Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/confidential-containers/guest-components
Confidential Containers Guest Tools and Components
https://github.com/confidential-containers/guest-components
Last synced: 25 days ago
JSON representation
Confidential Containers Guest Tools and Components
- Host: GitHub
- URL: https://github.com/confidential-containers/guest-components
- Owner: confidential-containers
- License: apache-2.0
- Created: 2021-10-25T09:33:35.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2024-11-07T15:30:30.000Z (about 1 month ago)
- Last Synced: 2024-11-07T15:31:08.473Z (about 1 month ago)
- Language: Rust
- Homepage:
- Size: 2.88 MB
- Stars: 82
- Watchers: 26
- Forks: 94
- Open Issues: 73
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Codeowners: CODEOWNERS
Awesome Lists containing this project
- awesome-tee-blockchain - confidential-containers/guest-components - Confidential Containers Guest Tools and Components (Repositories / Rust)
README
# Confidential Container Tools and Components
[![FOSSA Status](https://app.fossa.com/api/projects/git%2Bgithub.com%2Fconfidential-containers%2Fimage-rs.svg?type=shield)](https://app.fossa.com/projects/git%2Bgithub.com%2Fconfidential-containers%2Fimage-rs?ref=badge_shield)This repository includes tools and components for confidential container images.
## Components
[Attestation Agent](attestation-agent)
An agent for facilitating attestation protocols.
Can be built as a library to run in a process-based enclave or built as a process that runs inside a confidential vm.[image-rs](image-rs)
Rust implementation of the container image management library.[ocicrypt-rs](ocicrypt-rs)
Rust implementation of the OCI image encryption library.[api-server-rest](api-server-rest)
CoCo Restful API server.[confidential-data-hub](confidential-data-hub)
Confidential Data Hub.[coco-keyprovider](attestation-agent/coco_keyprovider/)
CoCo Keyprovider. Used to encrypt the container images.## Tools
[secret-cli](confidential-data-hub/secret)
Utility for sealing and unsealing sealed secrets[CDH Client](confidential-data-hub/hub/src/bin)
A tool for exercising CDH endpoints[CDH Go Client](confidential-data-hub/golang)
A Go tool for exercising CDH endpoints[CDH (One Shot)](confidential-data-hub/hub/src/bin/cdh-oneshot.rs)
One Shot version of CDH[CoCo Keyprovider](attestation-agent/coco_keyprovider)
Keyprovider endpoint for encrypting images## Build
A `Makefile` is provided to quickly build Attestation Agent/Api Server Rest/Confidential Data Hub for a given platform.
```shell
make build TEE_PLATFORM=$(TEE_PLATFORM)
make install DESTDIR=/usr/local/bin
```The `TEE_PLATFORM` parameter can be
- `none`: for tests with non-confidential guests
- `all`: for all following platforms
- `fs`: for platforms with encrypted root filesystems (i.e. s390x)
- `tdx`: for Intel TDX
- `az-tdx-vtpm`: for Intel TDX with Azure vTPM
- `sev`: for AMD SEV(-ES)
- `snp`: for AMD SEV-SNP
- `amd`: for both AMD SEV(-ES) and AMD SEV-SNP
- `az-snp-vtpm`: for AMD SEV-SNP with Azure vTPM
- `se`: for IBM Secure Execution (SE)by default, `kbs`/`sev` as a resource provider will be built in Confidential Data Hub. If you do not want enable any
default except for only builtin `offline-fs-kbc`, you can build with `NO_RESOURCE_PROVIDER` flag set to `true`.```shell
make build TEE_PLATFORM=$(TEE_PLATFORM) NO_RESOURCE_PROVIDER=true
```## License
[![FOSSA Status](https://app.fossa.com/api/projects/git%2Bgithub.com%2Fconfidential-containers%2Fimage-rs.svg?type=large)](https://app.fossa.com/projects/git%2Bgithub.com%2Fconfidential-containers%2Fimage-rs?ref=badge_large)