mirror of
https://github.com/PR0M3TH3AN/SeedPass.git
synced 2025-09-09 15:58:48 +00:00
Handle retrieval of 2FA entries
This commit is contained in:
@@ -1003,21 +1003,35 @@ class PasswordManager:
|
|||||||
return
|
return
|
||||||
index = int(index_input)
|
index = int(index_input)
|
||||||
|
|
||||||
# Retrieve entry details
|
|
||||||
entry = self.entry_manager.retrieve_entry(index)
|
entry = self.entry_manager.retrieve_entry(index)
|
||||||
if not entry:
|
if not entry:
|
||||||
return
|
return
|
||||||
|
|
||||||
# Display entry details
|
entry_type = entry.get("type", EntryType.PASSWORD.value)
|
||||||
|
|
||||||
|
if entry_type == EntryType.TOTP.value:
|
||||||
|
label = entry.get("label", "")
|
||||||
|
period = int(entry.get("period", 30))
|
||||||
|
notes = entry.get("notes", "")
|
||||||
|
print(colored(f"Retrieving 2FA code for '{label}'.", "cyan"))
|
||||||
|
try:
|
||||||
|
code = self.entry_manager.get_totp_code(index, self.parent_seed)
|
||||||
|
print(colored("\n[+] Retrieved 2FA Code:\n", "green"))
|
||||||
|
print(colored(f"Code: {code}", "yellow"))
|
||||||
|
if notes:
|
||||||
|
print(colored(f"Notes: {notes}", "cyan"))
|
||||||
|
TotpManager.print_progress_bar(period)
|
||||||
|
except Exception as e:
|
||||||
|
logging.error(f"Error generating TOTP code: {e}", exc_info=True)
|
||||||
|
print(colored(f"Error: Failed to generate TOTP code: {e}", "red"))
|
||||||
|
return
|
||||||
|
|
||||||
website_name = entry.get("website")
|
website_name = entry.get("website")
|
||||||
length = entry.get("length")
|
length = entry.get("length")
|
||||||
username = entry.get("username")
|
username = entry.get("username")
|
||||||
url = entry.get("url")
|
url = entry.get("url")
|
||||||
blacklisted = entry.get("blacklisted")
|
blacklisted = entry.get("blacklisted")
|
||||||
notes = entry.get("notes", "")
|
notes = entry.get("notes", "")
|
||||||
notes = entry.get("notes", "")
|
|
||||||
notes = entry.get("notes", "")
|
|
||||||
notes = entry.get("notes", "")
|
|
||||||
|
|
||||||
print(
|
print(
|
||||||
colored(
|
colored(
|
||||||
@@ -1037,10 +1051,8 @@ class PasswordManager:
|
|||||||
)
|
)
|
||||||
)
|
)
|
||||||
|
|
||||||
# Generate the password
|
|
||||||
password = self.password_generator.generate_password(length, index)
|
password = self.password_generator.generate_password(length, index)
|
||||||
|
|
||||||
# Display the password and associated details
|
|
||||||
if password:
|
if password:
|
||||||
print(
|
print(
|
||||||
colored(f"\n[+] Retrieved Password for {website_name}:\n", "green")
|
colored(f"\n[+] Retrieved Password for {website_name}:\n", "green")
|
||||||
|
50
src/tests/test_manager_retrieve_totp.py
Normal file
50
src/tests/test_manager_retrieve_totp.py
Normal file
@@ -0,0 +1,50 @@
|
|||||||
|
import sys
|
||||||
|
from pathlib import Path
|
||||||
|
from tempfile import TemporaryDirectory
|
||||||
|
|
||||||
|
from helpers import create_vault, TEST_SEED, TEST_PASSWORD
|
||||||
|
|
||||||
|
sys.path.append(str(Path(__file__).resolve().parents[1]))
|
||||||
|
|
||||||
|
from password_manager.entry_management import EntryManager
|
||||||
|
from password_manager.backup import BackupManager
|
||||||
|
from password_manager.manager import PasswordManager, EncryptionMode, TotpManager
|
||||||
|
|
||||||
|
|
||||||
|
class FakeNostrClient:
|
||||||
|
def __init__(self, *args, **kwargs):
|
||||||
|
self.published = []
|
||||||
|
|
||||||
|
def publish_snapshot(self, data: bytes):
|
||||||
|
self.published.append(data)
|
||||||
|
return None, "abcd"
|
||||||
|
|
||||||
|
|
||||||
|
def test_handle_retrieve_totp_entry(monkeypatch, capsys):
|
||||||
|
with TemporaryDirectory() as tmpdir:
|
||||||
|
tmp_path = Path(tmpdir)
|
||||||
|
vault, enc_mgr = create_vault(tmp_path, TEST_SEED, TEST_PASSWORD)
|
||||||
|
entry_mgr = EntryManager(vault, tmp_path)
|
||||||
|
backup_mgr = BackupManager(tmp_path)
|
||||||
|
|
||||||
|
pm = PasswordManager.__new__(PasswordManager)
|
||||||
|
pm.encryption_mode = EncryptionMode.SEED_ONLY
|
||||||
|
pm.encryption_manager = enc_mgr
|
||||||
|
pm.vault = vault
|
||||||
|
pm.entry_manager = entry_mgr
|
||||||
|
pm.backup_manager = backup_mgr
|
||||||
|
pm.parent_seed = TEST_SEED
|
||||||
|
pm.nostr_client = FakeNostrClient()
|
||||||
|
pm.fingerprint_dir = tmp_path
|
||||||
|
pm.is_dirty = False
|
||||||
|
|
||||||
|
entry_mgr.add_totp("Example", TEST_SEED)
|
||||||
|
|
||||||
|
monkeypatch.setattr("builtins.input", lambda *a, **k: "0")
|
||||||
|
monkeypatch.setattr(pm.entry_manager, "get_totp_code", lambda *a, **k: "123456")
|
||||||
|
monkeypatch.setattr(TotpManager, "print_progress_bar", lambda period: None)
|
||||||
|
|
||||||
|
pm.handle_retrieve_entry()
|
||||||
|
out = capsys.readouterr().out
|
||||||
|
assert "Retrieved 2FA Code" in out
|
||||||
|
assert "123456" in out
|
Reference in New Issue
Block a user