Skip to content

Commit e1fdaf7

Browse files
authored
Fix doc link to dmverity-vhd tool (#9068)
Moved to - https://github.com/microsoft/integrity-vhd Removal in original location in - microsoft/hcsshim#2318
1 parent cd23d2f commit e1fdaf7

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

src/confcom/azext_confcom/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -317,7 +317,7 @@ az confcom acipolicygen -i config.json
317317

318318
## dmverity Layer Hashing
319319

320-
To ensure the container that is being deployed is the intended container, the `confcom` tooling uses [dmverity hashing](https://www.kernel.org/doc/html/latest/admin-guide/device-mapper/verity.html). This is done by downloading the container locally with the Docker Daemon (or using a pre-downloaded tar file of the OCI image) and performing the dmverity hashing using the [dmverity-vhd tool](https://github.com/microsoft/hcsshim/tree/main/cmd/dmverity-vhd). These layer hashes are placed into the Rego security policy in the "layers" field of their respective container. Note that these dmverity layer hashes are different than the layer hashes reported by `docker image inspect`.
320+
To ensure the container that is being deployed is the intended container, the `confcom` tooling uses [dmverity hashing](https://www.kernel.org/doc/html/latest/admin-guide/device-mapper/verity.html). This is done by downloading the container locally with the Docker Daemon (or using a pre-downloaded tar file of the OCI image) and performing the dmverity hashing using the [dmverity-vhd tool](https://github.com/microsoft/integrity-vhd/blob/main/cmd/dmverity-vhd/README.md). These layer hashes are placed into the Rego security policy in the "layers" field of their respective container. Note that these dmverity layer hashes are different than the layer hashes reported by `docker image inspect`.
321321

322322
### Mixed-mode Policy Generation
323323

0 commit comments

Comments
 (0)