Amaury Chamayou
084a4fd4d6
JS runtime traces in responses ( #5237 )
2023-05-05 10:50:47 +01:00
Amaury Chamayou
a5958f2793
Make consensus type optional in join and ledger types ( #5232 )
2023-05-02 11:03:49 +01:00
Julien Maffre
6c8937eefb
SEV-SNP: Remove ability to read policy and endorsements from distinct environment variables ( #5217 )
2023-04-28 11:01:12 +00:00
Amaury Chamayou
4c6ebeebc4
Raft tracing ( #5201 )
2023-04-26 13:04:04 +01:00
Amaury Chamayou
d71d0a8a53
Remove unused membership states ( #5207 )
2023-04-25 18:42:38 +01:00
Amaury Chamayou
35cb1ae6b2
Make kid more clearly mandatory in COSE headers ( #5199 )
2023-04-25 16:35:25 +00:00
Julien Maffre
482fd30919
SNP: add support to read UVM security context from files rather than environment ( #5175 )
2023-04-21 15:53:26 +01:00
Markus Alexander Kuppe
c2208dc6ee
Validate several happy-path scenarios in `tests/raft_scenarios/`. ( #5187 )
2023-04-19 19:28:00 +01:00
Amaury Chamayou
5b1c504cdb
Remove signed HTTP request support ( #5137 )
2023-04-19 11:47:44 +01:00
Amaury Chamayou
7dd5e9a809
Remove unused re-sharing logic ( #5174 )
2023-04-13 17:25:34 +01:00
Takuro Sato
274683ff46
Fix TSAN warnings in indexing_test ( #5149 )
2023-04-03 11:41:05 +01:00
Eddy Ashton
efa475f99e
Capped queue for node-to-node forwarding, and live key exchange ( #4986 )
2023-03-23 14:48:54 +00:00
Amaury Chamayou
159f9b1dbc
Clear headers on error during handler execution ( #5122 )
2023-03-20 19:18:12 +00:00
Takuro Sato
714feaf7b1
Suppress ASAN errors ( #5089 )
2023-03-10 08:55:59 +00:00
Eddy Ashton
6eb3137723
Add `/gov/kv/endpoints` endpoint to access JS endpoint metadata ( #5068 )
2023-03-03 10:06:07 +00:00
Christoph M. Wintersteiger
84288d7659
Add configuration option for the timeout of forwarded RPC calls ( #5066 )
...
Co-authored-by: Amaury Chamayou <amaury@xargs.fr>
2023-03-01 13:05:18 +00:00
Paul Liétar
946112884f
Add support for host process stdio. ( #5056 )
2023-02-28 22:12:28 +00:00
Julien Maffre
23dfa31620
SEV-SNP: support for multiple measurement types on same node ( #5063 )
2023-02-28 21:34:27 +00:00
Eddy Ashton
8168ce9282
Add a builtin endpoint describing installed indexing strategies ( #5061 )
2023-02-27 10:19:22 +00:00
Julien Maffre
48ca1e2bfc
SEV-SNP ACI: Store and cross-verify UVM endorsements ( #5022 )
2023-02-22 10:38:33 +00:00
Mahati Chamarthy
4fee345d85
Multi-container: Index improvements ( #4978 )
2023-02-20 20:36:32 +00:00
Christoph M. Wintersteiger
f36f37fe1b
Add option to use node client certificates to ACME HTTP interface ( #4974 )
...
Co-authored-by: Amaury Chamayou <amaury@xargs.fr>
2023-02-20 16:01:51 +00:00
Julien Maffre
572964a84c
SEV-SNP: Tighten attestation verification ( #5024 )
2023-02-20 10:29:24 +00:00
Amaury Chamayou
d13233667e
Improve error messages in COSE Sign Auth policies ( #5019 )
2023-02-17 09:59:22 +00:00
Julien Maffre
e02dbdeaee
SEV-SNP ACI: Verify UVM endorsements ( #4915 )
2023-02-14 17:27:42 +00:00
Takuro Sato
eac45b5c4c
Change static variables accessed concurrently to thread_local ( #4980 )
2023-02-09 15:27:25 +00:00
Julien Maffre
7801b5de1c
SEV-SNP ACI: Retrieve attestation report endorsements from environment ( #4940 )
2023-02-07 15:36:18 +00:00
Mahati Chamarthy
2d7382a50b
Remove duplicate governance endpoints ( #4941 )
...
