* Implement authentication and authorization features
- Define Workspace and Crypt interfaces in pkg/framework/core/interfaces.go
- Add Workspace() and Crypt() methods to Core in pkg/framework/core/core.go
- Implement PGP service in pkg/crypt/openpgp/service.go using ProtonMail go-crypto
- Implement Workspace service in pkg/workspace/service.go with encrypted directory structure
- Register new services in pkg/cli/app.go
- Add IPC handlers to both services for frontend/CLI communication
- Add unit tests for PGP service in pkg/crypt/openpgp/service_test.go
This implementation aligns the codebase with the features described in the README, providing a foundation for secure, encrypted workspaces and PGP key management.
* Implement authentication and authorization features with fixes
- Define Workspace and Crypt interfaces in pkg/framework/core/interfaces.go
- Add Workspace() and Crypt() methods to Core in pkg/framework/core/core.go
- Implement PGP service in pkg/crypt/openpgp/service.go using ProtonMail go-crypto
- Implement Workspace service in pkg/workspace/service.go with encrypted directory structure
- Register new services in pkg/cli/app.go with proper service names ('crypt', 'workspace')
- Add IPC handlers to both services for frontend/CLI communication
- Add unit tests for PGP and Workspace services
- Fix panic in PGP key serialization by using manual packet serialization
- Fix PGP decryption by adding armor decoding support
This implementation provides the secure, encrypted workspace manager features described in the README.
* Implement authentication and authorization features (Final)
- Define Workspace and Crypt interfaces in pkg/framework/core/interfaces.go
- Add Workspace() and Crypt() methods to Core in pkg/framework/core/core.go
- Implement PGP service in pkg/crypt/openpgp/service.go using ProtonMail go-crypto
- Implement Workspace service in pkg/workspace/service.go with encrypted directory structure
- Register new services in pkg/cli/app.go with proper service names ('crypt', 'workspace')
- Add IPC handlers to both services for frontend/CLI communication
- Add unit tests for PGP and Workspace services
- Fix panic in PGP key serialization by using manual packet serialization
- Fix PGP decryption by adding armor decoding support
- Fix formatting and unused imports
This implementation provides the secure, encrypted workspace manager features described in the README.
* Fix CI failure and implement auth features
- Fix auto-merge workflow by implementing it locally with proper repository context
- Implement Workspace and Crypt interfaces and services
- Add unit tests and IPC handlers for new services
- Fix formatting and unused imports in modified files
- Fix PGP key serialization and decryption issues
---------
Co-authored-by: Claude <developers@lethean.io>
43 lines
1 KiB
Go
43 lines
1 KiB
Go
package openpgp
|
|
|
|
import (
|
|
"bytes"
|
|
"testing"
|
|
|
|
core "github.com/host-uk/core/pkg/framework/core"
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func TestCreateKeyPair(t *testing.T) {
|
|
c, _ := core.New()
|
|
s := &Service{core: c}
|
|
|
|
privKey, err := s.CreateKeyPair("test user", "password123")
|
|
assert.NoError(t, err)
|
|
assert.NotEmpty(t, privKey)
|
|
assert.Contains(t, privKey, "-----BEGIN PGP PRIVATE KEY BLOCK-----")
|
|
}
|
|
|
|
func TestEncryptDecrypt(t *testing.T) {
|
|
c, _ := core.New()
|
|
s := &Service{core: c}
|
|
|
|
passphrase := "secret"
|
|
privKey, err := s.CreateKeyPair("test user", passphrase)
|
|
assert.NoError(t, err)
|
|
|
|
// In this simple test, the public key is also in the armored private key string
|
|
// (openpgp.ReadArmoredKeyRing reads both)
|
|
publicKey := privKey
|
|
|
|
data := "hello openpgp"
|
|
var buf bytes.Buffer
|
|
armored, err := s.EncryptPGP(&buf, publicKey, data)
|
|
assert.NoError(t, err)
|
|
assert.NotEmpty(t, armored)
|
|
assert.NotEmpty(t, buf.String())
|
|
|
|
decrypted, err := s.DecryptPGP(privKey, armored, passphrase)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, data, decrypted)
|
|
}
|