tailscale/tka
Anton Tolchanov 781f79408d ipn/ipnlocal: allow multiple signature chains from the same SigCredential
Detection of duplicate Network Lock signature chains added in
01847e0123 failed to account for chains
originating with a SigCredential signature, which is used for wrapped
auth keys. This results in erroneous removal of signatures that
originate from the same re-usable auth key.

This change ensures that multiple nodes created by the same re-usable
auth key are not getting filtered out by the network lock.

Updates tailscale/corp#19764

Signed-off-by: Anton Tolchanov <anton@tailscale.com>
2024-06-27 19:28:57 +01:00
..
aum.go
aum_test.go
builder.go
builder_test.go
chaintest_test.go
deeplink.go
deeplink_test.go
key.go
key_test.go
scenario_test.go
sig.go ipn/ipnlocal: allow multiple signature chains from the same SigCredential 2024-06-27 19:28:57 +01:00
sig_test.go ipn/ipnlocal: allow multiple signature chains from the same SigCredential 2024-06-27 19:28:57 +01:00
state.go
state_test.go
sync.go
sync_test.go
tailchonk.go
tailchonk_test.go
tka.go ipn/ipnlocal: discard node keys that have been rotated out 2024-06-03 10:56:09 +01:00
tka_test.go