|
|
|
|
@ -100,7 +100,7 @@ func (b *LocalBackend) tkaSyncIfNeeded(nm *netmap.NetworkMap) error { |
|
|
|
|
b.mu.Lock() // take mu to protect access to synchronized fields.
|
|
|
|
|
defer b.mu.Unlock() |
|
|
|
|
|
|
|
|
|
ourNodeKey := b.prefs.Persist().PrivateNodeKey.Public() |
|
|
|
|
ourNodeKey := b.prefs.Persist().PublicNodeKey() |
|
|
|
|
|
|
|
|
|
isEnabled := b.tka != nil |
|
|
|
|
wantEnabled := nm.TKAEnabled |
|
|
|
|
@ -342,7 +342,7 @@ func (b *LocalBackend) NetworkLockInit(keys []tka.Key) error { |
|
|
|
|
var ourNodeKey key.NodePublic |
|
|
|
|
b.mu.Lock() |
|
|
|
|
if b.prefs.Valid() { |
|
|
|
|
ourNodeKey = b.prefs.Persist().PrivateNodeKey.Public() |
|
|
|
|
ourNodeKey = b.prefs.Persist().PublicNodeKey() |
|
|
|
|
} |
|
|
|
|
b.mu.Unlock() |
|
|
|
|
if ourNodeKey.IsZero() { |
|
|
|
|
@ -453,7 +453,7 @@ func (b *LocalBackend) NetworkLockModify(addKeys, removeKeys []tka.Key) (err err |
|
|
|
|
return nil |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
ourNodeKey := b.prefs.Persist().PrivateNodeKey.Public() |
|
|
|
|
ourNodeKey := b.prefs.Persist().PublicNodeKey() |
|
|
|
|
b.mu.Unlock() |
|
|
|
|
resp, err := b.tkaDoSyncSend(ourNodeKey, aums, true) |
|
|
|
|
b.mu.Lock() |
|
|
|
|
|