|
|
|
|
@ -151,7 +151,7 @@ func TestTKAEnablementFlow(t *testing.T) { |
|
|
|
|
PrivateNodeKey: nodePriv, |
|
|
|
|
NetworkLockKey: nlPriv, |
|
|
|
|
}, |
|
|
|
|
}).View())) |
|
|
|
|
}).View(), "")) |
|
|
|
|
b := LocalBackend{ |
|
|
|
|
capTailnetLock: true, |
|
|
|
|
varRoot: temp, |
|
|
|
|
@ -191,7 +191,7 @@ func TestTKADisablementFlow(t *testing.T) { |
|
|
|
|
PrivateNodeKey: nodePriv, |
|
|
|
|
NetworkLockKey: nlPriv, |
|
|
|
|
}, |
|
|
|
|
}).View())) |
|
|
|
|
}).View(), "")) |
|
|
|
|
|
|
|
|
|
temp := t.TempDir() |
|
|
|
|
tkaPath := filepath.Join(temp, "tka-profile", string(pm.CurrentProfile().ID)) |
|
|
|
|
@ -383,7 +383,7 @@ func TestTKASync(t *testing.T) { |
|
|
|
|
PrivateNodeKey: nodePriv, |
|
|
|
|
NetworkLockKey: nlPriv, |
|
|
|
|
}, |
|
|
|
|
}).View())) |
|
|
|
|
}).View(), "")) |
|
|
|
|
|
|
|
|
|
// Setup the tka authority on the control plane.
|
|
|
|
|
key := tka.Key{Kind: tka.Key25519, Public: nlPriv.Public().Verifier(), Votes: 2} |
|
|
|
|
@ -605,7 +605,7 @@ func TestTKADisable(t *testing.T) { |
|
|
|
|
PrivateNodeKey: nodePriv, |
|
|
|
|
NetworkLockKey: nlPriv, |
|
|
|
|
}, |
|
|
|
|
}).View())) |
|
|
|
|
}).View(), "")) |
|
|
|
|
|
|
|
|
|
temp := t.TempDir() |
|
|
|
|
tkaPath := filepath.Join(temp, "tka-profile", string(pm.CurrentProfile().ID)) |
|
|
|
|
@ -696,7 +696,7 @@ func TestTKASign(t *testing.T) { |
|
|
|
|
PrivateNodeKey: nodePriv, |
|
|
|
|
NetworkLockKey: nlPriv, |
|
|
|
|
}, |
|
|
|
|
}).View())) |
|
|
|
|
}).View(), "")) |
|
|
|
|
|
|
|
|
|
// Make a fake TKA authority, to seed local state.
|
|
|
|
|
disablementSecret := bytes.Repeat([]byte{0xa5}, 32) |
|
|
|
|
@ -785,7 +785,7 @@ func TestTKAForceDisable(t *testing.T) { |
|
|
|
|
PrivateNodeKey: nodePriv, |
|
|
|
|
NetworkLockKey: nlPriv, |
|
|
|
|
}, |
|
|
|
|
}).View())) |
|
|
|
|
}).View(), "")) |
|
|
|
|
|
|
|
|
|
temp := t.TempDir() |
|
|
|
|
tkaPath := filepath.Join(temp, "tka-profile", string(pm.CurrentProfile().ID)) |
|
|
|
|
@ -880,7 +880,7 @@ func TestTKAAffectedSigs(t *testing.T) { |
|
|
|
|
PrivateNodeKey: nodePriv, |
|
|
|
|
NetworkLockKey: nlPriv, |
|
|
|
|
}, |
|
|
|
|
}).View())) |
|
|
|
|
}).View(), "")) |
|
|
|
|
|
|
|
|
|
// Make a fake TKA authority, to seed local state.
|
|
|
|
|
disablementSecret := bytes.Repeat([]byte{0xa5}, 32) |
|
|
|
|
@ -1013,7 +1013,7 @@ func TestTKARecoverCompromisedKeyFlow(t *testing.T) { |
|
|
|
|
PrivateNodeKey: nodePriv, |
|
|
|
|
NetworkLockKey: nlPriv, |
|
|
|
|
}, |
|
|
|
|
}).View())) |
|
|
|
|
}).View(), "")) |
|
|
|
|
|
|
|
|
|
// Make a fake TKA authority, to seed local state.
|
|
|
|
|
disablementSecret := bytes.Repeat([]byte{0xa5}, 32) |
|
|
|
|
@ -1104,7 +1104,7 @@ func TestTKARecoverCompromisedKeyFlow(t *testing.T) { |
|
|
|
|
PrivateNodeKey: nodePriv, |
|
|
|
|
NetworkLockKey: cosignPriv, |
|
|
|
|
}, |
|
|
|
|
}).View())) |
|
|
|
|
}).View(), "")) |
|
|
|
|
b := LocalBackend{ |
|
|
|
|
varRoot: temp, |
|
|
|
|
logf: t.Logf, |
|
|
|
|
|