Граф коммитов

403 Коммитов

Автор SHA1 Сообщение Дата
Julien Maffre 38432a420e
Add log line for when ledger entry cannot be found (#3892) 2022-05-27 09:37:59 +01:00
Julien Maffre 4cca853963
Add recovery benchmark script (#3887) 2022-05-25 09:12:43 +01:00
Eddy Ashton 8e0b2c91cf
Restore public `ccf::Receipt` type (#3793) 2022-04-29 12:03:22 +00:00
Eddy Ashton e660b96ae0
Make verbose host logging always available (#3762) 2022-04-12 17:44:50 +01:00
Julien Maffre f2909fd0f0
Account for timezone in certificate validity period (#3732) 2022-04-05 11:51:41 +01:00
Amaury Chamayou 49d7b7941e
Fix unsafe package version number (#3698) 2022-03-24 19:15:16 +00:00
Amaury Chamayou 1346864472
Tweak stub to avoid symbol conflict (#3695) 2022-03-24 17:06:05 +00:00
Amaury Chamayou 8811dd6f2e
Set up unsafe build (#3631) 2022-03-09 21:36:50 +00:00
Eddy Ashton e30c6fb0ad
Separate public KV headers from implementation details (#3578) 2022-02-23 16:50:49 +00:00
Eddy Ashton c4ea8dfff2
Public header cleanup, part 2 (#3543) 2022-02-14 17:52:04 +00:00
Eddy Ashton d860527326
Move some headers to public, remove some unnecessary includes (#3533) 2022-02-11 09:35:38 +00:00
Eddy Ashton 26b8b307c3
Split authentication policies into public definition, private implementation (#3536) 2022-02-10 18:45:47 +00:00
Eddy Ashton 6c7a76b80d
Combine `cchost` and `cchost.virtual` (#3476) 2022-02-08 20:20:29 +00:00
Amaury Chamayou f3e2b06cdb
Make perf_client clients/perf (#3511) 2022-02-04 13:58:13 +00:00
Amaury Chamayou 9c4ef0e890
Upgrade Open Enclave to 0.17.6 (#3509) 2022-02-04 13:30:04 +00:00
Amaury Chamayou 9fdb6617bb
Commit evidence in ledger (#3460) 2022-01-31 18:19:48 +00:00
Eddy Ashton b9cf84f679
Daily fix - export symbols in SAN build (#3458) 2022-01-26 17:50:44 +00:00
Eddy Ashton ffd5124633
Simplify `logger.h` (#3419) 2022-01-26 15:57:59 +00:00
Maik Riechert 609ed5f010
cmake: add missing sgx target guards (#3447) 2022-01-25 11:55:20 +00:00
Christoph M. Wintersteiger b114701d4d
Handle UBSAN failures in connections test (#3433) 2022-01-24 12:15:52 +00:00
Christoph M. Wintersteiger 8666bbc96f
Remove mbedTLS (#3394)
Now that we use OpenSSL for TLS connections, we removed the remaining bits that relied on mbedTLS.
2022-01-18 17:43:53 +00:00
Eddy Ashton 21cd9b9674
Move constitutions to samples directory (#3401) 2022-01-13 18:31:53 +00:00
Eddy Ashton 4b67651af3
Remove `proposal_generator.py` (#3400) 2022-01-13 17:14:37 +00:00
Renato Golin 4a364317cb
Implement TLS in OpenSSL, support TLS 1.3 (#3361)
* Implement TLS in OpenSSL, support TLS 1.3

This is a large commit, implementing the TLS layer in OpenSSL,
together with mbedTLS, and is part of a transition to eliminate
mbedTLS from the codebase.

The src/crypto part is done already and this is a similar effort
on src/tls. The last part is src/clients (used for testing) and
will be done as a future patch, with extensive testing separate
than this work.

This commit has a temporary structure, to allow a compiler flag
to switch between OpenSSL and mbedTLS. Unlike src/crypto, we want
the transition to be as short lived as possible, so we didn't try
to create common classes, just an include trick to use the right
library.

The main changes, in order from most generic to most specific, are:

1.  The CMake flag `TLS_PROVIDER_IS_MBEDTLS` was introduced, turned
    OFF by default, to build CCF with mbedTLS instead of OpenSSL. This
    is for testing, in case we find issues with the new implementation.
    This is in addition to `CRYPTO_PROVIDER_IS_MBEDTLS` so we can set
    each flag independently.
2.  The OpenSSL library (`libssl`) that we use is from the same place
    we pick the Crypto library (`libcrypto`). Either the system or
    OpenEnclave, decided elsewhere. No new libraries are needed.
3.  Some of the existing mbedTLS headers were moved to src/clients to
    isolate that migration from the server side. So far, it only
    needed `ca.h` and `cert.h`, which are self-conatined. Those
    will be removed with the mbedTLS cleanup.
4.  A number of `#ifdef TLS_PROVIDER_IS_MBEDTLS` were added where
    there was no other way to common up implementation. Most notably
    in the previous TLS headers (`src/tls/*.h`) that are now just
    wrappers to the actual headers (`src/tls/{mbedtls,openssl}/*.h`).
5.  All TLS errors on both mbedTLS and OpenSSL have been #defined
    to a common set of `TLS_ERR_` errors, to allow for common error
    handlind, including `WANT_READ` and `WANT_WRITE`. To keep the
    mbedTLS way, OpenSSL has a hack to return the negative
    counterparts of the error codes, so that we can treat them as
    errors, like mbedTLS.
6.  To keep the current CCF implementation intact, we had to keep
    the callback mechanism in OpenSSL. This isn't the most natural
    way of handling BIOs but it works. Both `tls_endpoint` and
    `tls_test` have a similar implementation, handling asynchronous
    I/O. This should disappear later (probably well after removing
    mbedTLS from the codebase), once we manage to get BIOs directly
    to the users, from the OpenSSL implementation.
7.  A number of mbedTLS functionality, most notably in `context.h`,
    has been adapted to allow a common implementation between the
    two libraries, for example `peer_cert()` and `get_verify_error`.
8.  A copy of `crypto::error_string()` is present in the TLS side
    so that we can more easily control each (crypto/tls) with the
    CMake flags.
9.  A number of log messages were added or changed to convey more
    information to help diagnose TLS issues. Not all development
    log messages survived into the production patch, but those that
    did can still convey most of the information and help at least
    zero in on where you need to add more logs later.
10. Removed two unused methods in `Context`: `available_bytes` and
    `set_require_auth`. Those were never called and had no easy
    equivalent in OpenSSL. Added exceptions for some unused parameters
    in OpenSSL's `CA` and `Cert` to make sure we never use them.
    If those never hit on any further testing or benchmarking, then
    we're safe to remove them when we clean up mbedTLS.
11. Added a number of `FIXME` comments, highlighting the assumptions
    from reading the mbedTLS code and what the tests have shown it
    does/needs. Some of them may be wrong, and if so, we need to
    fix them before we start with the mbedTLS cleanup.
12. Added a very large `get_verify_error` in `OpenSSL::Context`
    with all errors the `verify_result` can throw. This wasn't
    really necessary but was added as a debugging tool. Once we're
    happy none of those weird corner cases happen on our code, we
    should really remove all unused ones and common up in a
    `case default:`, where developers can add specific ones later
    for debugging purposes again.
13. Updated the `tls_test` to handle multi-part messages (past 16K),
    supporting large messages, like `tls_endpoint`. Also truncated
    the large messages to make it easier to read the test logs.
14. Changed the e2e_logging.py large message range from 2^10
    (instead of 2^14), to help developers see some messages pass
    before the 16K threshold, which helped me realise what the
    problem was.
15. Added a long README document with all core issues with the port,
    and discussions on how to clean up in the future.

