cli/pkg/crypt/openpgp/service_test.go

44 lines
1 KiB
Go
Raw Normal View History

Implement Authentication and Authorization Features (#314) * Implement authentication and authorization features - Define Workspace and Crypt interfaces in pkg/framework/core/interfaces.go - Add Workspace() and Crypt() methods to Core in pkg/framework/core/core.go - Implement PGP service in pkg/crypt/openpgp/service.go using ProtonMail go-crypto - Implement Workspace service in pkg/workspace/service.go with encrypted directory structure - Register new services in pkg/cli/app.go - Add IPC handlers to both services for frontend/CLI communication - Add unit tests for PGP service in pkg/crypt/openpgp/service_test.go This implementation aligns the codebase with the features described in the README, providing a foundation for secure, encrypted workspaces and PGP key management. * Implement authentication and authorization features with fixes - Define Workspace and Crypt interfaces in pkg/framework/core/interfaces.go - Add Workspace() and Crypt() methods to Core in pkg/framework/core/core.go - Implement PGP service in pkg/crypt/openpgp/service.go using ProtonMail go-crypto - Implement Workspace service in pkg/workspace/service.go with encrypted directory structure - Register new services in pkg/cli/app.go with proper service names ('crypt', 'workspace') - Add IPC handlers to both services for frontend/CLI communication - Add unit tests for PGP and Workspace services - Fix panic in PGP key serialization by using manual packet serialization - Fix PGP decryption by adding armor decoding support This implementation provides the secure, encrypted workspace manager features described in the README. * Implement authentication and authorization features (Final) - Define Workspace and Crypt interfaces in pkg/framework/core/interfaces.go - Add Workspace() and Crypt() methods to Core in pkg/framework/core/core.go - Implement PGP service in pkg/crypt/openpgp/service.go using ProtonMail go-crypto - Implement Workspace service in pkg/workspace/service.go with encrypted directory structure - Register new services in pkg/cli/app.go with proper service names ('crypt', 'workspace') - Add IPC handlers to both services for frontend/CLI communication - Add unit tests for PGP and Workspace services - Fix panic in PGP key serialization by using manual packet serialization - Fix PGP decryption by adding armor decoding support - Fix formatting and unused imports This implementation provides the secure, encrypted workspace manager features described in the README. * Fix CI failure and implement auth features - Fix auto-merge workflow by implementing it locally with proper repository context - Implement Workspace and Crypt interfaces and services - Add unit tests and IPC handlers for new services - Fix formatting and unused imports in modified files - Fix PGP key serialization and decryption issues --------- Co-authored-by: Claude <developers@lethean.io>
2026-02-05 06:55:50 +00:00
package openpgp
import (
"bytes"
"testing"
core "github.com/host-uk/core/pkg/framework/core"
"github.com/stretchr/testify/assert"
)
func TestCreateKeyPair(t *testing.T) {
c, _ := core.New()
s := &Service{core: c}
privKey, err := s.CreateKeyPair("test user", "password123")
assert.NoError(t, err)
assert.NotEmpty(t, privKey)
assert.Contains(t, privKey, "-----BEGIN PGP PRIVATE KEY BLOCK-----")
}
func TestEncryptDecrypt(t *testing.T) {
c, _ := core.New()
s := &Service{core: c}
passphrase := "secret"
privKey, err := s.CreateKeyPair("test user", passphrase)
assert.NoError(t, err)
// In this simple test, the public key is also in the armored private key string
// (openpgp.ReadArmoredKeyRing reads both)
publicKey := privKey
data := "hello openpgp"
var buf bytes.Buffer
armored, err := s.EncryptPGP(&buf, publicKey, data)
assert.NoError(t, err)
assert.NotEmpty(t, armored)
assert.NotEmpty(t, buf.String())
decrypted, err := s.DecryptPGP(privKey, armored, passphrase)
assert.NoError(t, err)
assert.Equal(t, data, decrypted)
}