-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(KSA): System Key #1021
feat(KSA): System Key #1021
Conversation
Detected changes to the release files or to the check-files action |
Changes to the release files or the check-files action requires 2 approvals from CODEOWNERS |
ecfef98
to
e89eedf
Compare
Detected changes to the release files or to the check-files action |
Changes to the release files or the check-files action requires 2 approvals from CODEOWNERS |
e89eedf
to
e06108e
Compare
Detected changes to the release files or to the check-files action |
It looks like you are adding or removing the dafny keyword {:only}. |
Changes to the release files or the check-files action requires 2 approvals from CODEOWNERS |
e06108e
to
99c94ce
Compare
Detected changes to the release files or to the check-files action |
Changes to the release files or the check-files action requires 2 approvals from CODEOWNERS |
99c94ce
to
7339c7e
Compare
Detected changes to the release files or to the check-files action |
Changes to the release files or the check-files action requires 2 approvals from CODEOWNERS |
8dc3711
to
266bf70
Compare
7339c7e
to
4a8fcc8
Compare
Detected changes to the release files or to the check-files action |
Changes to the release files or the check-files action requires 2 approvals from CODEOWNERS |
AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStoreAdmin/src/MutationIndexUtils.dfy
Show resolved
Hide resolved
AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStoreAdmin/src/MutationIndexUtils.dfy
Show resolved
Hide resolved
AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStoreAdmin/src/Mutations.dfy
Show resolved
Hide resolved
@@ -800,7 +867,7 @@ module {:options "/functionSyntax:4" } Mutations { | |||
return Success(queryOut); | |||
} | |||
|
|||
method {:vcs_split_on_every_assert} ProcessBranchKeysInApplyMutation( | |||
method {:isolate_assertions} ProcessBranchKeysInApplyMutation( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
When reading the Dafny Ref,
it says that isolate_asserations
is the per-method equivalent of the /vcsSplitOnEveryAssert
.
See http://dafny.org/dafny/DafnyRef/DafnyRef#sec-isolate_assertions
When attending Dafny Proof clinics,
I was encouraged to use it.
...graphicMaterialProviders/dafny/AwsCryptographyKeyStoreAdmin/src/SystemKey/ContentHandler.dfy
Show resolved
Hide resolved
...graphicMaterialProviders/dafny/AwsCryptographyKeyStoreAdmin/src/SystemKey/ContentHandler.dfy
Show resolved
Hide resolved
...graphicMaterialProviders/dafny/AwsCryptographyKeyStoreAdmin/test/SystemKey/SignAndVerify.dfy
Outdated
Show resolved
Hide resolved
...graphicMaterialProviders/dafny/AwsCryptographyKeyStoreAdmin/test/SystemKey/SignAndVerify.dfy
Outdated
Show resolved
Hide resolved
...mithy-generated/software/amazon/cryptography/materialproviders/model/CollectionOfErrors.java
Outdated
Show resolved
Hide resolved
...mithy-generated/software/amazon/cryptography/materialproviders/model/CollectionOfErrors.java
Outdated
Show resolved
Hide resolved
@texastony and @texastony, I noticed you are updating the smithy model files. |
Co-authored-by: José Corella <[email protected]>
Detected changes to the release files or to the check-files action |
Changes to the release files or the check-files action requires 2 approvals from CODEOWNERS |
Detected changes to the release files or to the check-files action |
Changes to the release files or the check-files action requires 2 approvals from CODEOWNERS |
Detected changes to the release files or to the check-files action |
Changes to the release files or the check-files action requires 2 approvals from CODEOWNERS |
f2329d1
into
mutations/decrypt-encrypt-strat
Co-authored-by: José Corella <[email protected]>
Co-authored-by: José Corella <[email protected]>
Co-authored-by: José Corella <[email protected]>
Co-authored-by: José Corella <[email protected]>
Co-authored-by: José Corella <[email protected]>
Co-authored-by: José Corella <[email protected]>
Co-authored-by: José Corella <[email protected]>
Co-authored-by: José Corella <[email protected]>
Co-authored-by: José Corella <[email protected]>
Co-authored-by: José Corella <[email protected]>
Co-authored-by: José Corella <[email protected]>
Co-authored-by: José Corella <[email protected]>
Co-authored-by: José Corella <[email protected]>
Co-authored-by: José Corella <[email protected]>
Issue #, if available:
Description of changes:
Key Store Admin protects any non-cryptographic items store with this setting.
As of v?, TrustStorage is the default behavior.
Squash/merge commit message, if applicable:
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.