This is an automated email from the ASF dual-hosted git repository.

zfc pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/incubator-teaclave-website.git


The following commit(s) were added to refs/heads/master by this push:
     new 574429615 site: add overview page and polish content
574429615 is described below

commit 574429615327e833dc597da015244b9105010479
Author: Zhaofeng Chen <[email protected]>
AuthorDate: Sat Jul 19 01:35:21 2025 +0000

    site: add overview page and polish content
---
 site/blog/2025-07-08-repo-reorg-community-focus.md | 93 +++++++++++++++++++++
 site/docs/community/community.md                   | 10 ---
 site/docusaurus.config.js                          |  4 +-
 site/src/pages/index.js                            |  2 +-
 site/src/pages/overview.md                         | 94 ++++++++++++++++++++++
 5 files changed, 190 insertions(+), 13 deletions(-)

diff --git a/site/blog/2025-07-08-repo-reorg-community-focus.md 
b/site/blog/2025-07-08-repo-reorg-community-focus.md
new file mode 100644
index 000000000..60d67a40d
--- /dev/null
+++ b/site/blog/2025-07-08-repo-reorg-community-focus.md
@@ -0,0 +1,93 @@
+---
+
+title: Teaclave Repository Restructuring and Community Focus
+date: 2025-07-08
+author: [email protected]
+
+---
+
+Teaclave was originally created with a broad vision to explore the 
possibilities of confidential computing. It consisted of multiple components, 
including SDKs supporting Intel SGX and Arm TrustZone, a general-purpose 
application framework (FaaS), and experimental verification efforts, spanning 
several repositories under the Apache Incubator.
+
+Over the years, as the field of confidential computing evolved, we observed a 
clear trend: developers increasingly preferred building their own Trusted 
Applications using SDKs directly, rather than relying on a general-purpose FaaS 
framework. This organic shift in usage has also been reflected in our 
contributor activities. Most community engagement and active development now 
center around the SDKs, especially the Rust-based TrustZone and SGX SDKs.
+
+As part of our preparation for graduation from the Apache Incubator, we’ve 
received recurring questions about what Teaclave is today, and what its 
long-term focus should be. To address this and align with current usage and 
contributions, we propose a refined mission and corresponding repository 
restructuring.
+
+---
+
+## Refined Mission
+
+`Teaclave empowers developers to build memory-safe (e.g. Rust) Trusted 
Applications across diverse confidential computing platforms.`  
+Our primary focus going forward will be on maintaining and improving SDKs that 
support this mission.
+
+---
+
+## Repository Restructuring Plan
+
+### Goals
+
+- Reflect Teaclave’s active development and current focus  
+- Reduce long-term maintenance costs for inactive components  
+- Preserve historical contributions and community merit  
+
+### `incubator-teaclave`
+
+**Current Status:**  
+- Role: Former flagship repository for the FaaS-style confidential computing 
framework.  
+- Activity: Last commit in July 2023.  
+- Maintenance: No longer actively developed or aligned with the community’s 
current direction.  
+
+**Shift in Focus:**  
+- This repository will be repurposed as the **main landing page** for the 
Teaclave project (Podling or TLP). It will provide high-level documentation, 
links to active SDKs, examples to help users get started, and showcases to 
build with Teaclave SDKs.  
+- Historical contributions and community merit will be preserved [1].  
+- Preview of reorganized content is already hosted on the `main` branch [2].
+  - A clear project overview 
+  - Links to active SDK repositories (TrustZone, SGX, etc.)  
+  - Showcases for each SDK  
+  - A unified contribution guide and roadmap  
+
+[1]: https://github.com/apache/incubator-teaclave/graphs/contributors
+[2]: https://github.com/apache/incubator-teaclave/tree/main  
+
+**Action Items:**  
+- Deprecate the existing `master` branch and rename it to `legacy`  
+- Set `main` as the default branch  
+
+### `incubator-teaclave-crates`
+
+**Current Status:**  
+- Role: Hosts ported/forked crates for TEE platforms (e.g., sgx-crypto, 
protobuf)  
+- Activity: Some crates are outdated or redundant  
+- Maintenance: Partial  
+
+**Shift in Focus:**  
+This repository will remain an **auxiliary dependency hub** supporting only 
the active SDKs. It will be **cleaned and scoped down** to what is still 
necessary for TrustZone/SGX development.  
+**Action Items:**  
+- Retain the repository to support SDK builds and examples  
+- Remove:  
+  - Crates no longer used by maintained SDKs or demos  
+  - Redundant forks of crates that now work upstream  
+- Preserve and maintain:  
+  - Crates required by `incubator-teaclave-trustzone-sdk` or 
`incubator-teaclave-sgx-sdk`  
+
+### `incubator-teaclave-verification`
+
+**Current Status:**  
+- Role: Experimental repo for formal verification methods  
+- Activity: No active development or adoption  
+- Maintenance: Unmaintained  
+
+**Shift in Focus:**  
+This repository will become a **historical archive** for early verification 
efforts, preserved for transparency and reference.  
+
+**Action Items:**  
+- Archive the repository on GitHub (read-only)  
+- Add a short README noting its archival status and rationale  
+
+### Active SDKs
+
+These SDKs are actively maintained and form the core of Teaclave’s current 
focus:  
+- `incubator-teaclave-trustzone-sdk`  
+- `incubator-teaclave-sgx-sdk`  
+- `incubator-teaclave-java-tee-sdk`  
+
+No changes are proposed at this time. Any future updates will be discussed in 
separate threads.
\ No newline at end of file
diff --git a/site/docs/community/community.md b/site/docs/community/community.md
index c043c12f9..07af9cb50 100644
--- a/site/docs/community/community.md
+++ b/site/docs/community/community.md
@@ -22,10 +22,6 @@ an email to `[email protected]` (or
 `[email protected]`) to subscribe (or unsubscribe) the dev
 mailing list.
 
-## Discord
-
-Connect directly with Teaclave community members in Discord. 
[[Join](https://discord.gg/ynECXsxm5P)]
-
 ## GitHub Issues
 
 You can also ask questions, propose features, and report bugs in Teaclave's
@@ -43,12 +39,6 @@ we aim to create a project that is maintained and owned by 
the community. All
 kinds of contributions are welcome. Read this [contributing 
document](/contributing/) to
 learn more about how to contribute. Huge thanks to our 
[contributors](/contributors/).
 
-## Event Calendar
-
-The Teaclave community organizes a number of public events, including monthly
-general online meetups. You can subscribe to the
-[public events 
calendar](https://calendar.google.com/calendar/u/0/[email protected]).
-
 ## Reporting a Vulnerability
 
 We take a very active stance in eliminating security problems in Teaclave. We
diff --git a/site/docusaurus.config.js b/site/docusaurus.config.js
index 162e64447..954383d18 100644
--- a/site/docusaurus.config.js
+++ b/site/docusaurus.config.js
@@ -165,15 +165,15 @@ const config = {
           },
           { to: '/download', label: 'Download', position: 'right' },
           {
-            to: '/teaclave-docs',
+            to: '/overview',
             label: 'Docs',
             items: [
-              { label: 'Teaclave', to: '/teaclave-docs/' },
               { label: 'Teaclave TrustZone SDK', to: '/trustzone-sdk-docs/' },
               { label: 'API Docs: Teaclave TrustZone SDK (Host)', href: 
'https://teaclave.apache.org/api-docs/trustzone-sdk/optee_teec', target: 
'_self', rel: '' },
               { label: 'API Docs: Teaclave TrustZone SDK (TA)', href: 
'https://teaclave.apache.org/api-docs/trustzone-sdk/optee_utee', target: 
'_self', rel: '' },
               { label: 'Teaclave SGX SDK', to: '/sgx-sdk-docs/' },
               { label: 'API Docs: Teaclave SGX SDK', href: 
'https://teaclave.apache.org/api-docs/sgx-sdk/', target: '_self', rel: '' },
+              { label: 'Teaclave', to: '/teaclave-docs/' },
               { label: 'Teaclave FaaS (legacy)', to: '/docs/' },
             ],
             position: 'right',
diff --git a/site/src/pages/index.js b/site/src/pages/index.js
index 0e412fef0..9fe21cbde 100644
--- a/site/src/pages/index.js
+++ b/site/src/pages/index.js
@@ -19,7 +19,7 @@ function HomepageHeader() {
         <div className={styles.buttons}>
           <Link
             className="button button--secondary button--lg"
-            to="/teaclave-docs/">
+            to="/overview/">
             GET STARTED →
           </Link>
         </div>
diff --git a/site/src/pages/overview.md b/site/src/pages/overview.md
new file mode 100644
index 000000000..8b7a92e18
--- /dev/null
+++ b/site/src/pages/overview.md
@@ -0,0 +1,94 @@
+---
+permalink: /overview
+---
+
+# Teaclave: Empowering Memory-Safe Development for TEEs
+
+Welcome to the official website of Teaclave, an open-source initiative under 
the [Apache Incubator](https://incubator.apache.org/). Teaclave empowers 
developers to build memory-safe Trusted Applications across diverse 
confidential computing platforms**, including **Intel SGX** and **Arm 
TrustZone**.
+
+Originally designed as a general-purpose secure computing framework, Teaclave 
has naturally evolved into a growing ecosystem of developer-friendly SDKs, 
enabling direct development of custom Trusted Applications. This evolution is 
driven by strong community adoption and contributions.
+
+This page serves as an overview and entry point to the entire Teaclave 
ecosystem. Use it as a guide to explore SDKs, documentation, and useful 
developer resources for building secure and efficient TEE-based applications.
+
+---
+
+## 🔧 The Teaclave Ecosystem
+
+The Teaclave ecosystem consists of several independently maintained 
repositories, each targeting a specific Trusted Execution Environment (TEE). 
These SDKs and supporting libraries provide essential tooling for building 
secure applications in constrained environments using modern memory-safe 
languages like Rust.
+
+---
+
+### 🔐 [Teaclave TrustZone 
SDK](https://github.com/apache/incubator-teaclave-trustzone-sdk/)
+
+The Teaclave TrustZone SDK is a Rust-based development toolkit for building 
Trusted Applications (TAs) on Arm platforms using the open-source 
[OP-TEE](https://optee.readthedocs.io/) ecosystem. As the [**officially 
recommended Rust SDK for 
OP-TEE**](https://optee.readthedocs.io/en/latest/building/optee_with_rust.html),
 it enables developers to leverage the Rust standard library (`std`) in the 
secure world—something rarely possible in embedded TEE development.
+
+This SDK adheres to the GlobalPlatform TEE specifications, ensuring broad 
compatibility. It provides ergonomic, memory-safe APIs for both the normal 
world and the secure world, significantly reducing the risk of low-level memory 
vulnerabilities. A ready-to-use QEMU-based emulator environment is also 
included, allowing developers to rapidly prototype and test Trusted 
Applications entirely in Docker containers.
+
+**📄 Quick Navigation Links**
+- [📘 Teaclave TrustZone Docs](/trustzone-sdk-docs)
+- [📚 API Doc For (Normal World) Host 
Application](https://teaclave.apache.org/api-docs/trustzone-sdk/optee_teec/)
+- [📚 API Doc For (Secure World) Trust 
Application](https://teaclave.apache.org/api-docs/trustzone-sdk/optee_utee/)
+- [🚀 Quick Start: TA Development on 
QEMU](/trustzone-sdk-docs/emulate-and-dev-in-docker.md)
+- [🚀 Overview of OP-TEE Rust 
Examples](/trustzone-sdk-docs/overview-of-optee-rust-examples)
+- [🔗 OP-TEE with Rust (using Teaclave TrustZone 
SDK)](https://optee.readthedocs.io/en/latest/building/optee_with_rust.html)
+
+---
+
+### 🔐 [Teaclave SGX SDK](https://github.com/apache/incubator-teaclave-sgx-sdk/)
+
+The Teaclave SGX SDK brings memory-safe Rust programming to Intel SGX, 
enabling the development of secure enclave applications that benefit from 
Rust’s strong safety guarantees. It supports writing both enclaves and 
untrusted host applications in Rust, encouraging consistent use of modern Rust 
idioms across the entire trusted-untrusted boundary.
+
+The SDK offers a complete SGX-compatible runtime and tooling suite, bridging 
the gap between native SGX support and idiomatic Rust development. It allows 
developers to adopt Rust’s ownership model, type system, and concurrency safety 
even within the limitations of SGX.
+
+**📄 Quick Navigation Links**
+- [📘 Teaclave SGX Docs](/sgx-sdk-docs/)
+- [📚 SGX Enclave API Doc](https://teaclave.apache.org/api-docs/sgx-sdk/)
+- [🚀 Setting up your SGX Development 
Environment](/sgx-sdk-docs/environment-setup)
+
+---
+
+### 🔐 [Teaclave FaaS 
(legacy)](https://github.com/apache/incubator-teaclave/tree/legacy)
+
+The original **Teaclave Function-as-a-Service (FaaS)** platform was designed 
as a **general-purpose secure computing framework** that enables users to 
