feat: infrastructure packages and lint cleanup (#281)
* ci: consolidate duplicate workflows and merge CodeQL configs
Remove 17 duplicate workflow files that were split copies of the
combined originals. Each family (CI, CodeQL, Coverage, PR Build,
Alpha Release) had the same job duplicated across separate
push/pull_request/schedule/manual trigger files.
Merge codeql.yml and codescan.yml into a single codeql.yml with
a language matrix covering go, javascript-typescript, python,
and actions — matching the previous default setup coverage.
Remaining workflows (one per family):
- ci.yml (push + PR + manual)
- codeql.yml (push + PR + schedule, all languages)
- coverage.yml (push + PR + manual)
- alpha-release.yml (push + manual)
- pr-build.yml (PR + manual)
- release.yml (tag push)
- agent-verify.yml, auto-label.yml, auto-project.yml
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* feat: add collect, config, crypt, plugin packages and fix all lint issues
Add four new infrastructure packages with CLI commands:
- pkg/config: layered configuration (defaults → file → env → flags)
- pkg/crypt: crypto primitives (Argon2id, AES-GCM, ChaCha20, HMAC, checksums)
- pkg/plugin: plugin system with GitHub-based install/update/remove
- pkg/collect: collection subsystem (GitHub, BitcoinTalk, market, papers, excavate)
Fix all golangci-lint issues across the entire codebase (~100 errcheck,
staticcheck SA1012/SA1019/ST1005, unused, ineffassign fixes) so that
`core go qa` passes with 0 issues.
Closes #167, #168, #170, #250, #251, #252, #253, #254, #255, #256
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
---------
Co-authored-by: Claude Opus 4.5 <noreply@anthropic.com>
2026-02-04 11:34:43 +00:00
|
|
|
package crypt
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"fmt"
|
|
|
|
|
"os"
|
|
|
|
|
"strings"
|
|
|
|
|
|
2026-02-16 14:24:37 +00:00
|
|
|
"forge.lthn.ai/core/go/pkg/cli"
|
2026-02-17 19:19:40 +00:00
|
|
|
"forge.lthn.ai/core/go-crypt/crypt"
|
feat: infrastructure packages and lint cleanup (#281)
* ci: consolidate duplicate workflows and merge CodeQL configs
Remove 17 duplicate workflow files that were split copies of the
combined originals. Each family (CI, CodeQL, Coverage, PR Build,
Alpha Release) had the same job duplicated across separate
push/pull_request/schedule/manual trigger files.
Merge codeql.yml and codescan.yml into a single codeql.yml with
a language matrix covering go, javascript-typescript, python,
and actions — matching the previous default setup coverage.
Remaining workflows (one per family):
- ci.yml (push + PR + manual)
- codeql.yml (push + PR + schedule, all languages)
- coverage.yml (push + PR + manual)
- alpha-release.yml (push + manual)
- pr-build.yml (PR + manual)
- release.yml (tag push)
- agent-verify.yml, auto-label.yml, auto-project.yml
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* feat: add collect, config, crypt, plugin packages and fix all lint issues
Add four new infrastructure packages with CLI commands:
- pkg/config: layered configuration (defaults → file → env → flags)
- pkg/crypt: crypto primitives (Argon2id, AES-GCM, ChaCha20, HMAC, checksums)
- pkg/plugin: plugin system with GitHub-based install/update/remove
- pkg/collect: collection subsystem (GitHub, BitcoinTalk, market, papers, excavate)
Fix all golangci-lint issues across the entire codebase (~100 errcheck,
staticcheck SA1012/SA1019/ST1005, unused, ineffassign fixes) so that
`core go qa` passes with 0 issues.
