Skip to content

Releases: iExecBlockchainComputing/iexec-sms

8.0.0

22 Mar 14:37
230cd86
Compare
Choose a tag to compare

New Features

  • #150 #127 Support SMS in enclave for Scone TEE tasks.
  • #131 #128 #124 #121 #120 #119 #117 #116 #115 #112 Support Gramine framework for TEE tasks.
  • #130 Add GET /up client method in iexec-sms-library.
  • #125 Return a same SmsClient from the SmsClientProvider of iexec-sms-library when calling a same SMS URL.
  • #151 Add iExec banner at startup.
  • #158 #159 Show application version on banner.

Bug Fixes

  • #136 Remove TLS context on server.
  • #135 #156 Remove GET /secrets endpoints.
  • #126 Remove non-TEE workflow.
  • #157 Remove enclave entrypoints from Gramine sessions since already present in manifests of applications.
  • #163 Update Scone transformation parameters to enable health checks in SMS in enclave.

Quality

Dependency Upgrades

  • #149 Upgrade to Spring Boot 2.6.14.
  • #145 Upgrade to Gradle 7.6.
  • 63be7db Upgrade OkHttp to 4.9.0.
  • #160 Upgrade to Java 11.0.16 patch.
  • #161 Upgrade to iexec-common 7.0.0.
  • #162 Upgrade to jenkins-library 2.4.0.

v7.3.0

18 Jan 10:00
3157052
Compare
Choose a tag to compare
  • #153 Add endpoint to allow health checks.

v7.2.0

09 Jan 14:51
cbca354
Compare
Choose a tag to compare
  • #110 #114 #118 Increments jenkins-library up to version 2.2.3. Enable SonarCloud analyses on branches and pull requests.
  • #113 Add ReservedSecretKeyName class to iexec-sms-library.

v7.1.1

29 Nov 14:37
b8707a8
Compare
Choose a tag to compare
  • #141 Update build workflow to 2.1.4, update documentation in README and add CHANGELOG.

v7.1.0

11 Aug 13:12
Compare
Choose a tag to compare
  • #62 An application developer can define a secret associated to its dapp address.
  • #86 Allow a requester to define multiple secrets in the SMS. They can then be used when buying an order.
  • #88 Add OpenFeign client library in dedicated iexec-sms-library jar.
  • #93 Define possible errors during TEE session creation for task feedback.
  • #82 Use Spring Boot 2.6.2.
  • #101 Use Java 11.0.15.

v7.0.0 - The 7th Gear

17 Dec 16:35
50a00eb
Compare
Choose a tag to compare

Highly improved throughput of the iExec protocol.

v6.1.0

02 Dec 08:18
19bd580
Compare
Choose a tag to compare
  • #71 Generate enclave challenge private key with fixed length.

v6.0.0

29 Jul 14:33
5de43ed
Compare
Choose a tag to compare

What's new?

  • #41 #45 #47 Add TEE pre-compute stage for iExec Workers (confidential task inputs)
  • #46 #48 #50 Enable confidential task on iExec Workers with production enclave mode (pre-compute, compute and post-compute stages)
  • #49 #53 #54 Expose trusted TEE configuration for iExec Workers
  • #51 Add custom options for security policies
  • #57 Disable requester post-compute

v1.0.0

22 Jul 15:27
e816e0b
Compare
Choose a tag to compare

What is it?

  • The Secret Managment Service (SMS) stores secrets which are then usable in the iExec network.
  • This key component makes possible for anyone to compute confidential assets on the iExec network.
  • This component is mandatory to enable the TEE (Trusted Execution Environment) mode of the iExec network.
  • The iExec SMS provisions secrets to remote applications that are running inside identified & trusted enclaves.
  • Confidential assets you have (password, token, API key, AES key, ..) should be securely transferred from your machine to the SMS over a TLS channel (iExec SDK is recommended). This operation is only done once.
  • Internally, secrets are encrypted with standard AES encryption before being written to disk.
  • The iExec SMS secret provisioning policy is based on on-chain ACL (PoCo). PoCo smart contracts define simple ACL rules where individuals have ownership of on-chain objects they have deployed (workerpool, application, secret-dataset & requester).
  • Each individual who is the owner of an object could define a policy on it. For example, "As a Requester (0xAlice), I only authorize my confidential Secret-Dataset (0xSecretOfAlice) to be used by the application of Bob (0xAppOfBob) I trust which will run on the Workerpool of Carl (0xWorkerpoolOfCarl)".
  • When the secure application of Bob starts, the secret of Alice is written into a temporary session and sent over TLS to a dedicated Configuration & Attestation Service (CAS) enclave responsible for communicating with the final application enclave.
  • If the application enclave is legit (measurable with its mrenclave with Scone), it will receive the secrets.
  • To sum up, if all checks are correct, the secret of Alice will cross the following environments: Alice-Host -> iExec-SMS -> Scone-CAS -> Bob-Scone-Application