func testLoadAllPublicKeysUnverified(t *testing.T, g *libkb.GlobalContext) { cli, err := client.GetUserClient(g) if err != nil { t.Fatalf("failed to get user client: %s", err) } // t_rosetta arg := keybase1.LoadAllPublicKeysUnverifiedArg{Uid: keybase1.UID("b8939251cb3d367e68587acb33a64d19")} res, err := cli.LoadAllPublicKeysUnverified(context.TODO(), arg) if err != nil { t.Fatalf("failed to make load keys call: %s", err) } if len(res) != 3 { t.Fatalf("wrong amount of keys loaded: %d != %d", len(res), 3) } keys := map[keybase1.KID]bool{ keybase1.KID("0101fe1183765f256289427d6943cd8bab3b5fe095bcdd27f031ed298da523efd3120a"): true, keybase1.KID("0101b5839c4ccaa9d03b3016b9aa73a7e3eafb067f9c86c07a6f2f79cb8558b1c97f0a"): true, keybase1.KID("0101188ee7e63ccbd05af498772ab2975ee29df773240d17dde09aecf6c132a5a9a60a"): true, } for _, key := range res { if _, ok := keys[key.KID]; !ok { t.Fatalf("unknown key in response: %s", key.KID) } } }
func (md *MDServerLocal) getCurrentDeviceKID(ctx context.Context) (keybase1.KID, error) { key, err := md.config.KBPKI().GetCurrentCryptPublicKey(ctx) if err != nil { return keybase1.KID(""), err } return key.kid, nil }
func TestRevokedKeys(t *testing.T) { tc := SetupTest(t, "revoked keys", 1) defer tc.Cleanup() u, err := LoadUserPlusKeys(tc.G, "ff261e3b26543a24ba6c0693820ead19") if err != nil { t.Fatal(err) } if u.Username != "t_mike" { t.Errorf("username: %s, expected t_mike", u.Username) } if len(u.RevokedDeviceKeys) != 2 { t.Errorf("t_mike found with %d revoked keys, expected 2", len(u.RevokedDeviceKeys)) } kid := keybase1.KID("012073f26b5996912393f7d2961ca90968e4e83d6140e9771ba890ff8ba6ea97777e0a") for index, k := range u.RevokedDeviceKeys { if k.By != kid { t.Errorf("wrong revoking KID (index: %d) %s != %s", index, k.By, kid) } } }