Add four new infrastructure packages with CLI commands: - pkg/config: layered configuration (defaults → file → env → flags) - pkg/crypt: crypto primitives (Argon2id, AES-GCM, ChaCha20, HMAC, checksums) - pkg/plugin: plugin system with GitHub-based install/update/remove - pkg/collect: collection subsystem (GitHub, BitcoinTalk, market, papers, excavate) Fix all golangci-lint issues across the entire codebase (~100 errcheck, staticcheck SA1012/SA1019/ST1005, unused, ineffassign fixes) so that `core go qa` passes with 0 issues. Closes #167, #168, #170, #250, #251, #252, #253, #254, #255, #256 Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
45 lines
1.1 KiB
Go
45 lines
1.1 KiB
Go
package crypt
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func TestEncryptDecrypt_Good(t *testing.T) {
|
|
plaintext := []byte("hello, world!")
|
|
passphrase := []byte("correct-horse-battery-staple")
|
|
|
|
encrypted, err := Encrypt(plaintext, passphrase)
|
|
assert.NoError(t, err)
|
|
assert.NotEqual(t, plaintext, encrypted)
|
|
|
|
decrypted, err := Decrypt(encrypted, passphrase)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, plaintext, decrypted)
|
|
}
|
|
|
|
func TestEncryptDecrypt_Bad(t *testing.T) {
|
|
plaintext := []byte("secret data")
|
|
passphrase := []byte("correct-passphrase")
|
|
wrongPassphrase := []byte("wrong-passphrase")
|
|
|
|
encrypted, err := Encrypt(plaintext, passphrase)
|
|
assert.NoError(t, err)
|
|
|
|
_, err = Decrypt(encrypted, wrongPassphrase)
|
|
assert.Error(t, err)
|
|
}
|
|
|
|
func TestEncryptDecryptAES_Good(t *testing.T) {
|
|
plaintext := []byte("hello, AES world!")
|
|
passphrase := []byte("my-secure-passphrase")
|
|
|
|
encrypted, err := EncryptAES(plaintext, passphrase)
|
|
assert.NoError(t, err)
|
|
assert.NotEqual(t, plaintext, encrypted)
|
|
|
|
decrypted, err := DecryptAES(encrypted, passphrase)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, plaintext, decrypted)
|
|
}
|