fnox 1.25.1

A flexible secret management tool supporting multiple providers and encryption methods
Documentation
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
#!/usr/bin/env bats
#
# OS Keychain Provider Tests
#
# These tests verify the OS keychain provider integration with fnox.
#
# Prerequisites:
#   - macOS: Keychain Access (built-in)
#   - Linux: Secret Service (gnome-keyring or KWallet)
#   - Run tests: mise run test:bats -- test/keychain.bats
#
# Note: Tests use a dedicated "fnox-test" service name to avoid conflicts.
#

setup() {
	load 'test_helper/common_setup'
	_common_setup

	# Check if keychain tests are disabled via env var
	if [ -n "$SKIP_KEYCHAIN_TESTS" ]; then
		skip "Keychain tests disabled via SKIP_KEYCHAIN_TESTS env var"
	fi

	# Detect platform
	local platform
	platform="$(uname)"
	export PLATFORM="$platform"

	# Platform-specific setup
	if [[ $platform == "Darwin" ]]; then
		setup_macos_keychain
	elif [[ $platform == "Linux" ]]; then
		setup_linux_keychain
	else
		skip "OS keychain tests only support macOS and Linux (detected: $platform)"
	fi

	# Set a unique service name for tests
	export KEYCHAIN_SERVICE="fnox-test-$$"
}

setup_macos_keychain() {
	# In CI environments, skip keychain tests on macOS (they hang)
	if [ "${CI:-}" = "true" ] || [ -n "${GITHUB_ACTIONS:-}" ] || [ -n "${GITLAB_CI:-}" ] || [ -n "${CIRCLECI:-}" ]; then
		skip "Keychain tests disabled on macOS CI (tests hang)"
	fi

	# Verify keychain is accessible by attempting to list keychains
	security list-keychains >/dev/null 2>&1

	# Verify keychain access by creating a test entry
	security add-generic-password -s "fnox-test-access-check-$$" -a "test" -w "test" -U 2>&1

	# Clean up the test entry
	security delete-generic-password -s "fnox-test-access-check-$$" -a "test" 2>&1 || true
}

setup_linux_keychain() {
	# Check if secret-tool is available (for manual testing verification)
	if ! command -v secret-tool >/dev/null 2>&1; then
		echo "# Warning: secret-tool not found (install libsecret-tools for manual testing)" >&3
	fi

	# In CI environments, assume gnome-keyring-daemon is already running
	# (started by CI workflow before tests begin)
	if [ "${CI:-}" = "true" ] || [ -n "${GITHUB_ACTIONS:-}" ] || [ -n "${GITLAB_CI:-}" ] || [ -n "${CIRCLECI:-}" ]; then
		export USING_TEST_KEYRING=1
		return 0
	fi

	# For non-CI Linux, verify that a secret service is available via D-Bus
	if [ -z "${USING_TEST_KEYRING:-}" ]; then
		# Connect to the secret service (fail if not available)
		dbus-send --print-reply --dest=org.freedesktop.secrets /org/freedesktop/secrets org.freedesktop.DBus.Peer.Ping >/dev/null 2>&1
	fi
}

teardown() {
	# Clean up any test secrets from keychain (platform-specific)
	if [ -n "$TEST_SECRET_KEYS" ]; then
		for key in $TEST_SECRET_KEYS; do
			if [[ $PLATFORM == "Darwin" ]]; then
				# macOS: Use security command to delete test secrets
				security delete-generic-password -s "$KEYCHAIN_SERVICE" -a "$key" >/dev/null 2>&1 || true
			elif [[ $PLATFORM == "Linux" ]] && command -v secret-tool >/dev/null 2>&1; then
				# Linux: Use secret-tool to delete test secrets
				secret-tool clear service "$KEYCHAIN_SERVICE" account "$key" >/dev/null 2>&1 || true
			fi
		done
	fi

	# Note: Don't kill gnome-keyring-daemon or dbus in CI
	# They are started by the CI workflow and shared across all tests

	_common_teardown
}

# Helper function to create a keychain provider config
create_keychain_config() {
	local service="${1:-fnox-test}"
	local prefix="${2:-}"
	cat >"${FNOX_CONFIG_FILE:-fnox.toml}" <<EOF
[providers.keychain]
type = "keychain"
service = "$service"
EOF

	if [ -n "$prefix" ]; then
		cat >>"${FNOX_CONFIG_FILE}" <<EOF
prefix = "$prefix"
EOF
	fi

	cat >>"${FNOX_CONFIG_FILE}" <<EOF

[secrets]
EOF
}

# Helper to track secret keys for cleanup
track_secret() {
	local key="$1"
	TEST_SECRET_KEYS="${TEST_SECRET_KEYS:-} $key"
}

@test "fnox set stores secret in OS keychain" {
	create_keychain_config "$KEYCHAIN_SERVICE"

	# Set a secret using the keychain provider
	run "$FNOX_BIN" set MY_SECRET "my-secret-value" --provider keychain
	assert_success
	assert_output --partial "Set secret MY_SECRET"

	track_secret "MY_SECRET"

	# Verify the config contains only a reference (not the value)
	run cat "${FNOX_CONFIG_FILE}"
	assert_success
	# Check for inline table or TOML table format (both are valid)
	assert_output --partial 'MY_SECRET'
	assert_output --partial 'provider = "keychain"'
	assert_output --partial 'value = "MY_SECRET"'
	refute_output --partial "my-secret-value"
}

@test "fnox get retrieves secret from OS keychain" {
	create_keychain_config "$KEYCHAIN_SERVICE"

	# Set a secret
	run "$FNOX_BIN" set TEST_GET "test-value-123" --provider keychain
	assert_success
	track_secret "TEST_GET"

	# Get the secret back
	run "$FNOX_BIN" get TEST_GET
	assert_success
	assert_output "test-value-123"
}

@test "fnox set and get with prefix" {
	create_keychain_config "$KEYCHAIN_SERVICE" "myapp/"

	# Set a secret with prefix
	run "$FNOX_BIN" set PREFIXED_SECRET "prefixed-value" --provider keychain
	assert_success
	track_secret "myapp/PREFIXED_SECRET"

	# Get the secret (prefix is applied automatically)
	run "$FNOX_BIN" get PREFIXED_SECRET
	assert_success
	assert_output "prefixed-value"
}

@test "fnox get fails with non-existent secret" {
	create_keychain_config "$KEYCHAIN_SERVICE"

	# Manually add a reference to a non-existent secret
	cat >>"${FNOX_CONFIG_FILE}" <<EOF

[secrets.NONEXISTENT]
provider = "keychain"
value = "does-not-exist-$$"
EOF

	# Try to get non-existent secret
	run "$FNOX_BIN" get NONEXISTENT
	assert_failure
	assert_output --partial "secret_not_found"
}

@test "fnox set with special characters" {
	create_keychain_config "$KEYCHAIN_SERVICE"

	local secret_value='p@ssw0rd!#$%^&*()_+-={}[]|\:";'\''<>?,./~`'

	# Set a secret with special characters
	run "$FNOX_BIN" set SPECIAL_CHARS "$secret_value" --provider keychain
	assert_success
	track_secret "SPECIAL_CHARS"

	# Get it back
	run "$FNOX_BIN" get SPECIAL_CHARS
	assert_success
	assert_output "$secret_value"
}

@test "fnox set with multiline value" {
	create_keychain_config "$KEYCHAIN_SERVICE"

	local multiline_value="line1
line2
line3"

	# Set a multiline secret (using bash -c for stdin pipe)
	run bash -c "echo '$multiline_value' | '$FNOX_BIN' set MULTILINE --provider keychain"
	assert_success
	track_secret "MULTILINE"

	# Get it back
	run "$FNOX_BIN" get MULTILINE
	assert_success
	assert_output "$multiline_value"
}

@test "fnox set with interactive prompt" {
	skip "Interactive test - requires manual testing"
	# This test would require interactive input
	# Manual test: fnox set INTERACTIVE_SECRET --provider keychain
	# (will prompt for value when no value provided and stdin is a tty)
}

@test "fnox set updates existing secret" {
	create_keychain_config "$KEYCHAIN_SERVICE"

	# Set initial value
	run "$FNOX_BIN" set UPDATE_TEST "initial-value" --provider keychain
	assert_success
	track_secret "UPDATE_TEST"

	# Update the value
	run "$FNOX_BIN" set UPDATE_TEST "updated-value" --provider keychain
	assert_success

	# Get the updated value
	run "$FNOX_BIN" get UPDATE_TEST
	assert_success
	assert_output "updated-value"
}

@test "fnox list shows keychain secrets" {
	create_keychain_config "$KEYCHAIN_SERVICE"

	# Set multiple secrets
	run "$FNOX_BIN" set SECRET1 "value1" --provider keychain --description "First secret"
	assert_success
	track_secret "SECRET1"

	run "$FNOX_BIN" set SECRET2 "value2" --provider keychain --description "Second secret"
	assert_success
	track_secret "SECRET2"

	# List secrets
	run "$FNOX_BIN" list
	assert_success
	assert_output --partial "SECRET1"
	assert_output --partial "SECRET2"
	assert_output --partial "First secret"
	assert_output --partial "Second secret"
}

@test "fnox exec with keychain secrets" {
	create_keychain_config "$KEYCHAIN_SERVICE"

	# Set a secret
	run "$FNOX_BIN" set EXEC_TEST "exec-value" --provider keychain
	assert_success
	track_secret "EXEC_TEST"

	# Use it in exec (redirect stderr to filter age warnings from global config)
	run bash -c "'$FNOX_BIN' exec -- bash -c 'echo \$EXEC_TEST' 2>/dev/null"
	assert_success
	assert_output "exec-value"
}

@test "fnox set with description metadata" {
	create_keychain_config "$KEYCHAIN_SERVICE"

	# Set secret with description
	run "$FNOX_BIN" set DESCRIBED "value" --provider keychain --description "Test description"
	assert_success
	track_secret "DESCRIBED"

	# Verify description in list
	run "$FNOX_BIN" list
	assert_success
	assert_output --partial "DESCRIBED"
	assert_output --partial "Test description"
}

@test "fnox get with JSON-like value" {
	create_keychain_config "$KEYCHAIN_SERVICE"

	local json_value='{"api_key":"test123","endpoint":"https://api.example.com"}'

	# Set JSON value
	run "$FNOX_BIN" set JSON_SECRET "$json_value" --provider keychain
	assert_success
	track_secret "JSON_SECRET"

	# Get it back
	run "$FNOX_BIN" get JSON_SECRET
	assert_success
	assert_output "$json_value"
}

@test "keychain provider isolation with different service names" {
	# Create config with first service
	create_keychain_config "${KEYCHAIN_SERVICE}-1"
	run "$FNOX_BIN" set ISOLATED1 "value1" --provider keychain
	assert_success
	track_secret "ISOLATED1"

	# Create config with second service
	create_keychain_config "${KEYCHAIN_SERVICE}-2"
	run "$FNOX_BIN" set ISOLATED2 "value2" --provider keychain
	assert_success
	track_secret "ISOLATED2"

	# First secret should not be accessible with second config
	cat >>"${FNOX_CONFIG_FILE}" <<EOF

[secrets.ISOLATED1]
provider = "keychain"
value = "ISOLATED1"
EOF

	run "$FNOX_BIN" get ISOLATED1
	assert_failure
}

@test "fnox set reads from stdin" {
	create_keychain_config "$KEYCHAIN_SERVICE"

	# Set secret from stdin (using bash -c for stdin pipe)
	run bash -c "echo 'stdin-value' | '$FNOX_BIN' set STDIN_SECRET --provider keychain"
	assert_success
	track_secret "STDIN_SECRET"

	# Get it back
	run "$FNOX_BIN" get STDIN_SECRET
	assert_success
	assert_output "stdin-value"
}

@test "fnox with empty service name fails gracefully" {
	cat >"${FNOX_CONFIG_FILE}" <<EOF
[providers.keychain]
type = "keychain"
service = ""

[secrets.TEST]
provider = "keychain"
value = "test"
EOF

	# Should fail with helpful error
	run "$FNOX_BIN" get TEST
	assert_failure
}

@test "keychain provider with long values" {
	create_keychain_config "$KEYCHAIN_SERVICE"

	# Create a long value (4KB)
	local long_value
	long_value=$(python3 -c "print('a' * 4096)")

	# Set long value
	run "$FNOX_BIN" set LONG_SECRET "$long_value" --provider keychain
	assert_success
	track_secret "LONG_SECRET"

	# Get it back
	run "$FNOX_BIN" get LONG_SECRET
	assert_success
	assert_output "$long_value"
}

@test "fnox check detects missing keychain secrets" {
	create_keychain_config "$KEYCHAIN_SERVICE"

	# Add reference without actually storing in keychain
	cat >>"${FNOX_CONFIG_FILE}" <<EOF

[secrets.MISSING_SECRET]
provider = "keychain"
value = "not-in-keychain"
if_missing = "error"
EOF

	# Check should detect the missing secret
	run "$FNOX_BIN" check
	assert_failure
	assert_output --partial "MISSING_SECRET"
}