DeTEE Hacker Challenge for everybody who wants to break the DeTEE technology
|
||
---|---|---|
.cargo | ||
docker | ||
mint_sol | ||
proto | ||
scripts | ||
src | ||
.gitignore | ||
build.rs | ||
Cargo.lock | ||
Cargo.toml | ||
deploy_ed25519 | ||
README.md | ||
rustfmt.toml |
Welcome to the HACKER CHALLENGE
Building and packaging the challenge
The host can be without SGX support. To build and package the challenge you will need the docker environment. Do the following steps to build the challenge:
# Notice that there is no SGX device mounted, run inside rewrite directory
docker run --rm --name packager -it -v .:/root/rewrite occlum/occlum:latest-ubuntu20.04
# Inside the docker container run package.sh and follow its instructions
cd /root/rewrite && ./scripts/package.sh --prep
exit # Feel free to exit the container
Testing the challenge
To test the challenge you will need the SGX support.
# this will boot few containers containing servers that will replicate the private key generated by one of the nodes
./scripts/testnet.sh
# to interact with the servers list the ports
docker container list
# pick some node and
curl localhost:your-port
# node will respond with a homepage with more information
The node homepage source is also here.
Production build
./scripts/build-container.sh
Contributing to the challenge
Don't forget to run cargo clippy
and cargo fmt
before submitting a PR.