* Trying to fix the ubsan error

* Remove unnecessary FIXMEs

* Add FIXME to check-todo.sh

* We don't need MbedTLS entropy for OpenSSL

The entropy source isn't a generic implementation, but one based on
mbedTLS, which we don't need for OpenSSL. This removes the last
FIXME.

* Restrict SSL cipher to TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256

To improve security and keep the same behaviour, this commit forces
specific TLS1.2 and TLS1.3 ciphers that were used in the mbedTLS
implementation.

This fixes all problems in the tls_report but one:
Secure Client-Initiated Renegotiation
 -> VULNERABLE (NOT ok), DoS threat (6 attempts)

This will be looked at on the next patch.

* Disable renegotiation to avoid DoS attacks

This makes the tls_report identical to previous mbedTLS.

* Free temporary BIOs in CA/Cert c-tors

Detected by leak sanitizers, but I should have known better...

* Use Unique_BIO|X509 in peer_cert to avoid leaks

Following the C-style code in OpenSSL's documentation was a bad
idea. Using unique_ptr wrappers to guarantee nothing leaks.

* Simplify get_verify_error to avoid UB on memcpy

Same as previous UB, writing at the end of a string. Using std::string
to avoid any memory manipulation by hand.

* Fix typos
2022-01-09 15:16:46 +00:00
Maik Riechert b6459873de
js_v8: ccf.rpc, ccf.crypto bindings & enable npm app test (#3338) 2021-12-21 14:22:10 +00:00
Maik Riechert 918d1d4d37
Experimental V8 app (#3258) 2021-12-16 14:55:29 +00:00
Amaury Chamayou 99e2d9e31d
Only scan for release tags (#3315) 2021-12-14 13:11:34 +00:00
Amaury Chamayou 623f403b81
Upgrade Open Enclave to 0.17.5 (#3284) 2021-12-09 08:57:59 +00:00
Julien Maffre 80b8103a0c
Add option to link in `nghttp2` library (#3287) 2021-12-08 09:41:14 +00:00
Julien Maffre 6ee448ded7
Add support for KV range for `kv::untyped::Map` (#3276) 2021-12-03 17:19:01 +00:00
Amaury Chamayou 18ce16f812
Remove unused serialiser (#3271) 2021-12-01 11:12:48 +00:00
Julien Maffre 03b1998000
Rename tests from `_CFT` to `_cft` (#3245) 2021-11-25 12:58:35 +00:00
Julien Maffre bb946237a6
JSON configuration for `cchost` (#3209) 2021-11-23 17:35:01 +00:00
Renato Golin 039cfa53ae
TLS Cleanup + OpenSSL Base64 (#3217) 2021-11-18 07:41:20 +00:00
Eddy Ashton 0d3d39c29d
Cleanup Raft implementation (#3210) 2021-11-12 20:03:18 +00:00
Julien Maffre 958fad7fe0
Remove unused reserved memory option (#3204) 2021-11-11 13:17:37 +00:00
Christoph M. Wintersteiger 34b4615fc9
Enable 2-tx reconfiguration with CFT (#3097)
Add support for 2-transaction reconfiguration with CFT consensus

