fix: Correct AGEClient method receivers and error syntax

- Change AGEClient method receivers from immutable to mutable
- Remove unnecessary `!` error propagation operators
This commit is contained in:
Mahmoud-Emad
2025-09-14 18:01:29 +03:00
parent 0c2d805fa0
commit 0ef28b6cfe
2 changed files with 15 additions and 15 deletions

View File

@@ -38,7 +38,7 @@ signing_keypair := age_client.generate_signing_keypair() or {
return
}
!signed := age_client.sign(signing_keypair.sign_key, message) or {
signed := age_client.sign(signing_keypair.sign_key, message) or {
println('Error signing message: ${err}')
return
}
@@ -47,7 +47,7 @@ verified := age_client.verify(signing_keypair.verify_key, message, signed.signat
println('Error verifying signature: ${err}')
return
}
!println('Message: ${message}')
println('Message: ${message}')
println('Signature: ${signed.signature}')
println('Signature valid: ${verified}')

View File

@@ -5,7 +5,7 @@ import freeflowuniverse.herolib.core.redisclient
// Stateless AGE operations
// generate_keypair creates a new Age encryption key pair
pub fn (client &AGEClient) generate_keypair() !KeyPair {
pub fn (mut client AGEClient) generate_keypair() !KeyPair {
response := client.redis.send_expect_list(['AGE', 'GENENC'])!
if response.len < 2 {
@@ -19,7 +19,7 @@ pub fn (client &AGEClient) generate_keypair() !KeyPair {
}
// generate_signing_keypair creates a new Age signing key pair
pub fn (client &AGEClient) generate_signing_keypair() !SigningKeyPair {
pub fn (mut client AGEClient) generate_signing_keypair() !SigningKeyPair {
response := client.redis.send_expect_list(['AGE', 'GENSIGN'])!
if response.len < 2 {
@@ -33,7 +33,7 @@ pub fn (client &AGEClient) generate_signing_keypair() !SigningKeyPair {
}
// encrypt encrypts a message with the recipient's public key
pub fn (client &AGEClient) encrypt(recipient string, message string) !EncryptionResult {
pub fn (mut client AGEClient) encrypt(recipient string, message string) !EncryptionResult {
ciphertext := client.redis.send_expect_str(['AGE', 'ENCRYPT', recipient, message])!
return EncryptionResult{
@@ -42,12 +42,12 @@ pub fn (client &AGEClient) encrypt(recipient string, message string) !Encryption
}
// decrypt decrypts a message with the identity (private key)
pub fn (client &AGEClient) decrypt(identity string, ciphertext string) !string {
pub fn (mut client AGEClient) decrypt(identity string, ciphertext string) !string {
return client.redis.send_expect_str(['AGE', 'DECRYPT', identity, ciphertext])!
}
// sign signs a message with the signing key
pub fn (client &AGEClient) sign(sign_key string, message string) !SignatureResult {
pub fn (mut client AGEClient) sign(sign_key string, message string) !SignatureResult {
signature := client.redis.send_expect_str(['AGE', 'SIGN', sign_key, message])!
return SignatureResult{
@@ -56,7 +56,7 @@ pub fn (client &AGEClient) sign(sign_key string, message string) !SignatureResul
}
// verify verifies a signature with the verification key
pub fn (client &AGEClient) verify(verify_key string, message string, signature string) !bool {
pub fn (mut client AGEClient) verify(verify_key string, message string, signature string) !bool {
result := client.redis.send_expect_int(['AGE', 'VERIFY', verify_key, message, signature])!
return result == 1
}
@@ -64,7 +64,7 @@ pub fn (client &AGEClient) verify(verify_key string, message string, signature s
// Key-managed AGE operations
// create_named_keypair creates and stores a named encryption key pair
pub fn (client &AGEClient) create_named_keypair(name string) !KeyPair {
pub fn (mut client AGEClient) create_named_keypair(name string) !KeyPair {
response := client.redis.send_expect_list(['AGE', 'KEYGEN', name])!
if response.len < 2 {
@@ -78,7 +78,7 @@ pub fn (client &AGEClient) create_named_keypair(name string) !KeyPair {
}
// create_named_signing_keypair creates and stores a named signing key pair
pub fn (client &AGEClient) create_named_signing_keypair(name string) !SigningKeyPair {
pub fn (mut client AGEClient) create_named_signing_keypair(name string) !SigningKeyPair {
response := client.redis.send_expect_list(['AGE', 'SIGNKEYGEN', name])!
if response.len < 2 {
@@ -92,7 +92,7 @@ pub fn (client &AGEClient) create_named_signing_keypair(name string) !SigningKey
}
// encrypt_with_named_key encrypts a message using a named key
pub fn (client &AGEClient) encrypt_with_named_key(key_name string, message string) !EncryptionResult {
pub fn (mut client AGEClient) encrypt_with_named_key(key_name string, message string) !EncryptionResult {
ciphertext := client.redis.send_expect_str(['AGE', 'ENCRYPTNAME', key_name, message])!
return EncryptionResult{
@@ -101,12 +101,12 @@ pub fn (client &AGEClient) encrypt_with_named_key(key_name string, message strin
}
// decrypt_with_named_key decrypts a message using a named key
pub fn (client &AGEClient) decrypt_with_named_key(key_name string, ciphertext string) !string {
pub fn (mut client AGEClient) decrypt_with_named_key(key_name string, ciphertext string) !string {
return client.redis.send_expect_str(['AGE', 'DECRYPTNAME', key_name, ciphertext])!
}
// sign_with_named_key signs a message using a named signing key
pub fn (client &AGEClient) sign_with_named_key(key_name string, message string) !SignatureResult {
pub fn (mut client AGEClient) sign_with_named_key(key_name string, message string) !SignatureResult {
signature := client.redis.send_expect_str(['AGE', 'SIGNNAME', key_name, message])!
return SignatureResult{
@@ -115,13 +115,13 @@ pub fn (client &AGEClient) sign_with_named_key(key_name string, message string)
}
// verify_with_named_key verifies a signature using a named verification key
pub fn (client &AGEClient) verify_with_named_key(key_name string, message string, signature string) !bool {
pub fn (mut client AGEClient) verify_with_named_key(key_name string, message string, signature string) !bool {
result := client.redis.send_expect_int(['AGE', 'VERIFYNAME', key_name, message, signature])!
return result == 1
}
// list_keys lists all stored AGE keys
pub fn (client &AGEClient) list_keys() ![]string {
pub fn (mut client AGEClient) list_keys() ![]string {
response := client.redis.send_expect_list(['AGE', 'LIST'])!
mut keys := []string{}