-
Notifications
You must be signed in to change notification settings - Fork 46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Increment counter #6
Milestone
Comments
brenzi
added a commit
that referenced
this issue
Dec 12, 2020
* [stf] add TrustedCall::ceremonies_register_attestations * [stf] add TrustedCall::ceremonies_grant_reputation * [stf] Rename: TrustedGetter::ceremony_registration -> get_registration * [stf] Call on_ceremony_phase_changed if phase change occurred. * [stf] Added wip of updating storage upon block import. but we need a mechanism to know which shards we need to update before. * [stf] remove storage updates for trusted calls as the relevant storages are updated upon block import. * [stf] get meetup location * [stf] added TrustedGetter::get_attestations * [stf] storage_update: update before executing on_ceremony phase change * [stf] update_get_storage_hashes_for_getter * [enclave] get_state: init_shard if previously unitialized shard is adressed * [enclave] change state_init_logic. Initialize all shards that are known on chain by default. * [enclave] verify worker responses does return options, such that we know if a storage_hash is none * [stf] fix storage update per shard for locations and bootstrappers * [stf] StfError::Dispatch -> Dispatch(String) from call name * [enclave] initialize shard if queried an inexistent shard. * [stf] renamed TrustedGetter::get_meetup_time_and_location -> get_meetup_index_time_and_location * [stf] TrustedCall::register_participant: throw specific error if at wrong phase. * trusted register-participant and get-registration works * [stf] remove get_ceremony_registration as we access the pallet's storage directly * [bootstrape_demo] change incognito to normal keys to be bootstrappers. Successfully assigning meetups now. * [bootstrap_demo] successfully create and sign claims * [bootstrap_demo] successfully register_attestations and get_attestations * [bootstrap_demo] successfully get_balance at the end. Script executes successfully * [bootstrap_demo] cosmetics * [enclave,stf] cleanup warnings * [stf] rename getter enums * [stf] replace get_encointer_balance by pallet call directly * [enclave] make storage_updates_on_block generec over the stf * [worker] only feed 100 blocks at a time into the chain relay. Improved logging while syncing to keep track of sync status * [worker] assume that we are on our own and skip mutual remote attestation * [WorkerApi] Remove default protocol ws. * [bootstrap-demo] + worker-url as argument. * [bootstrap-demo] replaced next phase calls with wait_for_phase calls * test currency spec with well-known incognito accounts * hard coding M1 demo Co-authored-by: clangenb <[email protected]>
haerdib
added a commit
that referenced
this issue
Sep 28, 2022
* add test script * first try remove compiler temp change to haerdibg fix parsing fixes fix change.md Update README.md fixes (#3) remove pallet changes fix change.md fix printing changes remove docker image for now fix comments add global challenge level set min level fix gloabl challenge level update challenge sentence Update README.md (#4) fix variables fix meta.C -> meta.E fix misc - include all Update README.md (#5) fix prios Update README.md (#6) test modify readme maybe? test nr 2 test again try fix * change owner back to integritee * readd master branch * remove extra .yml file * remove outdated scripts * rename priority to challenge * fix readme.md * remove docker file
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Increment (or initialize) the counter for the appropriate account if the AccountId and the corresponding signature match.
This runs inside the SGX enclave
The text was updated successfully, but these errors were encountered: