gitspace 0.2.0-rc.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.claude/settings.local.json +21 -0
- package/.gitspace/bundle.json +50 -0
- package/.gitspace/select/01-status.sh +40 -0
- package/.gitspace/setup/01-install-deps.sh +12 -0
- package/.gitspace/setup/02-typecheck.sh +16 -0
- package/AGENTS.md +439 -0
- package/CLAUDE.md +1 -0
- package/LICENSE +25 -0
- package/README.md +607 -0
- package/bin/gssh +62 -0
- package/bun.lock +647 -0
- package/docs/CONNECTION.md +623 -0
- package/docs/GATEWAY-WORKER.md +319 -0
- package/docs/GETTING-STARTED.md +448 -0
- package/docs/GITSPACE-PLATFORM.md +1819 -0
- package/docs/INFRASTRUCTURE.md +1347 -0
- package/docs/PROTOCOL.md +619 -0
- package/docs/QUICKSTART.md +174 -0
- package/docs/RELAY.md +327 -0
- package/docs/REMOTE-DESIGN.md +549 -0
- package/docs/ROADMAP.md +564 -0
- package/docs/SITE_DOCS_FIGMA_MAKE.md +1167 -0
- package/docs/STACK-DESIGN.md +588 -0
- package/docs/UNIFIED_ARCHITECTURE.md +292 -0
- package/experiments/pty-benchmark.ts +148 -0
- package/experiments/pty-latency.ts +100 -0
- package/experiments/router/client.ts +199 -0
- package/experiments/router/protocol.ts +74 -0
- package/experiments/router/router.ts +217 -0
- package/experiments/router/session.ts +180 -0
- package/experiments/router/test.ts +133 -0
- package/experiments/socket-bandwidth.ts +77 -0
- package/homebrew/gitspace.rb +45 -0
- package/landing-page/ATTRIBUTIONS.md +3 -0
- package/landing-page/README.md +11 -0
- package/landing-page/bun.lock +801 -0
- package/landing-page/guidelines/Guidelines.md +61 -0
- package/landing-page/index.html +37 -0
- package/landing-page/package.json +90 -0
- package/landing-page/postcss.config.mjs +15 -0
- package/landing-page/public/_redirects +1 -0
- package/landing-page/public/favicon.png +0 -0
- package/landing-page/src/app/App.tsx +53 -0
- package/landing-page/src/app/components/figma/ImageWithFallback.tsx +27 -0
- package/landing-page/src/app/components/ui/accordion.tsx +66 -0
- package/landing-page/src/app/components/ui/alert-dialog.tsx +157 -0
- package/landing-page/src/app/components/ui/alert.tsx +66 -0
- package/landing-page/src/app/components/ui/aspect-ratio.tsx +11 -0
- package/landing-page/src/app/components/ui/avatar.tsx +53 -0
- package/landing-page/src/app/components/ui/badge.tsx +46 -0
- package/landing-page/src/app/components/ui/breadcrumb.tsx +109 -0
- package/landing-page/src/app/components/ui/button.tsx +57 -0
- package/landing-page/src/app/components/ui/calendar.tsx +75 -0
- package/landing-page/src/app/components/ui/card.tsx +92 -0
- package/landing-page/src/app/components/ui/carousel.tsx +241 -0
- package/landing-page/src/app/components/ui/chart.tsx +353 -0
- package/landing-page/src/app/components/ui/checkbox.tsx +32 -0
- package/landing-page/src/app/components/ui/collapsible.tsx +33 -0
- package/landing-page/src/app/components/ui/command.tsx +177 -0
- package/landing-page/src/app/components/ui/context-menu.tsx +252 -0
- package/landing-page/src/app/components/ui/dialog.tsx +135 -0
- package/landing-page/src/app/components/ui/drawer.tsx +132 -0
- package/landing-page/src/app/components/ui/dropdown-menu.tsx +257 -0
- package/landing-page/src/app/components/ui/form.tsx +168 -0
- package/landing-page/src/app/components/ui/hover-card.tsx +44 -0
- package/landing-page/src/app/components/ui/input-otp.tsx +77 -0
- package/landing-page/src/app/components/ui/input.tsx +21 -0
- package/landing-page/src/app/components/ui/label.tsx +24 -0
- package/landing-page/src/app/components/ui/menubar.tsx +276 -0
- package/landing-page/src/app/components/ui/navigation-menu.tsx +168 -0
- package/landing-page/src/app/components/ui/pagination.tsx +127 -0
- package/landing-page/src/app/components/ui/popover.tsx +48 -0
- package/landing-page/src/app/components/ui/progress.tsx +31 -0
- package/landing-page/src/app/components/ui/radio-group.tsx +45 -0
- package/landing-page/src/app/components/ui/resizable.tsx +56 -0
- package/landing-page/src/app/components/ui/scroll-area.tsx +58 -0
- package/landing-page/src/app/components/ui/select.tsx +189 -0
- package/landing-page/src/app/components/ui/separator.tsx +28 -0
- package/landing-page/src/app/components/ui/sheet.tsx +139 -0
- package/landing-page/src/app/components/ui/sidebar.tsx +726 -0
- package/landing-page/src/app/components/ui/skeleton.tsx +13 -0
- package/landing-page/src/app/components/ui/slider.tsx +63 -0
- package/landing-page/src/app/components/ui/sonner.tsx +25 -0
- package/landing-page/src/app/components/ui/switch.tsx +31 -0
- package/landing-page/src/app/components/ui/table.tsx +116 -0
- package/landing-page/src/app/components/ui/tabs.tsx +66 -0
- package/landing-page/src/app/components/ui/textarea.tsx +18 -0
- package/landing-page/src/app/components/ui/toggle-group.tsx +73 -0
- package/landing-page/src/app/components/ui/toggle.tsx +47 -0
- package/landing-page/src/app/components/ui/tooltip.tsx +61 -0
- package/landing-page/src/app/components/ui/use-mobile.ts +21 -0
- package/landing-page/src/app/components/ui/utils.ts +6 -0
- package/landing-page/src/components/docs/DocsContent.tsx +718 -0
- package/landing-page/src/components/docs/DocsSidebar.tsx +84 -0
- package/landing-page/src/components/landing/CTA.tsx +59 -0
- package/landing-page/src/components/landing/Comparison.tsx +84 -0
- package/landing-page/src/components/landing/FaultyTerminal.tsx +424 -0
- package/landing-page/src/components/landing/Features.tsx +201 -0
- package/landing-page/src/components/landing/Hero.tsx +142 -0
- package/landing-page/src/components/landing/Pricing.tsx +140 -0
- package/landing-page/src/components/landing/Roadmap.tsx +86 -0
- package/landing-page/src/components/landing/Security.tsx +81 -0
- package/landing-page/src/components/landing/TerminalWindow.tsx +27 -0
- package/landing-page/src/components/landing/UseCases.tsx +55 -0
- package/landing-page/src/components/landing/Workflow.tsx +101 -0
- package/landing-page/src/components/layout/DashboardNavbar.tsx +37 -0
- package/landing-page/src/components/layout/Footer.tsx +55 -0
- package/landing-page/src/components/layout/LandingNavbar.tsx +82 -0
- package/landing-page/src/components/ui/badge.tsx +39 -0
- package/landing-page/src/components/ui/breadcrumb.tsx +115 -0
- package/landing-page/src/components/ui/button.tsx +57 -0
- package/landing-page/src/components/ui/card.tsx +79 -0
- package/landing-page/src/components/ui/mock-terminal.tsx +68 -0
- package/landing-page/src/components/ui/separator.tsx +28 -0
- package/landing-page/src/lib/utils.ts +6 -0
- package/landing-page/src/main.tsx +10 -0
- package/landing-page/src/pages/Dashboard.tsx +133 -0
- package/landing-page/src/pages/DocsPage.tsx +79 -0
- package/landing-page/src/pages/LandingPage.tsx +31 -0
- package/landing-page/src/pages/TerminalView.tsx +106 -0
- package/landing-page/src/styles/fonts.css +0 -0
- package/landing-page/src/styles/index.css +3 -0
- package/landing-page/src/styles/tailwind.css +4 -0
- package/landing-page/src/styles/theme.css +181 -0
- package/landing-page/vite.config.ts +19 -0
- package/npm/darwin-arm64/bin/gssh +0 -0
- package/npm/darwin-arm64/package.json +20 -0
- package/package.json +74 -0
- package/scripts/build.ts +284 -0
- package/scripts/release.ts +140 -0
- package/src/__tests__/test-utils.ts +298 -0
- package/src/commands/__tests__/serve-messages.test.ts +190 -0
- package/src/commands/access.ts +298 -0
- package/src/commands/add.ts +452 -0
- package/src/commands/auth.ts +364 -0
- package/src/commands/connect.ts +287 -0
- package/src/commands/directory.ts +16 -0
- package/src/commands/host.ts +396 -0
- package/src/commands/identity.ts +184 -0
- package/src/commands/list.ts +200 -0
- package/src/commands/relay.ts +315 -0
- package/src/commands/remove.ts +241 -0
- package/src/commands/serve.ts +1493 -0
- package/src/commands/share.ts +456 -0
- package/src/commands/status.ts +125 -0
- package/src/commands/switch.ts +353 -0
- package/src/commands/tmux.ts +317 -0
- package/src/core/__tests__/access.test.ts +240 -0
- package/src/core/access.ts +277 -0
- package/src/core/bundle.ts +342 -0
- package/src/core/config.ts +510 -0
- package/src/core/git.ts +317 -0
- package/src/core/github.ts +151 -0
- package/src/core/identity.ts +631 -0
- package/src/core/linear.ts +225 -0
- package/src/core/shell.ts +161 -0
- package/src/core/trusted-relays.ts +315 -0
- package/src/index.ts +821 -0
- package/src/lib/remote-session/index.ts +7 -0
- package/src/lib/remote-session/protocol.ts +267 -0
- package/src/lib/remote-session/session-handler.ts +581 -0
- package/src/lib/remote-session/workspace-scanner.ts +167 -0
- package/src/lib/tmux-lite/README.md +81 -0
- package/src/lib/tmux-lite/cli.ts +796 -0
