Skip to content

Conversation

@Daulox92
Copy link
Contributor

@Daulox92 Daulox92 commented Sep 9, 2025

Updates actions/checkout@v4 to actions/checkout@v5 across CI workflows.

Upgrade to actions/checkout@v5 for improved performance and stability.

Reference:
Latest version: https://github.com/actions/checkout/releases/tag/v5.0.0

@preston4896 preston4896 changed the base branch from main to v1.1 November 14, 2025 06:42
@preston4896 preston4896 merged commit ab7dfaf into automata-network:v1.1 Nov 14, 2025
3 checks passed
preston4896 added a commit that referenced this pull request Nov 17, 2025
* EVM Changes (#52)

* forge update: automata-on-chain-pccs

* PCCSRouter interface updates

* forge-update: automata-on-chain-pccs

* checkpoint forge-test

* tcbEvaluationDataNumber interface

* updated tests to use versioned fmspc and qe id daos

* Fix typos and clarify comments in Intel DCAP quote structs (#33)

* Update CommonStruct.sol

* Update V4Structs.sol

* Fix typo in CommonStruct documentation and update Makefile help text (#43)

* Update CommonStruct.sol

* Update Makefile

---------

Co-authored-by: Preston Ong <[email protected]>

* DEV-4128: DCAP Attestation Contract To Support Multiple zkVM Program Identifiers (#46)

* multiple vkey implementation

* adds a zk verifier getter with a selector argument

* minor updates

* minor updates, added getters to fetch all active program ids for a given zkvm

* updates and formatting

* check timestamp upon loading tcb evaluation

* pccs router reverts if collaterals cannot be found in versioned daos

* updated ata sepolia pccs deployment and script

* ata sepolia deployment

* dependencies werent up to date after rebasing lol

* updated zk test cases

* script and ata sepolia updates

* ata mainnet deployment

* ata sepolia broadcast

* update version dao config script

* stop tracking broadcast logs

* sepolia and holesky deployments

* updated router configuration for versioned daos

* pccs router no longer requires fmspc tcb and qeid daos in the constructor

* pccs router incorrect timestamp emptiness check

* DEV-4147: Quote V5 Verification Solidity Implementation (#51)

* code refactoring

* declare uint8 type for tcb status in output

* no need to return tdx module version

* separate findTdxModuleIdentity into its own function

* v5 implemented but stack too deep :(

* fmt

* no need to pass tdx module for relaunch check

* code refactoring, looks like it has resolved std issues

* td15 report parser

* v5 td15 report verification successful

* fixed tdx tcb convergence error

* check tdx module tcb for relaunch

* misc fixes

* updated VerifiedOutput struct

* README and releases draft

* release draft

* update build action

* shorten error messages to reduce contract code size

* pass ci

* update zk verification

* update zkvm identifiers, test case and benchmark

* github actions variables

---------

Co-authored-by: Ocenka <[email protected]>
Co-authored-by: leopardracer <[email protected]>

* Solana DCAP Verifier with SP1 Integration (#54)

* WIP: Support for SOLANA DCAP Attestation (#34)

* feat: setup verifier program

* feat: integrate automata-dcap-framework which will hold all the solana programs written using anchor

* feat: add quote chunking and test framework for verifier

* chore: upgrade to latest version of anchor and integrate dcap-rs

* feat: get verify dcap quote working where we just parse the quote and print

* feat: add support for pccs program

* feat: get pck cert working

* feat: additional apis for pccs and updated the failing verifier due to print

* feat: implement pcs cert upsert

* feat: implement qe identity upsert

* feat: add support for tcb info

* tests: get tcb_info tests working

* feat: implement dcap verifier sdk with pccs and verifier clients

* feat: update qe tcb status to a temporary PDA after veriyfing quote enclave source

* feat: emit events for PCCS

* feat: add the sdk verify_quote function

* docs: add docs for solana framework dcap attestation

* feat: move tcb status checks on chain

* feat: split verified output to multiple booleans

* verify pubkey and sig in secp256r1 instructions

* fix: remove chunk indexing only rely on total size (#35)

* verify_pck_cert_chain_zk seems to compile

* added pck chain zk verification in sdk

* zk checkpoint

* negated pi_a

* secp256r1 zk passed testing

* renamed ecdsa zk crates

* tested root ca upsert with zk

* refactored test crate

* refactored sdk

* verify collateral zk

* cutting out the middleman

* all pccs methods should now become zk-compatible

* dcap verifier crl check todo

* sdk updates

* sdk interface update to include zk arguments

* signer getter for sdk

* minor fixes

* refactored test crate

* use http url for solana-zk dependencies

* chore: resolve merge conflicts

* anchor program address

* dcap-rs dependencies

* updated zk program

* automata-on-chain-pccs program updates for zk

* zk updates

* zk ecdsa verification works for all collateral types

* pccs collateral timestamp check

* updated tests

* implemented CRL upsert instructions and certificate revocation checks

* code refactoring

* fixed zk crl checks

* optimized issuer cert data checks, but we are still getting out of memory errors

* crl checks now performed in zk guest code

* updated tests

* still out of memory 😭😭😭

* load risc0 verifier on genesis

* x509-parser

* x509-parser patch still doesnt work

* resolved out of memory issues for x509

* refactored sdk for the verifier

* check issuer revocation status in the program

* check collateral expiration in the verifier

* tcbinfo pccs program and sdk updates

* updated zk guest program to take bytemuck serialized inputs for JSON collaterals.

* tcb info zerocopy serialization works on solana program, but minor compromises on the verifier program

* update dcap-rs workspace dependencies to fetch from github

* refactoring

* zk guest update to parse enclave identity

* enclave identity deserialization update

* use avec crate to align json data in verifier program

* dcap-rs update

* get_verified_output

* changes to tcb verification

* attempting crl check on pck cert chain zk verification

* updated README

* updates

* removed system program context from verify instructions

* documentation

* migrated zk from risc0 to sp1

* refactored zk crate

* sdk and zk updates

* program built, but theres so much that needs fixing

* program built

* the fun part is just about to begin

* sp1 dcap p256 verifier setup

* sp1 zk verifier builds

* sp1 proof generation on client side

* successful pccs sp1 integration

* modified verify_zk_pck_cert

* tests

* convert pcs_certificate and quote_data_buffer to zero_copy accounts, sp1 integrates successfully with dcap-verifier

* cleanup

---------

Co-authored-by: Udit Samani <[email protected]>

* updated release notes

* evm: upgraded risczero to v2.2

* release notes fix

* evm: content hash with timestamps

* update release note

* evm: no need to parse quote body for verification

* DEV-4308: V3QuoteVerifier reads from PCSv4 Collaterals (#58)

* qeIdentity parameter renaming

* quotev3 verifier reads from pcs api v4 and updated test

* v3 verifier update on existing network

* testnet deployment

* mainnet deployment

* update zkvm identifier

* deprecate previous deployments on various network

* update pccs deployments

* hyperevm testnet deployment

* hyperevm mainnet deployment

* chore: updated risc0-ethereum to v3.0.0

* added foundry.lock

* v5 ata sepolia deployment

* v5 zk bug fixed

* fusaka testnet update

* removed v1.0 ethereum deployment

* added pico groth16 verification test case (#75)

* removed holesky deployment info

* v5 quote verifier deployment

* forge script updates

* Update GitHub Actions in CI Workflows (#62)

* Update build.yml

* Update slither.yml

* docs: fixes few minor typos (#74)

* docs: fix duplicate World Sepolia entry in Testnet table

* docs: fix broken link

* Merge pull request #70 from automata-network/legacy/risczerov3

Upgrade RiscZero dependency to v3 on current contracts

* Update OnChainQuoteAttestation.md

* Update OnChainQuoteAttestation.md

* Update OnChainQuoteAttestation.md

* Update OnChainQuoteAttestation.md

* Update OnChainQuoteAttestation.md

---------

Co-authored-by: Voronor <[email protected]>
Co-authored-by: VolodymyrBg <[email protected]>
Co-authored-by: Preston Ong <[email protected]>

* readme updates

* updated evm docs

* dcap rust crates migration completed

successful monorepo migration

solana dependency update

proper deployment fetch and version management

finishing touches

* readme updates. ready for release

* modified release note

* published npm

---------

Co-authored-by: Ocenka <[email protected]>
Co-authored-by: leopardracer <[email protected]>
Co-authored-by: Udit Samani <[email protected]>
Co-authored-by: CrazyFrog <[email protected]>
Co-authored-by: iPLAY888 <[email protected]>
Co-authored-by: Voronor <[email protected]>
Co-authored-by: VolodymyrBg <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants