Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Scheduler scheduling execution of sgx / confidential contracts #1082

Closed
willscott opened this issue Oct 15, 2018 · 7 comments
Closed

Scheduler scheduling execution of sgx / confidential contracts #1082

willscott opened this issue Oct 15, 2018 · 7 comments

Comments

@willscott
Copy link
Contributor

Right now, we have the notion of a single committee.

As we get confidential contracts, we'll need another pass at the scheduler, either to have a second 'parallel sgx chain', or to allow each individual sgx runtime / contract to get scheduled to a node.

@kostko
Copy link
Member

kostko commented Oct 15, 2018

I think the current plan is for thr confidential runtime to just register as a different runtime. Since the scheduler and roothash support multiple runtimes, things shoulf just work as long as we keep these separate.

@willscott
Copy link
Contributor Author

Once we have multiple enclaves / contracts, it would be great to start thinking about how we imagine that will work

@kostko
Copy link
Member

kostko commented Oct 16, 2018

As discussed in the current core confidentiality RFC the plan is:

  • Two runtimes registered with the registry: confidential and non-confidential.
  • Each runtime has a distinct "runtime-id".
  • Each runtime has a distinct compute committee (some compute nodes only run the confidential runtime, some only run the non-confidential runtime as we currently don't support multiple runtimes per worker).
  • Each runtime has distinct roothash state.

Everything we need for this should already be supported (minus the TEE work which is part of #979), we may need to debug some issues as we haven't really tested with such configuration (see #1062 for adding E2E tests with multiple runtimes).

@kostko
Copy link
Member

kostko commented Oct 16, 2018

Oh and for gateways - we likely need to run two gateways as these are completely distinct chains.

@willscott
Copy link
Contributor Author

I guess i'm also interested in how we go from this first pass at supporting sgx to a merged chain. Having a sense of how we hope to do that will make it easier to decide whether to have the next version of web3c built in a way that expects being back at a merged gateway or not.

@ryscheng-mobile
Copy link
Contributor

Potential dup - rfc for core confidentiality addresses some of this already

@kostko
Copy link
Member

kostko commented Oct 16, 2018

Note that the Core Confidentiality RFC assumes completely separate chains (roothash states) due to the discussion that we had in the RFC.

@bennetyee bennetyee mentioned this issue Jan 28, 2019
20 tasks
@kostko kostko closed this as completed Apr 23, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants