-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add test coverage, CI and update deps #3
Conversation
Downgrade Go version requirement from 1.23 to 1.20 for compatibility. Update `golang.org/x/crypto` to v0.33.0 and `golang.org/x/sys` to v0.30.0 to pull in the latest patches. Ensure consistency across go.mod and go.sum.
This commit introduces GitHub Actions workflows including CI pipelines for Go projects, covering tasks such as testing, linting, vulnerability scanning (govulncheck), dependency review, REUSE compliance, and CodeQL analysis. Scheduled daily dependency updates via Dependabot and automated weekly CodeQL analysis are included to ensure code quality and security. These workflows enhance the project's automation, maintainability, and compliance.
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
Introduces a `codecov.yml` file to enforce test coverage standards. Sets a 95% target for both project and patch coverage with a 2% threshold. Includes additional rules for CI failures and pull request handling.
Included the MIT license text and added SPDX license headers to relevant files for improved license clarity and compliance. This ensures proper attribution and adherence to open-source licensing standards.
Included the MIT license text and added SPDX license headers to relevant files for improved license clarity and compliance. This ensures proper attribution and adherence to open-source licensing standards.
Introduce unit tests for `NewEncrypter` and `NewEncrypterWithSettings`, covering successful creation and edge cases like empty passphrase, broken readers, and writers. Additionally, define a new `ErrPassPhraseEmpty` error for validating non-empty passphrases.
Return an error if the passphrase is empty to handle invalid inputs gracefully. Add unit tests for decryption functionality, including cases for nil and incorrect passphrases, ensuring robust error handling and correctness.
This commit introduces a check to ensure the number of Argon2 rounds meets the minimum threshold, returning an error if invalid. Additional test cases were added to validate error scenarios such as invalid Argon2 settings, salt, IV, tampered ciphertext, missing checksum, and broken readers. These changes enhance the robustness of the decryption process and error handling.
Updated all byte literals in `decrypter_test.go` to consistently use octal notation (e.g., `0o0, 0o1`) instead of decimal notation (e.g., `00, 01`). This improves code clarity and aligns with standard Go practices for representing raw bytes.
Refactored error messages in decryption tests to reflect precise failure causes, improving clarity and debugging effectiveness. Added a new test case to validate decryption failure with insufficient Argon2 rounds, ensuring robust handling of edge cases.
No description provided.