Skip to content

Commit acface6

Browse files
committed
chore: Fix linter issues
1 parent 42cb42e commit acface6

10 files changed

Lines changed: 44 additions & 41 deletions

.golangci.yml

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,11 @@ issues:
2020
- ST1003 # CamelCase variables; see constants/cipher.go
2121
- missing output for example, go test can't validate it
2222
- variable 'hasExpiredEntity' is only used in the if-statement
23+
- G101
24+
- Magic number
25+
- param max has same name as predeclared identifier
26+
- G115
27+
- the methods of "signatureCollector"
2328
exclude-rules:
2429
- path: crypto/key_clear.go
2530
text: "SA1019"
@@ -31,6 +36,8 @@ issues:
3136
text: "Using the variable on range scope"
3237
- path: crypto/sign_verify_test.go
3338
text: "Using the variable on range scope"
39+
- path: crypto/interop_test.go
40+
text: "G101: Potential hardcoded credentials"
3441

3542
linters:
3643
enable-all: true

crypto/encrypt_decrypt_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -927,7 +927,7 @@ func TestEncryptDecryptKey(t *testing.T) {
927927
func TestEncryptCompressionApplied(t *testing.T) {
928928
const numReplicas = 10
929929
builder := strings.Builder{}
930-
for i := 0; i < numReplicas; i++ {
930+
for range numReplicas {
931931
builder.WriteString(testMessage)
932932
}
933933
messageToEncrypt := builder.String()

crypto/keyring_test.go

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ import (
55
"testing"
66

77
"github.com/stretchr/testify/assert"
8+
"github.com/stretchr/testify/require"
89

910
"github.com/ProtonMail/go-crypto/openpgp/ecdh"
1011
"github.com/ProtonMail/go-crypto/openpgp/eddsa"
@@ -121,11 +122,11 @@ func TestKeyIds(t *testing.T) {
121122
}
122123

123124
func TestMultipleKeyRing(t *testing.T) {
124-
assert.Exactly(t, 3, len(keyRingTestMultiple.entities))
125+
assert.Len(t, keyRingTestMultiple.entities, 3)
125126
assert.Exactly(t, 3, keyRingTestMultiple.CountEntities())
126127
assert.Exactly(t, 3, keyRingTestMultiple.CountDecryptionEntities(testTime))
127128

128-
assert.Exactly(t, 3, len(keyRingTestMultiple.GetKeys()))
129+
assert.Len(t, keyRingTestMultiple.GetKeys(), 3)
129130

130131
testKey, err := keyRingTestMultiple.GetKey(1)
131132
if err != nil {
@@ -134,28 +135,28 @@ func TestMultipleKeyRing(t *testing.T) {
134135
assert.Exactly(t, keyTestEC, testKey)
135136

136137
_, err = keyRingTestMultiple.GetKey(3)
137-
assert.NotNil(t, err)
138+
require.Error(t, err)
138139

139140
singleKeyRing, err := keyRingTestMultiple.FirstKey()
140141
if err != nil {
141142
t.Fatal("Expected no error while filtering the first key, got:", err)
142143
}
143-
assert.Exactly(t, 1, len(singleKeyRing.entities))
144+
assert.Len(t, singleKeyRing.entities, 1)
144145
assert.Exactly(t, 1, singleKeyRing.CountEntities())
145146
assert.Exactly(t, 1, singleKeyRing.CountDecryptionEntities(testTime))
146147
}
147148

148149
func TestSerializeParse(t *testing.T) {
149150
serialized, err := keyRingTestMultiple.Serialize()
150-
assert.Nil(t, err)
151+
require.NoError(t, err)
151152

152153
parsed, err := NewKeyRingFromBinary(serialized)
153-
assert.Nil(t, err)
154+
require.NoError(t, err)
154155

155-
assert.Exactly(t, 3, len(parsed.GetKeys()))
156+
assert.Len(t, parsed.GetKeys(), 3)
156157
for i, parsedKey := range parsed.GetKeys() {
157158
expectedKey, err := keyRingTestMultiple.GetKey(i)
158-
assert.Nil(t, err)
159+
require.NoError(t, err)
159160
assert.Exactly(t, parsedKey.GetFingerprint(), expectedKey.GetFingerprint())
160161
}
161162
}
@@ -167,7 +168,7 @@ func TestClearPrivateKey(t *testing.T) {
167168
}
168169

169170
for _, key := range keyRingCopy.GetKeys() {
170-
assert.Nil(t, clearPrivateKey(key.entity.PrivateKey.PrivateKey))
171+
require.NoError(t, clearPrivateKey(key.entity.PrivateKey.PrivateKey))
171172
}
172173

