Skip to content

Releases: microsoft/CCF

3.0.8

27 Feb 20:20
Compare
Choose a tag to compare

Fixed

  • Fixed a bug where historical query fetches could stall when requesting a range of large ledger entries (#5026, #5058).

2.0.17

27 Feb 22:21
0ef5df6
Compare
Choose a tag to compare

Fixed

  • Fixed a bug where historical query fetches could stall when requesting a range of large ledger entries (#5026, #5058).

3.0.7

23 Feb 14:18
e7dc04c
Compare
Choose a tag to compare

Changed

  • JWT refresh now only produces writes on key set changes (#5037)

Dependencies

  • Updated cryptography pin in Python package from 0.38 to 0.39 (#5053)

3.0.6

15 Feb 17:17
a236d05
Compare
Choose a tag to compare

Changed

  • Additional logging of historical query flow in UNSAFE builds.
  • Historical query system will re-request entries if the host fails to provide them within a fixed time.

Dependencies

  • Upgraded OpenEnclave to 0.18.5.
  • Upgraded t_cose from v1.1 to v1.1.1. v1.1.1 can optionally allow unknown critical header parameters in COSE_Sign1 envelopes which is desirable for CCF C++ applications.

2.0.16

14 Feb 21:36
3e1f5dc
Compare
Choose a tag to compare

Dependencies

  • Upgraded OpenEnclave to 0.18.5.

2.0.15

10 Feb 10:53
60b3f8e
Compare
Choose a tag to compare

Changed

  • Additional logging of historical query flow in UNSAFE builds.
  • Historical query system will re-request entries if the host fails to provide them within a fixed time.

4.0.0-dev4

07 Feb 14:26
90f566a
Compare
Choose a tag to compare
4.0.0-dev4 Pre-release
Pre-release

Changed

  • ccf::RpcContext::set_response() has been renamed to ccf::RpcContext::set_response_json() (#4813).
  • The built-in authentication policies for JWTs and certs will now enforce expiry times, based on the current time received from the host. JWTs must contain "nbf" and "exp" claims, and if those are outside the current time then the request will get an authentication error (#4786).
  • ccf.crypto.sign() previously returned DER-encoded ECDSA signatures and now returns IEEE P1363 encoded signatures, aligning with the behavior of the Web Crypto API and ccf.crypto.verifySignature() (#4829).
  • Proposals authenticated with COSE Sign1 must now contain a ccf.gov.msg.created_at header parameter, set to a positive integer number of seconds since epoch. This timestamp is used to detect potential proposal replay. The ccf_cose_sign1* scripts have been updated accordingly and require a --ccf-gov-msg-created_at.
  • Updated Clang version requirement to >= 10 in cmake.

Added

  • Added ccf.enableUntrustedDateTime to JS API. After calling ccf.enableUntrustedDateTime(true), the Date global object will use the untrusted host time to retrieve the current time.
  • Add new ccf.crypto.jwkToPem, ccf.crypto.pubJwkToPem, ccf.crypto.rsaJwkToPem, ccf.crypto.pubRsaJwkToPem, ccf.crypto.eddsaJwkToPem, ccf.crypto.pubEddsaJwkToPem to JavaScript/TypesScript API to convert EC/RSA/EdDSA keys from PEM to Json Web Key (#4876).
  • Add new constructors to cryptography C++ API to generate EC/RSA/EdDSA keys from Json Web Key (#4876).

3.0.5

26 Jan 14:11
1e45307
Compare
Choose a tag to compare

Added

  • Add new ccf.crypto.jwkToPem, ccf.crypto.pubJwkToPem, ccf.crypto.rsaJwkToPem, ccf.crypto.pubRsaJwkToPem, ccf.crypto.eddsaJwkToPem, ccf.crypto.pubEddsaJwkToPem to JavaScript/TypesScript API to convert EC/RSA/EdDSA keys from PEM to Json Web Key (#4876).
  • Add new constructors to cryptography C++ API to generate EC/RSA/EdDSA keys from Json Web Key (#4876).
  • Proposals authenticated with COSE Sign1 must now contain a ccf.gov.msg.created_at header parameter, set to a positive integer number of seconds since epoch. This timestamp is used to detect potential proposal replay. The ccf_cose_sign1* scripts have been updated accordingly and require a --ccf-gov-msg-created_at.

3.0.4

13 Jan 18:05
88d4fc6
Compare
Choose a tag to compare

Changed

  • ccf.crypto.sign() previously returned DER-encoded ECDSA signatures and now returns IEEE P1363 encoded signatures, aligning with the behavior of the Web Crypto API and ccf.crypto.verifySignature() (#4829).

Added

  • Added ccf.enableUntrustedDateTime to JS API. After calling ccf.enableUntrustedDateTime(true), the Date global object will use the untrusted host time to retrieve the current time.

4.0.0-dev3

21 Dec 11:49
245c593
Compare
Choose a tag to compare
4.0.0-dev3 Pre-release
Pre-release

Fixed

  • Node-to-node channels no longer check certificate expiry times. This previously caused "Peer certificate verification failed" error messages when node or service certs expired. (#4733)
  • node_data_json_file configuration option is now correctly applied in Start and Recover modes (#4761).

Changed

  • Increased default NumHeapPages (heap size) for js_generic from 131072 (500MB) to 524288 (2GB).
  • TCP_NODELAY is now set for all incoming and outgoing TCP connections (#4717).