gitspace 0.2.0-rc.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (318) hide show
  1. package/.claude/settings.local.json +21 -0
  2. package/.gitspace/bundle.json +50 -0
  3. package/.gitspace/select/01-status.sh +40 -0
  4. package/.gitspace/setup/01-install-deps.sh +12 -0
  5. package/.gitspace/setup/02-typecheck.sh +16 -0
  6. package/AGENTS.md +439 -0
  7. package/CLAUDE.md +1 -0
  8. package/LICENSE +25 -0
  9. package/README.md +607 -0
  10. package/bin/gssh +62 -0
  11. package/bun.lock +647 -0
  12. package/docs/CONNECTION.md +623 -0
  13. package/docs/GATEWAY-WORKER.md +319 -0
  14. package/docs/GETTING-STARTED.md +448 -0
  15. package/docs/GITSPACE-PLATFORM.md +1819 -0
  16. package/docs/INFRASTRUCTURE.md +1347 -0
  17. package/docs/PROTOCOL.md +619 -0
  18. package/docs/QUICKSTART.md +174 -0
  19. package/docs/RELAY.md +327 -0
  20. package/docs/REMOTE-DESIGN.md +549 -0
  21. package/docs/ROADMAP.md +564 -0
  22. package/docs/SITE_DOCS_FIGMA_MAKE.md +1167 -0
  23. package/docs/STACK-DESIGN.md +588 -0
  24. package/docs/UNIFIED_ARCHITECTURE.md +292 -0
  25. package/experiments/pty-benchmark.ts +148 -0
  26. package/experiments/pty-latency.ts +100 -0
  27. package/experiments/router/client.ts +199 -0
  28. package/experiments/router/protocol.ts +74 -0
  29. package/experiments/router/router.ts +217 -0
  30. package/experiments/router/session.ts +180 -0
  31. package/experiments/router/test.ts +133 -0
  32. package/experiments/socket-bandwidth.ts +77 -0
  33. package/homebrew/gitspace.rb +45 -0
  34. package/landing-page/ATTRIBUTIONS.md +3 -0
  35. package/landing-page/README.md +11 -0
  36. package/landing-page/bun.lock +801 -0
  37. package/landing-page/guidelines/Guidelines.md +61 -0
  38. package/landing-page/index.html +37 -0
  39. package/landing-page/package.json +90 -0
  40. package/landing-page/postcss.config.mjs +15 -0
  41. package/landing-page/public/_redirects +1 -0
  42. package/landing-page/public/favicon.png +0 -0
  43. package/landing-page/src/app/App.tsx +53 -0
  44. package/landing-page/src/app/components/figma/ImageWithFallback.tsx +27 -0
  45. package/landing-page/src/app/components/ui/accordion.tsx +66 -0
  46. package/landing-page/src/app/components/ui/alert-dialog.tsx +157 -0
  47. package/landing-page/src/app/components/ui/alert.tsx +66 -0
  48. package/landing-page/src/app/components/ui/aspect-ratio.tsx +11 -0
  49. package/landing-page/src/app/components/ui/avatar.tsx +53 -0
  50. package/landing-page/src/app/components/ui/badge.tsx +46 -0
  51. package/landing-page/src/app/components/ui/breadcrumb.tsx +109 -0
  52. package/landing-page/src/app/components/ui/button.tsx +57 -0
  53. package/landing-page/src/app/components/ui/calendar.tsx +75 -0
  54. package/landing-page/src/app/components/ui/card.tsx +92 -0
  55. package/landing-page/src/app/components/ui/carousel.tsx +241 -0
  56. package/landing-page/src/app/components/ui/chart.tsx +353 -0
  57. package/landing-page/src/app/components/ui/checkbox.tsx +32 -0
  58. package/landing-page/src/app/components/ui/collapsible.tsx +33 -0
  59. package/landing-page/src/app/components/ui/command.tsx +177 -0
  60. package/landing-page/src/app/components/ui/context-menu.tsx +252 -0
  61. package/landing-page/src/app/components/ui/dialog.tsx +135 -0
  62. package/landing-page/src/app/components/ui/drawer.tsx +132 -0
  63. package/landing-page/src/app/components/ui/dropdown-menu.tsx +257 -0
  64. package/landing-page/src/app/components/ui/form.tsx +168 -0
  65. package/landing-page/src/app/components/ui/hover-card.tsx +44 -0
  66. package/landing-page/src/app/components/ui/input-otp.tsx +77 -0
  67. package/landing-page/src/app/components/ui/input.tsx +21 -0
  68. package/landing-page/src/app/components/ui/label.tsx +24 -0
  69. package/landing-page/src/app/components/ui/menubar.tsx +276 -0
  70. package/landing-page/src/app/components/ui/navigation-menu.tsx +168 -0