173174
keys := keyRingCopy.GetKeys()

crypto/message_test.go

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ import (
1111

1212
"github.com/ProtonMail/go-crypto/openpgp/packet"
1313
"github.com/stretchr/testify/assert"
14+
"github.com/stretchr/testify/require"
1415
)
1516

1617
func TestTextMessageEncryptionWithPassword(t *testing.T) {
@@ -32,7 +33,7 @@ func TestTextMessageEncryptionWithPassword(t *testing.T) {
3233
}
3334
sessionKey, ok := p.(*packet.SymmetricKeyEncrypted)
3435
if ok {
35-
assert.Equal(t, sessionKey.CipherFunc, packet.CipherAES256)
36+
assert.Equal(t, packet.CipherAES256, sessionKey.CipherFunc)
3637
foundSk = true
3738
break
3839
}
@@ -43,7 +44,7 @@ func TestTextMessageEncryptionWithPassword(t *testing.T) {
4344
// Decrypt data with wrong password
4445
decryptorWrong, _ := testPGP.Decryption().Password([]byte("Wrong password")).New()
4546
_, err = decryptorWrong.Decrypt(encrypted.Bytes(), Bytes)
46-
assert.NotNil(t, err)
47+
require.Error(t, err)
4748

4849
// Decrypt data with the good password
4950
decryptor, _ := testPGP.Decryption().Password(testSymmetricKey).New()
@@ -67,7 +68,7 @@ func TestBinaryMessageEncryptionWithPassword(t *testing.T) {
6768
// Decrypt data with wrong password
6869
decryptorWrong, _ := testPGP.Decryption().Password([]byte("Wrong password")).New()
6970
_, err = decryptorWrong.Decrypt(encrypted.Bytes(), Bytes)
70-
assert.NotNil(t, err)
71+
require.Error(t, err)
7172

7273
// Decrypt data with the good password
7374
decryptor, _ := testPGP.Decryption().Password(testSymmetricKey).New()
@@ -305,7 +306,7 @@ func TestSHA1SignedMessageDecryption(t *testing.T) {
305306

306307
func TestMultipleKeyMessageEncryption(t *testing.T) {
307308
var message = []byte("plain text")
308-
assert.Exactly(t, 3, len(keyRingTestMultiple.entities))
309+
assert.Len(t, keyRingTestMultiple.entities, 3)
309310

310311
encryptor, _ := testPGP.Encryption().Recipients(keyRingTestMultiple).SigningKeys(keyRingTestPrivate).New()
311312
ciphertext, err := encryptor.Encrypt(message)
@@ -317,7 +318,7 @@ func TestMultipleKeyMessageEncryption(t *testing.T) {
317318
// followed by a single symmetrically encrypted data packet (tag 18)
318319
var p packet.Packet
319320
packets := packet.NewReader(bytes.NewReader(ciphertext.Bytes()))
320-
for i := 0; i < 3; i++ {
321+
for range 3 {
321322
if p, err = packets.Next(); err != nil {
322323
t.Fatal(err.Error())
323324
}
@@ -349,15 +350,15 @@ func TestMultipleKeyMessageEncryption(t *testing.T) {
349350

350351
func TestMessageGetEncryptionKeyIDs(t *testing.T) {
351352
var message = []byte("plain text")
352-
assert.Exactly(t, 3, len(keyRingTestMultiple.entities))
353+
assert.Len(t, keyRingTestMultiple.entities, 3)
353354

354355
encryptor, _ := testPGP.Encryption().Recipients(keyRingTestMultiple).SigningKeys(keyRingTestPrivate).New()
355356
ciphertext, err := encryptor.Encrypt(message)
356357
if err != nil {
357358
t.Fatal("Expected no error when encrypting, got:", err)
358359
}
359360
ids, ok := ciphertext.EncryptionKeyIDs()
360-
assert.Exactly(t, 3, len(ids))
361+
assert.Len(t, ids, 3)
361362
assert.True(t, ok)
362363
encKey, ok := keyRingTestMultiple.entities[0].EncryptionKey(time.Now(), nil)
363364
assert.True(t, ok)
@@ -371,7 +372,7 @@ func TestMessageGetHexGetEncryptionKeyIDs(t *testing.T) {
371372
}
372373

373374
ids, ok := ciphertext.HexEncryptionKeyIDs()
374-
assert.Exactly(t, 2, len(ids))
375+
assert.Len(t, ids, 2)
375376
assert.True(t, ok)
376377

377378
assert.Exactly(t, "76ad736fa7e0e83c", ids[0])
@@ -388,7 +389,7 @@ func TestMessageGetSignatureKeyIDs(t *testing.T) {
388389
}
389390

390391
ids, ok := SignatureKeyIDs(signature)
391-
assert.Exactly(t, 1, len(ids))
392+
assert.Len(t, ids, 1)
392393
assert.True(t, ok)
393394
signingKey, ok := keyRingTestPrivate.entities[0].SigningKey(time.Now(), nil)
394395
assert.True(t, ok)
@@ -402,7 +403,7 @@ func TestMessageGetHexSignatureKeyIDs(t *testing.T) {
402403
}
403404

404405
ids, ok := ciphertext.HexSignatureKeyIDs()
405-
assert.Exactly(t, 2, len(ids))
406+
assert.Len(t, ids, 2)
406407
assert.True(t, ok)
407408

408409
assert.Exactly(t, "3eb6259edf21df24", ids[0])

crypto/sessionkey_test.go

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ import (
1111
"github.com/ProtonMail/gopenpgp/v3/constants"
1212
"github.com/ProtonMail/gopenpgp/v3/profile"
1313
"github.com/stretchr/testify/assert"
14+
"github.com/stretchr/testify/require"
1415
)
1516

1617
var testSessionKey *SessionKey
@@ -81,7 +82,7 @@ func TestSymmetricKeyPacket(t *testing.T) {
8182
decHandle, _ := testPGP.Decryption().Password([]byte("Wrong password")).New()
8283
wrongSymmetricKey, err := decHandle.DecryptSessionKey(keyPacket)
8384
if err != nil {
84-
assert.EqualError(t, err, "gopenpgp: unable to decrypt any packet")
85+
require.EqualError(t, err, "gopenpgp: unable to decrypt any packet")
8586
} else {
8687
assert.NotEqual(t, testSessionKey, wrongSymmetricKey)
8788
}
@@ -134,7 +135,7 @@ func TestDataPacketEncryption(t *testing.T) {
134135
}
135136
decryptor, _ := testPGP.Decryption().SessionKey(wrongKey).New()
136137
_, err = decryptor.Decrypt(pgpMessage.BinaryDataPacket(), Bytes)
137-
assert.NotNil(t, err)
138+
require.Error(t, err)
138139

139140
// Decrypt data with the good session key
140141
decryptor, _ = testPGP.Decryption().SessionKey(testSessionKey).New()
@@ -145,7 +146,7 @@ func TestDataPacketEncryption(t *testing.T) {
145146
assert.Exactly(t, message, decrypted.Bytes())
146147

147148
// Encrypt session key
148-
assert.Exactly(t, 3, len(keyRingTestMultiple.entities))
149+
assert.Len(t, keyRingTestMultiple.entities, 3)
149150
encryptor, _ = testPGP.Encryption().Recipients(keyRingTestMultiple).New()
150151
keyPackets, err := encryptor.EncryptSessionKey(testSessionKey)
151152
if err != nil {
@@ -167,7 +168,7 @@ func TestDataPacketEncryption(t *testing.T) {
167168
}
168169
ids, ok := pgpMessage.EncryptionKeyIDs()
169170
assert.True(t, ok)
170-
assert.Exactly(t, 3, len(ids))
171+
assert.Len(t, ids, 3)
171172

172173
// Test if final decryption succeeds
173174
decryptor, _ = testPGP.Decryption().DecryptionKeys(keyRingTestPrivate).New()
@@ -239,7 +240,7 @@ func TestDataPacketEncryptionAndSignature(t *testing.T) {
239240
}
240241
decryptor, _ := testPGP.Decryption().SessionKey(wrongKey).New()
241242
_, err = decryptor.Decrypt(pgpMessage.BinaryDataPacket(), Bytes)
242-
assert.NotNil(t, err)
243+
require.Error(t, err)
243244

244245
// Decrypt data with the good session key
245246
decryptor, _ = testPGP.Decryption().SessionKey(testSessionKey).New()
@@ -276,7 +277,7 @@ func TestDataPacketEncryptionAndSignature(t *testing.T) {
276277
assert.Exactly(t, message, decrypted.Bytes())
277278

