You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
tailscale/tka
Anton Tolchanov 781f79408d ipn/ipnlocal: allow multiple signature chains from the same SigCredential
Detection of duplicate Network Lock signature chains added in
01847e0123 failed to account for chains
originating with a SigCredential signature, which is used for wrapped
auth keys. This results in erroneous removal of signatures that
originate from the same re-usable auth key.

This change ensures that multiple nodes created by the same re-usable
auth key are not getting filtered out by the network lock.

Updates tailscale/corp#19764

Signed-off-by: Anton Tolchanov <anton@tailscale.com>
4 months ago
..
aum.go all: use new AppendEncode methods available in Go 1.22 (#11079) 8 months ago
aum_test.go
builder.go
builder_test.go
chaintest_test.go all: use Go 1.22 range-over-int 6 months ago
deeplink.go
deeplink_test.go
key.go
key_test.go
scenario_test.go all: cleanup unused code, part 1 (#10661) 10 months ago
sig.go ipn/ipnlocal: allow multiple signature chains from the same SigCredential 4 months ago
sig_test.go ipn/ipnlocal: allow multiple signature chains from the same SigCredential 4 months ago
state.go tka: clarify field comment 11 months ago
state_test.go
sync.go all: use Go 1.22 range-over-int 6 months ago
sync_test.go
tailchonk.go all: use Go 1.22 range-over-int 6 months ago
tailchonk_test.go
tka.go ipn/ipnlocal: discard node keys that have been rotated out 5 months ago
tka_test.go all: implement lock revoke-keys command 1 year ago