Files
snapd/go.mod
Michael Vogt 573d8a9816 secboot: detect lockout mode in CheckTPMKeySealingSupported (#12418)
This commit fixes the issue that the detection of TPM key sealing
does not take into account if the system is already has the lockout
auth attribute set. If this is the case an install will not be
successful but currently this is detected very late.

Note that lockoutAuthSet() is exactly the same 5 lines of code like
https://github.com/snapcore/secboot/pull/220/files
Once we can use secboot master this can be removed and
`secboot.LockoutAuthSet()` can be used instead.

* devicestate: take tpm provision mode into account when checking for encryption

* devicestate: tweak MockSecbootCheckTPMKeySealingSupported() usage and tests

* secboot: improve test coverage for CheckTPMKeySealingSupported()

* secboot: use LockoutAuthSet from secboot

* devicestate: more mode->tpmMode
2023-01-23 17:56:05 +01:00

41 lines
2.1 KiB
Modula-2

module github.com/snapcore/snapd
go 1.13
// maze.io/x/crypto/afis imported by github.com/snapcore/secboot/tpm2
replace maze.io/x/crypto => github.com/snapcore/maze.io-x-crypto v0.0.0-20190131090603-9b94c9afe066
require (
github.com/canonical/go-efilib v0.3.1-0.20220815143333-7e5151412e93 // indirect
github.com/canonical/go-sp800.90a-drbg v0.0.0-20210314144037-6eeb1040d6c3 // indirect
github.com/canonical/go-tpm2 v0.0.0-20210827151749-f80ff5afff61
github.com/canonical/tcglog-parser v0.0.0-20210824131805-69fa1e9f0ad2 // indirect
github.com/coreos/go-systemd v0.0.0-20180511133405-39ca1b05acc7
github.com/godbus/dbus v0.0.0-20190726142602-4481cbc300e2
github.com/gorilla/mux v1.7.4-0.20190701202633-d83b6ffe499a
github.com/gvalkov/golang-evdev v0.0.0-20191114124502-287e62b94bcb
github.com/jessevdk/go-flags v1.5.1-0.20210607101731-3927b71304df
github.com/juju/ratelimit v1.0.1
github.com/kr/pretty v0.2.2-0.20200810074440-814ac30b4b18 // indirect
github.com/mvo5/goconfigparser v0.0.0-20200803085309-72e476556adb
// if below two libseccomp-golang lines are updated, one must also update packaging/ubuntu-14.04/rules
github.com/mvo5/libseccomp-golang v0.9.1-0.20180308152521-f4de83b52afb // old trusty builds only
github.com/seccomp/libseccomp-golang v0.9.2-0.20220502024300-f57e1d55ea18
github.com/snapcore/bolt v1.3.2-0.20210908134111-63c8bfcf7af8
github.com/snapcore/go-gettext v0.0.0-20191107141714-82bbea49e785
github.com/snapcore/secboot v0.0.0-20230119174011-57239c9f324a
golang.org/x/crypto v0.0.0-20220829220503-c86fa9a7ed90
golang.org/x/net v0.0.0-20220826154423-83b083e8dc8b // indirect
golang.org/x/sys v0.0.0-20220829200755-d48e67d00261
golang.org/x/xerrors v0.0.0-20220609144429-65e65417b02f
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c
gopkg.in/macaroon.v1 v1.0.0-20150121114231-ab3940c6c165
gopkg.in/mgo.v2 v2.0.0-20180704144907-a7e2c1d573e1
gopkg.in/retry.v1 v1.0.3
gopkg.in/tomb.v2 v2.0.0-20161208151619-d5d1b5820637
gopkg.in/tylerb/graceful.v1 v1.2.15
gopkg.in/yaml.v2 v2.4.0
gopkg.in/yaml.v3 v3.0.0-20210107192922-496545a6307b
maze.io/x/crypto v0.0.0-20190131090603-9b94c9afe066 // indirect
)