- package/src/lib/tmux-lite/crypto/__tests__/helpers/handshake-runner.ts +349 -0
- package/src/lib/tmux-lite/crypto/__tests__/helpers/mock-relay.ts +291 -0
- package/src/lib/tmux-lite/crypto/__tests__/helpers/test-identities.ts +142 -0
- package/src/lib/tmux-lite/crypto/__tests__/integration/authorization.integration.test.ts +339 -0
- package/src/lib/tmux-lite/crypto/__tests__/integration/e2e-communication.integration.test.ts +477 -0
- package/src/lib/tmux-lite/crypto/__tests__/integration/error-handling.integration.test.ts +499 -0
- package/src/lib/tmux-lite/crypto/__tests__/integration/handshake.integration.test.ts +371 -0
- package/src/lib/tmux-lite/crypto/__tests__/integration/security.integration.test.ts +573 -0
- package/src/lib/tmux-lite/crypto/access-control.test.ts +512 -0
- package/src/lib/tmux-lite/crypto/access-control.ts +320 -0
- package/src/lib/tmux-lite/crypto/frames.test.ts +262 -0
- package/src/lib/tmux-lite/crypto/frames.ts +141 -0
- package/src/lib/tmux-lite/crypto/handshake.ts +894 -0
- package/src/lib/tmux-lite/crypto/identity.test.ts +220 -0
- package/src/lib/tmux-lite/crypto/identity.ts +286 -0
- package/src/lib/tmux-lite/crypto/index.ts +51 -0
- package/src/lib/tmux-lite/crypto/invites.test.ts +381 -0
- package/src/lib/tmux-lite/crypto/invites.ts +215 -0
- package/src/lib/tmux-lite/crypto/keyexchange.ts +435 -0
- package/src/lib/tmux-lite/crypto/keys.test.ts +58 -0
- package/src/lib/tmux-lite/crypto/keys.ts +47 -0
- package/src/lib/tmux-lite/crypto/secretbox.test.ts +169 -0
- package/src/lib/tmux-lite/crypto/secretbox.ts +124 -0
- package/src/lib/tmux-lite/handshake-handler.ts +451 -0
- package/src/lib/tmux-lite/protocol.test.ts +307 -0
- package/src/lib/tmux-lite/protocol.ts +266 -0
- package/src/lib/tmux-lite/relay-client.ts +506 -0
- package/src/lib/tmux-lite/server.ts +1250 -0
- package/src/lib/tmux-lite/shell-integration.sh +37 -0
- package/src/lib/tmux-lite/terminal-queries.test.ts +54 -0
- package/src/lib/tmux-lite/terminal-queries.ts +49 -0
- package/src/relay/__tests__/e2e-flow.test.ts +1284 -0
- package/src/relay/__tests__/helpers/auth.ts +354 -0
- package/src/relay/__tests__/helpers/ports.ts +51 -0
- package/src/relay/__tests__/protocol-validation.test.ts +265 -0
- package/src/relay/authorization.ts +303 -0
- package/src/relay/embedded-assets.generated.d.ts +15 -0
- package/src/relay/identity.ts +352 -0
- package/src/relay/index.ts +57 -0
- package/src/relay/pipes.test.ts +427 -0
- package/src/relay/pipes.ts +195 -0
- package/src/relay/protocol.ts +804 -0
- package/src/relay/registries.test.ts +437 -0
- package/src/relay/registries.ts +593 -0
- package/src/relay/server.test.ts +1323 -0
- package/src/relay/server.ts +1092 -0
- package/src/relay/signing.ts +238 -0
- package/src/relay/types.ts +69 -0
- package/src/serve/client-session-manager.ts +622 -0
- package/src/serve/daemon.ts +497 -0
- package/src/serve/pty-session.ts +236 -0
- package/src/serve/types.ts +169 -0
- package/src/shared/components/Flow.tsx +453 -0
- package/src/shared/components/Flow.tui.tsx +343 -0
- package/src/shared/components/Flow.web.tsx +442 -0
- package/src/shared/components/Inbox.tsx +446 -0
- package/src/shared/components/Inbox.tui.tsx +262 -0
- package/src/shared/components/Inbox.web.tsx +329 -0
- package/src/shared/components/MachineList.tsx +187 -0
- package/src/shared/components/MachineList.tui.tsx +161 -0
- package/src/shared/components/MachineList.web.tsx +210 -0
- package/src/shared/components/ProjectList.tsx +176 -0
- package/src/shared/components/ProjectList.tui.tsx +109 -0
- package/src/shared/components/ProjectList.web.tsx +143 -0
- package/src/shared/components/SpacesBrowser.tsx +332 -0
- package/src/shared/components/SpacesBrowser.tui.tsx +163 -0
- package/src/shared/components/SpacesBrowser.web.tsx +221 -0
- package/src/shared/components/index.ts +103 -0
- package/src/shared/hooks/index.ts +16 -0
- package/src/shared/hooks/useNavigation.ts +226 -0
- package/src/shared/index.ts +122 -0
- package/src/shared/providers/LocalMachineProvider.ts +425 -0
- package/src/shared/providers/MachineProvider.ts +165 -0
- package/src/shared/providers/RemoteMachineProvider.ts +444 -0
- package/src/shared/providers/index.ts +26 -0
- package/src/shared/types.ts +145 -0
- package/src/tui/adapters.ts +120 -0
- package/src/tui/app.tsx +1816 -0
- package/src/tui/components/Terminal.tsx +580 -0
- package/src/tui/hooks/index.ts +35 -0
- package/src/tui/hooks/useAppState.ts +314 -0
- package/src/tui/hooks/useDaemonStatus.ts +174 -0
- package/src/tui/hooks/useInboxTUI.ts +113 -0
- package/src/tui/hooks/useRemoteMachines.ts +209 -0
- package/src/tui/index.ts +24 -0
- package/src/tui/state.ts +299 -0
- package/src/tui/terminal-bracketed-paste.test.ts +45 -0
- package/src/tui/terminal-bracketed-paste.ts +47 -0
- package/src/types/bundle.ts +112 -0
- package/src/types/config.ts +89 -0
- package/src/types/errors.ts +206 -0
- package/src/types/identity.ts +284 -0
- package/src/types/workspace-fuzzy.ts +49 -0
- package/src/types/workspace.ts +151 -0
- package/src/utils/bun-socket-writer.ts +80 -0
- package/src/utils/deps.ts +127 -0
- package/src/utils/fuzzy-match.ts +125 -0
- package/src/utils/logger.ts +127 -0
- package/src/utils/markdown.ts +254 -0
- package/src/utils/onboarding.ts +229 -0
- package/src/utils/prompts.ts +114 -0
- package/src/utils/run-commands.ts +112 -0
- package/src/utils/run-scripts.ts +142 -0
- package/src/utils/sanitize.ts +98 -0
- package/src/utils/secrets.ts +122 -0
- package/src/utils/shell-escape.ts +40 -0
- package/src/utils/utf8.ts +79 -0
- package/src/utils/workspace-state.ts +47 -0
- package/src/web/README.md +73 -0
- package/src/web/bun.lock +575 -0
- package/src/web/eslint.config.js +23 -0
- package/src/web/index.html +16 -0
- package/src/web/package.json +37 -0
- package/src/web/public/vite.svg +1 -0
- package/src/web/src/App.tsx +604 -0
- package/src/web/src/assets/react.svg +1 -0
- package/src/web/src/components/Terminal.tsx +207 -0
- package/src/web/src/hooks/useRelayConnection.ts +224 -0
- package/src/web/src/hooks/useTerminal.ts +699 -0
- package/src/web/src/index.css +55 -0
- package/src/web/src/lib/crypto/__tests__/web-terminal.test.ts +1158 -0
- package/src/web/src/lib/crypto/frames.ts +205 -0
- package/src/web/src/lib/crypto/handshake.ts +396 -0
- package/src/web/src/lib/crypto/identity.ts +128 -0
- package/src/web/src/lib/crypto/keyexchange.ts +246 -0
- package/src/web/src/lib/crypto/relay-signing.ts +53 -0
- package/src/web/src/lib/invite.ts +58 -0
- package/src/web/src/lib/storage/identity-store.ts +94 -0
- package/src/web/src/main.tsx +10 -0
- package/src/web/src/types/identity.ts +45 -0
- package/src/web/tsconfig.app.json +28 -0
- package/src/web/tsconfig.json +7 -0
- package/src/web/tsconfig.node.json +26 -0
- package/src/web/vite.config.ts +31 -0
- package/todo-security.md +92 -0
- package/tsconfig.json +23 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/12b7107e435bf1b9a8713a7f320472a63e543104d633d89a26f8d21f4e4ef182.sqlite +0 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/12b7107e435bf1b9a8713a7f320472a63e543104d633d89a26f8d21f4e4ef182.sqlite-shm +0 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/12b7107e435bf1b9a8713a7f320472a63e543104d633d89a26f8d21f4e4ef182.sqlite-wal +0 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/1a1ac3db1ab86ecf712f90322868a9aabc2c7dc9fe2dfbe94f9b075096276b0f.sqlite +0 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/1a1ac3db1ab86ecf712f90322868a9aabc2c7dc9fe2dfbe94f9b075096276b0f.sqlite-shm +0 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/1a1ac3db1ab86ecf712f90322868a9aabc2c7dc9fe2dfbe94f9b075096276b0f.sqlite-wal +0 -0
- package/worker/bun.lock +237 -0
- package/worker/package.json +22 -0
- package/worker/schema.sql +96 -0
- package/worker/src/handlers/auth.ts +451 -0
- package/worker/src/handlers/subdomains.ts +376 -0
- package/worker/src/handlers/user.ts +98 -0
- package/worker/src/index.ts +70 -0
- package/worker/src/middleware/auth.ts +152 -0
- package/worker/src/services/cloudflare.ts +609 -0
- package/worker/src/types.ts +96 -0
- package/worker/tsconfig.json +15 -0
- package/worker/wrangler.toml +26 -0
|
@@ -0,0 +1,1158 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Web Terminal Tests
|
|
3
|
+
*
|
|
4
|
+
* Comprehensive tests for the web terminal connection flow:
|
|
5
|
+
* 1. Browser crypto unit tests (identity, keyexchange, handshake, frames)
|
|
6
|
+
* 2. Browser ↔ Node crypto interop tests
|
|
7
|
+
* 3. Web terminal E2E connection tests (with and without invite)
|
|
8
|
+
*
|
|
9
|
+
* These tests run in Bun but use the same noble-curves libraries as the browser.
|
|
10
|
+
*/
|
|
11
|
+
|
|
12
|
+
import { describe, expect, test, beforeAll, afterAll, beforeEach } from "bun:test";
|
|
13
|
+
|
|
14
|
+
// Browser crypto modules (same code runs in Bun)
|
|
15
|
+
import {
|
|
16
|
+
generateIdentity,
|
|
17
|
+
generateSigningKeypair,
|
|
18
|
+
generateKeyExchangeKeypair,
|
|
19
|
+
sign,
|
|
20
|
+
verify,
|
|
21
|
+
deriveIdentityId,
|
|
22
|
+
serializeIdentity,
|
|
23
|
+
deserializeIdentity,
|
|
24
|
+
} from "../identity";
|
|
25
|
+
|
|
26
|
+
import {
|
|
27
|
+
randomBytes,
|
|
28
|
+
x25519SharedSecret,
|
|
29
|
+
generateEphemeralKeypair,
|
|
30
|
+
deriveSessionKeys,
|
|
31
|
+
deriveSessionKeysFromMultiple,
|
|
32
|
+
validateX25519PublicKey,
|
|
33
|
+
X25519_KEY_LENGTH,
|
|
34
|
+
} from "../keyexchange";
|
|
35
|
+
|
|
36
|
+
import {
|
|
37
|
+
createClientHello,
|
|
38
|
+
processServerHello,
|
|
39
|
+
createClientAuth,
|
|
40
|
+
processServerAuth,
|
|
41
|
+
type X3DHResponseMessage,
|
|
42
|
+
type X3DHResultMessage,
|
|
43
|
+
} from "../handshake";
|
|
44
|
+
import { signRelayMessage } from "../relay-signing";
|
|
45
|
+
|
|
46
|
+
import {
|
|
47
|
+
encrypt,
|
|
48
|
+
decrypt,
|
|
49
|
+
createFrame,
|
|
50
|
+
openFrame,
|
|
51
|
+
encodeFrame,
|
|
52
|
+
decodeFrame,
|
|
53
|
+
MASTER_STREAM_ID,
|
|
54
|
+
} from "../frames";
|
|
55
|
+
|
|
56
|
+
// Node crypto modules (for interop testing)
|
|
57
|
+
import { generateRelayIdentity } from "../../../../../relay/identity";
|
|
58
|
+
import { clearAllRegistries } from "../../../../../relay/registries";
|
|
59
|
+
import {
|
|
60
|
+
createTestIdentity as createNodeIdentity,
|
|
61
|
+
toPublicIdentity,
|
|
62
|
+
} from "../../../../../lib/tmux-lite/crypto/__tests__/helpers/test-identities";
|
|
63
|
+
import { HandshakeHandler } from "../../../../../lib/tmux-lite/handshake-handler";
|
|
64
|
+
import { AccessControlList } from "../../../../../lib/tmux-lite/crypto/access-control";
|
|
65
|
+
import { createInviteToken } from "../../../../../lib/tmux-lite/crypto/invites";
|
|
66
|
+
import { signChallenge, getSigningKeyBase64 } from "../../../../../relay/__tests__/helpers/auth";
|
|
67
|
+
import { startRelayServer } from "../../../../../relay/__tests__/helpers/ports";
|
|
68
|
+
import { createHash } from "crypto";
|
|
69
|
+
import type { Server } from "bun";
|
|
70
|
+
|
|
71
|
+
// ============================================================================
|
|
72
|
+
// Part 1: Browser Crypto Unit Tests
|
|
73
|
+
// ============================================================================
|
|
74
|
+
|
|
75
|
+
describe("Browser Crypto: Identity", () => {
|
|
76
|
+
test("generates valid signing keypair", () => {
|
|
77
|
+
const keypair = generateSigningKeypair();
|
|
78
|
+
expect(keypair.publicKey).toBeInstanceOf(Uint8Array);
|
|
79
|
+
expect(keypair.secretKey).toBeInstanceOf(Uint8Array);
|
|
80
|
+
expect(keypair.publicKey.length).toBe(32);
|
|
81
|
+
expect(keypair.secretKey.length).toBe(64); // Ed25519 convention
|
|
82
|
+
});
|
|
83
|
+
|
|
84
|
+
test("generates valid key exchange keypair", () => {
|
|
85
|
+
const keypair = generateKeyExchangeKeypair();
|
|
86
|
+
expect(keypair.publicKey).toBeInstanceOf(Uint8Array);
|
|
87
|
+
expect(keypair.privateKey).toBeInstanceOf(Uint8Array);
|
|
88
|
+
expect(keypair.publicKey.length).toBe(32);
|
|
89
|
+
expect(keypair.privateKey.length).toBe(32);
|
|
90
|
+
});
|
|
91
|
+
|
|
92
|
+
test("generates complete identity", () => {
|
|
93
|
+
const identity = generateIdentity("Test Browser");
|
|
94
|
+
expect(identity.id).toBeDefined();
|
|
95
|
+
expect(identity.id.length).toBe(16);
|
|
96
|
+
expect(identity.signing).toBeDefined();
|
|
97
|
+
expect(identity.keyExchange).toBeDefined();
|
|
98
|
+
expect(identity.label).toBe("Test Browser");
|
|
99
|
+
expect(identity.createdAt).toBeGreaterThan(0);
|
|
100
|
+
});
|
|
101
|
+
|
|
102
|
+
test("sign and verify work correctly", () => {
|
|
103
|
+
const keypair = generateSigningKeypair();
|
|
104
|
+
const message = new TextEncoder().encode("Hello, World!");
|
|
105
|
+
|
|
106
|
+
const signature = sign(message, keypair.secretKey);
|
|
107
|
+
expect(signature.length).toBe(64);
|
|
108
|
+
|
|
109
|
+
const isValid = verify(message, signature, keypair.publicKey);
|
|
110
|
+
expect(isValid).toBe(true);
|
|
111
|
+
});
|
|
112
|
+
|
|
113
|
+
test("verify rejects invalid signature", () => {
|
|
114
|
+
const keypair = generateSigningKeypair();
|
|
115
|
+
const message = new TextEncoder().encode("Hello, World!");
|
|
116
|
+
|
|
117
|
+
const signature = sign(message, keypair.secretKey);
|
|
118
|
+
|
|
119
|
+
// Tamper with signature
|
|
120
|
+
const badSignature = new Uint8Array(signature);
|
|
121
|
+
badSignature[0] ^= 0xff;
|
|
122
|
+
|
|
123
|
+
const isValid = verify(message, badSignature, keypair.publicKey);
|
|
124
|
+
expect(isValid).toBe(false);
|
|
125
|
+
});
|
|
126
|
+
|
|
127
|
+
test("verify rejects wrong message", () => {
|
|
128
|
+
const keypair = generateSigningKeypair();
|
|
129
|
+
const message = new TextEncoder().encode("Hello, World!");
|
|
130
|
+
const wrongMessage = new TextEncoder().encode("Wrong message");
|
|
131
|
+
|
|
132
|
+
const signature = sign(message, keypair.secretKey);
|
|
133
|
+
const isValid = verify(wrongMessage, signature, keypair.publicKey);
|
|
134
|
+
expect(isValid).toBe(false);
|
|
135
|
+
});
|
|
136
|
+
|
|
137
|
+
test("deriveIdentityId produces consistent IDs", () => {
|
|
138
|
+
const keypair = generateSigningKeypair();
|
|
139
|
+
const id1 = deriveIdentityId(keypair.publicKey);
|
|
140
|
+
const id2 = deriveIdentityId(keypair.publicKey);
|
|
141
|
+
expect(id1).toBe(id2);
|
|
142
|
+
expect(id1.length).toBe(16);
|
|
143
|
+
});
|
|
144
|
+
|
|
145
|
+
test("serialize and deserialize identity", () => {
|
|
146
|
+
const identity = generateIdentity("Test");
|
|
147
|
+
const serialized = serializeIdentity(identity);
|
|
148
|
+
const deserialized = deserializeIdentity(serialized);
|
|
149
|
+
|
|
150
|
+
expect(deserialized.id).toBe(identity.id);
|
|
151
|
+
expect(deserialized.label).toBe(identity.label);
|
|
152
|
+
expect(deserialized.createdAt).toBe(identity.createdAt);
|
|
153
|
+
|
|
154
|
+
// Keys should match (convert to Array for comparison to avoid ArrayBuffer type issues)
|
|
155
|
+
expect(Array.from(new Uint8Array(deserialized.signing.publicKey))).toEqual(Array.from(identity.signing.publicKey));
|
|
156
|
+
expect(Array.from(new Uint8Array(deserialized.signing.secretKey))).toEqual(Array.from(identity.signing.secretKey));
|
|
157
|
+
expect(Array.from(new Uint8Array(deserialized.keyExchange.publicKey))).toEqual(Array.from(identity.keyExchange.publicKey));
|
|
158
|
+
expect(Array.from(new Uint8Array(deserialized.keyExchange.privateKey))).toEqual(Array.from(identity.keyExchange.privateKey));
|
|
159
|
+
});
|
|
160
|
+
});
|
|
161
|
+
|
|
162
|
+
describe("Browser Crypto: Key Exchange", () => {
|
|
163
|
+
test("randomBytes generates correct length", () => {
|
|
164
|
+
const bytes16 = randomBytes(16);
|
|
165
|
+
const bytes32 = randomBytes(32);
|
|
166
|
+
expect(bytes16.length).toBe(16);
|
|
167
|
+
expect(bytes32.length).toBe(32);
|
|
168
|
+
});
|
|
169
|
+
|
|
170
|
+
test("randomBytes generates different values", () => {
|
|
171
|
+
const a = randomBytes(32);
|
|
172
|
+
const b = randomBytes(32);
|
|
173
|
+
expect(a).not.toEqual(b);
|
|
174
|
+
});
|
|
175
|
+
|
|
176
|
+
test("generateEphemeralKeypair produces valid keys", () => {
|
|
177
|
+
const keypair = generateEphemeralKeypair();
|
|
178
|
+
expect(keypair.publicKey.length).toBe(X25519_KEY_LENGTH);
|
|
179
|
+
expect(keypair.privateKey.length).toBe(X25519_KEY_LENGTH);
|
|
180
|
+
