Tobin Feldman-Fitzthum
Tobin Feldman-Fitzthum
Knobs are a great part of this project, but there are limited options to style them. It seems like the only thing we can do is change the background color...
This is the very beginning of this PR. I still need to fix some issues with the underlying crate, add support for verifying tokens in the KBS, and fixup all...
Today we have to select which token verifier we want to use at configuration time. The KBS can't handle connections from multiple guests that got their tokens from different types...
Currently it's optional whether the KBS is configured with the public key of the AS. If the public key is not provided, the token is not verified. There is an...
Is this possible? Async closures are not stable. I don't really want to stick a `block_on` thing inside the closure. I might be able to use an async function as...
Better version of https://github.com/confidential-containers/trustee/pull/752 (I am keeping that branch in place in case anyone is developing on top of it. This PR has significant changes.) Not quite done yet, but...
We expect the user to generate the admin keypair for the KBS (and keyprovider), but this really isn't necessary. This commit does maintain the existing workflow, so users can continue...
This PR allows clients to configure the RVPS by communicating with the KBS, which will proxy the request via the AS, to the KBS. The significance of this might not...
See https://github.com/confidential-containers/trustee/issues/762 We've been providing a kbs-client binary via oras that only has the sample attester built in. This has been fine for our test cases in the CI, but...
See also https://github.com/confidential-containers/guest-components/pull/957 and https://github.com/virtee/kbs-types/pull/58 A few things to know about this piece of the puzzle: 1) We have a different attestation policy for each device class. The evidence from...