Co-authored-by: Julien Maffre <42961061+jumaffre@users.noreply.github.com>
Co-authored-by: Amaury Chamayou <amaury@xargs.fr>
2021-11-04 15:07:09 +00:00
Amaury Chamayou 7838687aac
Disable BFT by default (#3115) 2021-10-21 20:18:16 +01:00
Amaury Chamayou 56ccde63dd
Document USE_SNMALLOC (#3016) 2021-09-23 14:36:34 +01:00
Julien Maffre 113e5ea037
Python infra: run CCF nodes inside containers (#2900) 2021-09-20 16:45:38 +00:00
Maik Riechert e93d2f0beb
JS FFI plugin building (#2978) 2021-09-15 11:25:16 +00:00
Maik Riechert c8dc9248a9
partly revert #2954 to avoid compiler warning (#2973) 2021-09-10 16:23:19 +01:00
Amaury Chamayou bf38d36377
Remove now-unnecessary profiling wrappers (#2963) 2021-09-09 13:10:47 +01:00
Maik Riechert 56a16c5c0d
Remove usage of CMake's `InstallRequiredSystemLibraries` (#2955) 2021-09-09 09:18:49 +00:00
Maik Riechert 425692fdce
cmake: Use `add_enclave_library` consistently (#2960) 2021-09-07 19:36:36 +00:00
Maik Riechert b0ef1b3f49
Use upstream LVI CMake support from OE (#2948) 2021-09-07 17:32:38 +00:00
Maik Riechert e6a535ee94
use cmake helpers for http parser library (#2954) 2021-09-06 22:38:11 +00:00
Maik Riechert f87fa994dd
remove dead cmake code (#2949) 2021-09-06 16:15:21 +00:00
Amaury Chamayou 8fb7d74990
C++ 20 (#2862) 2021-08-04 14:59:09 +01:00
Amaury Chamayou a43fd55f38
Clang 10 toolchain & default compiler updates (#2739) 2021-08-02 20:09:32 +01:00
Amaury Chamayou f6f3523e33
Upgrade to Open Enclave 0.17.1 (#2795) 2021-07-13 21:00:18 +01:00
Amaury Chamayou 29832139b2
Profile tests (#2766) 2021-07-06 16:35:32 +01:00
Amaury Chamayou b1799eacad
Fix cpack depdency for OE 0.17.0 final (#2763) 2021-07-05 21:14:21 +01:00
Amaury Chamayou a8de00a46e
Clang 10 compatibility (#2736) 2021-06-28 11:15:23 +01:00
Amaury Chamayou 5d8f46a92c
Switch to Open Enclave 0.17.0 rc1 (#2701) 2021-06-24 14:19:33 +01:00
Amaury Chamayou 21dde004f2
Upgrade to OE 0.16.1 (#2622) 2021-05-26 13:16:12 +01:00
Julien Maffre ce131e667e
Python infra for testing node partitions (#2553) 2021-05-11 17:13:07 +01:00
Eddy Ashton 23d6ab520b
Pass system clock for enclave time (#2509) 2021-04-30 09:59:25 +01:00
Eddy Ashton 96e197b4ec
Change install prefix and cmake version parsing (#2530) 2021-04-29 12:04:35 +01:00
Eddy Ashton 8b1eea2dcd
Remove Lua governance and Lua dependency (#2465) 2021-04-14 19:14:40 +01:00
Eddy Ashton 71cf21ea27
Remove oesign shenanigans from CMake (#2434) 2021-04-08 16:47:20 +01:00
Eddy Ashton ce65c10353
Upgrade to OE 0.15 final (#2421) 2021-04-08 09:19:34 +01:00
Amaury Chamayou 82a7f808a0
Code id gov + misc fixes (#2406) 2021-04-06 09:23:42 +01:00
Eddy Ashton 556e125e3e
Update to OpenEnclave 0.15.0~rc1 (#2398) 2021-04-01 17:49:35 +01:00
Eddy Ashton d73eeb9a1d
Make TRACE and DEBUG options only compile-time enabled (#2404) 2021-04-01 17:27:55 +01:00
Maik Riechert 8a6caf2b27
js gov: set_js_app / remove_js_app (#2400) 2021-04-01 15:57:53 +01:00
Amaury Chamayou b944dc5961
Split test and default actions (#2397) 2021-04-01 12:55:54 +01:00
Amaury Chamayou d92615db4d
Support concatenation of constitution shards (#2380) 2021-03-31 12:03:46 +01:00
Eddy Ashton 68ee1ea54b
Separate 3rdparty includes into exported, internal, test (#2360) 2021-03-29 11:50:26 +01:00
Julien Maffre 51f65034ed
Disable BFT in CCF releases (#2359) 2021-03-26 16:49:12 +00:00
Eddy Ashton b3e7bac57c
Define more headers as public, and split endpoints into separate library (#2328) 2021-03-25 14:19:15 +00:00
Amaury Chamayou 312d3d2fb1
JS governance dependencies (#2339) 2021-03-22 19:21:44 +00:00
Julien Maffre 4fc9d5d366
Remove secp256k1 (#2333) 2021-03-19 19:59:04 +00:00
Amaury Chamayou 92f9fe2015
Split JS Wrapper (#2306) 2021-03-18 09:01:12 +00:00
Maik Riechert 2efb4d5c27
Historical JS endpoints (#2285) 2021-03-15 15:59:21 +00:00
Christoph M. Wintersteiger 2f4641ce6b
Switch to external Merkle trees (#2289) 2021-03-09 19:07:03 +00:00
Amaury Chamayou 0af7653901
Align src and install paths for new includes (#2263) 2021-03-02 08:32:35 +00:00
Christoph M. Wintersteiger cb3d0a3fea
More key wrapping (#2246)
Adds more key wrapping methods to the crypto library and the JS app.
2021-03-01 17:07:29 +00:00
Eddy Ashton 4fd9f5f309
Historic queries: Range queries and app-dictated handles (#2233) 2021-03-01 16:19:14 +00:00
Amaury Chamayou c8aa7a5205
Do not attempt to use invalid tags for releases (#2254) 2021-03-01 09:28:20 +00:00
Christoph M. Wintersteiger 57c2d2eb78
Refactor crypto library (#2225)
* Refactoring of the crypto code into a proper library with implementations hidden behind abstract interfaces.

Co-authored-by: Amaury Chamayou <amaury@xargs.fr>
2021-02-25 17:34:07 +00:00
Amaury Chamayou b230f23895
Open Enclave 0.14.0 final (#2228) 2021-02-23 18:58:30 +00:00
Matthew Parkinson 0c073d8840
Fix comment for upgrading snmalloc (#2226) 2021-02-23 10:16:31 +00:00
Alex c1ba762c58
Resolve snmalloc zero memory issue (#2211) 2021-02-19 10:10:03 +00:00
Christoph M. Wintersteiger cd5792537a
Hash harmonisation and signature exploration. Fixes #2106. (#2123) 2021-02-18 15:13:14 +00:00
Maik Riechert e9af59eb3c
Add js heap size limit & tests (#2177) 2021-02-16 20:07:54 +00:00
Eddy Ashton 951a7a9380
Raft election bugfix: Accept post-election rollbacks from new primary (#2192) 2021-02-16 14:59:04 +00:00
Amaury Chamayou cf940d3574
Replaces references to master with references to main (#2171) 2021-02-05 11:32:19 +00:00
Julien Maffre 7486d2d3a6
Shallow repo clone in CI (#2132) 2021-02-01 14:45:11 +00:00
Eddy Ashton 941d945360
Set keyId when signing HTTP requests from C++ (#2101) 2021-01-22 09:21:35 +00:00
Julien Maffre d07dafef87
Update tutorial for authentication policies (#2052) 2021-01-08 15:57:44 +00:00
Christoph M. Wintersteiger c8b0302b17
Add missing openenclave::oecryptoopenssl (#2054)
Add missing openenclave::oecryptoopenssl to non-LVI-mitigated enclaves
2021-01-08 12:47:22 +00:00
Julien Maffre 915cab49ab
Faster end-to-end tests in the CI (#2039) 2021-01-05 17:32:57 +00:00
Julien Maffre 016d5441b5
Generate snapshots by default (#2029) 2020-12-18 09:37:39 +00:00
Christoph M. Wintersteiger 7d11a18993
Merkle trees: add OpenSSL and mbedTLS hash functions and switch History to full SHA256 (#2031)
Co-authored-by: Amaury Chamayou <amchamay@microsoft.com>
2020-12-17 20:30:27 +00:00
Eddy Ashton 8d050636d6
Support multiple auth policies, decouple auth from frontends (#2010) 2020-12-17 16:37:34 +00:00
Amaury Chamayou 81da8fc3f0
Switch to 0.13 final (#2030) 2020-12-16 14:12:21 +00:00
Amaury Chamayou 37c5966806
Dependency cleanup (#2025) 2020-12-15 11:23:14 +00:00
Christoph M. Wintersteiger e2fa6d27fc
New Merkle trees (#1989)
New Merkle Trees