expect(validateX25519PublicKey(keypair.publicKey)).toBe(true);
|
|
181
|
+
});
|
|
182
|
+
|
|
183
|
+
test("x25519SharedSecret produces same result for both parties", () => {
|
|
184
|
+
const alice = generateEphemeralKeypair();
|
|
185
|
+
const bob = generateEphemeralKeypair();
|
|
186
|
+
|
|
187
|
+
const sharedA = x25519SharedSecret(alice.privateKey, bob.publicKey);
|
|
188
|
+
const sharedB = x25519SharedSecret(bob.privateKey, alice.publicKey);
|
|
189
|
+
|
|
190
|
+
expect(sharedA).toEqual(sharedB);
|
|
191
|
+
expect(sharedA.length).toBe(X25519_KEY_LENGTH);
|
|
192
|
+
});
|
|
193
|
+
|
|
194
|
+
test("deriveSessionKeys produces symmetric keys", () => {
|
|
195
|
+
const alice = generateEphemeralKeypair();
|
|
196
|
+
const bob = generateEphemeralKeypair();
|
|
197
|
+
|
|
198
|
+
const sharedSecret = x25519SharedSecret(alice.privateKey, bob.publicKey);
|
|
199
|
+
const salt = randomBytes(32);
|
|
200
|
+
|
|
201
|
+
const aliceKeys = deriveSessionKeys(sharedSecret, salt, true);
|
|
202
|
+
const bobKeys = deriveSessionKeys(sharedSecret, salt, false);
|
|
203
|
+
|
|
204
|
+
// Alice's sendKey should match Bob's receiveKey
|
|
205
|
+
expect(aliceKeys.sendKey).toEqual(bobKeys.receiveKey);
|
|
206
|
+
expect(aliceKeys.receiveKey).toEqual(bobKeys.sendKey);
|
|
207
|
+
expect(aliceKeys.sessionId).toBe(bobKeys.sessionId);
|
|
208
|
+
});
|
|
209
|
+
|
|
210
|
+
test("deriveSessionKeysFromMultiple combines secrets correctly", () => {
|
|
211
|
+
const ephemeral1 = generateEphemeralKeypair();
|
|
212
|
+
const ephemeral2 = generateEphemeralKeypair();
|
|
213
|
+
const ephemeral3 = generateEphemeralKeypair();
|
|
214
|
+
|
|
215
|
+
const dh1 = x25519SharedSecret(ephemeral1.privateKey, ephemeral2.publicKey);
|
|
216
|
+
const dh2 = x25519SharedSecret(ephemeral1.privateKey, ephemeral3.publicKey);
|
|
217
|
+
|
|
218
|
+
const salt = randomBytes(32);
|
|
219
|
+
const keys = deriveSessionKeysFromMultiple([dh1, dh2], salt, true);
|
|
220
|
+
|
|
221
|
+
expect(keys.sendKey.length).toBe(32);
|
|
222
|
+
expect(keys.receiveKey.length).toBe(32);
|
|
223
|
+
expect(keys.sessionId.length).toBeGreaterThan(0);
|
|
224
|
+
});
|
|
225
|
+
|
|
226
|
+
test("validateX25519PublicKey rejects invalid keys", () => {
|
|
227
|
+
// All zeros
|
|
228
|
+
expect(validateX25519PublicKey(new Uint8Array(32))).toBe(false);
|
|
229
|
+
|
|
230
|
+
// Wrong length
|
|
231
|
+
expect(validateX25519PublicKey(new Uint8Array(16))).toBe(false);
|
|
232
|
+
|
|
233
|
+
// Valid key
|
|
234
|
+
const keypair = generateEphemeralKeypair();
|
|
235
|
+
expect(validateX25519PublicKey(keypair.publicKey)).toBe(true);
|
|
236
|
+
});
|
|
237
|
+
});
|
|
238
|
+
|
|
239
|
+
describe("Browser Crypto: Frames (AES-GCM)", () => {
|
|
240
|
+
test("encrypt and decrypt round-trip", async () => {
|
|
241
|
+
const key = randomBytes(32);
|
|
242
|
+
const plaintext = new TextEncoder().encode("Hello, encrypted world!");
|
|
243
|
+
|
|
244
|
+
const { nonce, ciphertext } = await encrypt(plaintext, key);
|
|
245
|
+
|
|
246
|
+
expect(nonce.length).toBe(12);
|
|
247
|
+
expect(ciphertext.length).toBeGreaterThan(plaintext.length); // Includes auth tag
|
|
248
|
+
|
|
249
|
+
const decrypted = await decrypt(ciphertext, nonce, key);
|
|
250
|
+
expect(decrypted).not.toBeNull();
|
|
251
|
+
expect(new TextDecoder().decode(decrypted!)).toBe("Hello, encrypted world!");
|
|
252
|
+
});
|
|
253
|
+
|
|
254
|
+
test("decrypt fails with wrong key", async () => {
|
|
255
|
+
const key1 = randomBytes(32);
|
|
256
|
+
const key2 = randomBytes(32);
|
|
257
|
+
const plaintext = new TextEncoder().encode("Secret message");
|
|
258
|
+
|
|
259
|
+
const { nonce, ciphertext } = await encrypt(plaintext, key1);
|
|
260
|
+
const decrypted = await decrypt(ciphertext, nonce, key2);
|
|
261
|
+
|
|
262
|
+
expect(decrypted).toBeNull();
|
|
263
|
+
});
|
|
264
|
+
|
|
265
|
+
test("decrypt fails with tampered ciphertext", async () => {
|
|
266
|
+
const key = randomBytes(32);
|
|
267
|
+
const plaintext = new TextEncoder().encode("Secret message");
|
|
268
|
+
|
|
269
|
+
const { nonce, ciphertext } = await encrypt(plaintext, key);
|
|
270
|
+
|
|
271
|
+
// Tamper with ciphertext
|
|
272
|
+
const tampered = new Uint8Array(ciphertext);
|
|
273
|
+
tampered[0] ^= 0xff;
|
|
274
|
+
|
|
275
|
+
const decrypted = await decrypt(tampered, nonce, key);
|
|
276
|
+
expect(decrypted).toBeNull();
|
|
277
|
+
});
|
|
278
|
+
|
|
279
|
+
test("encodeFrame and decodeFrame round-trip", () => {
|
|
280
|
+
const frame = {
|
|
281
|
+
streamId: MASTER_STREAM_ID,
|
|
282
|
+
nonce: randomBytes(12),
|
|
283
|
+
ciphertext: randomBytes(100),
|
|
284
|
+
};
|
|
285
|
+
|
|
286
|
+
const encoded = encodeFrame(frame);
|
|
287
|
+
const decoded = decodeFrame(encoded);
|
|
288
|
+
|
|
289
|
+
expect(decoded).not.toBeNull();
|
|
290
|
+
expect(decoded!.streamId).toBe(frame.streamId);
|
|
291
|
+
expect(decoded!.nonce).toEqual(frame.nonce);
|
|
292
|
+
expect(decoded!.ciphertext).toEqual(frame.ciphertext);
|
|
293
|
+
});
|
|
294
|
+
|
|
295
|
+
test("createFrame and openFrame round-trip", async () => {
|
|
296
|
+
const key = randomBytes(32);
|
|
297
|
+
const data = new TextEncoder().encode("Terminal output data");
|
|
298
|
+
|
|
299
|
+
const frame = await createFrame(MASTER_STREAM_ID, data, key);
|
|
300
|
+
const result = await openFrame(frame, key);
|
|
301
|
+
|
|
302
|
+
expect(result).not.toBeNull();
|
|
303
|
+
expect(result!.streamId).toBe(MASTER_STREAM_ID);
|
|
304
|
+
expect(new TextDecoder().decode(result!.data)).toBe("Terminal output data");
|
|
305
|
+
});
|
|
306
|
+
});
|
|
307
|
+
|
|
308
|
+
describe("Browser Crypto: X3DH Handshake", () => {
|
|
309
|
+
test("createClientHello produces valid message", () => {
|
|
310
|
+
const { state, message } = createClientHello("test-machine");
|
|
311
|
+
|
|
312
|
+
expect(state.phase).toBe("awaiting_server_hello");
|
|
313
|
+
expect(state.ephemeral).toBeDefined();
|
|
314
|
+
expect(state.clientNonce.length).toBe(32);
|
|
315
|
+
|
|
316
|
+
expect(message.version).toBe(1);
|
|
317
|
+
expect(message.ephemeralKey).toBeDefined();
|
|
318
|
+
expect(message.timestamp).toBeGreaterThan(0);
|
|
319
|
+
expect(message.clientNonce).toBeDefined();
|
|
320
|
+
expect(message.machineIdHint).toBe("test-machine");
|
|
321
|
+
});
|
|
322
|
+
|
|
323
|
+
test("full handshake flow (simulated)", () => {
|
|
324
|
+
// This simulates what the server would do
|
|
325
|
+
const browserClient = generateIdentity("Browser Client");
|
|
326
|
+
const serverMachine = generateIdentity("Server Machine");
|
|
327
|
+
|
|
328
|
+
// Step 1: Browser creates ClientHello
|
|
329
|
+
const { state: clientState1, message: _clientHello } = createClientHello();
|
|
330
|
+
|
|
331
|
+
// Step 2: Simulate server creating ServerHello
|
|
332
|
+
const serverEphemeral = generateEphemeralKeypair();
|
|
333
|
+
const signedPreKey = generateEphemeralKeypair();
|
|
334
|
+
const serverNonce = randomBytes(32);
|
|
335
|
+
|
|
336
|
+
// Server signs its pre-key
|
|
337
|
+
const preKeySignature = sign(signedPreKey.publicKey, serverMachine.signing.secretKey);
|
|
338
|
+
|
|
339
|
+
const serverHello: X3DHResponseMessage = {
|
|
340
|
+
version: 1,
|
|
341
|
+
identityKey: btoa(String.fromCharCode(...serverMachine.signing.publicKey)),
|
|
342
|
+
keyExchangeKey: btoa(String.fromCharCode(...serverMachine.keyExchange.publicKey)),
|
|
343
|
+
ephemeralKey: btoa(String.fromCharCode(...serverEphemeral.publicKey)),
|
|
344
|
+
signedPreKey: btoa(String.fromCharCode(...signedPreKey.publicKey)),
|
|
345
|
+
preKeySignature: btoa(String.fromCharCode(...preKeySignature)),
|
|
346
|
+
serverNonce: btoa(String.fromCharCode(...serverNonce)),
|
|
347
|
+
timestamp: Date.now(),
|
|
348
|
+
};
|
|
349
|
+
|
|
350
|
+
// Step 3: Browser processes ServerHello
|
|
351
|
+
const clientState2 = processServerHello(clientState1, serverHello);
|
|
352
|
+
expect(clientState2).not.toBeNull();
|
|
353
|
+
expect(clientState2!.phase).toBe("awaiting_server_auth");
|
|
354
|
+
|
|
355
|
+
// Step 4: Browser creates ClientAuth
|
|
356
|
+
const { message: clientAuth, sessionKeys: browserSessionKeys } = createClientAuth(
|
|
357
|
+
clientState2!,
|
|
358
|
+
browserClient,
|
|
359
|
+
{ type: "access_list" }
|
|
360
|
+
);
|
|
361
|
+
|
|
362
|
+
expect(clientAuth.version).toBe(1);
|
|
363
|
+
expect(clientAuth.identityKey).toBeDefined();
|
|
364
|
+
expect(clientAuth.keyExchangeKey).toBeDefined();
|
|
365
|
+
expect(clientAuth.identityProof).toBeDefined();
|
|
366
|
+
|
|
367
|
+
expect(browserSessionKeys.sendKey.length).toBe(32);
|
|
368
|
+
expect(browserSessionKeys.receiveKey.length).toBe(32);
|
|
369
|
+
expect(browserSessionKeys.sessionId.length).toBeGreaterThan(0);
|
|
370
|
+
});
|
|
371
|
+
|
|
372
|
+
test("processServerHello rejects invalid signature", () => {
|
|
373
|
+
const { state } = createClientHello();
|
|
374
|
+
|
|
375
|
+
const serverHello: X3DHResponseMessage = {
|
|
376
|
+
version: 1,
|
|
377
|
+
identityKey: btoa(String.fromCharCode(...randomBytes(32))),
|
|
378
|
+
keyExchangeKey: btoa(String.fromCharCode(...randomBytes(32))),
|
|
379
|
+
ephemeralKey: btoa(String.fromCharCode(...generateEphemeralKeypair().publicKey)),
|
|
380
|
+
signedPreKey: btoa(String.fromCharCode(...generateEphemeralKeypair().publicKey)),
|
|
381
|
+
preKeySignature: btoa(String.fromCharCode(...randomBytes(64))), // Invalid signature
|
|
382
|
+
serverNonce: btoa(String.fromCharCode(...randomBytes(32))),
|
|
383
|
+
timestamp: Date.now(),
|
|
384
|
+
};
|
|
385
|
+
|
|
386
|
+
const result = processServerHello(state, serverHello);
|
|
387
|
+
expect(result).toBeNull();
|
|
388
|
+
});
|
|
389
|
+
|
|
390
|
+
test("processServerHello rejects expired timestamp", () => {
|
|
391
|
+
const serverMachine = generateIdentity("Server");
|
|
392
|
+
const signedPreKey = generateEphemeralKeypair();
|
|
393
|
+
const preKeySignature = sign(signedPreKey.publicKey, serverMachine.signing.secretKey);
|
|
394
|
+
|
|
395
|
+
const { state } = createClientHello();
|
|
396
|
+
|
|
397
|
+
const serverHello: X3DHResponseMessage = {
|
|
398
|
+
version: 1,
|
|
399
|
+
identityKey: btoa(String.fromCharCode(...serverMachine.signing.publicKey)),
|
|
400
|
+
keyExchangeKey: btoa(String.fromCharCode(...serverMachine.keyExchange.publicKey)),
|
|
401
|
+
ephemeralKey: btoa(String.fromCharCode(...generateEphemeralKeypair().publicKey)),
|
|
402
|
+
signedPreKey: btoa(String.fromCharCode(...signedPreKey.publicKey)),
|
|
403
|
+
preKeySignature: btoa(String.fromCharCode(...preKeySignature)),
|
|
404
|
+
serverNonce: btoa(String.fromCharCode(...randomBytes(32))),
|
|
405
|
+
timestamp: Date.now() - 10 * 60 * 1000, // 10 minutes ago - too old
|
|
406
|
+
};
|
|
407
|
+
|
|
408
|
+
const result = processServerHello(state, serverHello);
|
|
409
|
+
expect(result).toBeNull();
|
|
410
|
+
});
|
|
411
|
+
});
|
|
412
|
+
|
|
413
|
+
// ============================================================================
|
|
414
|
+
// Part 2: Browser ↔ Node Crypto Interop Tests
|
|
415
|
+
// ============================================================================
|
|
416
|
+
|
|
417
|
+
describe("Browser ↔ Node Interop: Identity", () => {
|
|
418
|
+
test("browser-generated identity can be verified by node identity module", () => {
|
|
419
|
+
const browserIdentity = generateIdentity("Browser");
|
|
420
|
+
const message = new TextEncoder().encode("Test message");
|
|
421
|
+
|
|
422
|
+
// Browser signs
|
|
423
|
+
const signature = sign(message, browserIdentity.signing.secretKey);
|
|
424
|
+
|
|
425
|
+
// Verify using browser verify function (same code path as node would use)
|
|
426
|
+
const isValid = verify(message, signature, browserIdentity.signing.publicKey);
|
|
427
|
+
expect(isValid).toBe(true);
|
|
428
|
+
});
|
|
429
|
+
|
|
430
|
+
test("node-generated identity can be verified by browser crypto", () => {
|
|
431
|
+
const nodeIdentity = createNodeIdentity("Node Machine");
|
|
432
|
+
const message = new TextEncoder().encode("Test message");
|
|
433
|
+
|
|
434
|
+
// Node signs using the same sign function from browser module
|
|
435
|
+
// (both use @noble/curves/ed25519)
|
|
436
|
+
const signature = sign(message, nodeIdentity.signing.secretKey);
|
|
437
|
+
|
|
438
|
+
// Browser verifies
|
|
439
|
+
const isValid = verify(message, signature, nodeIdentity.signing.publicKey);
|
|
440
|
+
expect(isValid).toBe(true);
|
|
441
|
+
});
|
|
442
|
+
});
|
|
443
|
+
|
|
444
|
+
describe("Browser ↔ Node Interop: Key Exchange", () => {
|
|
445
|
+
test("browser and node keypairs can compute same shared secret", () => {
|
|
446
|
+
// Browser generates keypair
|
|
447
|
+
const browserKeypair = generateEphemeralKeypair();
|
|
448
|
+
|
|
449
|
+
// Node generates keypair (using same function - both use noble)
|
|
450
|
+
const nodeKeypair = generateEphemeralKeypair();
|
|
451
|
+
|
|
452
|
+
// Compute shared secrets from both sides
|
|
453
|
+
const browserShared = x25519SharedSecret(browserKeypair.privateKey, nodeKeypair.publicKey);
|
|
454
|
+
const nodeShared = x25519SharedSecret(nodeKeypair.privateKey, browserKeypair.publicKey);
|
|
455
|
+
|
|
456
|
+
expect(browserShared).toEqual(nodeShared);
|
|
457
|
+
});
|
|
458
|
+
|
|
459
|
+
test("browser and node derive same session keys", () => {
|
|
460
|
+
const browserKeypair = generateEphemeralKeypair();
|
|
461
|
+
const nodeKeypair = generateEphemeralKeypair();
|
|
462
|
+
|
|
463
|
+
const sharedSecret = x25519SharedSecret(browserKeypair.privateKey, nodeKeypair.publicKey);
|
|
464
|
+
const salt = randomBytes(32);
|
|
465
|
+
|
|
466
|
+
// Browser derives as initiator
|
|
467
|
+
const browserKeys = deriveSessionKeys(sharedSecret, salt, true);
|
|
468
|
+
|
|
469
|
+
// Node derives as responder
|
|
470
|
+
const nodeKeys = deriveSessionKeys(sharedSecret, salt, false);
|
|
471
|
+
|
|
472
|
+
// Should be symmetric
|
|
473
|
+
expect(browserKeys.sendKey).toEqual(nodeKeys.receiveKey);
|
|
474
|
+
expect(browserKeys.receiveKey).toEqual(nodeKeys.sendKey);
|
|
475
|
+
expect(browserKeys.sessionId).toBe(nodeKeys.sessionId);
|
|
476
|
+
});
|
|
477
|
+
});
|
|
478
|
+
|
|
479
|
+
// ============================================================================
|
|
480
|
+
// Part 3: Web Terminal E2E Connection Tests
|
|
481
|
+
// ============================================================================
|
|
482
|
+
|
|
483
|
+
const TEST_HOST = "127.0.0.1";
|
|
484
|
+
let relayUrl = "";
|
|
485
|
+
let relayHttpBase = "";
|
|
486
|
+
|
|
487
|
+
// Generate test identities
|
|
488
|
+
const testRelayIdentity = generateRelayIdentity("web-terminal-test-relay");
|
|
489
|
+
const testMachineIdentity = createNodeIdentity("Test Machine");
|
|
490
|
+
|
|
491
|
+
let server: Server<any>;
|
|
492
|
+
|
|
493
|
+
describe("Web Terminal E2E", () => {
|
|
494
|
+
beforeAll(async () => {
|
|
495
|
+
// Pre-authorize the test machine
|
|
496
|
+
server = startRelayServer({
|
|
497
|
+
bind: TEST_HOST,
|
|
498
|
+
hostname: TEST_HOST,
|
|
499
|
+
disableRateLimit: true,
|
|
500
|
+
identity: testRelayIdentity,
|
|
501
|
+
preAuthorizedMachines: new Set([
|
|
502
|
+
getSigningKeyBase64(testMachineIdentity),
|
|
503
|
+
]),
|
|
504
|
+
});
|
|
505
|
+
relayUrl = `ws://${TEST_HOST}:${server.port}/ws`;
|
|
506
|
+
relayHttpBase = `http://${TEST_HOST}:${server.port}`;
|
|
507
|
+
|
|
508
|
+
// Wait for server to start accepting requests to avoid flakiness.
