Skip to content
This repository was archived by the owner on May 3, 2022. It is now read-only.

Commit b9038fb

Browse files
definitelynobodyNick Vidal
authored andcommitted
Type Rust and WebAssembly consistently.
1 parent 864bff2 commit b9038fb

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

docs/Installation/Wasm.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,19 +2,19 @@
22

33
## Build and run a WebAssembly module
44

5-
Install the Webassembly rust toolchain:
5+
Install the WebAssembly Rust toolchain:
66

77
$ rustup target install wasm32-wasi
88

9-
Create a simple rust program:
9+
Create a simple Rust program:
1010

1111
$ cargo init --bin hello-world
1212
$ cd hello-world
1313
$ echo 'fn main() { println!("Hello, Enarx!"); }' > src/main.rs
1414
$ cargo build --release --target=wasm32-wasi
1515

1616
Assuming you did install the `enarx` binary and have it in your `$PATH`, you can
17-
now run the Webassembly program in an Enarx keep.
17+
now run the WebAssembly program in an Enarx keep.
1818

1919
$ enarx run target/wasm32-wasi/release/hello-world.wasm
2020
[…]

docs/Technical/Trust-Architecture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ Enarx provides four layers in the run-time stack. Working from the lowest up, t
88
1. a VMM (Virtual Memory Manager)
99
2. a microkernel (μkernel)
1010
3. a WASM runtime (WebAssembly)
11-
4. a WASI implementation (Web Assembly System Interface).
11+
4. a WASI implementation (WebAssembly System Interface).
1212

1313
All of these are cryptographically measured and checked at runtime before each deployment. They are not the only layers in the stack, however. Others include the CPU (in which layer we also include CPU firmware), the host kernel and the application itself. See below for a little more detail about the trust architecture.
1414

0 commit comments

Comments
 (0)