feat: Implement Wine CSP HTTP provider for GOST cryptographic operations
Some checks failed
AOC Guard CI / aoc-guard (push) Has been cancelled
AOC Guard CI / aoc-verify (push) Has been cancelled
Docs CI / lint-and-preview (push) Has been cancelled
Scanner Analyzers / Discover Analyzers (push) Has been cancelled
Scanner Analyzers / Build Analyzers (push) Has been cancelled
Scanner Analyzers / Test Language Analyzers (push) Has been cancelled
Scanner Analyzers / Validate Test Fixtures (push) Has been cancelled
Scanner Analyzers / Verify Deterministic Output (push) Has been cancelled
Signals CI & Image / signals-ci (push) Has been cancelled
Some checks failed
AOC Guard CI / aoc-guard (push) Has been cancelled
AOC Guard CI / aoc-verify (push) Has been cancelled
Docs CI / lint-and-preview (push) Has been cancelled
Scanner Analyzers / Discover Analyzers (push) Has been cancelled
Scanner Analyzers / Build Analyzers (push) Has been cancelled
Scanner Analyzers / Test Language Analyzers (push) Has been cancelled
Scanner Analyzers / Validate Test Fixtures (push) Has been cancelled
Scanner Analyzers / Verify Deterministic Output (push) Has been cancelled
Signals CI & Image / signals-ci (push) Has been cancelled
- Added WineCspHttpProvider class to interface with Wine-hosted CryptoPro CSP. - Implemented ICryptoProvider, ICryptoProviderDiagnostics, and IDisposable interfaces. - Introduced WineCspHttpSigner and WineCspHttpHasher for signing and hashing operations. - Created WineCspProviderOptions for configuration settings including service URL and key options. - Developed CryptoProGostSigningService to handle GOST signing operations and key management. - Implemented HTTP service for the Wine CSP with endpoints for signing, verification, and hashing. - Added Swagger documentation for API endpoints. - Included health checks and error handling for service availability. - Established DTOs for request and response models in the service.
This commit is contained in:
@@ -17,12 +17,14 @@ public class RuntimeFactsIngestionServiceTests
|
||||
var scoringService = new RecordingScoringService();
|
||||
var cache = new InMemoryReachabilityCache();
|
||||
var eventsPublisher = new RecordingEventsPublisher();
|
||||
var provenanceNormalizer = new RuntimeFactsProvenanceNormalizer();
|
||||
var service = new RuntimeFactsIngestionService(
|
||||
factRepository,
|
||||
TimeProvider.System,
|
||||
cache,
|
||||
eventsPublisher,
|
||||
scoringService,
|
||||
provenanceNormalizer,
|
||||
NullLogger<RuntimeFactsIngestionService>.Instance);
|
||||
|
||||
var request = new RuntimeFactsIngestRequest
|
||||
@@ -61,6 +63,21 @@ public class RuntimeFactsIngestionServiceTests
|
||||
Assert.Equal("runtime", persisted.Metadata?["provenance.source"]);
|
||||
Assert.Equal("cg-123", persisted.Metadata?["provenance.callgraphId"]);
|
||||
Assert.NotNull(persisted.Metadata?["provenance.ingestedAt"]);
|
||||
|
||||
// Verify context_facts with AOC provenance (SIGNALS-24-003)
|
||||
Assert.NotNull(persisted.ContextFacts);
|
||||
Assert.NotNull(persisted.ContextFacts.Provenance);
|
||||
Assert.Equal(1, persisted.ContextFacts.Provenance.SchemaVersion);
|
||||
Assert.Equal(ProvenanceFeedType.RuntimeFacts, persisted.ContextFacts.Provenance.FeedType);
|
||||
Assert.Equal(3, persisted.ContextFacts.RecordCount); // Three events (provenance tracks each observation)
|
||||
Assert.NotEmpty(persisted.ContextFacts.Provenance.Records);
|
||||
Assert.All(persisted.ContextFacts.Provenance.Records, record =>
|
||||
{
|
||||
Assert.NotEmpty(record.RecordId);
|
||||
Assert.NotEmpty(record.RecordType);
|
||||
Assert.NotNull(record.Subject);
|
||||
Assert.NotNull(record.Facts);
|
||||
});
|
||||
}
|
||||
|
||||
private sealed class InMemoryReachabilityFactRepository : IReachabilityFactRepository
|
||||
|
||||
Reference in New Issue
Block a user