blob: f7b1f56c246cfe1291814338b11ab770cc5fe032 [file] [log] [blame]
package(default_visibility = ["//visibility:public"])
licenses(["notice"])
exports_files(srcs = ["credential.json"])
filegroup(
name = "credentials",
testonly = 1,
srcs = [
"aws_credentials_cc.txt",
"aws_key_arn.txt",
"bad_access_keys_aws.csv",
"bad_aws_credentials_cc.txt",
"bad_aws_key_arn.txt",
"bad_credentials_aws.csv",
"bad_gcp_credentials.json",
"bad_gcp_key_name.txt",
"credential.json",
"credentials_aws.cred",
"credentials_aws.csv",
"credentials_aws.ini",
"gcp_key_name.txt",
],
)
filegroup(
name = "ecies_keysets",
testonly = 1,
srcs = [
# Generated with
# tinkey create \
# --key-template examples/keytemplates/ECIES_P256_HKDFHMACSHA256_AES128CTR_128BITIV_HMACSHA256_128BITTAG.ascii \
# --out testdata/ecies_private_keyset2.bin --out-format BINARY
"ecies_private_keyset.bin",
# Generated with
# tinkey create \
# --key-template examples/keytemplates/ECIES_P256_HKDFHMACSHA256_AES128GCM.ascii \
# --out testdata/ecies_private_keyset2.bin --out-format BINARY
"ecies_private_keyset2.bin",
# tinkey create-public-keyset --in testdata/ecies_private_keyset.bin --in-form BINARY \
# --out testdata/ecies_public_keyset.bin --out-form BINARY
"ecies_public_keyset.bin",
"ecies_public_keyset2.bin",
],
)