Skip to content

Commit 05655ff

Browse files
committed
No _ in id names for whatever reason
1 parent 2bf5280 commit 05655ff

1 file changed

Lines changed: 14 additions & 14 deletions

File tree

xml/cha_images.xml

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -691,7 +691,7 @@
691691
system administrators, or system-level software can view or modify
692692
data in use.
693693
</para>
694-
<sect2 xml:id="_trusted_execution_environment_tee">
694+
<sect2 xml:id="trusted-execution-environment-tee">
695695
<title>Trusted Execution Environment (TEE)</title>
696696
<para>
697697
At the heart of confidential computing is the Trusted Execution Environment (TEE).
@@ -728,14 +728,14 @@
728728
</varlistentry>
729729
</variablelist>
730730
</sect2>
731-
<sect2 xml:id="_key_concepts_on_aws">
731+
<sect2 xml:id="key-concepts-on-aws">
732732
<title>Key Concepts on AWS</title>
733733
<para>
734734
AWS implements the TEE concepts through a combination of Nitro
735735
Trusted Platform Module (TPM) technology, specialized OS images,
736736
and Nitro Enclaves.
737737
</para>
738-
<sect3 xml:id="_isolation_on_aws">
738+
<sect3 xml:id="isolation-on-aws">
739739
<title>Isolation on AWS</title>
740740
<para>
741741
Isolation is achieved using images that provide an overlay-based read-only system.
@@ -744,7 +744,7 @@
744744
remotely accessible to minimize the attack surface.
745745
</para>
746746
</sect3>
747-
<sect3 xml:id="_attestation_on_aws">
747+
<sect3 xml:id="attestation-on-aws">
748748
<title>Attestation on AWS</title>
749749
<para>
750750
The image boots via a PCR-measured Unified Kernel Image (UKI) containing the kernel,
@@ -763,7 +763,7 @@
763763
</listitem>
764764
</itemizedlist>
765765
</sect3>
766-
<sect3 xml:id="_memory_encryption_and_nitro_enclaves">
766+
<sect3 xml:id="memory-encryption-and-nitro-enclaves">
767767
<title>Memory Encryption and Nitro Enclaves</title>
768768
<para>
769769
While the base instance runs in overlayfs mode (writing to memory only),
@@ -777,9 +777,9 @@
777777
</para>
778778
</sect3>
779779
</sect2>
780-
<sect2 xml:id="_practical_guide_deploying_attestable_images">
780+
<sect2 xml:id="practical-guide-deploying-attestable-images">
781781
<title>Practical Guide: Deploying Attestable Images</title>
782-
<sect3 xml:id="_1_fetch_and_register_the_image">
782+
<sect3 xml:id="fetch-and-register-the-image">
783783
<title>1. Fetch and Register the Image</title>
784784
<para>
785785
To start, you need an attestable image. For example, a SUSE Linux
@@ -809,7 +809,7 @@
809809
</para>
810810
</important>
811811
</sect3>
812-
<sect3 xml:id="_2_pcr_measurements">
812+
<sect3 xml:id="pcr-measurements">
813813
<title>2. PCR Measurements</title>
814814
<para>
815815
Before launching, download the precomputed PCR measurements:
@@ -821,7 +821,7 @@
821821
instance.
822822
</para>
823823
</sect3>
824-
<sect3 xml:id="_3_launching_the_instance">
824+
<sect3 xml:id="launching-the-instance">
825825
<title>3. Launching the Instance</title>
826826
<para>
827827
Select an instance type that supports Nitro TPM and Enclaves (e.g.,
@@ -830,7 +830,7 @@
830830
is explicitly enabled.
831831
</para>
832832
</sect3>
833-
<sect3 xml:id="_4_verifying_the_tee">
833+
<sect3 xml:id="verifying-the-tee">
834834
<title>4. Verifying the TEE</title>
835835
<para>
836836
Once logged into the instance, you can generate an attestation
@@ -860,7 +860,7 @@ $ show-nitrotpm-pcrs
860860
</itemizedlist>
861861
</sect3>
862862
</sect2>
863-
<sect2 xml:id="_managing_the_enclave_workload">
863+
<sect2 xml:id="managing-the-enclave-workload">
864864
<title>Managing the Enclave Workload</title>
865865
<para>
866866
The workload itself is packaged as an AWS Enclave Image (<literal>.eif</literal>)
@@ -875,7 +875,7 @@ $ show-nitrotpm-pcrs
875875
is not meant to be a real-world application but serves as a demonstration of how
876876
to build and run an enclave that can attest its integrity.
877877
</para>
878-
<sect3 xml:id="_running_the_enclave">
878+
<sect3 xml:id="running-the-enclave">
879879
<title>Running the Enclave</title>
880880
<para>
881881
Use the <literal>nitro-cli</literal> tool to launch your workload:
@@ -888,7 +888,7 @@ $ pushd /data $ nitro-cli run-enclave \
888888
$ nitro-cli describe-enclaves
889889
</programlisting>
890890
</sect3>
891-
<sect3 xml:id="_enclave_attestation">
891+
<sect3 xml:id="enclave-attestation">
892892
<title>Enclave Attestation</title>
893893
<para>
894894
To verify the enclave's integrity, connect to it via <literal>vsock</literal>:
@@ -911,7 +911,7 @@ $ vsock_client Enclave-CID
911911
</itemizedlist>
912912
</sect3>
913913
</sect2>
914-
<sect2 xml:id="_future_directions_for_suse">
914+
<sect2 xml:id="future-directions-for-suse">
915915
<title>Future Directions for SUSE</title>
916916
<para>
917917
Efforts are underway to deepen SUSE support for AWS

0 commit comments

Comments
 (0)