diff --git a/internal/cli/generate.go b/internal/cli/generate.go index 4f08b2c..84b20d8 100644 --- a/internal/cli/generate.go +++ b/internal/cli/generate.go @@ -28,7 +28,9 @@ func newGenerateMnemonicCmd() *cobra.Command { return &cobra.Command{ Use: "mnemonic", Short: "Generate a random BIP39 mnemonic phrase", - Long: `Generate a cryptographically secure random BIP39 mnemonic phrase that can be used with 'secret init' or 'secret import'.`, + Long: `Generate a cryptographically secure random BIP39 ` + + `mnemonic phrase that can be used with 'secret init' ` + + `or 'secret import'.`, RunE: func(cmd *cobra.Command, args []string) error { cli := NewCLIInstance() return cli.GenerateMnemonic(cmd) @@ -92,7 +94,13 @@ func (cli *Instance) GenerateMnemonic(cmd *cobra.Command) error { } // GenerateSecret generates a random secret and stores it in the vault -func (cli *Instance) GenerateSecret(cmd *cobra.Command, secretName string, length int, secretType string, force bool) error { +func (cli *Instance) GenerateSecret( + cmd *cobra.Command, + secretName string, + length int, + secretType string, + force bool, +) error { if length < 1 { return fmt.Errorf("length must be at least 1") } diff --git a/internal/cli/init.go b/internal/cli/init.go index daafa00..19f1c92 100644 --- a/internal/cli/init.go +++ b/internal/cli/init.go @@ -161,7 +161,8 @@ func (cli *Instance) Init(cmd *cobra.Command) error { } // Write encrypted long-term private key - if err := afero.WriteFile(cli.fs, filepath.Join(unlockerDir, "longterm.age"), encryptedLtPrivKey, secret.FilePerms); err != nil { + ltPrivKeyPath := filepath.Join(unlockerDir, "longterm.age") + if err := afero.WriteFile(cli.fs, ltPrivKeyPath, encryptedLtPrivKey, secret.FilePerms); err != nil { return fmt.Errorf("failed to write encrypted long-term private key: %w", err) } diff --git a/internal/cli/version_test.go b/internal/cli/version_test.go index ec772ac..e9cd36e 100644 --- a/internal/cli/version_test.go +++ b/internal/cli/version_test.go @@ -34,7 +34,9 @@ import ( // Helper function to set up a vault with long-term key func setupTestVault(t *testing.T, fs afero.Fs, stateDir string) { // Set mnemonic for testing - t.Setenv(secret.EnvMnemonic, "abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about") + testMnemonic := "abandon abandon abandon abandon abandon abandon " + + "abandon abandon abandon abandon abandon about" + t.Setenv(secret.EnvMnemonic, testMnemonic) // Create vault vlt, err := vault.CreateVault(fs, stateDir, "default")