Co-authored-by: Amaury Chamayou <amchamay@microsoft.com>
2023-02-07 14:21:46 +00:00
Eddy Ashton
4790a6a879
Fixes for thread ID assignment ( #4952 )
2023-02-06 09:13:05 +00:00
Paul Liétar
feffb205c5
Allow applications to add .well-known endpoints. ( #4949 )
...
The ACME frontend was binding to the entire `.well-known` directory,
intercepting any requests make to it, including to paths outside of the
particular `acme-challenge` sub-directory.
This was preventing applications from handling any paths inside the
`.well-known`, which may be necessary to implement certain protocols,
such as did:web.
The code to extract the actor name from an incoming request is special
cased for the .well-known directory, in which case it will include the
second path component in the actor's name. THe ACME frontend's actor is
now the full `.well-known/acme-challenge`.
We did consider implementing this by instead moving the ACME endpoints
into the CommonEndpointRegistry, indirectly making them part of the
application frontend, and removing the .well-known actor. Unfortunately
this would make the endpoints accessible only once the application
frontend has been opened, which would prevent a service from obtaining
an ACME certificate early in its lifecycle.
2023-02-03 12:17:31 +00:00
Eddy Ashton
7f8615e0b7
Simplify assignment of thread IDs ( #4900 )
2023-01-31 13:36:54 +00:00
Christoph M. Wintersteiger
f925b2d3fe
Add SANs to ACME client ( #4910 )
2023-01-30 12:10:22 +00:00
Julien Maffre
3e17ebcfee
Setup environment variables for ACI ( #4888 )
2023-01-27 10:41:40 +00:00
Amaury Chamayou
86c6d2d931
Add ccf gov msg created at ( #4823 )
2023-01-24 11:37:22 +00:00
Julien Maffre
a5ccb03e35
Add JWK to PEM converters ( #4876 )
2023-01-24 09:40:43 +00:00
Christoph M. Wintersteiger
8f191cec9c
Add support for external service CSRs in ACME client ( #4856 )
2023-01-17 16:28:32 +00:00
Takuro Sato
139121a46d
Use p1363 encoding for sign() JS API with ECDSA ( #4829 )
2023-01-12 22:05:47 +00:00
Eddy Ashton
5d7d81a646
Check validity times in default auth policies ( #4786 )
2023-01-12 13:18:58 +00:00
Julien Maffre
5e0d4f34bf
Automatically return gRPC errors for framework-level errors ( #4813 )
2023-01-10 16:15:03 +00:00
Julien Maffre
24d5e88dbf
HTTP/2: Further configuration options ( #4790 )
2023-01-03 15:43:25 +00:00
Julien Maffre
f60b35c706
HTTP/2: return error for to-be-forwarded requests ( #4787 )
2022-12-22 15:21:27 +00:00
Julien Maffre
1f5e00ea92
HTTP/2: support for configuration and error reporting ( #4779 )
2022-12-22 10:37:11 +00:00
Eddy Ashton
0b92c31503
Multi-Container: Use detached streams to send user requests directly to executors, rather than queuing ( #4780 )
2022-12-22 09:49:52 +00:00
Julien Maffre
16a5defab0
Fix issues with snapshot generation for CHAMP ( #4730 )
2022-12-14 17:30:24 +00:00
Eddy Ashton
1ebcd07839
Remove unintended time checks from node-to-node validation ( #4733 )
2022-12-13 16:28:22 +00:00
Julien Maffre
a2fed9a30a
gRPC server streaming on close callback ( #4713 )
2022-12-13 12:04:49 +00:00
Julien Maffre
a55efd25d5
Fix compilation error with undefined variables in SNP builds ( #4704 )
2022-12-09 13:07:56 +00:00
Julien Maffre
e638c5edca
Allow for SEV-SNP attestation report verification on non SEV-SNP platforms ( #4679 )
2022-12-06 22:49:42 +00:00
