Handle retrieval of 2FA entries

This commit is contained in:
thePR0M3TH3AN
2025-07-03 10:08:35 -04:00
parent 319f179af3
commit fe41ae4a60
2 changed files with 69 additions and 7 deletions

View File

@@ -1003,21 +1003,35 @@ class PasswordManager:
return return
index = int(index_input) index = int(index_input)
# Retrieve entry details
entry = self.entry_manager.retrieve_entry(index) entry = self.entry_manager.retrieve_entry(index)
if not entry: if not entry:
return return
# Display entry details entry_type = entry.get("type", EntryType.PASSWORD.value)
if entry_type == EntryType.TOTP.value:
label = entry.get("label", "")
period = int(entry.get("period", 30))
notes = entry.get("notes", "")
print(colored(f"Retrieving 2FA code for '{label}'.", "cyan"))
try:
code = self.entry_manager.get_totp_code(index, self.parent_seed)
print(colored("\n[+] Retrieved 2FA Code:\n", "green"))
print(colored(f"Code: {code}", "yellow"))
if notes:
print(colored(f"Notes: {notes}", "cyan"))
TotpManager.print_progress_bar(period)
except Exception as e:
logging.error(f"Error generating TOTP code: {e}", exc_info=True)
print(colored(f"Error: Failed to generate TOTP code: {e}", "red"))
return
website_name = entry.get("website") website_name = entry.get("website")
length = entry.get("length") length = entry.get("length")
username = entry.get("username") username = entry.get("username")
url = entry.get("url") url = entry.get("url")
blacklisted = entry.get("blacklisted") blacklisted = entry.get("blacklisted")
notes = entry.get("notes", "") notes = entry.get("notes", "")
notes = entry.get("notes", "")
notes = entry.get("notes", "")
notes = entry.get("notes", "")
print( print(
colored( colored(
@@ -1037,10 +1051,8 @@ class PasswordManager:
) )
) )
# Generate the password
password = self.password_generator.generate_password(length, index) password = self.password_generator.generate_password(length, index)
# Display the password and associated details
if password: if password:
print( print(
colored(f"\n[+] Retrieved Password for {website_name}:\n", "green") colored(f"\n[+] Retrieved Password for {website_name}:\n", "green")

View File

@@ -0,0 +1,50 @@
import sys
from pathlib import Path
from tempfile import TemporaryDirectory
from helpers import create_vault, TEST_SEED, TEST_PASSWORD
sys.path.append(str(Path(__file__).resolve().parents[1]))
from password_manager.entry_management import EntryManager
from password_manager.backup import BackupManager
from password_manager.manager import PasswordManager, EncryptionMode, TotpManager
class FakeNostrClient:
def __init__(self, *args, **kwargs):
self.published = []
def publish_snapshot(self, data: bytes):
self.published.append(data)
return None, "abcd"
def test_handle_retrieve_totp_entry(monkeypatch, capsys):
with TemporaryDirectory() as tmpdir:
tmp_path = Path(tmpdir)
vault, enc_mgr = create_vault(tmp_path, TEST_SEED, TEST_PASSWORD)
entry_mgr = EntryManager(vault, tmp_path)
backup_mgr = BackupManager(tmp_path)
pm = PasswordManager.__new__(PasswordManager)
pm.encryption_mode = EncryptionMode.SEED_ONLY
pm.encryption_manager = enc_mgr
pm.vault = vault
pm.entry_manager = entry_mgr
pm.backup_manager = backup_mgr
pm.parent_seed = TEST_SEED
pm.nostr_client = FakeNostrClient()
pm.fingerprint_dir = tmp_path
pm.is_dirty = False
entry_mgr.add_totp("Example", TEST_SEED)
monkeypatch.setattr("builtins.input", lambda *a, **k: "0")
monkeypatch.setattr(pm.entry_manager, "get_totp_code", lambda *a, **k: "123456")
monkeypatch.setattr(TotpManager, "print_progress_bar", lambda period: None)
pm.handle_retrieve_entry()
out = capsys.readouterr().out
assert "Retrieved 2FA Code" in out
assert "123456" in out