Граф коммитов

335 Коммитов

Автор SHA1 Сообщение Дата
Amaury Chamayou 084a4fd4d6
JS runtime traces in responses (#5237) 2023-05-05 10:50:47 +01:00
Amaury Chamayou a5958f2793
Make consensus type optional in join and ledger types (#5232) 2023-05-02 11:03:49 +01:00
Julien Maffre 6c8937eefb
SEV-SNP: Remove ability to read policy and endorsements from distinct environment variables (#5217) 2023-04-28 11:01:12 +00:00
Amaury Chamayou 4c6ebeebc4
Raft tracing (#5201) 2023-04-26 13:04:04 +01:00
Amaury Chamayou d71d0a8a53
Remove unused membership states (#5207) 2023-04-25 18:42:38 +01:00
Amaury Chamayou 35cb1ae6b2
Make kid more clearly mandatory in COSE headers (#5199) 2023-04-25 16:35:25 +00:00
Julien Maffre 482fd30919
SNP: add support to read UVM security context from files rather than environment (#5175) 2023-04-21 15:53:26 +01:00
Markus Alexander Kuppe c2208dc6ee
Validate several happy-path scenarios in `tests/raft_scenarios/`. (#5187) 2023-04-19 19:28:00 +01:00
Amaury Chamayou 5b1c504cdb
Remove signed HTTP request support (#5137) 2023-04-19 11:47:44 +01:00
Amaury Chamayou 7dd5e9a809
Remove unused re-sharing logic (#5174) 2023-04-13 17:25:34 +01:00
Takuro Sato 274683ff46
Fix TSAN warnings in indexing_test (#5149) 2023-04-03 11:41:05 +01:00
Eddy Ashton efa475f99e
Capped queue for node-to-node forwarding, and live key exchange (#4986) 2023-03-23 14:48:54 +00:00
Amaury Chamayou 159f9b1dbc
Clear headers on error during handler execution (#5122) 2023-03-20 19:18:12 +00:00
Takuro Sato 714feaf7b1
Suppress ASAN errors (#5089) 2023-03-10 08:55:59 +00:00
Eddy Ashton 6eb3137723
Add `/gov/kv/endpoints` endpoint to access JS endpoint metadata (#5068) 2023-03-03 10:06:07 +00:00
Christoph M. Wintersteiger 84288d7659
Add configuration option for the timeout of forwarded RPC calls (#5066)
Co-authored-by: Amaury Chamayou <amaury@xargs.fr>
2023-03-01 13:05:18 +00:00
Paul Liétar 946112884f
Add support for host process stdio. (#5056) 2023-02-28 22:12:28 +00:00
Julien Maffre 23dfa31620
SEV-SNP: support for multiple measurement types on same node (#5063) 2023-02-28 21:34:27 +00:00
Eddy Ashton 8168ce9282
Add a builtin endpoint describing installed indexing strategies (#5061) 2023-02-27 10:19:22 +00:00
Julien Maffre 48ca1e2bfc
SEV-SNP ACI: Store and cross-verify UVM endorsements (#5022) 2023-02-22 10:38:33 +00:00
Mahati Chamarthy 4fee345d85
Multi-container: Index improvements (#4978) 2023-02-20 20:36:32 +00:00
Christoph M. Wintersteiger f36f37fe1b
Add option to use node client certificates to ACME HTTP interface (#4974)
Co-authored-by: Amaury Chamayou <amaury@xargs.fr>
2023-02-20 16:01:51 +00:00
Julien Maffre 572964a84c
SEV-SNP: Tighten attestation verification (#5024) 2023-02-20 10:29:24 +00:00
Amaury Chamayou d13233667e
Improve error messages in COSE Sign Auth policies (#5019) 2023-02-17 09:59:22 +00:00
Julien Maffre e02dbdeaee
SEV-SNP ACI: Verify UVM endorsements (#4915) 2023-02-14 17:27:42 +00:00
Takuro Sato eac45b5c4c
Change static variables accessed concurrently to thread_local (#4980) 2023-02-09 15:27:25 +00:00
Julien Maffre 7801b5de1c
SEV-SNP ACI: Retrieve attestation report endorsements from environment (#4940) 2023-02-07 15:36:18 +00:00
Mahati Chamarthy 2d7382a50b
Remove duplicate governance endpoints (#4941)
Co-authored-by: Amaury Chamayou <amchamay@microsoft.com>
2023-02-07 14:21:46 +00:00
Eddy Ashton 4790a6a879
Fixes for thread ID assignment (#4952) 2023-02-06 09:13:05 +00:00
Paul Liétar feffb205c5
Allow applications to add .well-known endpoints. (#4949)
The ACME frontend was binding to the entire `.well-known` directory,
intercepting any requests make to it, including to paths outside of the
particular `acme-challenge` sub-directory.

This was preventing applications from handling any paths inside the
`.well-known`, which may be necessary to implement certain protocols,
such as did:web.

The code to extract the actor name from an incoming request is special
cased for the .well-known directory, in which case it will include the
second path component in the actor's name. THe ACME frontend's actor is
now the full `.well-known/acme-challenge`.

We did consider implementing this by instead moving the ACME endpoints
into the CommonEndpointRegistry, indirectly making them part of the
application frontend, and removing the .well-known actor. Unfortunately
this would make the endpoints accessible only once the application
frontend has been opened, which would prevent a service from obtaining
an ACME certificate early in its lifecycle.
2023-02-03 12:17:31 +00:00
Eddy Ashton 7f8615e0b7
Simplify assignment of thread IDs (#4900) 2023-01-31 13:36:54 +00:00
Christoph M. Wintersteiger f925b2d3fe
Add SANs to ACME client (#4910) 2023-01-30 12:10:22 +00:00
Julien Maffre 3e17ebcfee
Setup environment variables for ACI (#4888) 2023-01-27 10:41:40 +00:00
Amaury Chamayou 86c6d2d931
Add ccf gov msg created at (#4823) 2023-01-24 11:37:22 +00:00
Julien Maffre a5ccb03e35
Add JWK to PEM converters (#4876) 2023-01-24 09:40:43 +00:00
Christoph M. Wintersteiger 8f191cec9c
Add support for external service CSRs in ACME client (#4856) 2023-01-17 16:28:32 +00:00
Takuro Sato 139121a46d
Use p1363 encoding for sign() JS API with ECDSA (#4829) 2023-01-12 22:05:47 +00:00
Eddy Ashton 5d7d81a646
Check validity times in default auth policies (#4786) 2023-01-12 13:18:58 +00:00
Julien Maffre 5e0d4f34bf
Automatically return gRPC errors for framework-level errors (#4813) 2023-01-10 16:15:03 +00:00
Julien Maffre 24d5e88dbf
HTTP/2: Further configuration options (#4790) 2023-01-03 15:43:25 +00:00
Julien Maffre f60b35c706
HTTP/2: return error for to-be-forwarded requests (#4787) 2022-12-22 15:21:27 +00:00
Julien Maffre 1f5e00ea92
HTTP/2: support for configuration and error reporting (#4779) 2022-12-22 10:37:11 +00:00
Eddy Ashton 0b92c31503
Multi-Container: Use detached streams to send user requests directly to executors, rather than queuing (#4780) 2022-12-22 09:49:52 +00:00
Julien Maffre 16a5defab0
Fix issues with snapshot generation for CHAMP (#4730) 2022-12-14 17:30:24 +00:00
Eddy Ashton 1ebcd07839
Remove unintended time checks from node-to-node validation (#4733) 2022-12-13 16:28:22 +00:00
Julien Maffre a2fed9a30a
gRPC server streaming on close callback (#4713) 2022-12-13 12:04:49 +00:00
Julien Maffre a55efd25d5
Fix compilation error with undefined variables in SNP builds (#4704) 2022-12-09 13:07:56 +00:00
Julien Maffre e638c5edca
Allow for SEV-SNP attestation report verification on non SEV-SNP platforms (#4679) 2022-12-06 22:49:42 +00:00
Julien Maffre 03e6f50032
gRPC server streaming (#4537) 2022-12-06 09:26:53 +00:00
Amaury Chamayou 65e36e917a
Add summary and description to openapi (#4654) 2022-12-06 08:50:24 +00:00
Eddy Ashton c37ecccfa7
Document read-write KV restrictions in different execution contexts (#4677) 2022-12-05 09:48:37 +00:00
Eddy Ashton 2f82fc8260
Generate wrapping endpoints for governance tables (#4659) 2022-11-30 18:46:09 +00:00
Julien Maffre 500c25a6a6
Misc fixes for to support HTTP/2 streaming (#4634) 2022-11-25 18:56:48 +00:00
Julien Maffre 6b83123ee1
Retrieve `HTTPResponder` from `RpcContext` (#4618) 2022-11-24 14:58:37 +00:00
Eddy Ashton 258d43330e
Session consistency: Parse forwarded messages with consistency info (#4595) 2022-11-21 18:11:18 +00:00
Andrew Jeffery a4a512447c
View history (#4580) 2022-11-21 15:55:02 +00:00
Julien Maffre b2ce26fa70
Pass startup snapshot separately from configuration (#4566) 2022-11-16 18:42:36 +00:00
Paul Liétar a090c8b7db
Only render bytevectors as text if all characters are printable. (#4561)
Previously bytevectors were logged as text as long as they didn't contain null bytes. This could cause crashes if verbose logging in the enclave was enabled, the host used the JSON logger and the application wrote binary data to the KV. The log messages would contain invalid Unicode sequences, which made the JSON logger crash when trying to embed the message as a string field.
2022-11-16 14:51:03 +00:00
Takuro Sato 4ddc8dcb43
Miscellaneous improvements in crypto API (#4547) 2022-11-14 15:19:22 +00:00
Takuro Sato 394cd340a2
Add functions to convert EdDSA keys from PEM to JWK (#4524)
Co-authored-by: Julien Maffre <42961061+jumaffre@users.noreply.github.com>
2022-11-11 16:46:06 +00:00
Dominic Ayre 9daa673a39
Track guest policy fields in SNP attestation (#4492) 2022-11-09 17:26:55 +00:00
Andrew Jeffery 1295e7b28a
Index deletes (#4352) 2022-11-04 17:44:31 +00:00
Takuro Sato 05d35bd9ab
Add sign api to js crypt api (#4454) 2022-11-02 22:38:29 +00:00
Mahati Chamarthy 972547ef6e
Add QuickJS runtime execution cap (#4396) 2022-11-01 18:38:36 +00:00
Amaury Chamayou 86375602ad
Enable COSE Sign1 authentication for governance endpoints (#4392) 2022-10-26 15:39:26 +00:00
Dominic Ayre 28fd219017
Change `COMPILE_TARGETS` to take a single target, including SNP (#4367) 2022-10-26 09:08:24 +00:00
Takuro Sato 12968a3b9f
Add eddsa with curve25519 to the JS crypto API (#4391) 2022-10-25 18:36:58 +00:00
Eddy Ashton fddbab576a
Send response from within application code (#4316) 2022-10-24 16:07:16 +00:00
Fotis Kounelis 7bbdc88e04
add missing headers required when including files for certain options (#4382) 2022-10-23 19:01:01 +01:00
Julien Maffre 125caa2504
Use new `snp.measurements` table to store SNP measurements (#4376) 2022-10-21 13:55:15 +01:00
Dominic Ayre de9359f542
Rename security_policies table to host_data (#4374) 2022-10-21 08:18:20 +00:00
Julien Maffre 742750583e
PEM to JWK converters (#4359) 2022-10-20 23:47:42 +01:00
Eddy Ashton 30a044eab8
Remove C++20 stubs from `nonstd.h` (#4375) 2022-10-20 12:57:27 +01:00
Mahati Chamarthy e8240c9280
Jsruntime memory limit (#4344) 2022-10-19 14:18:42 +01:00
Amaury Chamayou 1bbf8886f3
Cose signing authn (#4306)
* .