execute private computations on confidential data using Intel SGX.
+
+As the field of confidential computing evolved, the Teaclave community 
naturally shifted its focus. Developers increasingly preferred building their 
own custom Trusted Applications directly using SDKs, rather than relying on a 
general-purpose FaaS framework. This shift was reflected in contributor 
activity, with most development and community engagement moving toward the 
Rust-based TrustZone and SGX SDKs. As a result, the FaaS framework is no longer 
actively maintained and has been archived.
+
+Although now considered **legacy**, the FaaS platform remains a valuable 
milestone in Teaclave’s evolution into an SDK-focused ecosystem. Its 
architecture demonstrates how to build a high-level, privacy-preserving compute 
service on top of hardware-enforced TEEs.  We preserve its documentation and 
codebase history so that developers can continue to learn from its design and 
implementation.
+
+**📄 Quick Navigation Links**
+- [📘 Teaclave FaaS (legacy) Docs](/docs/)
+- [📘 Papers, Talks, and Related Articles](/docs/papers-talks)
+
+---
+
+### ☕ [Teaclave Java TEE SDK 
*(Experimental)*](https://github.com/apache/incubator-teaclave-java-tee-sdk/)
+
+The Teaclave Java TEE SDK is an **experimental toolkit** for building 
Java-based Trusted Applications on Intel SGX. It follows a familiar 
host/enclave partitioning model, similar to Intel's official SGX SDK, and aims 
to make confidential computing more accessible to Java developers.
+
+By supporting a modular structure with clear separation between host-side and 
enclave-side components, this SDK helps bring the benefits of hardware-based 
trusted execution to Java ecosystems. It also adopts a provider interface 
inspired by the Java SPI (Service Provider Interface) model to facilitate 
pluggability and flexibility in enclave logic.
+
+> ⚠️ Note: This SDK is still in an experimental stage.
+
+**📄 Quick Navigation Links**
+- [📘 Java TEE SDK Proposal](/blog/2022/10/08/accepting-java-enclave-proposal)
+
+---
+
+### 📦 [Teaclave Dependency 
Crates](https://github.com/apache/incubator-teaclave-crates)
+
+The Teaclave Dependency Crates repository hosts a curated set of Rust 
libraries that have been adapted for use within Trusted Execution Environments. 
Due to the limitations of TEEs—such as the absence of standard OS support, 
restricted I/O, and incomplete standard library coverage—many third-party 
crates require modification or isolation to ensure safety and compatibility.
+
+This repository serves as a security-reviewed foundation for TEE application 
development, offering vetted versions of widely-used crates like `rustls` and 
`ring`, reworked for secure enclave execution. It significantly simplifies the 
dependency management process for developers building within these constrained 
environments.
+
+---
+
+## 👥 Community Management
+
+We welcome all contributors to help grow the Teaclave project and ecosystem. 
Whether you're new to trusted computing or an experienced contributor, your 
involvement is highly valued.
+
+Please visit the [**Community**](/community) page for more details on how to 
participate and contribute.
+
+**📄 Quick Navigation Links**
+- [🚀 How to Contribute to Teaclave](/contributing)
+- [🚀 How to Become a Member of Teaclave](/becoming-a-member)
+- [🚀 How to Make a Release](/release-guide)


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to