278279
// Encrypt session key
279-
assert.Exactly(t, 3, len(keyRingTestMultiple.entities))
280+
assert.Len(t, keyRingTestMultiple.entities, 3)
280281
encryptor, _ = testPGP.Encryption().Recipients(keyRingTestMultiple).New()
281282
keyPacket, err := encryptor.EncryptSessionKey(testSessionKey)
282283
if err != nil {
@@ -298,7 +299,7 @@ func TestDataPacketEncryptionAndSignature(t *testing.T) {
298299
}
299300
ids, ok := pgpMessage.EncryptionKeyIDs()
300301
assert.True(t, ok)
301-
assert.Exactly(t, 3, len(ids))
302+
assert.Len(t, ids, 3)
302303

303304
// Test if final decryption & verification succeeds
304305
decryptor, _ = testPGP.Decryption().DecryptionKeys(keyRingTestPrivate).VerificationKeys(keyRingTestPublic).New()
@@ -345,7 +346,7 @@ func TestMDCFailDecryption(t *testing.T) {
345346

346347
decryptor, _ := testPGP.Decryption().SessionKey(sessionKey).New()
347348
_, err = decryptor.Decrypt(pgpMessage.BinaryDataPacket(), Bytes)
348-
assert.NotNil(t, err)
349+
assert.Error(t, err)
349350
}
350351

351352
func TestAsymmetricKeyPacketDecryptionFailure(t *testing.T) {

crypto/signature_test.go

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -176,9 +176,6 @@ func Test_KeyRing_GetVerifiedSignatureTimestampSuccess(t *testing.T) {
176176
t.Fatal(err)
177177
}
178178
actualTime := verificationResult.SignatureCreationTime()
179-
if err != nil {
180-
t.Errorf("Got an error while parsing the signature creation time: %v", err)
181-
}
182179
if timeLocal != actualTime {
183180
t.Errorf("Expected creation time to be %d, got %d", timeLocal, actualTime)
184181
}
@@ -226,9 +223,6 @@ func Test_KeyRing_GetVerifiedSignatureWithTwoKeysTimestampSuccess(t *testing.T)
226223
}
227224
actualTime := verificationResult.SignatureCreationTime()
228225
otherTime := verificationResult.Signatures[1].Signature.CreationTime.Unix()
229-
if err != nil {
230-
t.Errorf("Got an error while parsing the signature creation time: %v", err)
231-
}
232226

233227
if time2 != otherTime {
234228
t.Errorf("Expected creation time to be %d, got %d", otherTime, time2)

go.mod

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,6 @@ module github.com/ProtonMail/gopenpgp/v3
22

33
go 1.23.0
44

5-
65
require (
76
github.com/ProtonMail/go-crypto v1.4.1
87
github.com/ProtonMail/go-mime v0.0.0-20230322103455-7d82a3887f2f

internal/sanitize_string_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ func testStringSanitizeReader(t *testing.T, test string) {
2323
n, err = reader.Read(smallBuff)
2424
byteBuffer.Write(smallBuff[:n])
2525
}
26-
assert.Equal(t, byteBuffer.String(), expectedOutput(test))
26+
assert.Equal(t, expectedOutput(test), byteBuffer.String())
2727
}
2828

2929
func TestStringSanitizeReader(t *testing.T) {

mime/mime.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ func Decrypt(
6262
bodyContent, bodyMimeType := body.GetBody()
6363
bodyContentSanitized := internal.SanitizeString(bodyContent)
6464
callbacks.OnBody(bodyContentSanitized, bodyMimeType)
65-
for i := 0; i < len(attachments); i++ {
65+
for i := range attachments {
6666
callbacks.OnAttachment(attachmentHeaders[i], []byte(attachments[i]))
6767
}
6868
callbacks.OnEncryptedHeaders("")

mime/mime_test.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,18 +22,18 @@ func (t *Callbacks) OnBody(body string, mimetype string) {
2222
assert.Exactly(t.Testing, readTestFile("mime_decryptedBody", false), body)
2323
}
2424

25-
func (t Callbacks) OnAttachment(headers string, data []byte) {
25+
func (t *Callbacks) OnAttachment(headers string, data []byte) {
2626
assert.Exactly(t.Testing, 1, data)
2727
}
2828

29-
func (t Callbacks) OnEncryptedHeaders(headers string) {
29+
func (t *Callbacks) OnEncryptedHeaders(headers string) {
3030
assert.Exactly(t.Testing, "", headers)
3131
}
3232

33-
func (t Callbacks) OnVerified(verified int) {
33+
func (t *Callbacks) OnVerified(verified int) {
3434
}
3535

36-
func (t Callbacks) OnError(err error) {
36+
func (t *Callbacks) OnError(err error) {
3737
t.Testing.Fatal("Error in decrypting MIME message: ", err)
3838
}
3939

0 commit comments

Comments
 (0)