* wip

* wip

* wip

* wip

* tag=True does not do anything because it is default

* attach, detach...

* gov

* deps

* fix

* wip

* .

* wip

* wip

* checks

* wip

* .

* verifier

* verifier

* plug stuff in

* fmt

* .

* wip

* fix

* rest

* move test

* fix

* tweaks

* cmake

* cmake_fix

* schema

* Update include/ccf/common_auth_policies.h

Co-authored-by: Eddy Ashton <ashton.eddy@gmail.com>

* feedback

* span span span

* .

* Turn off colours in the governance test

Co-authored-by: Eddy Ashton <ashton.eddy@gmail.com>
2022-10-18 10:01:54 +00:00
Eddy Ashton 1dd0f69b45
Fix formatting of IPv6 addresses (#4339) 2022-10-18 08:20:34 +00:00
Mahati Chamarthy 7a2c9d190d
Revert doc changes related to `/app` prefix (#4355)
* Doc links

* Update tests

* OpenAPI changes

* Daily
2022-10-17 14:20:03 +01:00
Takuro Sato 5c731c83f8
Add secp256k1 to the JS crypto API (#4347)
* Add secp256k1 to the JS crypto API

* Fix lint

* Add missing parentheses

* Update CHANGELOG.md

Co-authored-by: Takuro Sato <takurosato@microsoft.com>
Co-authored-by: Amaury Chamayou <amchamay@microsoft.com>
2022-10-14 17:21:59 +01:00
Dominic Ayre 454fba9b21
Use host_data for SNP verification (#4235) 2022-10-07 11:39:54 +00:00
Eddy Ashton 06ef4d6094
Miscellaneous API improvements (#4318) 2022-10-07 10:02:11 +00:00
Mahati Chamarthy 317942ef46
Remove 'Enclave' naming for AttestationProvider (#4309)
* Remove 'Enclave' naming for AttestationProvider

... as it now supports attestation for both SGX and SEV-SNP

* Deprecate and add changelog entry
2022-10-06 10:40:58 +01:00
Andrew Jeffery a8f7b0ff91
Post commit execution: part 2 (#4296)
Add get_user_data and set_user_data functions to the RpcContext to enable passing data to the post local-commit handler without going through serialization and deserialization.
2022-10-05 09:58:44 +00:00
Julien Maffre 45433fc030
`attestation` configuration format change for server type diversity (#4302) 2022-10-05 09:02:46 +00:00
Mahati Chamarthy dbf64facdf
Remove `app` prefix from API docs (#4298) 2022-10-04 19:54:51 +00:00
Andrew Jeffery e15cb903c3
Post commit execution: part 1 (#4291) 2022-10-04 11:36:40 +01:00
Julien Maffre 47684aedeb
Fetch quote endorsements from AMD endpoint (#4277) 2022-10-03 13:18:34 +01:00
Andrew Jeffery 617d38bf9d
Implement open ranges on the untyped map (#4288) 2022-09-30 19:36:25 +00:00
Amaury Chamayou 9c0d4924f2
Remove old adapter and is_tx_committed (#4295) 2022-09-30 19:46:55 +01:00
Julien Maffre 2fe6b9213b
Remove support for 1.x snapshots (#4255) 2022-09-30 17:28:38 +01:00
Mahati Chamarthy 22b7574685
Add error schema to openapi definition (#4223) 2022-09-29 09:45:59 +01:00
Andrew Jeffery 92a10a5833
Clarify store docs on index and add link to strategy (#4260) 2022-09-27 09:22:00 +00:00
Julien Maffre 3f92e4c38e
Use HTTP enclave client to fetch SEV SNP endorsement certificates (#4226) 2022-09-22 15:34:07 +01:00
Eddy Ashton 8a3ef13ae9
Move ownership of Tx to `unique_ptr`, and demonstrate extending ownership in `external_executor` (#4218) 2022-09-22 11:24:39 +01:00
Eddy Ashton c3695837a6
Fix warnings in docs build (#4241) 2022-09-15 14:31:21 +00:00
Eddy Ashton 869da22467
Refactor frontend to remove return-based response, and retry endpoint lookup on conflict (#4205) 2022-09-09 10:46:06 +00:00
Andrea Piccione a88cfdf868
Expose HMAC through the Public C++ Crypto API (#4204) 2022-09-08 20:42:48 +00:00
Julien Maffre 5318885490
Add basic gRPC support to external executor app (#4183) 2022-09-05 11:32:13 +01:00
Heidi Howard c95f447230
Removing a line break from map_handle.h (#4192) 2022-09-02 15:15:51 +01:00
Eddy Ashton 23f3d1cb40
Add support for setting HTTP/2 trailing headers (#4179) 2022-08-31 10:46:57 +01:00
Amaury Chamayou 6af2cb9e45
Add read_only_adapter_v3 (#4162) 2022-08-24 10:29:19 +01:00
Mahati Chamarthy dcac6d6c82
Remove hardcoded prefix `/app` for application endpoints (#4147)
* Remove hardcoded prefix `/app` for application endpoint