Closes #167, #168, #170, #250, #251, #252, #253, #254, #255, #256
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
---------
Co-authored-by: Claude Opus 4.5 <noreply@anthropic.com>
2026-02-04 11:34:43 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
|
|
// Encrypt command flags
|
|
|
|
|
var (
|
|
|
|
|
encryptPassphrase string
|
|
|
|
|
encryptAES bool
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
func addEncryptCommand(parent *cli.Command) {
|
|
|
|
|
encryptCmd := cli.NewCommand("encrypt", "Encrypt a file", "", func(cmd *cli.Command, args []string) error {
|
|
|
|
|
return runEncrypt(args[0])
|
|
|
|
|
})
|
|
|
|
|
encryptCmd.Args = cli.ExactArgs(1)
|
|
|
|
|
|
|
|
|
|
cli.StringFlag(encryptCmd, &encryptPassphrase, "passphrase", "p", "", "Passphrase (prompted if not given)")
|
|
|
|
|
cli.BoolFlag(encryptCmd, &encryptAES, "aes", "", false, "Use AES-256-GCM instead of ChaCha20-Poly1305")
|
|
|
|
|
|
|
|
|
|
parent.AddCommand(encryptCmd)
|
|
|
|
|
|
|
|
|
|
decryptCmd := cli.NewCommand("decrypt", "Decrypt an encrypted file", "", func(cmd *cli.Command, args []string) error {
|
|
|
|
|
return runDecrypt(args[0])
|
|
|
|
|
})
|
|
|
|
|
decryptCmd.Args = cli.ExactArgs(1)
|
|
|
|
|
|
|
|
|
|
cli.StringFlag(decryptCmd, &encryptPassphrase, "passphrase", "p", "", "Passphrase (prompted if not given)")
|
|
|
|
|
cli.BoolFlag(decryptCmd, &encryptAES, "aes", "", false, "Use AES-256-GCM instead of ChaCha20-Poly1305")
|
|
|
|
|
|
|
|
|
|
parent.AddCommand(decryptCmd)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func getPassphrase() (string, error) {
|
|
|
|
|
if encryptPassphrase != "" {
|
|
|
|
|
return encryptPassphrase, nil
|
|
|
|
|
}
|
|
|
|
|
return cli.Prompt("Passphrase", "")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func runEncrypt(path string) error {
|
|
|
|
|
passphrase, err := getPassphrase()
|
|
|
|
|
if err != nil {
|
|
|
|
|
return cli.Wrap(err, "failed to read passphrase")
|
|
|
|
|
}
|
|
|
|
|
if passphrase == "" {
|
|
|
|
|
return cli.Err("passphrase cannot be empty")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
data, err := os.ReadFile(path)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return cli.Wrap(err, "failed to read file")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
var encrypted []byte
|
|
|
|
|
if encryptAES {
|
|
|
|
|
encrypted, err = crypt.EncryptAES(data, []byte(passphrase))
|
|
|
|
|
} else {
|
|
|
|
|
encrypted, err = crypt.Encrypt(data, []byte(passphrase))
|
|
|
|
|
}
|
|
|
|
|
if err != nil {
|
|
|
|
|
return cli.Wrap(err, "failed to encrypt")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
outPath := path + ".enc"
|
|
|
|
|
if err := os.WriteFile(outPath, encrypted, 0o600); err != nil {
|
|
|
|
|
return cli.Wrap(err, "failed to write encrypted file")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
cli.Success(fmt.Sprintf("Encrypted %s -> %s", path, outPath))
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func runDecrypt(path string) error {
|
|
|
|
|
passphrase, err := getPassphrase()
|
|
|
|
|
if err != nil {
|
|
|
|
|
return cli.Wrap(err, "failed to read passphrase")
|
|
|
|
|
}
|
|
|
|
|
if passphrase == "" {
|
|
|
|
|
return cli.Err("passphrase cannot be empty")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
data, err := os.ReadFile(path)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return cli.Wrap(err, "failed to read file")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
var decrypted []byte
|
|
|
|
|
if encryptAES {
|
|
|
|
|
decrypted, err = crypt.DecryptAES(data, []byte(passphrase))
|
|
|
|
|
} else {
|
|
|
|
|
decrypted, err = crypt.Decrypt(data, []byte(passphrase))
|
|
|
|
|
}
|
|
|
|
|
if err != nil {
|
|
|
|
|
return cli.Wrap(err, "failed to decrypt")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
outPath := strings.TrimSuffix(path, ".enc")
|
|
|
|
|
if outPath == path {
|
|
|
|
|
outPath = path + ".dec"
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if err := os.WriteFile(outPath, decrypted, 0o600); err != nil {
|
|
|
|
|
return cli.Wrap(err, "failed to write decrypted file")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
cli.Success(fmt.Sprintf("Decrypted %s -> %s", path, outPath))
|
|
|
|
|
return nil
|
|
|
|
|
}
|