Skip to content

Commit 9ff6416

Browse files
committed
Merge remote-tracking branch 'origin/feature-in-onboarding' into feature-in-onboarding
2 parents bea722e + 8d8b833 commit 9ff6416

File tree

3 files changed

+34
-15
lines changed

3 files changed

+34
-15
lines changed

docs/hackathon/1-cookbook.mdx

Lines changed: 16 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,19 @@ import ConfidentialVMBuilder from "@site/src/components/ConfidentialVMBuilder";
1010

1111
Reference for commands you will encounter when interacting with Confidential VMs.
1212

13-
## Command Builder
13+
## Confidential Space command builder
1414

15-
Use this interactive builder to generate the exact command you need:
15+
Use this interactive builder to generate the exact Confidential Space VM deploy command you need.
16+
17+
:::warning[Source your .env file]
18+
19+
Before running the following gcloud command don't forget to source your `.env` file:
20+
21+
```bash
22+
source .env
23+
```
24+
25+
:::
1626

1727
<ConfidentialVMBuilder />
1828

@@ -54,9 +64,9 @@ You can also view logs in the Google Cloud Console by navigating to the Logging
5464

5565
:::
5666

57-
## Deploying AMD SEV Confidential VMs
67+
## Deploying on AMD SEV
5868

59-
This command creates a Confidential Computing VM instance using AMD SEV ([Secure Encrypted Virtualization](https://www.amd.com/content/dam/amd/en/documents/epyc-business-docs/white-papers/memory-encryption-white-paper.pdf)), with a specific image, network configuration, and security settings.
69+
This command creates a Confidential Space VM instance using AMD SEV ([Secure Encrypted Virtualization](https://www.amd.com/content/dam/amd/en/documents/epyc-business-docs/white-papers/memory-encryption-white-paper.pdf)), with a specific image, network configuration, and security settings.
6070
The metadata section is critical for configuring the Trusted Execution Environment (TEE).
6171
The command is broken down in the following sections.
6272

@@ -196,9 +206,9 @@ gcloud compute instances create $INSTANCE_NAME \
196206
- `--reservation-affinity=any`: If you have reservations, this allows the VM to use any available reservation.
197207
- `--confidential-compute-type=SEV`: Enables AMD SEV (Secure Encrypted Virtualization) Confidential Computing. This is the core flag that makes this instance a confidential VM.
198208

199-
## Deploying Intel TDX Confidential VMs
209+
## Deploying on Intel TDX
200210

201-
This command creates a Confidential Computing VM instance using Intel TDX ([Trust Domain Extensions](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/documentation.html)), with a specific image, network configuration, and security settings.
211+
This command creates a Confidential Space VM instance using Intel TDX ([Trust Domain Extensions](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/documentation.html)), with a specific image, network configuration, and security settings.
202212
The command instructions differing from [Deploying AMD SEV Confidential VMs](#deploying-amd-sev-confidential-vms) are highlighted.
203213

204214
```bash

src/components/ConfidentialVMBuilder.tsx

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -371,7 +371,7 @@ export default function ConfidentialVMBuilder(): JSX.Element {
371371
<div style={containerStyle}>
372372
<div style={headerStyle} onClick={() => setIsExpanded(!isExpanded)}>
373373
<Heading as="h3" style={{ margin: 0, fontSize: "1.25rem" }}>
374-
Confidential VM Command Builder
374+
Confidential Space Command Builder
375375
</Heading>
376376
<span>{isExpanded ? "▲" : "▼"}</span>
377377
</div>
@@ -420,8 +420,8 @@ export default function ConfidentialVMBuilder(): JSX.Element {
420420
style={inputStyle}
421421
/>
422422
<div style={hintStyle}>
423-
Default is $INSTANCE_NAME from your .env file (recommended
424-
format: PROJECT_NAME-TEAM_NAME)
423+
Default: $INSTANCE_NAME from your .env file (format:
424+
PROJECT_NAME-TEAM_NAME)
425425
</div>
426426
</div>
427427

@@ -494,8 +494,8 @@ export default function ConfidentialVMBuilder(): JSX.Element {
494494
style={inputStyle}
495495
/>
496496
<div style={hintStyle}>
497-
Default is $TEE_IMAGE_REFERENCE from your .env file (e.g.,
498-
ghcr.io/YOUR_REPO_IMAGE:main)
497+
Default: $TEE_IMAGE_REFERENCE from your .env file (e.g.
498+
ghcr.io/flare-foundation/flare-ai-social:main)
499499
</div>
500500
</div>
501501

@@ -514,6 +514,9 @@ export default function ConfidentialVMBuilder(): JSX.Element {
514514
Add Variable
515515
</button>
516516
</div>
517+
<div style={hintStyle}>
518+
Environment variables are by default loaded from your .env file
519+
</div>
517520

518521
{formState.envVars.map((envVar, index) => (
519522
<div

src/components/hackathon/OnboardingChecklist.tsx

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,12 @@ const CHECKLIST_STEPS = [
1111
{ id: "google-account-create", text: "Have a Google account" },
1212
{
1313
id: "google-account-register",
14-
text: "Submit account during registration",
14+
text: "Submit account during registration (i.e. the Google Form)",
15+
},
16+
{
17+
id: "google-account-access",
18+
text: "Verify access to `verifiable-ai-hackathon` GCP project",
1519
},
16-
{ id: "google-account-access", text: "Verify GCP project access" },
1720
],
1821
},
1922
{
@@ -25,7 +28,7 @@ const CHECKLIST_STEPS = [
2528
{ id: "store-api-key", text: "Store API key securely" },
2629
{
2730
id: "openrouter-api",
28-
text: "Set up OpenRouter API (Consensus track only)",
31+
text: "Set up OpenRouter API (Consensus Learning track only)",
2932
},
3033
],
3134
},
@@ -36,7 +39,10 @@ const CHECKLIST_STEPS = [
3639
subSteps: [
3740
{ id: "gcloud-install", text: "Install gcloud CLI" },
3841
{ id: "gcloud-auth", text: "Authenticate CLI" },
39-
{ id: "gcloud-verify", text: "Verify project access" },
42+
{
43+
id: "gcloud-verify",
44+
text: "Verify gcloud access to verifiable-ai-hackathon project",
45+
},
4046
],
4147
},
4248
{

0 commit comments

Comments
 (0)