Julien Maffre
03e6f50032
gRPC server streaming ( #4537 )
2022-12-06 09:26:53 +00:00
Amaury Chamayou
65e36e917a
Add summary and description to openapi ( #4654 )
2022-12-06 08:50:24 +00:00
Eddy Ashton
c37ecccfa7
Document read-write KV restrictions in different execution contexts ( #4677 )
2022-12-05 09:48:37 +00:00
Eddy Ashton
2f82fc8260
Generate wrapping endpoints for governance tables ( #4659 )
2022-11-30 18:46:09 +00:00
Julien Maffre
500c25a6a6
Misc fixes for to support HTTP/2 streaming ( #4634 )
2022-11-25 18:56:48 +00:00
Julien Maffre
6b83123ee1
Retrieve `HTTPResponder` from `RpcContext` ( #4618 )
2022-11-24 14:58:37 +00:00
Eddy Ashton
258d43330e
Session consistency: Parse forwarded messages with consistency info ( #4595 )
2022-11-21 18:11:18 +00:00
Andrew Jeffery
a4a512447c
View history ( #4580 )
2022-11-21 15:55:02 +00:00
Julien Maffre
b2ce26fa70
Pass startup snapshot separately from configuration ( #4566 )
2022-11-16 18:42:36 +00:00
Paul Liétar
a090c8b7db
Only render bytevectors as text if all characters are printable. ( #4561 )
...
Previously bytevectors were logged as text as long as they didn't contain null bytes. This could cause crashes if verbose logging in the enclave was enabled, the host used the JSON logger and the application wrote binary data to the KV. The log messages would contain invalid Unicode sequences, which made the JSON logger crash when trying to embed the message as a string field.
2022-11-16 14:51:03 +00:00
Takuro Sato
4ddc8dcb43
Miscellaneous improvements in crypto API ( #4547 )
2022-11-14 15:19:22 +00:00
Takuro Sato
394cd340a2
Add functions to convert EdDSA keys from PEM to JWK ( #4524 )
...
Co-authored-by: Julien Maffre <42961061+jumaffre@users.noreply.github.com>
2022-11-11 16:46:06 +00:00
Dominic Ayre
9daa673a39
Track guest policy fields in SNP attestation ( #4492 )
2022-11-09 17:26:55 +00:00
Andrew Jeffery
1295e7b28a
Index deletes ( #4352 )
2022-11-04 17:44:31 +00:00
Takuro Sato
05d35bd9ab
Add sign api to js crypt api ( #4454 )
2022-11-02 22:38:29 +00:00
Mahati Chamarthy
972547ef6e
Add QuickJS runtime execution cap ( #4396 )
2022-11-01 18:38:36 +00:00
Amaury Chamayou
86375602ad
Enable COSE Sign1 authentication for governance endpoints ( #4392 )
2022-10-26 15:39:26 +00:00
Dominic Ayre
28fd219017
Change `COMPILE_TARGETS` to take a single target, including SNP ( #4367 )
2022-10-26 09:08:24 +00:00
Takuro Sato
12968a3b9f
Add eddsa with curve25519 to the JS crypto API ( #4391 )
2022-10-25 18:36:58 +00:00
Eddy Ashton
fddbab576a
Send response from within application code ( #4316 )
2022-10-24 16:07:16 +00:00
Fotis Kounelis
7bbdc88e04
add missing headers required when including files for certain options ( #4382 )
2022-10-23 19:01:01 +01:00
Julien Maffre
125caa2504
Use new `snp.measurements` table to store SNP measurements ( #4376 )
2022-10-21 13:55:15 +01:00
Dominic Ayre
de9359f542
Rename security_policies table to host_data ( #4374 )
2022-10-21 08:18:20 +00:00
Julien Maffre
742750583e
PEM to JWK converters ( #4359 )
2022-10-20 23:47:42 +01:00
Eddy Ashton
30a044eab8
Remove C++20 stubs from `nonstd.h` ( #4375 )
2022-10-20 12:57:27 +01:00
Mahati Chamarthy
e8240c9280
Jsruntime memory limit ( #4344 )
2022-10-19 14:18:42 +01:00
Amaury Chamayou
1bbf8886f3
Cose signing authn ( #4306 )
...
