Add four new infrastructure packages with CLI commands: - pkg/config: layered configuration (defaults → file → env → flags) - pkg/crypt: crypto primitives (Argon2id, AES-GCM, ChaCha20, HMAC, checksums) - pkg/plugin: plugin system with GitHub-based install/update/remove - pkg/collect: collection subsystem (GitHub, BitcoinTalk, market, papers, excavate) Fix all golangci-lint issues across the entire codebase (~100 errcheck, staticcheck SA1012/SA1019/ST1005, unused, ineffassign fixes) so that `core go qa` passes with 0 issues. Closes #167, #168, #170, #250, #251, #252, #253, #254, #255, #256 Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
74 lines
1.5 KiB
Go
74 lines
1.5 KiB
Go
package crypt
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"github.com/host-uk/core/pkg/cli"
|
|
"github.com/host-uk/core/pkg/crypt"
|
|
"golang.org/x/crypto/bcrypt"
|
|
)
|
|
|
|
// Hash command flags
|
|
var (
|
|
hashBcrypt bool
|
|
hashVerify string
|
|
)
|
|
|
|
func addHashCommand(parent *cli.Command) {
|
|
hashCmd := cli.NewCommand("hash", "Hash a password with Argon2id or bcrypt", "", func(cmd *cli.Command, args []string) error {
|
|
return runHash(args[0])
|
|
})
|
|
hashCmd.Args = cli.ExactArgs(1)
|
|
|
|
cli.BoolFlag(hashCmd, &hashBcrypt, "bcrypt", "b", false, "Use bcrypt instead of Argon2id")
|
|
cli.StringFlag(hashCmd, &hashVerify, "verify", "", "", "Verify input against this hash")
|
|
|
|
parent.AddCommand(hashCmd)
|
|
}
|
|
|
|
func runHash(input string) error {
|
|
// Verify mode
|
|
if hashVerify != "" {
|
|
return runHashVerify(input, hashVerify)
|
|
}
|
|
|
|
// Hash mode
|
|
if hashBcrypt {
|
|
hash, err := crypt.HashBcrypt(input, bcrypt.DefaultCost)
|
|
if err != nil {
|
|
return cli.Wrap(err, "failed to hash password")
|
|
}
|
|
fmt.Println(hash)
|
|
return nil
|
|
}
|
|
|
|
hash, err := crypt.HashPassword(input)
|
|
if err != nil {
|
|
return cli.Wrap(err, "failed to hash password")
|
|
}
|
|
fmt.Println(hash)
|
|
return nil
|
|
}
|
|
|
|
func runHashVerify(input, hash string) error {
|
|
var match bool
|
|
var err error
|
|
|
|
if hashBcrypt {
|
|
match, err = crypt.VerifyBcrypt(input, hash)
|
|
} else {
|
|
match, err = crypt.VerifyPassword(input, hash)
|
|
}
|
|
|
|
if err != nil {
|
|
return cli.Wrap(err, "failed to verify hash")
|
|
}
|
|
|
|
if match {
|
|
cli.Success("Password matches hash")
|
|
return nil
|
|
}
|
|
|
|
cli.Error("Password does not match hash")
|
|
return cli.Err("hash verification failed")
|
|
}
|