Co-authored-by: Amaury Chamayou <amchamay@microsoft.com>
2020-12-11 19:32:21 +00:00
Amaury Chamayou 5e403f23f4
Fix .deb constraint so it works with 0.13-rc2 (#2019) 2020-12-11 15:52:49 +00:00
Amaury Chamayou 303ef59d2a
OE 0.13 rc2 (#2014) 2020-12-11 14:55:57 +00:00
Amaury Chamayou a75945fd84
Add cmake for logging sample using a release (#1947) 2020-12-03 14:30:32 +00:00
Amaury Chamayou 458812d9c2
Remove global code coverage (#1968) 2020-12-01 15:42:41 +00:00
Julien Maffre bb6e72df1e
Move perf client out of samples directory (#1946) 2020-11-30 09:47:37 +00:00
Julien Maffre 216d15e8bc
Install logging JS app (#1932) 2020-11-27 08:53:09 +00:00
Amaury Chamayou 1683fa1a3d
Remove sample key from repo (#1921) 2020-11-25 10:55:12 +00:00
Eddy Ashton 18e3e03483
Replace http-parser with llhttp (#1913) 2020-11-24 13:02:06 +00:00
Eddy Ashton 6b64b2ac45
Remove lua_generic (#1905) 2020-11-20 15:17:25 +00:00
Amaury Chamayou 7923029ace
Signature-authenticated proposals (#1870) 2020-11-12 16:09:22 +00:00
Amaury Chamayou 82e4d007fd
Make what we can prettier (#1862) 2020-11-10 10:57:56 +00:00
Julien Maffre 07e2389d1c
Quote verification CLI (#1850) 2020-11-03 17:24:39 +00:00
Amaury Chamayou 9bba96fb17
Run forum tests in CI (#1826) 2020-10-28 18:46:35 +00:00
Amaury Chamayou a722aba433
Libcurl is not needed anymore now that the notification server is gone (#1832) 2020-10-28 11:23:20 +00:00
Amaury Chamayou 23004b8b9c
Upgrade to OE 0.12 final (#1830) 2020-10-28 10:16:48 +00:00
Amaury Chamayou 5956b07bc9
Install tools.cmake (#1820)
* Install tools.cmake

