Граф коммитов

3120 Коммитов

Автор SHA1 Сообщение Дата
Julien Maffre 499c88a868
Infra: fix for full test suite error (#5012) 2023-02-15 13:30:39 +00:00
Amaury Chamayou 14628b82b9
Revert to clang 10 by default and build with clang 12 separately (#5011) 2023-02-15 10:46:28 +00:00
Julien Maffre e02dbdeaee
SEV-SNP ACI: Verify UVM endorsements (#4915) 2023-02-14 17:27:42 +00:00
Dominic Ayre 0607d8db3d
Pass RPC address instead of node instance to executor (#5007) 2023-02-14 16:26:25 +00:00
Julien Maffre 1f5f9eab75
Test infra: cleanup Docker remote shim (#5001) 2023-02-14 15:28:30 +00:00
Amaury Chamayou d0fd99a7d0
Upgrade to Open Enclave 0.18.5 (#5004) 2023-02-14 14:54:07 +00:00
Julien Maffre c2410ecbc3
SEV-SNP ACI: simplify primary container command (#4999) 2023-02-14 14:42:01 +00:00
Dominic Ayre ad3106cf83
Create network if one doesn't exist in all dockershim cases (#5006) 2023-02-14 14:32:02 +00:00
Takuro Sato 8fb8bc7802
Downgrade confcom to 0.2.6 (#5005) 2023-02-14 10:56:54 +00:00
dependabot[bot] 0d792871ab
Bump golang.org/x/sys from 0.4.0 to 0.5.0 in /attestation-container (#5002) 2023-02-13 21:17:22 +00:00
Takuro Sato a09aab86b2
Upgrade confcom az cli extention to 0.2.8 (#4932)
Co-authored-by: Takuro Sato <takurosato@microsoft.com--username>
Co-authored-by: Ubuntu <takurosato@takurosato-sgx.taez5sojqghejlh3t0iq3iwtjd.cx.internal.cloudapp.net>
Co-authored-by: Mahati Chamarthy <mahati.chamarthy@gmail.com>
Co-authored-by: Julien Maffre <42961061+jumaffre@users.noreply.github.com>
2023-02-13 18:36:46 +00:00
Takuro Sato c858298213
Fix TSAN errors (#4998)
Co-authored-by: Ubuntu <takurosato@microsoft.com--username>
2023-02-13 15:33:42 +00:00
Amaury Chamayou 9f7534f0d9
Tighten and test basic constraints (#4995) 2023-02-10 17:32:52 +00:00
Amaury Chamayou 1e66f71303
Do not collect metrics for endpoints not found (#4992) 2023-02-10 16:23:29 +00:00
Julien Maffre 94ad1f033e
Docs: Disable link checks (#4993) 2023-02-10 15:26:27 +00:00
Amaury Chamayou d851ce4439
Fix forwarding for readonly endpoints in JS/TS samples (#4989) 2023-02-10 14:29:21 +00:00
Julien Maffre eb1445ea5b
Improve test coverage for historical range queries (#4964) 2023-02-10 13:30:44 +00:00
Dominic Ayre d528609f4d
Use out argument for IP information (#4985) 2023-02-10 12:12:33 +00:00
Julien Maffre fc7f85799f
Update SEV-SNP ACI file share to North Europe (#4988) 2023-02-10 11:37:31 +00:00
Julien Maffre 3067f8673f
Attestation container: reduce size of container image (#4955) 2023-02-10 09:50:22 +00:00
Dominic Ayre 9957798f24
Change ACI region to North Europe (#4977) 2023-02-09 15:53:11 +00:00
Takuro Sato eac45b5c4c
Change static variables accessed concurrently to thread_local (#4980) 2023-02-09 15:27:25 +00:00
Eddy Ashton a44759fbc6
Historical queries: Re-request seqnos if host fails to respond (#4976) 2023-02-09 14:19:49 +00:00
Dominic Ayre d683a23a03
Only create docker dir if doesn't already exist 2023-02-09 11:20:01 +00:00
Dominic Ayre 0b987f36bf
Fix build action 2023-02-09 10:27:28 +00:00
Dominic Ayre db03daf4ab
Attempt to fix build action 2023-02-09 10:26:22 +00:00
Amaury Chamayou 5605076991
Full txid in read_ledger (#4963) 2023-02-08 15:19:55 +00:00
Julien Maffre 4acd955855
Infra: fix SSH remote (#4972) 2023-02-08 10:55:34 +00:00
Mahati Chamarthy 7870b3963f
JWT endpoint (#4971) 2023-02-08 10:37:25 +00:00
Julien Maffre 7801b5de1c
SEV-SNP ACI: Retrieve attestation report endorsements from environment (#4940) 2023-02-07 15:36:18 +00:00
Mahati Chamarthy 2d7382a50b
Remove duplicate governance endpoints (#4941)
Co-authored-by: Amaury Chamayou <amchamay@microsoft.com>
2023-02-07 14:21:46 +00:00
Dominic Ayre 82f9bc9d05
Make secondary ACI cleanup independent of primary (#4970) 2023-02-07 13:52:10 +00:00
Dominic Ayre 90f566abd0
Cleanup ACI even when workspace cleanup failed (#4969) 2023-02-07 11:26:55 +00:00
Takuro Sato 30468ed25d
Run 'SNPCC Release' and 'Virtual Release' in the daily CI (#4962) 2023-02-07 10:12:30 +00:00
Eddy Ashton b08299ddc2
Fix documented options for `--consensus` in `sandbox.sh` and `e2e_args.py` (#4967) 2023-02-07 10:00:23 +00:00
Dominic Ayre a471de8615
Increase ACI deployment timeout (#4960) 2023-02-06 15:01:59 +00:00
Amaury Chamayou 048add256b
Revert "Activate Spectre mitigations for SNP builds" (#4961) 2023-02-06 13:18:21 +00:00
Amaury Chamayou f0f95f4950
Activate Spectre mitigations for SNP builds (#4905) 2023-02-06 11:26:33 +00:00
Takuro Sato 7e7df9efe6
Update CHANGELOG (#4959) 2023-02-06 10:48:09 +00:00
Takuro Sato 150616ca8e
Increase ssh timeout (#4956)
Co-authored-by: Julien Maffre <42961061+jumaffre@users.noreply.github.com>
2023-02-06 09:22:24 +00:00
Eddy Ashton 4790a6a879
Fixes for thread ID assignment (#4952) 2023-02-06 09:13:05 +00:00
Paul Liétar cd29d78291
Distinguish between system and user include search paths in add_ccf_app. (#4950)
The add_ccf_app CMake macro had a INCLUDE_DIRS arguments, which can be
used to add directories to the compiler's header search path. To my
surprise, all paths in this argument are added as "system" headers,
which mean they get passed as `-isystem` flags to the compiler.

This has the effect of silencing any compiler warnings emitted in the
headers found through these path. While this is the intended behaviour
for 3rd party dependencies, it is undesirable for code that is part of
the application, which should adhere to the configured warning settings.

This has bit us in SCITT, where for a long time some warnings had been
silenced due to this and had gone unoticed, only to create a lot of
confusion later on when this code would suddenly fail to compile when
moved elsewhere. See microsoft/scitt-ccf-ledger#86
for some context.
2023-02-04 07:28:08 +00:00
Markus Alexander Kuppe 4a468588b9
A pending node that becomes part of any configuration immediately transitions to Follower state. (#4928) 2023-02-03 17:26:49 +00:00
Julien Maffre a1392801c3
Fix build of SNP PR container (#4954) 2023-02-03 17:19:30 +00:00
Amaury Chamayou 56fb19df0f
Update CI image to 02-02-2023 (#4944) 2023-02-03 14:54:46 +00:00
Julien Maffre 5bf87b3829
Attestation container: retrieve report endorsements from environment (#4948) 2023-02-03 14:36:09 +00:00
Paul Liétar feffb205c5
Allow applications to add .well-known endpoints. (#4949)
The ACME frontend was binding to the entire `.well-known` directory,
intercepting any requests make to it, including to paths outside of the
particular `acme-challenge` sub-directory.

This was preventing applications from handling any paths inside the
`.well-known`, which may be necessary to implement certain protocols,
such as did:web.

The code to extract the actor name from an incoming request is special
cased for the .well-known directory, in which case it will include the
second path component in the actor's name. THe ACME frontend's actor is
now the full `.well-known/acme-challenge`.

We did consider implementing this by instead moving the ACME endpoints
into the CommonEndpointRegistry, indirectly making them part of the
application frontend, and removing the .well-known actor. Unfortunately
this would make the endpoints accessible only once the application
frontend has been opened, which would prevent a service from obtaining
an ACME certificate early in its lifecycle.
2023-02-03 12:17:31 +00:00
Eddy Ashton 51e4209fee
Structured verbose logging in `raft.h` (#4933) 2023-02-03 09:31:27 +00:00
Amaury Chamayou d98332b71e
Use clang-format-10 even on when we build with clang-12 (#4945) 2023-02-02 12:15:36 +00:00
dependabot[bot] 4b78d1b64a
Bump google.golang.org/grpc from 1.52.0 to 1.52.3 in /attestation-container (#4918) 2023-02-02 11:13:27 +00:00