* .
* wip
* wip
* wip
* wip
* tag=True does not do anything because it is default
* attach, detach...
* gov
* deps
* fix
* wip
* .
* wip
* wip
* checks
* wip
* .
* verifier
* verifier
* plug stuff in
* fmt
* .
* wip
* fix
* rest
* move test
* fix
* tweaks
* cmake
* cmake_fix
* schema
* Update include/ccf/common_auth_policies.h
Co-authored-by: Eddy Ashton <ashton.eddy@gmail.com>
* feedback
* span span span
* .
* Turn off colours in the governance test
Co-authored-by: Eddy Ashton <ashton.eddy@gmail.com>
2022-10-18 10:01:54 +00:00
Eddy Ashton
1dd0f69b45
Fix formatting of IPv6 addresses ( #4339 )
2022-10-18 08:20:34 +00:00
Mahati Chamarthy
7a2c9d190d
Revert doc changes related to `/app` prefix ( #4355 )
...
* Doc links
* Update tests
* OpenAPI changes
* Daily
2022-10-17 14:20:03 +01:00
Takuro Sato
5c731c83f8
Add secp256k1 to the JS crypto API ( #4347 )
...
* Add secp256k1 to the JS crypto API
* Fix lint
* Add missing parentheses
* Update CHANGELOG.md
Co-authored-by: Takuro Sato <takurosato@microsoft.com>
Co-authored-by: Amaury Chamayou <amchamay@microsoft.com>
2022-10-14 17:21:59 +01:00
Dominic Ayre
454fba9b21
Use host_data for SNP verification ( #4235 )
2022-10-07 11:39:54 +00:00
Eddy Ashton
06ef4d6094
Miscellaneous API improvements ( #4318 )
2022-10-07 10:02:11 +00:00
Mahati Chamarthy
317942ef46
Remove 'Enclave' naming for AttestationProvider ( #4309 )
...
* Remove 'Enclave' naming for AttestationProvider
... as it now supports attestation for both SGX and SEV-SNP
* Deprecate and add changelog entry
2022-10-06 10:40:58 +01:00
Andrew Jeffery
a8f7b0ff91
Post commit execution: part 2 ( #4296 )
...
Add get_user_data and set_user_data functions to the RpcContext to enable passing data to the post local-commit handler without going through serialization and deserialization.
2022-10-05 09:58:44 +00:00
Julien Maffre
45433fc030
`attestation` configuration format change for server type diversity ( #4302 )
2022-10-05 09:02:46 +00:00
Mahati Chamarthy
dbf64facdf
Remove `app` prefix from API docs ( #4298 )
2022-10-04 19:54:51 +00:00
Andrew Jeffery
e15cb903c3
Post commit execution: part 1 ( #4291 )
2022-10-04 11:36:40 +01:00
Julien Maffre
47684aedeb
Fetch quote endorsements from AMD endpoint ( #4277 )
2022-10-03 13:18:34 +01:00
Andrew Jeffery
617d38bf9d
Implement open ranges on the untyped map ( #4288 )
2022-09-30 19:36:25 +00:00
Amaury Chamayou
9c0d4924f2
Remove old adapter and is_tx_committed ( #4295 )
2022-09-30 19:46:55 +01:00
Julien Maffre
2fe6b9213b
Remove support for 1.x snapshots ( #4255 )
2022-09-30 17:28:38 +01:00
Mahati Chamarthy
22b7574685
Add error schema to openapi definition ( #4223 )
2022-09-29 09:45:59 +01:00
Andrew Jeffery
92a10a5833
Clarify store docs on index and add link to strategy ( #4260 )
2022-09-27 09:22:00 +00:00
Julien Maffre
3f92e4c38e
Use HTTP enclave client to fetch SEV SNP endorsement certificates ( #4226 )
2022-09-22 15:34:07 +01:00
Eddy Ashton
8a3ef13ae9
Move ownership of Tx to `unique_ptr`, and demonstrate extending ownership in `external_executor` ( #4218 )
2022-09-22 11:24:39 +01:00
Eddy Ashton
c3695837a6
Fix warnings in docs build ( #4241 )
2022-09-15 14:31:21 +00:00
Eddy Ashton
869da22467
Refactor frontend to remove return-based response, and retry endpoint lookup on conflict ( #4205 )
2022-09-09 10:46:06 +00:00
Andrea Piccione
a88cfdf868
Expose HMAC through the Public C++ Crypto API ( #4204 )
2022-09-08 20:42:48 +00:00
Julien Maffre
5318885490
Add basic gRPC support to external executor app ( #4183 )
2022-09-05 11:32:13 +01:00
Heidi Howard
c95f447230
Removing a line break from map_handle.h ( #4192 )
2022-09-02 15:15:51 +01:00
Eddy Ashton
23f3d1cb40
Add support for setting HTTP/2 trailing headers ( #4179 )
2022-08-31 10:46:57 +01:00
Amaury Chamayou
6af2cb9e45
Add read_only_adapter_v3 ( #4162 )
2022-08-24 10:29:19 +01:00
Mahati Chamarthy
dcac6d6c82
Remove hardcoded prefix `/app` for application endpoints ( #4147 )
...
* Remove hardcoded prefix `/app` for application endpoint
This change will allow applications to use endpoints as defined when creating them i.e. an endpoint created at `/log/private`
will be available `/log/private` without the additional prefix of `/app/`. The reference openapi schema now reflects this change.
This change will also allow existing applications to continue using and calling with `/app/` prefix as well.
* Refactor code and modify doc
2022-08-23 16:43:35 +01:00
Eddy Ashton
04e7e52c06
Permanently delete items from the KV ( #4145 )
2022-08-23 10:03:49 +01:00
Dominic Ayre
79dc84556c
Support SEV-SNP attestation in CCF ( #4106 )
2022-08-19 14:16:27 +01:00
Dominic Ayre
2595b521ae
Refactor PAL into a namespace with separate header files ( #4148 )
2022-08-18 13:16:28 +01:00
Christoph M. Wintersteiger
a828a4d31c
Add facilities for custom ACME challenges ( #4115 )
2022-08-17 17:13:16 +00:00
Christoph M. Wintersteiger
14727d0191
Expose node config subsystem interface ( #4118 )
2022-08-17 16:30:39 +00:00
Eddy Ashton
dafcd67024
Mitigations for potential stale reads from Legacy xAPIC ( #4127 )
2022-08-16 16:46:47 +00:00
Amaury Chamayou
5285c12a16
Upgrade fmtlib from 8.1.1 to 9.0.0 ( #4122 )
2022-08-15 14:01:53 +00:00
Mahati Chamarthy
856df5be72
Add a method that decodes path parameters ( #4126 )
2022-08-15 13:21:53 +00:00
Eddy Ashton
33b9f4c9fe
Re-execute auth policies on conflict ( #4102 )
2022-08-11 16:45:01 +01:00
Julien Maffre
4bb77b4ce0
Move attestation report generation/verification to `Pal` ( #4083 )
2022-08-09 20:19:08 +00:00
Mahati Chamarthy
88d3e83faa
Populate all error details on authentication failure ( #4093 )
...
When an application is configured with multiple auth options,
respond with auth specific error details on failure.
Co-authored-by: Mahati Chamarthy <mchamarthy@microsoft.com>
2022-08-08 15:21:22 +01:00
Christoph M. Wintersteiger
03955ecd67
Add missing header includes ( #4104 )
2022-08-05 15:09:12 +01:00
Eddy Ashton
6b04017f85
Add mutex locks to sample indexing strategies ( #4075 )
2022-07-31 09:59:02 +00:00
Amaury Chamayou
dfe98cbf16
Safe node removal ( #4008 )
2022-07-28 13:06:21 +01:00
Istvan Haller
5dcb7567d3
Created CCF PAL ( #4050 )
2022-07-22 15:12:56 +01:00
SeongTae Jeong
e9566fa19d
<docs>[kvStoreAPI]: correct the comments in WriteOnlyHandle ( #4059 )
...
Reference: https://github.com/microsoft/CCF/issues/4055 (#4055 )
2022-07-22 08:28:33 +00:00
Christoph M. Wintersteiger
6d53029c93
Include missing header ( #4058 )
2022-07-21 17:55:27 +01:00
Istvan Haller
26aa7fca19
Improved compatibility for clang-12 and clang-13 ( #4054 )
2022-07-20 18:35:00 +01:00
Eddy Ashton
28d71b666b
Deprecate old logging macros from application code ( #4039 )
2022-07-15 17:01:00 +01:00
Eddy Ashton
a4244022b8
Add support for tagged loggers and app-specific logging macros ( #4024 )
2022-07-15 09:16:26 +01:00
Julien Maffre
8a41971203
Add experimental support for HTTP/2 ( #4010 )
2022-07-14 14:37:10 +00:00
Julien Maffre
413ee9fe11
Add arbitrary service data ( #3997 )
2022-06-30 10:51:40 +00:00
Julien Maffre
7b2309047e
Report `TxID` at which current service was created ( #3996 )
2022-06-30 09:00:19 +01:00
Julien Maffre
79bb99b676
Track number of service recoveries ( #3982 )
2022-06-28 20:23:27 +01:00
Christoph M. Wintersteiger
6d7f2a5aad
Allow regex to specify endpoints to serve on an interface ( #3970 )
2022-06-24 15:21:28 +01:00
Eddy Ashton
7a8e3b01ad
Use custom mutex implementation on SGX ( #3978 )
2022-06-24 14:00:54 +01:00
Julien Maffre
f3afd63a11
Restrict maximum size of client HTTP request ( #3941 )
2022-06-23 19:43:49 +01:00
Christoph M. Wintersteiger
bd378bef0e
ACME challenge frontend ( #3945 )
2022-06-21 18:03:29 +00:00
Amaury Chamayou
3a11c9b1b4
Do not append an unnecessary line return when using Json logging ( #3946 )
2022-06-21 09:12:08 +00:00
Eddy Ashton
6e899f31f8
Describe forwarding behaviour in generated OpenAPI ( #3935 )
2022-06-20 19:26:52 +01:00
Christoph M. Wintersteiger
c734789723
Add ACME client for globally endorsed TLS certificates ( #3877 )
...
Co-authored-by: Amaury Chamayou <amaury@xargs.fr>
Co-authored-by: Maik Riechert <maik.riechert@arcor.de>
2022-06-15 17:06:32 +00:00
Eddy Ashton
265ee5b85f
Ensure `crypto::Pem`s contain PEM encoded contents ( #3918 )
2022-06-14 15:24:56 +01:00
Eddy Ashton
e4362abb02
Remove ExecuteOutsideConsensus type ( #3891 )
2022-05-25 16:35:48 +01:00
Eddy Ashton
722c8f971e
Remove null byte from PEM files ( #3885 )
2022-05-25 15:28:11 +01:00
Amaury Chamayou
debbc049e6
Remove set_execute_outside_consensus ( #3886 )
2022-05-25 08:56:39 +00:00
Eddy Ashton
36de81af48
Describe indexing strategies in docs ( #3832 )
2022-05-11 17:33:30 +01:00
Renato Golin
92fb195692
UDP enclave echo server ( #3787 )
...
* UDP enclave echo server
This is an end-to-end UDP echo server, which receives UDP packets from
multiple clients at the same time, passes them to the enclave with a
message type that is handled by a QUICEchoEndpoint (which just echoes
back the messages to the client) and send the message back through the
ring buffer to the host, which then send to the correct client.
