Add four new infrastructure packages with CLI commands: - pkg/config: layered configuration (defaults → file → env → flags) - pkg/crypt: crypto primitives (Argon2id, AES-GCM, ChaCha20, HMAC, checksums) - pkg/plugin: plugin system with GitHub-based install/update/remove - pkg/collect: collection subsystem (GitHub, BitcoinTalk, market, papers, excavate) Fix all golangci-lint issues across the entire codebase (~100 errcheck, staticcheck SA1012/SA1019/ST1005, unused, ineffassign fixes) so that `core go qa` passes with 0 issues. Closes #167, #168, #170, #250, #251, #252, #253, #254, #255, #256 Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
50 lines
1.1 KiB
Go
50 lines
1.1 KiB
Go
package crypt
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"golang.org/x/crypto/bcrypt"
|
|
)
|
|
|
|
func TestHashPassword_Good(t *testing.T) {
|
|
password := "my-secure-password"
|
|
|
|
hash, err := HashPassword(password)
|
|
assert.NoError(t, err)
|
|
assert.NotEmpty(t, hash)
|
|
assert.Contains(t, hash, "$argon2id$")
|
|
|
|
match, err := VerifyPassword(password, hash)
|
|
assert.NoError(t, err)
|
|
assert.True(t, match)
|
|
}
|
|
|
|
func TestVerifyPassword_Bad(t *testing.T) {
|
|
password := "my-secure-password"
|
|
wrongPassword := "wrong-password"
|
|
|
|
hash, err := HashPassword(password)
|
|
assert.NoError(t, err)
|
|
|
|
match, err := VerifyPassword(wrongPassword, hash)
|
|
assert.NoError(t, err)
|
|
assert.False(t, match)
|
|
}
|
|
|
|
func TestHashBcrypt_Good(t *testing.T) {
|
|
password := "bcrypt-test-password"
|
|
|
|
hash, err := HashBcrypt(password, bcrypt.DefaultCost)
|
|
assert.NoError(t, err)
|
|
assert.NotEmpty(t, hash)
|
|
|
|
match, err := VerifyBcrypt(password, hash)
|
|
assert.NoError(t, err)
|
|
assert.True(t, match)
|
|
|
|
// Wrong password should not match
|
|
match, err = VerifyBcrypt("wrong-password", hash)
|
|
assert.NoError(t, err)
|
|
assert.False(t, match)
|
|
}
|