This change will allow applications to use endpoints as defined when creating them i.e. an endpoint created at `/log/private`
will be available `/log/private` without the additional prefix of `/app/`. The reference openapi schema now reflects this change.

This change will also allow existing applications to continue using and calling with `/app/` prefix as well.

* Refactor code and modify doc
2022-08-23 16:43:35 +01:00
Eddy Ashton 04e7e52c06
Permanently delete items from the KV (#4145) 2022-08-23 10:03:49 +01:00
Dominic Ayre 79dc84556c
Support SEV-SNP attestation in CCF (#4106) 2022-08-19 14:16:27 +01:00
Dominic Ayre 2595b521ae
Refactor PAL into a namespace with separate header files (#4148) 2022-08-18 13:16:28 +01:00
Christoph M. Wintersteiger a828a4d31c
Add facilities for custom ACME challenges (#4115) 2022-08-17 17:13:16 +00:00
Christoph M. Wintersteiger 14727d0191
Expose node config subsystem interface (#4118) 2022-08-17 16:30:39 +00:00
Eddy Ashton dafcd67024
Mitigations for potential stale reads from Legacy xAPIC (#4127) 2022-08-16 16:46:47 +00:00
Amaury Chamayou 5285c12a16
Upgrade fmtlib from 8.1.1 to 9.0.0 (#4122) 2022-08-15 14:01:53 +00:00
Mahati Chamarthy 856df5be72
Add a method that decodes path parameters (#4126) 2022-08-15 13:21:53 +00:00
Eddy Ashton 33b9f4c9fe
Re-execute auth policies on conflict (#4102) 2022-08-11 16:45:01 +01:00
Julien Maffre 4bb77b4ce0
Move attestation report generation/verification to `Pal` (#4083) 2022-08-09 20:19:08 +00:00
Mahati Chamarthy 88d3e83faa
Populate all error details on authentication failure (#4093)
When an application is configured with multiple auth options,
respond with auth specific error details on failure.

