diff --git a/veilid-wasm/tests/src/VeilidRoutingContext.test.ts b/veilid-wasm/tests/src/VeilidRoutingContext.test.ts index 94b6ee2d..f60d17fa 100644 --- a/veilid-wasm/tests/src/VeilidRoutingContext.test.ts +++ b/veilid-wasm/tests/src/VeilidRoutingContext.test.ts @@ -103,7 +103,7 @@ describe('VeilidRoutingContext', () => { const bestCryptoKind = veilidCrypto.bestCryptoKind(); const ownerKeyPair = veilidCrypto.generateKeyPair(bestCryptoKind); const [owner, secret] = ownerKeyPair.split(':'); - const dhtRecordKey = await routingContext.getDhtRecordKey({ kind: 'DFLT', o_cnt: 1 }, `${bestCryptoKind}:owner`); + const dhtRecordKey = await routingContext.getDhtRecordKey({ kind: 'DFLT', o_cnt: 1 }, `${bestCryptoKind}:${owner}`); const dhtRecord = await routingContext.createDhtRecord({ kind: 'DFLT', o_cnt: 1 }, ownerKeyPair, bestCryptoKind); expect(dhtRecord.key).toBeDefined(); expect(dhtRecord.key).toEqual(dhtRecordKey); diff --git a/veilid-wasm/tests/src/utils/veilid-config.ts b/veilid-wasm/tests/src/utils/veilid-config.ts index 1b3d6eb2..4cbe6184 100644 --- a/veilid-wasm/tests/src/utils/veilid-config.ts +++ b/veilid-wasm/tests/src/utils/veilid-config.ts @@ -21,6 +21,15 @@ export const veilidCoreInitConfig: VeilidWASMConfig = { export var veilidCoreStartupConfig = (() => { var defaultConfig = veilidClient.defaultConfig(); defaultConfig.program_name = 'veilid-wasm-test'; + if(process.env.NETWORK_KEY) { + defaultConfig.network.network_key_password = process.env.NETWORK_KEY; + } + if(process.env.BOOTSTRAP_KEYS) { + defaultConfig.network.routing_table.bootstrap_keys = process.env.BOOTSTRAP_KEYS.split(',') as `${string}:${string}`[]; + } + if(process.env.BOOTSTRAP) { + defaultConfig.network.routing_table.bootstrap = process.env.BOOTSTRAP.split(','); + } // Ensure we are starting from scratch defaultConfig.table_store.delete = true; defaultConfig.protected_store.delete = true;