Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add an OID for attestation transparency. HRST-32 #436

Merged
merged 4 commits into from
Apr 25, 2023
Merged

Conversation

arai-fortanix
Copy link
Contributor

Attestation transparency information will be added to the certificate used for joining the cluster, so we need an OID for that purpose.

This is being added on the 1.x branch because roche currently must be built with a 1.x version of sgx_pkix due to dependencies on dcap-ql version 3.3. dcap-ql can't be updated without updating mbedtls.

Attestation transparency information will be added to the
certificate used for joining the cluster, so we need an
OID for that purpose.

This is being added on the 1.x branch because roche
currently must be built with a 1.x version of sgx_pkix
due to dependencies on dcap-ql version 3.3. dcap-ql
can't be updated without updating mbedtls.
Copy link
Collaborator

@Taowyoo Taowyoo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM
The CI seems failed because of some network issue.

@Taowyoo
Copy link
Collaborator

Taowyoo commented Apr 24, 2023

bors retry

1 similar comment
@arai-fortanix
Copy link
Contributor Author

bors retry

@Taowyoo
Copy link
Collaborator

Taowyoo commented Apr 24, 2023

bors cancel

1 similar comment
@Taowyoo
Copy link
Collaborator

Taowyoo commented Apr 24, 2023

bors cancel

@Taowyoo
Copy link
Collaborator

Taowyoo commented Apr 24, 2023

bors r+

bors bot added a commit that referenced this pull request Apr 24, 2023
436: Add an OID for attestation transparency. HRST-32 r=Taowyoo a=arai-fortanix

Attestation transparency information will be added to the certificate used for joining the cluster, so we need an OID for that purpose.

This is being added on the 1.x branch because roche currently must be built with a 1.x version of sgx_pkix due to dependencies on dcap-ql version 3.3. dcap-ql can't be updated without updating mbedtls.

Co-authored-by: Daniel Arai <daniel@fortanix.com>
@bors
Copy link
Contributor

bors bot commented Apr 24, 2023

Build failed:

@Taowyoo
Copy link
Collaborator

Taowyoo commented Apr 24, 2023

Is it fine to use 0.3.3 sgx-isa?
I saw there is some difference in sgx-isa/src/arch.rs
https://github.com/fortanix/rust-sgx/blob/sgx-isa_v0.3.3/sgx-isa/src/arch.rs
https://github.com/fortanix/rust-sgx/blob/sgx-pkix_v0.1.x/sgx-isa/src/arch.rs

The changes in #421 is not covered in 0.3.3 sgx-isa

@Taowyoo
Copy link
Collaborator

Taowyoo commented Apr 24, 2023

Seems CI is blocked by jethrogb/pe-rs#6 , which is meet in #433 before. I fixed it by temporarily pin rust tool-chain version in: c10e404

@arai-fortanix
Copy link
Contributor Author

I don't think the sgx-isa version matters. This branch should only be used for updates to sgx_pkix, so as long as sgx_pkix itself works, I think it's fine. If we want to pick up the new version of sgx_pkix in things that depend on it, we'll need to make that change in those crates and run the tests for them with appropriate versions of things.

@Taowyoo
Copy link
Collaborator

Taowyoo commented Apr 24, 2023

I don't think the sgx-isa version matters. This branch should only be used for updates to sgx_pkix, so as long as sgx_pkix itself works, I think it's fine. If we want to pick up the new version of sgx_pkix in things that depend on it, we'll need to make that change in those crates and run the tests for them with appropriate versions of things.

I see. You are correct. The path dependency does not affect the user of sgx_pkix.

@arai-fortanix
Copy link
Contributor Author

bors cancel

@arai-fortanix
Copy link
Contributor Author

bors r+

bors bot added a commit that referenced this pull request Apr 25, 2023
436: Add an OID for attestation transparency. HRST-32 r=arai-fortanix a=arai-fortanix

Attestation transparency information will be added to the certificate used for joining the cluster, so we need an OID for that purpose.

This is being added on the 1.x branch because roche currently must be built with a 1.x version of sgx_pkix due to dependencies on dcap-ql version 3.3. dcap-ql can't be updated without updating mbedtls.

Co-authored-by: Daniel Arai <daniel@fortanix.com>
@arai-fortanix
Copy link
Contributor Author

bors cancel

@bors
Copy link
Contributor

bors bot commented Apr 25, 2023

Canceled.

@arai-fortanix
Copy link
Contributor Author

bors retry

@arai-fortanix
Copy link
Contributor Author

bors try

bors bot added a commit that referenced this pull request Apr 25, 2023
@arai-fortanix
Copy link
Contributor Author

bors r+

bors bot added a commit that referenced this pull request Apr 25, 2023
436: Add an OID for attestation transparency. HRST-32 r=arai-fortanix a=arai-fortanix

Attestation transparency information will be added to the certificate used for joining the cluster, so we need an OID for that purpose.

This is being added on the 1.x branch because roche currently must be built with a 1.x version of sgx_pkix due to dependencies on dcap-ql version 3.3. dcap-ql can't be updated without updating mbedtls.

Co-authored-by: Daniel Arai <daniel@fortanix.com>
@bors
Copy link
Contributor

bors bot commented Apr 25, 2023

try

Build succeeded:

@arai-fortanix
Copy link
Contributor Author

bors cancel

@bors
Copy link
Contributor

bors bot commented Apr 25, 2023

Canceled.

@arai-fortanix
Copy link
Contributor Author

bors cancel

@arai-fortanix
Copy link
Contributor Author

bors r+

bors bot added a commit that referenced this pull request Apr 25, 2023
436: Add an OID for attestation transparency. HRST-32 r=arai-fortanix a=arai-fortanix

Attestation transparency information will be added to the certificate used for joining the cluster, so we need an OID for that purpose.

This is being added on the 1.x branch because roche currently must be built with a 1.x version of sgx_pkix due to dependencies on dcap-ql version 3.3. dcap-ql can't be updated without updating mbedtls.

Co-authored-by: Daniel Arai <daniel@fortanix.com>
@arai-fortanix
Copy link
Contributor Author

bors cancel

@bors
Copy link
Contributor

bors bot commented Apr 25, 2023

Canceled.

@arai-fortanix
Copy link
Contributor Author

bors r+

@bors
Copy link
Contributor

bors bot commented Apr 25, 2023

Build succeeded:

  • continuous-integration/travis-ci/push

@bors bors bot merged commit 4ca64de into sgx-pkix_v0.1.x Apr 25, 2023
@@ -25,7 +25,8 @@ matrix:
- clang-11
- musl-tools
rust:
- stable
# This need to change back to `nightly` after https://github.com/fortanix/rust-sgx/issues/433 is fixed
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we please pin to a specific stable version instead

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants