the enclave hosts and the discovery service, shared between
parties (if e.g. they don't have access to/want to maintain SGX capable boxes).
![Example SGX deployment](Example%20SGX%20deployment.png)
![Example SGX deployment](ExampleSGXdeployment.png)

View File

@ -78,6 +78,7 @@ We look forward to seeing what you can do with Corda!
design/kafka-notary/design.md
design/monitoring-management/design.md
design/sgx-integration/design.md
design/sgx-infrastructure/design.md
.. toctree::
:caption: Participate

View File

@ -2,7 +2,6 @@ Serialization
=============
.. toctree::
:caption: Other docs
:maxdepth: 1