* Changelog message

Co-authored-by: Eddy Ashton <edashton@microsoft.com>
2020-10-26 11:53:44 +00:00
Amaury Chamayou 891f8335ed
Explicit node flags (#1803) 2020-10-22 14:54:43 +01:00
Amaury Chamayou 7e0d84ff2a
Split stub to avoid importing unnecessary symbols in evercrypt.a (#1789) 2020-10-22 13:18:59 +01:00
Amaury Chamayou 8e508c7659
Enable SAN on libraries built in separate cmake files (#1757) 2020-10-19 14:47:07 +01:00
Eddy Ashton ff2d0ba468
Add Vegeta stress test to CI (#1763) 2020-10-15 16:57:56 +01:00
Julien Maffre 0bc244579a
Public documentation update (#1703) 2020-10-06 16:44:53 +01:00
Maik Riechert 869c2369b4
Add application sandbox (#1695) 2020-10-05 11:00:31 +01:00
Eddy Ashton c8ec9ae75c
Install getting_started scripts with source permissions (#1699) 2020-10-02 18:58:23 +01:00
Christoph M. Wintersteiger 3cb7de75ba
Upgrade Evercrypt code (#1576) 2020-09-18 20:04:44 +01:00
Eddy Ashton 85e2b06e7f
Add test of Python CLI (#1603) 2020-09-17 13:13:09 +01:00
Julien Maffre efc5b054a7
Fix case (#1609) 2020-09-15 15:53:46 +01:00
Maik Riechert 5559526935
remove OE 0.10 workarounds (#1606) 2020-09-14 09:26:07 +01:00
Eddy Ashton f5cb286b64
Remove flatbuffers (#1593) 2020-09-09 15:31:17 +01:00
Alex 6aba788a98
Renaming consensus types (#1591) 2020-09-09 10:59:57 +01:00
Alex 9bd7c0b2bc
AFT: add an option to execute requests on the backup (#1540)
* When running with BFT mode we now execute requests on the backups
* Start the renaming process from Raft to AFT
* Change the network type from a template to an abstract base class that has normal and test implementation
2020-09-04 08:49:02 +01:00
Eddy Ashton af0533fd08
Remove --no-undefined in SAN builds (#1562) 2020-09-03 16:28:34 +01:00
Maik Riechert 3e7750bdb0
Add support for proposing attested CA certs (#1448) 2020-09-02 10:46:17 +01:00
Amaury Chamayou ab03172b80
Extend asn1_san to support multiple entries (#1552) 2020-09-01 17:35:05 +01:00
Alex 3909627c10
Starting setting up for one consensus (#1516) 2020-08-21 09:27:10 +01:00
Eddy Ashton b915ec1926
Host fairness with load monitor (#1480) 2020-08-12 14:30:17 +01:00
Amaury Chamayou f4a6cd67fc Fix cmake format 2020-07-31 14:52:21 +01:00
Amaury Chamayou 7baaab2e47
fix cmake (#1473) 2020-07-31 14:38:15 +01:00
Amaury Chamayou e549cf144f
Build, publish and use (in containers) .deb (#1443) 2020-07-31 11:46:52 +01:00
Eddy Ashton 4ed19a12ec
Support LVI when building from installed CCF (#1467) 2020-07-31 09:02:47 +01:00
Eddy Ashton 21e388f6df
Build CCF with LVI mitigations (#1427) 2020-07-28 11:56:45 +01:00
Julien Maffre 96e9af622f
Python Ledger docs and tutorial (#1435) 2020-07-28 10:01:27 +01:00
Julien Maffre f798d8b902
Python clients cleanup and docs (#1429) 2020-07-27 17:34:16 +01:00
Eddy Ashton c5cd8656cf
Remove local copy of OE (#1437) 2020-07-27 14:05:38 +01:00
Julien Maffre 61097092ce
Compile warnings enforcing and fixes (#1416) 2020-07-21 16:08:25 +01:00
Eddy Ashton b9d442786c
Install utils in bin, not BIN (#1414) 2020-07-17 15:11:38 +01:00
Amaury Chamayou f3618dd780
Update oe 0.10 pre-release (#1400) 2020-07-13 10:03:14 +01:00
Eddy Ashton 168c9df3ab
Give the C++ e2e logging test a uniquely regexable name (#1394) 2020-07-10 09:54:04 +01:00
Julien Maffre b53a4445ce
Start packaging Python infra (#1380) 2020-07-07 15:46:44 +01:00
Eddy Ashton cf38832a99
Update version tag format (#1335) 2020-06-25 13:10:04 +01:00
Julien Maffre 03e6f41eb6
cchost --version (#1323) 2020-06-25 11:45:58 +01:00
Eddy Ashton ff0ceb6971
Support make as CMake Generator (#1326) 2020-06-23 12:13:08 +01:00