Co-authored-by: Mahati Chamarthy <mchamarthy@microsoft.com>
2022-08-08 15:21:22 +01:00
Christoph M. Wintersteiger 03955ecd67
Add missing header includes (#4104) 2022-08-05 15:09:12 +01:00
Eddy Ashton 6b04017f85
Add mutex locks to sample indexing strategies (#4075) 2022-07-31 09:59:02 +00:00
Amaury Chamayou dfe98cbf16
Safe node removal (#4008) 2022-07-28 13:06:21 +01:00
Istvan Haller 5dcb7567d3
Created CCF PAL (#4050) 2022-07-22 15:12:56 +01:00
SeongTae Jeong e9566fa19d
<docs>[kvStoreAPI]: correct the comments in WriteOnlyHandle (#4059)
Reference: https://github.com/microsoft/CCF/issues/4055 (#4055)
2022-07-22 08:28:33 +00:00
Christoph M. Wintersteiger 6d53029c93
Include missing header (#4058) 2022-07-21 17:55:27 +01:00
Istvan Haller 26aa7fca19
Improved compatibility for clang-12 and clang-13 (#4054) 2022-07-20 18:35:00 +01:00
Eddy Ashton 28d71b666b
Deprecate old logging macros from application code (#4039) 2022-07-15 17:01:00 +01:00
Eddy Ashton a4244022b8
Add support for tagged loggers and app-specific logging macros (#4024) 2022-07-15 09:16:26 +01:00
Julien Maffre 8a41971203
Add experimental support for HTTP/2 (#4010) 2022-07-14 14:37:10 +00:00
Julien Maffre 413ee9fe11
Add arbitrary service data (#3997) 2022-06-30 10:51:40 +00:00
Julien Maffre 7b2309047e
Report `TxID` at which current service was created (#3996) 2022-06-30 09:00:19 +01:00
Julien Maffre 79bb99b676
Track number of service recoveries (#3982) 2022-06-28 20:23:27 +01:00
Christoph M. Wintersteiger 6d7f2a5aad
Allow regex to specify endpoints to serve on an interface (#3970) 2022-06-24 15:21:28 +01:00
Eddy Ashton 7a8e3b01ad
Use custom mutex implementation on SGX (#3978) 2022-06-24 14:00:54 +01:00
Julien Maffre f3afd63a11
Restrict maximum size of client HTTP request (#3941) 2022-06-23 19:43:49 +01:00
Christoph M. Wintersteiger bd378bef0e
ACME challenge frontend (#3945) 2022-06-21 18:03:29 +00:00
Amaury Chamayou 3a11c9b1b4
Do not append an unnecessary line return when using Json logging (#3946) 2022-06-21 09:12:08 +00:00
Eddy Ashton 6e899f31f8
Describe forwarding behaviour in generated OpenAPI (#3935) 2022-06-20 19:26:52 +01:00
Christoph M. Wintersteiger c734789723
Add ACME client for globally endorsed TLS certificates (#3877)
Co-authored-by: Amaury Chamayou <amaury@xargs.fr>
Co-authored-by: Maik Riechert <maik.riechert@arcor.de>
2022-06-15 17:06:32 +00:00
Eddy Ashton 265ee5b85f
Ensure `crypto::Pem`s contain PEM encoded contents (#3918) 2022-06-14 15:24:56 +01:00
Eddy Ashton e4362abb02
Remove ExecuteOutsideConsensus type (#3891) 2022-05-25 16:35:48 +01:00
Eddy Ashton 722c8f971e
Remove null byte from PEM files (#3885) 2022-05-25 15:28:11 +01:00
Amaury Chamayou debbc049e6
Remove set_execute_outside_consensus (#3886) 2022-05-25 08:56:39 +00:00
Eddy Ashton 36de81af48
Describe indexing strategies in docs (#3832) 2022-05-11 17:33:30 +01:00
Renato Golin 92fb195692
UDP enclave echo server (#3787)
* UDP enclave echo server

This is an end-to-end UDP echo server, which receives UDP packets from
multiple clients at the same time, passes them to the enclave with a
message type that is handled by a QUICEchoEndpoint (which just echoes
back the messages to the client) and send the message back through the
ring buffer to the host, which then send to the correct client.

The UDP packets, alongside their socket addresses, are passed to the
enclave as quic_inbound rung buffer messages and received back as
quic_outbound messages. For now, those are encoded as {long,long} to
avoid size issues in the serialization, but eventually, they'll be
broken down to their components {short,char[14]}.