|
|
509
|
+
const deadline = Date.now() + 3000;
|
|
510
|
+
// eslint-disable-next-line no-constant-condition
|
|
511
|
+
while (true) {
|
|
512
|
+
try {
|
|
513
|
+
const res = await fetch(`${relayHttpBase}/health`);
|
|
514
|
+
if (res.ok) break;
|
|
515
|
+
} catch {
|
|
516
|
+
// ignore until deadline
|
|
517
|
+
}
|
|
518
|
+
if (Date.now() > deadline) {
|
|
519
|
+
throw new Error("Relay server did not become healthy in time");
|
|
520
|
+
}
|
|
521
|
+
await new Promise((r) => setTimeout(r, 50));
|
|
522
|
+
}
|
|
523
|
+
});
|
|
524
|
+
|
|
525
|
+
afterAll(() => {
|
|
526
|
+
server.stop(true);
|
|
527
|
+
});
|
|
528
|
+
|
|
529
|
+
beforeEach(() => {
|
|
530
|
+
clearAllRegistries();
|
|
531
|
+
});
|
|
532
|
+
|
|
533
|
+
/**
|
|
534
|
+
* Helper: Create and register a machine connection with challenge-response auth
|
|
535
|
+
*/
|
|
536
|
+
async function setupMachine(machineIdentity: ReturnType<typeof createNodeIdentity>, accessList: AccessControlList) {
|
|
537
|
+
const url = new URL(relayUrl);
|
|
538
|
+
url.searchParams.set("role", "machine");
|
|
539
|
+
// No token needed - auth via challenge-response
|
|
540
|
+
|
|
541
|
+
const ws = new WebSocket(url.toString());
|
|
542
|
+
ws.binaryType = "arraybuffer";
|
|
543
|
+
|
|
544
|
+
await new Promise<void>((resolve, reject) => {
|
|
545
|
+
ws.onopen = () => resolve();
|
|
546
|
+
ws.onerror = () => reject(new Error("Machine connection failed"));
|
|
547
|
+
setTimeout(() => reject(new Error("Timeout")), 5000);
|
|
548
|
+
});
|
|
549
|
+
|
|
550
|
+
// Wait for relay_identity with challenge
|
|
551
|
+
const challenge = await new Promise<Uint8Array>((resolve, reject) => {
|
|
552
|
+
const timeout = setTimeout(() => reject(new Error("Challenge timeout")), 5000);
|
|
553
|
+
ws.onmessage = (event) => {
|
|
554
|
+
try {
|
|
555
|
+
const data = typeof event.data === "string" ? event.data : new TextDecoder().decode(event.data);
|
|
556
|
+
const msg = JSON.parse(data);
|
|
557
|
+
if (msg.type === "relay_identity" && msg.challenge) {
|
|
558
|
+
clearTimeout(timeout);
|
|
559
|
+
resolve(Buffer.from(msg.challenge, "base64"));
|
|
560
|
+
}
|
|
561
|
+
} catch {
|
|
562
|
+
// Ignore
|
|
563
|
+
}
|
|
564
|
+
};
|
|
565
|
+
});
|
|
566
|
+
|
|
567
|
+
// Sign challenge
|
|
568
|
+
const signature = signChallenge(challenge, machineIdentity.signing.secretKey);
|
|
569
|
+
const publicIdentity = toPublicIdentity(machineIdentity);
|
|
570
|
+
|
|
571
|
+
// Register machine with challenge response
|
|
572
|
+
ws.send(JSON.stringify({
|
|
573
|
+
type: "register_machine",
|
|
574
|
+
machineId: machineIdentity.id,
|
|
575
|
+
signingKey: publicIdentity.signingPublicKey,
|
|
576
|
+
keyExchangeKey: publicIdentity.keyExchangePublicKey,
|
|
577
|
+
challengeResponse: signature,
|
|
578
|
+
label: machineIdentity.label,
|
|
579
|
+
}));
|
|
580
|
+
|
|
581
|
+
await new Promise<void>((resolve, reject) => {
|
|
582
|
+
const timeout = setTimeout(() => reject(new Error("Registration timeout")), 5000);
|
|
583
|
+
ws.onmessage = (event) => {
|
|
584
|
+
try {
|
|
585
|
+
const data = typeof event.data === "string" ? event.data : new TextDecoder().decode(event.data);
|
|
586
|
+
const msg = JSON.parse(data);
|
|
587
|
+
if (msg.type === "registered") {
|
|
588
|
+
clearTimeout(timeout);
|
|
589
|
+
resolve();
|
|
590
|
+
} else if (msg.type === "error") {
|
|
591
|
+
clearTimeout(timeout);
|
|
592
|
+
reject(new Error(msg.message));
|
|
593
|
+
}
|
|
594
|
+
} catch {
|
|
595
|
+
// Ignore
|
|
596
|
+
}
|
|
597
|
+
};
|
|
598
|
+
});
|
|
599
|
+
|
|
600
|
+
const handshakeHandler = new HandshakeHandler({
|
|
601
|
+
identity: machineIdentity,
|
|
602
|
+
accessList,
|
|
603
|
+
handshakeTimeoutMs: 30000,
|
|
604
|
+
});
|
|
605
|
+
|
|
606
|
+
return { ws, handshakeHandler };
|
|
607
|
+
}
|
|
608
|
+
|
|
609
|
+
/**
|
|
610
|
+
* Helper: Set up machine to handle handshake messages
|
|
611
|
+
*/
|
|
612
|
+
function setupMachineHandshakeHandler(ws: WebSocket, handler: HandshakeHandler, onComplete: (clientId: string) => void) {
|
|
613
|
+
ws.onmessage = async (event) => {
|
|
614
|
+
const data = typeof event.data === "string" ? event.data : new TextDecoder().decode(event.data);
|
|
615
|
+
const msg = JSON.parse(data);
|
|
616
|
+
|
|
617
|
+
if (msg.type === "client_connected") {
|
|
618
|
+
console.log("[machine] Client connected:", msg.connectionId);
|
|
619
|
+
}
|
|
620
|
+
|
|
621
|
+
if (msg.type === "data" && msg.connectionId) {
|
|
622
|
+
const msgData = Buffer.from(msg.data, "base64");
|
|
623
|
+
try {
|
|
624
|
+
const jsonStr = new TextDecoder().decode(msgData);
|
|
625
|
+
const envelope = JSON.parse(jsonStr);
|
|
626
|
+
|
|
627
|
+
if (envelope.type === "handshake") {
|
|
628
|
+
// Convert browser format (step + spread fields) to HandshakeHandler format (phase + data)
|
|
629
|
+
// Browser sends: { type: "handshake", step: "client_hello", ...clientHelloFields }
|
|
630
|
+
// Handler expects: { type: "handshake", phase: "client_hello", data: clientHelloFields }
|
|
631
|
+
const { type: _type, step, ...handshakeData } = envelope;
|
|
632
|
+
const handlerMessage = {
|
|
633
|
+
type: "handshake" as const,
|
|
634
|
+
phase: step as "client_hello" | "client_auth",
|
|
635
|
+
data: handshakeData,
|
|
636
|
+
};
|
|
637
|
+
|
|
638
|
+
const result = await handler.processMessage(msg.connectionId, handlerMessage);
|
|
639
|
+
|
|
640
|
+
if (result.type === "reply" || result.type === "established") {
|
|
641
|
+
// Convert response back to browser format
|
|
642
|
+
// Handler returns: { type: "handshake", phase: "server_hello", data: serverHelloFields }
|
|
643
|
+
// Browser expects: { type: "handshake", step: "server_hello", ...serverHelloFields }
|
|
644
|
+
const responseData = result.message.data as Record<string, unknown>;
|
|
645
|
+
const browserFormatResponse = {
|
|
646
|
+
type: "handshake",
|
|
647
|
+
step: result.message.phase,
|
|
648
|
+
...responseData,
|
|
649
|
+
};
|
|
650
|
+
|
|
651
|
+
ws.send(JSON.stringify({
|
|
652
|
+
type: "data",
|
|
653
|
+
connectionId: msg.connectionId,
|
|
654
|
+
data: Buffer.from(JSON.stringify(browserFormatResponse)).toString("base64"),
|
|
655
|
+
}));
|
|
656
|
+
|
|
657
|
+
if (result.type === "established") {
|
|
658
|
+
console.log("[machine] Handshake established with:", result.session.peerIdentityId);
|
|
659
|
+
onComplete(result.session.peerIdentityId);
|
|
660
|
+
}
|
|
661
|
+
} else if (result.type === "error") {
|
|
662
|
+
console.error("[machine] Handshake error:", result.reason);
|
|
663
|
+
}
|
|
664
|
+
}
|
|
665
|
+
} catch (e) {
|
|
666
|
+
console.error("[machine] Handshake handler error:", e);
|
|
667
|
+
}
|
|
668
|
+
}
|
|
669
|
+
};
|
|
670
|
+
}
|
|
671
|
+
|
|
672
|
+
test("browser client can connect with pre-authorization", async () => {
|
|
673
|
+
// Browser client generates its own identity
|
|
674
|
+
const browserIdentity = generateIdentity("Browser Client");
|
|
675
|
+
|
|
676
|
+
// Pre-authorize the browser identity
|
|
677
|
+
const accessList = new AccessControlList();
|
|
678
|
+
accessList.addEntry({
|
|
679
|
+
id: browserIdentity.id,
|
|
680
|
+
signingPublicKey: Buffer.from(browserIdentity.signing.publicKey).toString("base64"),
|
|
681
|
+
keyExchangePublicKey: Buffer.from(browserIdentity.keyExchange.publicKey).toString("base64"),
|
|
682
|
+
}, 'full');
|
|
683
|
+
|
|
684
|
+
const { ws: machineWs, handshakeHandler } = await setupMachine(testMachineIdentity, accessList);
|
|
685
|
+
|
|
686
|
+
// Also authorize with relay (using accessType format)
|
|
687
|
+
machineWs.send(JSON.stringify({
|
|
688
|
+
type: "authorize_client",
|
|
689
|
+
machineId: testMachineIdentity.id,
|
|
690
|
+
clientIdentityId: browserIdentity.id,
|
|
691
|
+
signingKey: Buffer.from(browserIdentity.signing.publicKey).toString("base64"),
|
|
692
|
+
keyExchangeKey: Buffer.from(browserIdentity.keyExchange.publicKey).toString("base64"),
|
|
693
|
+
accessType: "full",
|
|
694
|
+
}));
|
|
695
|
+
|
|
696
|
+
await new Promise<void>((resolve) => {
|
|
697
|
+
const handler = (event: MessageEvent) => {
|
|
698
|
+
const data = typeof event.data === "string" ? event.data : new TextDecoder().decode(event.data);
|
|
699
|
+
const msg = JSON.parse(data);
|
|
700
|
+
if (msg.type === "client_authorized") {
|
|
701
|
+
machineWs.removeEventListener("message", handler);
|
|
702
|
+
resolve();
|
|
703
|
+
}
|
|
704
|
+
};
|
|
705
|
+
machineWs.addEventListener("message", handler);
|
|
706
|
+
});
|
|
707
|
+
|
|
708
|
+
// Track handshake completion
|
|
709
|
+
let machineHandshakeComplete = false;
|
|
710
|
+
let machineReceivedClientId: string | null = null;
|
|
711
|
+
|
|
712
|
+
setupMachineHandshakeHandler(machineWs, handshakeHandler, (clientId) => {
|
|
713
|
+
machineHandshakeComplete = true;
|
|
714
|
+
machineReceivedClientId = clientId;
|
|
715
|
+
});
|
|
716
|
+
|
|
717
|
+
// Browser connects (no token needed)
|
|
718
|
+
const clientUrl = new URL(relayUrl);
|
|
719
|
+
clientUrl.searchParams.set("role", "client");
|
|
720
|
+
|
|
721
|
+
const clientWs = new WebSocket(clientUrl.toString());
|
|
722
|
+
|
|
723
|
+
await new Promise<void>((resolve) => {
|
|
724
|
+
clientWs.onopen = () => resolve();
|
|
725
|
+
});
|
|
726
|
+
|
|
727
|
+
// Browser sends connect_to_machine
|
|
728
|
+
const signedConnect = signRelayMessage({
|
|
729
|
+
type: "connect_to_machine",
|
|
730
|
+
machineId: testMachineIdentity.id,
|
|
731
|
+
clientIdentityId: browserIdentity.id,
|
|
732
|
+
}, browserIdentity);
|
|
733
|
+
clientWs.send(JSON.stringify(signedConnect));
|
|
734
|
+
|
|
735
|
+
// Wait for connection_established
|
|
736
|
+
let connectionEstablished = false;
|
|
737
|
+
await new Promise<void>((resolve) => {
|
|
738
|
+
clientWs.onmessage = (event) => {
|
|
739
|
+
const msg = JSON.parse(event.data);
|
|
740
|
+
if (msg.type === "connection_established") {
|
|
741
|
+
connectionEstablished = true;
|
|
742
|
+
resolve();
|
|
743
|
+
} else if (msg.type === "error") {
|
|
744
|
+
console.error("Connection error:", msg.message);
|
|
745
|
+
resolve();
|
|
746
|
+
}
|
|
747
|
+
};
|
|
748
|
+
setTimeout(resolve, 5000);
|
|
749
|
+
});
|
|
750
|
+
|
|
751
|
+
expect(connectionEstablished).toBe(true);
|
|
752
|
+
|
|
753
|
+
// Now browser should do X3DH handshake
|
|
754
|
+
const { state: clientState, message: clientHello } = createClientHello(testMachineIdentity.id);
|
|
755
|
+
|
|
756
|
+
// Wrap handshake message like useTerminal does
|
|
757
|
+
clientWs.send(JSON.stringify({
|
|
758
|
+
type: "data",
|
|
759
|
+
data: Buffer.from(JSON.stringify({
|
|
760
|
+
type: "handshake",
|
|
761
|
+
step: "client_hello",
|
|
762
|
+
...clientHello,
|
|
763
|
+
})).toString("base64"),
|
|
764
|
+
}));
|
|
765
|
+
|
|
766
|
+
// Wait for handshake messages
|
|
767
|
+
let browserSessionKeys: ReturnType<typeof deriveSessionKeys> | null = null;
|
|
768
|
+
let handshakeComplete = false;
|
|
769
|
+
let currentState = clientState;
|
|
770
|
+
|
|
771
|
+
await new Promise<void>((resolve) => {
|
|
772
|
+
const handler = (event: MessageEvent) => {
|
|
773
|
+
const msg = JSON.parse(event.data);
|
|
774
|
+
|
|
775
|
+
if (msg.type === "data" && msg.data) {
|
|
776
|
+
try {
|
|
777
|
+
const data = Buffer.from(msg.data, "base64");
|
|
778
|
+
const envelope = JSON.parse(new TextDecoder().decode(data));
|
|
779
|
+
|
|
780
|
+
if (envelope.type === "handshake") {
|
|
781
|
+
if (envelope.step === "server_hello") {
|
|
782
|
+
const newState = processServerHello(currentState, envelope as X3DHResponseMessage);
|
|
783
|
+
if (newState) {
|
|
784
|
+
currentState = newState;
|
|
785
|
+
const { message: authMessage, sessionKeys } = createClientAuth(
|
|
786
|
+
newState,
|
|
787
|
+
browserIdentity,
|
|
788
|
+
{ type: "access_list" }
|
|
789
|
+
);
|
|
790
|
+
browserSessionKeys = sessionKeys;
|
|
791
|
+
|
|
792
|
+
clientWs.send(JSON.stringify({
|
|
793
|
+
type: "data",
|
|
794
|
+
data: Buffer.from(JSON.stringify({
|
|
795
|
+
type: "handshake",
|
|
796
|
+
step: "client_auth",
|
|
797
|
+
...authMessage,
|
|
798
|
+
})).toString("base64"),
|
|
799
|
+
}));
|
|
800
|
+
}
|
|
801
|
+
} else if (envelope.step === "server_auth") {
|
|
802
|
+
const result = processServerAuth(
|
|
803
|
+
currentState,
|
|
804
|
+
envelope as X3DHResultMessage,
|
|
805
|
+
browserSessionKeys!