The UDP packets, alongside their socket addresses, are passed to the
enclave as quic_inbound rung buffer messages and received back as
quic_outbound messages. For now, those are encoded as {long,long} to
avoid size issues in the serialization, but eventually, they'll be
broken down to their components {short,char[14]}.
UDP interfaces are created like their TCP counterparts, via a new
field in RPCInterface called 'protocol', with default to "tcp". If
the field is set to "udp", the host will listen on the UDP version
of RPCConnection and use the 'quic_*' messages, which connects to the
new QUICEchoEndpoint.
Also:
* Renaming "service" to "port"
* Refactoring TCPBehaviour into SocketBehaviour<ConnType>
* Factor next_id out to share amongst all RPC connections
* Use local ConnID in rpc_connections, same as tcp/udp
* Factor some common logic into socket.h
* Factor pending writes/reads into ds/pending_io.h
Issues:
* There is an implicit 'quic_start' message but not a 'quic_close' one,
which can be a problem for many connections, over time. It's not
clear to me yet that this will create leaks / mismatches, but we have
to make sure it doesn't on the next step.
* The current RPCConnections is parametrized by TCPImpl/UDPImpl, which
is handy for now but creates the implicit structural dependency
between the two parameters. We need a common interface to derive
from, so that the two structures can actually be checked at compile
time.
* To implement the step above, we need to fix 'proxy_ptr' and
'close_ptr' to allow pointer checks (virtual inheritance). I tried
implementing that first but it creates ripples throughout the code.
We may never fix this, but then things like the auto-increment will
have to continue being external, amongst other things.
Next Steps:
1. To implement all services through unencrypted UDP, just like TCP, so
we can test the longecity and stability of the UDP channel. We can
ignore all TLS errors, and just make sure requests and responses are
passed to the right services and back to the right clients. This
will also need a UDP client, so that nodes can RPC each other in
UDP.
2. To implement QUICEndpoint using ngtcp2 and HTTP3Endpoint using nghttp3
and test using proper TLS certificates and make sure the services are
still available in the same way.
* Unnecessary uv dependency in quic_endpoint
* Increasing number of doxygen graph nodes
* Simplify UDP echo test
* Remove unnecessary FIXME workaround
* if constexpr isTCP/isUDP
* Fix sockaddr encoding to {short,char[14]}
* Testing multiple UDP messages
2022-05-10 16:48:33 +00:00
Julien Maffre
e165709e2a
Re-enable joining from old snapshot test ( #3573 )
2022-05-04 15:02:46 +00:00
Eddy Ashton
8e0b2c91cf
Restore public `ccf::Receipt` type ( #3793 )
2022-04-29 12:03:22 +00:00
Eddy Ashton
de4a3c4586
Fix off-by-one in indexer ( #3799 )
2022-04-29 11:21:40 +00:00
Eddy Ashton
17f7b675fb
Use pointers for JSON schema ADL ( #3795 )
2022-04-27 11:01:22 +01:00
Julien Maffre
ea38c18f1e
Also renew self-signed node certificate ( #3767 )
2022-04-19 14:17:19 +01:00
Eddy Ashton
944f28dd32
Indexing for values ( #3745 )
2022-04-12 17:14:09 +00:00
Eddy Ashton
e660b96ae0
Make verbose host logging always available ( #3762 )
2022-04-12 17:44:50 +01:00
Eddy Ashton
dac7a8d038
Describe text objects as `text/plain` in generated OpenAPI ( #3751 )
2022-04-11 08:51:39 +00:00
Christoph M. Wintersteiger
6b90d30b0e
Fix some Sphinx complaints ( #3749 )
2022-04-07 17:58:59 +01:00
Eddy Ashton
5ceef1074c
Make `HostProcesses` subsytem public ( #3725 )
2022-03-30 20:56:33 +01:00
Eddy Ashton
5140e0f7ae
Move private headers to separate folder in install ( #3716 )
2022-03-29 08:25:43 +00:00
Christoph M. Wintersteiger
c856048d34
Add service identity endorsements to historical receipts ( #3679 )
2022-03-28 14:29:31 +00:00