UDP interfaces are created like their TCP counterparts, via a new
field in RPCInterface called 'protocol', with default to "tcp". If
the field is set to "udp", the host will listen on the UDP version
of RPCConnection and use the 'quic_*' messages, which connects to the
new QUICEchoEndpoint.

Also:
 * Renaming "service" to "port"
 * Refactoring TCPBehaviour into SocketBehaviour<ConnType>
 * Factor next_id out to share amongst all RPC connections
 * Use local ConnID in rpc_connections, same as tcp/udp
 * Factor some common logic into socket.h
 * Factor pending writes/reads into ds/pending_io.h

Issues:
 * There is an implicit 'quic_start' message but not a 'quic_close' one,
   which can be a problem for many connections, over time. It's not
   clear to me yet that this will create leaks / mismatches, but we have
   to make sure it doesn't on the next step.
 * The current RPCConnections is parametrized by TCPImpl/UDPImpl, which
   is handy for now but creates the implicit structural dependency
   between the two parameters. We need a common interface to derive
   from, so that the two structures can actually be checked at compile
   time.
 * To implement the step above, we need to fix 'proxy_ptr' and
   'close_ptr' to allow pointer checks (virtual inheritance). I tried
   implementing that first but it creates ripples throughout the code.
   We may never fix this, but then things like the auto-increment will
   have to continue being external, amongst other things.

Next Steps:

 1. To implement all services through unencrypted UDP, just like TCP, so
    we can test the longecity and stability of the UDP channel. We can
    ignore all TLS errors, and just make sure requests and responses are
    passed to the right services and back to the right clients. This
    will also need a UDP client, so that nodes can RPC each other in
    UDP.

 2. To implement QUICEndpoint using ngtcp2 and HTTP3Endpoint using nghttp3
    and test using proper TLS certificates and make sure the services are
    still available in the same way.

* Unnecessary uv dependency in quic_endpoint

* Increasing number of doxygen graph nodes

* Simplify UDP echo test

* Remove unnecessary FIXME workaround

* if constexpr isTCP/isUDP

* Fix sockaddr encoding to {short,char[14]}

* Testing multiple UDP messages
2022-05-10 16:48:33 +00:00
Julien Maffre e165709e2a
Re-enable joining from old snapshot test (#3573) 2022-05-04 15:02:46 +00:00
Eddy Ashton 8e0b2c91cf
Restore public `ccf::Receipt` type (#3793) 2022-04-29 12:03:22 +00:00
Eddy Ashton de4a3c4586
Fix off-by-one in indexer (#3799) 2022-04-29 11:21:40 +00:00
Eddy Ashton 17f7b675fb
Use pointers for JSON schema ADL (#3795) 2022-04-27 11:01:22 +01:00
Julien Maffre ea38c18f1e
Also renew self-signed node certificate (#3767) 2022-04-19 14:17:19 +01:00
Eddy Ashton 944f28dd32
Indexing for values (#3745) 2022-04-12 17:14:09 +00:00
Eddy Ashton e660b96ae0
Make verbose host logging always available (#3762) 2022-04-12 17:44:50 +01:00
Eddy Ashton dac7a8d038
Describe text objects as `text/plain` in generated OpenAPI (#3751) 2022-04-11 08:51:39 +00:00
Christoph M. Wintersteiger 6b90d30b0e
Fix some Sphinx complaints (#3749) 2022-04-07 17:58:59 +01:00
Eddy Ashton 5ceef1074c
Make `HostProcesses` subsytem public (#3725) 2022-03-30 20:56:33 +01:00
Eddy Ashton 5140e0f7ae
Move private headers to separate folder in install (#3716) 2022-03-29 08:25:43 +00:00
Christoph M. Wintersteiger c856048d34
Add service identity endorsements to historical receipts (#3679) 2022-03-28 14:29:31 +00:00