|
|
806
|
+
);
|
|
807
|
+
if (result) {
|
|
808
|
+
handshakeComplete = true;
|
|
809
|
+
clientWs.removeEventListener("message", handler);
|
|
810
|
+
resolve();
|
|
811
|
+
}
|
|
812
|
+
}
|
|
813
|
+
}
|
|
814
|
+
} catch (e) {
|
|
815
|
+
console.error("Handshake error:", e);
|
|
816
|
+
}
|
|
817
|
+
}
|
|
818
|
+
};
|
|
819
|
+
clientWs.addEventListener("message", handler);
|
|
820
|
+
setTimeout(() => {
|
|
821
|
+
clientWs.removeEventListener("message", handler);
|
|
822
|
+
resolve();
|
|
823
|
+
}, 10000);
|
|
824
|
+
});
|
|
825
|
+
|
|
826
|
+
expect(handshakeComplete).toBe(true);
|
|
827
|
+
expect(browserSessionKeys).not.toBeNull();
|
|
828
|
+
expect(machineHandshakeComplete).toBe(true);
|
|
829
|
+
expect(machineReceivedClientId).not.toBeNull();
|
|
830
|
+
expect(machineReceivedClientId!).toBe(browserIdentity.id);
|
|
831
|
+
|
|
832
|
+
clientWs.close();
|
|
833
|
+
machineWs.close();
|
|
834
|
+
});
|
|
835
|
+
|
|
836
|
+
test("browser client can connect via invite", async () => {
|
|
837
|
+
const accessList = new AccessControlList();
|
|
838
|
+
// Note: accessList is empty - we'll use invite for authorization
|
|
839
|
+
|
|
840
|
+
const { ws: machineWs, handshakeHandler } = await setupMachine(testMachineIdentity, accessList);
|
|
841
|
+
|
|
842
|
+
// Browser generates its own identity
|
|
843
|
+
const browserIdentity = generateIdentity("Browser Client");
|
|
844
|
+
|
|
845
|
+
// Create invite token
|
|
846
|
+
const inviteToken = createInviteToken(testMachineIdentity, relayUrl, {
|
|
847
|
+
accessType: 'full',
|
|
848
|
+
validityMs: 3600000,
|
|
849
|
+
});
|
|
850
|
+
|
|
851
|
+
const inviteId = createHash("sha256")
|
|
852
|
+
.update(inviteToken)
|
|
853
|
+
.digest("hex")
|
|
854
|
+
.substring(0, 16);
|
|
855
|
+
|
|
856
|
+
// Register invite with relay
|
|
857
|
+
machineWs.send(JSON.stringify({
|
|
858
|
+
type: "register_invite",
|
|
859
|
+
inviteId,
|
|
860
|
+
machineId: testMachineIdentity.id,
|
|
861
|
+
expiresAt: Date.now() + 3600000,
|
|
862
|
+
maxUses: null,
|
|
863
|
+
}));
|
|
864
|
+
|
|
865
|
+
await new Promise<void>((resolve, reject) => {
|
|
866
|
+
const handler = (event: MessageEvent) => {
|
|
867
|
+
const data = typeof event.data === "string" ? event.data : new TextDecoder().decode(event.data);
|
|
868
|
+
const msg = JSON.parse(data);
|
|
869
|
+
if (msg.type === "registered") {
|
|
870
|
+
machineWs.removeEventListener("message", handler);
|
|
871
|
+
resolve();
|
|
872
|
+
} else if (msg.type === "error") {
|
|
873
|
+
machineWs.removeEventListener("message", handler);
|
|
874
|
+
reject(new Error(msg.message));
|
|
875
|
+
}
|
|
876
|
+
};
|
|
877
|
+
machineWs.addEventListener("message", handler);
|
|
878
|
+
setTimeout(() => reject(new Error("Invite registration timeout")), 5000);
|
|
879
|
+
});
|
|
880
|
+
|
|
881
|
+
// Track handshake
|
|
882
|
+
let machineHandshakeComplete = false;
|
|
883
|
+
setupMachineHandshakeHandler(machineWs, handshakeHandler, () => {
|
|
884
|
+
machineHandshakeComplete = true;
|
|
885
|
+
});
|
|
886
|
+
|
|
887
|
+
// Browser connects and uses invite (no token needed)
|
|
888
|
+
const clientUrl = new URL(relayUrl);
|
|
889
|
+
clientUrl.searchParams.set("role", "client");
|
|
890
|
+
|
|
891
|
+
const clientWs = new WebSocket(clientUrl.toString());
|
|
892
|
+
|
|
893
|
+
await new Promise<void>((resolve) => {
|
|
894
|
+
clientWs.onopen = () => resolve();
|
|
895
|
+
});
|
|
896
|
+
|
|
897
|
+
// Browser sends connect_with_invite (like useTerminal does with inviteId)
|
|
898
|
+
const signedConnect = signRelayMessage({
|
|
899
|
+
type: "connect_with_invite",
|
|
900
|
+
inviteId,
|
|
901
|
+
clientIdentityId: browserIdentity.id,
|
|
902
|
+
}, browserIdentity);
|
|
903
|
+
clientWs.send(JSON.stringify(signedConnect));
|
|
904
|
+
|
|
905
|
+
// Wait for connection_established
|
|
906
|
+
let connectionEstablished = false;
|
|
907
|
+
await new Promise<void>((resolve) => {
|
|
908
|
+
clientWs.onmessage = (event) => {
|
|
909
|
+
const msg = JSON.parse(event.data);
|
|
910
|
+
if (msg.type === "connection_established") {
|
|
911
|
+
connectionEstablished = true;
|
|
912
|
+
resolve();
|
|
913
|
+
} else if (msg.type === "error") {
|
|
914
|
+
console.error("Connection error:", msg.message);
|
|
915
|
+
resolve();
|
|
916
|
+
}
|
|
917
|
+
};
|
|
918
|
+
setTimeout(resolve, 5000);
|
|
919
|
+
});
|
|
920
|
+
|
|
921
|
+
expect(connectionEstablished).toBe(true);
|
|
922
|
+
|
|
923
|
+
// Do X3DH handshake
|
|
924
|
+
const { state: clientState, message: clientHello } = createClientHello(testMachineIdentity.id);
|
|
925
|
+
|
|
926
|
+
clientWs.send(JSON.stringify({
|
|
927
|
+
type: "data",
|
|
928
|
+
data: Buffer.from(JSON.stringify({
|
|
929
|
+
type: "handshake",
|
|
930
|
+
step: "client_hello",
|
|
931
|
+
...clientHello,
|
|
932
|
+
})).toString("base64"),
|
|
933
|
+
}));
|
|
934
|
+
|
|
935
|
+
let browserSessionKeys: ReturnType<typeof deriveSessionKeys> | null = null;
|
|
936
|
+
let handshakeComplete = false;
|
|
937
|
+
let currentState = clientState;
|
|
938
|
+
|
|
939
|
+
await new Promise<void>((resolve) => {
|
|
940
|
+
const handler = (event: MessageEvent) => {
|
|
941
|
+
const msg = JSON.parse(event.data);
|
|
942
|
+
|
|
943
|
+
if (msg.type === "data" && msg.data) {
|
|
944
|
+
try {
|
|
945
|
+
const data = Buffer.from(msg.data, "base64");
|
|
946
|
+
const envelope = JSON.parse(new TextDecoder().decode(data));
|
|
947
|
+
|
|
948
|
+
if (envelope.type === "handshake") {
|
|
949
|
+
if (envelope.step === "server_hello") {
|
|
950
|
+
const newState = processServerHello(currentState, envelope as X3DHResponseMessage);
|
|
951
|
+
if (newState) {
|
|
952
|
+
currentState = newState;
|
|
953
|
+
// Note: use full inviteToken (not inviteId) for X3DH authorization
|
|
954
|
+
// inviteId is only for relay's connect_with_invite message
|
|
955
|
+
const { message: authMessage, sessionKeys } = createClientAuth(
|
|
956
|
+
newState,
|
|
957
|
+
browserIdentity,
|
|
958
|
+
{ type: "invite", inviteToken: inviteToken }
|
|
959
|
+
);
|
|
960
|
+
browserSessionKeys = sessionKeys;
|
|
961
|
+
|
|
962
|
+
clientWs.send(JSON.stringify({
|
|
963
|
+
type: "data",
|
|
964
|
+
data: Buffer.from(JSON.stringify({
|
|
965
|
+
type: "handshake",
|
|
966
|
+
step: "client_auth",
|
|
967
|
+
...authMessage,
|
|
968
|
+
})).toString("base64"),
|
|
969
|
+
}));
|
|
970
|
+
}
|
|
971
|
+
} else if (envelope.step === "server_auth") {
|
|
972
|
+
const result = processServerAuth(
|
|
973
|
+
currentState,
|
|
974
|
+
envelope as X3DHResultMessage,
|
|
975
|
+
browserSessionKeys!
