Amaury Chamayou
Amaury Chamayou
- [x] cchost #6905 #6907 - [ ] ccf_js - [x] ccf_kv #7006 - [ ] ccf_endpoints #7076 - [ ] ccf - [x] ccfcrypto #7009 - [ ] `include/`...
We currently have two separate log level settings, which remain from the SGX days: 1. Host log level, set in configuration (`logging.host_level`): https://microsoft.github.io/CCF/main/operations/generated_config.html#logging 2. Enclave log level, set via CLI...
See https://github.com/microsoft/scitt-ccf-ledger/issues/247 We would need to add a check in https://github.com/microsoft/CCF/blob/93f3ae44097440a2e3ce55e4bf9537008b91bf99/src/http/http_parser.h#L196 for content-length, and terminate early there. At the moment, this is checked later on, while the body is appended...
Although cose_auth currently uses 4(kid) to look up the member key, some signing tools may embed x5t/x5chain, which currently causes the qcbor spiffy parser to fail. We should allow them...
It's possible for a number of join attempts to be made that do not result in a node being trusted. Those have to be manually deleted by the operator at...
Trying to parse https://github.com/microsoft/CCF/blob/0b466fd309e560f3a5ec9b99451c21c6b7aaed0a/cddl/ccf-tree-alg.cddl fails with: ``` ⚠️ Invalid CDDL file (/home/amchamay/CCF/cddl/ccf-tree-alg.cddl) Error: /cddl/ccf-tree-alg.cddl:2:13 - error: Expected property name, received =(=), >(>) &(leaf: 1) => ccf-leaf ^ | at Parser.parserError...
Trying to parse https://github.com/microsoft/CCF/blob/31ceb7b93ce701cd0df691d0a0d227023de01332/cddl/ccf-receipt.cddl fails with: ``` $ npx cddl validate ./cddl/ccf-receipt.cddl ⚠️ Invalid CDDL file (/home/amchamay/CCF/cddl/ccf-receipt.cddl) Error: /cddl/ccf-receipt.cddl:4:36 - error: Expected ":" or "=>" phdr : bstr .cbor protected-headers,...
Add support for a "policyRego" field in configuration, similar to "policyScript" but allowing the definition of [Rego](https://www.openpolicyagent.org/docs/latest/policy-language/) policies. A sample policy may be: ``` package policy default allow := false...
Add support for a "policyRego" field in configuration, similar to "policyScript" but allowing the definition of [Rego](https://www.openpolicyagent.org/docs/latest/policy-language/) policies. A sample policy may be: ``` package policy default allow := false...
https://github.com/microsoft/CCF/actions/runs/18779614419/job/53582774718?pr=7407 ``` 2025-10-24 13:02:23.361 | INFO | {cft} infra.clients:post:1224 - [1|cose=member0] POST /gov/members/state-digests/9d56092c9d290589f7e041d077b63c59a984b62ce67f2b2c447714fc0b42fb41:ack?api-version=2024-07-01 {'memberId': '9d56092c9d290589f7e041d077b63c59a984b62ce67f2b2c447714fc0b42fb41', 'stateDigest': '2fc163c92a128c30c6d804af310e700405de214655e186fc699a132baab8a712'} 2025-10-24 13:02:23.361 | INFO | {cft} infra.clients:post:1224 - 400 {"error":{"code":"StateDigestMismatch","message":"Submitted state digest is...