|
|
976
|
+
);
|
|
977
|
+
if (result) {
|
|
978
|
+
handshakeComplete = true;
|
|
979
|
+
clientWs.removeEventListener("message", handler);
|
|
980
|
+
resolve();
|
|
981
|
+
}
|
|
982
|
+
}
|
|
983
|
+
}
|
|
984
|
+
} catch (e) {
|
|
985
|
+
console.error("Handshake error:", e);
|
|
986
|
+
}
|
|
987
|
+
}
|
|
988
|
+
};
|
|
989
|
+
clientWs.addEventListener("message", handler);
|
|
990
|
+
setTimeout(() => {
|
|
991
|
+
clientWs.removeEventListener("message", handler);
|
|
992
|
+
resolve();
|
|
993
|
+
}, 10000);
|
|
994
|
+
});
|
|
995
|
+
|
|
996
|
+
expect(handshakeComplete).toBe(true);
|
|
997
|
+
expect(browserSessionKeys).not.toBeNull();
|
|
998
|
+
expect(machineHandshakeComplete).toBe(true);
|
|
999
|
+
|
|
1000
|
+
// Test encrypted data exchange
|
|
1001
|
+
const testData = new TextEncoder().encode("Hello from browser!");
|
|
1002
|
+
const frame = await createFrame(MASTER_STREAM_ID, testData, browserSessionKeys!.sendKey);
|
|
1003
|
+
|
|
1004
|
+
clientWs.send(JSON.stringify({
|
|
1005
|
+
type: "data",
|
|
1006
|
+
data: btoa(String.fromCharCode(...frame)),
|
|
1007
|
+
}));
|
|
1008
|
+
|
|
1009
|
+
// Give time for data to reach machine
|
|
1010
|
+
await new Promise((r) => setTimeout(r, 200));
|
|
1011
|
+
|
|
1012
|
+
clientWs.close();
|
|
1013
|
+
machineWs.close();
|
|
1014
|
+
});
|
|
1015
|
+
});
|
|
1016
|
+
|
|
1017
|
+
// ============================================================================
|
|
1018
|
+
// Part 4: Regression Tests
|
|
1019
|
+
// ============================================================================
|
|
1020
|
+
|
|
1021
|
+
describe("Regression: Handshake Message Parsing", () => {
|
|
1022
|
+
/**
|
|
1023
|
+
* Regression test for race condition bug:
|
|
1024
|
+
* Session keys are stored when sending client_auth, BEFORE server_auth arrives.
|
|
1025
|
+
* The handleDataMessage function must correctly parse JSON handshake messages
|
|
1026
|
+
* even when session keys are already set, otherwise it will try to decrypt
|
|
1027
|
+
* the JSON as an encrypted frame and fail.
|
|
1028
|
+
*/
|
|
1029
|
+
test("server_auth is correctly parsed as JSON when session keys are already set", async () => {
|
|
1030
|
+
// Simulate the browser's handleDataMessage logic
|
|
1031
|
+
const sessionKeys = deriveSessionKeys(randomBytes(32), randomBytes(32), true);
|
|
1032
|
+
|
|
1033
|
+
// Create a mock server_auth message (what the machine sends)
|
|
1034
|
+
const serverAuth = {
|
|
1035
|
+
type: "handshake",
|
|
1036
|
+
phase: "server_auth",
|
|
1037
|
+
data: {
|
|
1038
|
+
version: 1,
|
|
1039
|
+
identityKey: btoa(String.fromCharCode(...randomBytes(32))),
|
|
1040
|
+
identityProof: btoa(String.fromCharCode(...randomBytes(32))),
|
|
1041
|
+
result: { type: "accepted", permissions: { read: true, write: true, manage: false } },
|
|
1042
|
+
},
|
|
1043
|
+
};
|
|
1044
|
+
|
|
1045
|
+
// Encode as base64 (like relay does)
|
|
1046
|
+
const base64Data = btoa(JSON.stringify(serverAuth));
|
|
1047
|
+
|
|
1048
|
+
// Decode and check - this is the critical path that was buggy
|
|
1049
|
+
const bytes = Uint8Array.from(atob(base64Data), c => c.charCodeAt(0));
|
|
1050
|
+
|
|
1051
|
+
// The fix: try JSON parsing first, regardless of session keys
|
|
1052
|
+
let isHandshakeMessage = false;
|
|
1053
|
+
let parsedPhase: string | null = null;
|
|
1054
|
+
|
|
1055
|
+
try {
|
|
1056
|
+
const jsonStr = new TextDecoder().decode(bytes);
|
|
1057
|
+
const envelope = JSON.parse(jsonStr);
|
|
1058
|
+
|
|
1059
|
+
if (envelope.type === "handshake") {
|
|
1060
|
+
isHandshakeMessage = true;
|
|
1061
|
+
parsedPhase = envelope.phase;
|
|
1062
|
+
}
|
|
1063
|
+
} catch {
|
|
1064
|
+
// Not JSON - would be encrypted data
|
|
1065
|
+
}
|
|
1066
|
+
|
|
1067
|
+
expect(isHandshakeMessage).toBe(true);
|
|
1068
|
+
expect(parsedPhase).toBe("server_auth");
|
|
1069
|
+
|
|
1070
|
+
// Verify that trying to decrypt as frame would fail
|
|
1071
|
+
// (this is what the old buggy code would do)
|
|
1072
|
+
const decryptResult = await openFrame(bytes, sessionKeys.receiveKey);
|
|
1073
|
+
expect(decryptResult).toBeNull();
|
|
1074
|
+
});
|
|
1075
|
+
|
|
1076
|
+
test("encrypted frames are correctly decrypted when session keys are set", async () => {
|
|
1077
|
+
const sessionKeys = deriveSessionKeys(randomBytes(32), randomBytes(32), true);
|
|
1078
|
+
|
|
1079
|
+
// Create an encrypted frame (what PTY output looks like)
|
|
1080
|
+
const plaintext = new TextEncoder().encode("Hello from terminal!");
|
|
1081
|
+
const frame = await createFrame(MASTER_STREAM_ID, plaintext, sessionKeys.sendKey);
|
|
1082
|
+
|
|
1083
|
+
// This is NOT valid JSON, so JSON parsing should fail
|
|
1084
|
+
let isHandshakeMessage = false;
|
|
1085
|
+
|
|
1086
|
+
try {
|
|
1087
|
+
const jsonStr = new TextDecoder().decode(frame);
|
|
1088
|
+
const envelope = JSON.parse(jsonStr);
|
|
1089
|
+
if (envelope.type === "handshake") {
|
|
1090
|
+
isHandshakeMessage = true;
|
|
1091
|
+
}
|
|
1092
|
+
} catch {
|
|
1093
|
+
// Expected - encrypted data is not valid JSON
|
|
1094
|
+
}
|
|
1095
|
+
|
|
1096
|
+
expect(isHandshakeMessage).toBe(false);
|
|
1097
|
+
|
|
1098
|
+
// But decryption should work (using receiveKey since we encrypted with sendKey, simulating peer)
|
|
1099
|
+
const decryptResult = await openFrame(frame, sessionKeys.sendKey);
|
|
1100
|
+
expect(decryptResult).not.toBeNull();
|
|
1101
|
+
expect(new TextDecoder().decode(decryptResult!.data)).toBe("Hello from terminal!");
|
|
1102
|
+
});
|
|
1103
|
+
|
|
1104
|
+
test("handshake and encrypted data can be correctly distinguished", async () => {
|
|
1105
|
+
const sessionKeys = deriveSessionKeys(randomBytes(32), randomBytes(32), true);
|
|
1106
|
+
|
|
1107
|
+
// Test both message types in sequence
|
|
1108
|
+
const messages = [
|
|
1109
|
+
// server_auth arrives first (JSON handshake)
|
|
1110
|
+
btoa(JSON.stringify({
|
|
1111
|
+
type: "handshake",
|
|
1112
|
+
phase: "server_auth",
|
|
1113
|
+
data: {
|
|
1114
|
+
version: 1,
|
|
1115
|
+
identityKey: btoa(String.fromCharCode(...randomBytes(32))),
|
|
1116
|
+
identityProof: btoa(String.fromCharCode(...randomBytes(32))),
|
|
1117
|
+
result: { type: "accepted", permissions: { read: true, write: true, manage: false } },
|
|
1118
|
+
},
|
|
1119
|
+
})),
|
|
1120
|
+
// Then encrypted PTY output arrives
|
|
1121
|
+
btoa(String.fromCharCode(...await createFrame(
|
|
1122
|
+
MASTER_STREAM_ID,
|
|
1123
|
+
new TextEncoder().encode("$ "),
|
|
1124
|
+
sessionKeys.sendKey
|
|
1125
|
+
))),
|
|
1126
|
+
];
|
|
1127
|
+
|
|
1128
|
+
const results: Array<{ type: "handshake" | "encrypted"; data?: string }> = [];
|
|
1129
|
+
|
|
1130
|
+
for (const base64Data of messages) {
|
|
1131
|
+
const bytes = Uint8Array.from(atob(base64Data), c => c.charCodeAt(0));
|
|
1132
|
+
|
|
1133
|
+
// Try JSON first (the fix)
|
|
1134
|
+
try {
|
|
1135
|
+
const jsonStr = new TextDecoder().decode(bytes);
|
|
1136
|
+
const envelope = JSON.parse(jsonStr);
|
|
1137
|
+
|
|
1138
|
+
if (envelope.type === "handshake") {
|
|
1139
|
+
results.push({ type: "handshake" });
|
|
1140
|
+
continue;
|
|
1141
|
+
}
|
|
1142
|
+
} catch {
|
|
1143
|
+
// Not JSON
|
|
1144
|
+
}
|
|
1145
|
+
|
|
1146
|
+
// Try decryption
|
|
1147
|
+
const frame = await openFrame(bytes, sessionKeys.sendKey);
|
|
1148
|
+
if (frame) {
|
|
1149
|
+
results.push({ type: "encrypted", data: new TextDecoder().decode(frame.data) });
|
|
1150
|
+
}
|
|
1151
|
+
}
|
|
1152
|
+
|
|
1153
|
+
expect(results).toHaveLength(2);
|
|
1154
|
+
expect(results[0].type).toBe("handshake");
|
|
1155
|
+
expect(results[1].type).toBe("encrypted");
|
|
1156
|
+
expect(results[1].data).toBe("$ ");
|
|
1157
|
+
});
|
|
1158
|
+
});
|