  71. package/landing-page/src/app/components/ui/pagination.tsx +127 -0
  72. package/landing-page/src/app/components/ui/popover.tsx +48 -0
  73. package/landing-page/src/app/components/ui/progress.tsx +31 -0
  74. package/landing-page/src/app/components/ui/radio-group.tsx +45 -0
  75. package/landing-page/src/app/components/ui/resizable.tsx +56 -0
  76. package/landing-page/src/app/components/ui/scroll-area.tsx +58 -0
  77. package/landing-page/src/app/components/ui/select.tsx +189 -0
  78. package/landing-page/src/app/components/ui/separator.tsx +28 -0
  79. package/landing-page/src/app/components/ui/sheet.tsx +139 -0
  80. package/landing-page/src/app/components/ui/sidebar.tsx +726 -0
  81. package/landing-page/src/app/components/ui/skeleton.tsx +13 -0
  82. package/landing-page/src/app/components/ui/slider.tsx +63 -0
  83. package/landing-page/src/app/components/ui/sonner.tsx +25 -0
  84. package/landing-page/src/app/components/ui/switch.tsx +31 -0
  85. package/landing-page/src/app/components/ui/table.tsx +116 -0
  86. package/landing-page/src/app/components/ui/tabs.tsx +66 -0
  87. package/landing-page/src/app/components/ui/textarea.tsx +18 -0
  88. package/landing-page/src/app/components/ui/toggle-group.tsx +73 -0
  89. package/landing-page/src/app/components/ui/toggle.tsx +47 -0
  90. package/landing-page/src/app/components/ui/tooltip.tsx +61 -0
  91. package/landing-page/src/app/components/ui/use-mobile.ts +21 -0
  92. package/landing-page/src/app/components/ui/utils.ts +6 -0
  93. package/landing-page/src/components/docs/DocsContent.tsx +718 -0
  94. package/landing-page/src/components/docs/DocsSidebar.tsx +84 -0
  95. package/landing-page/src/components/landing/CTA.tsx +59 -0
  96. package/landing-page/src/components/landing/Comparison.tsx +84 -0
  97. package/landing-page/src/components/landing/FaultyTerminal.tsx +424 -0
  98. package/landing-page/src/components/landing/Features.tsx +201 -0
  99. package/landing-page/src/components/landing/Hero.tsx +142 -0
  100. package/landing-page/src/components/landing/Pricing.tsx +140 -0
  101. package/landing-page/src/components/landing/Roadmap.tsx +86 -0
  102. package/landing-page/src/components/landing/Security.tsx +81 -0
  103. package/landing-page/src/components/landing/TerminalWindow.tsx +27 -0
  104. package/landing-page/src/components/landing/UseCases.tsx +55 -0
  105. package/landing-page/src/components/landing/Workflow.tsx +101 -0
  106. package/landing-page/src/components/layout/DashboardNavbar.tsx +37 -0
  107. package/landing-page/src/components/layout/Footer.tsx +55 -0
  108. package/landing-page/src/components/layout/LandingNavbar.tsx +82 -0
  109. package/landing-page/src/components/ui/badge.tsx +39 -0
  110. package/landing-page/src/components/ui/breadcrumb.tsx +115 -0
  111. package/landing-page/src/components/ui/button.tsx +57 -0
  112. package/landing-page/src/components/ui/card.tsx +79 -0
  113. package/landing-page/src/components/ui/mock-terminal.tsx +68 -0
  114. package/landing-page/src/components/ui/separator.tsx +28 -0
  115. package/landing-page/src/lib/utils.ts +6 -0
  116. package/landing-page/src/main.tsx +10 -0
  117. package/landing-page/src/pages/Dashboard.tsx +133 -0
  118. package/landing-page/src/pages/DocsPage.tsx +79 -0
  119. package/landing-page/src/pages/LandingPage.tsx +31 -0
  120. package/landing-page/src/pages/TerminalView.tsx +106 -0
  121. package/landing-page/src/styles/fonts.css +0 -0
  122. package/landing-page/src/styles/index.css +3 -0
  123. package/landing-page/src/styles/tailwind.css +4 -0
  124. package/landing-page/src/styles/theme.css +181 -0
  125. package/landing-page/vite.config.ts +19 -0
  126. package/npm/darwin-arm64/bin/gssh +0 -0
  127. package/npm/darwin-arm64/package.json +20 -0
  128. package/package.json +74 -0
  129. package/scripts/build.ts +284 -0
  130. package/scripts/release.ts +140 -0
  131. package/src/__tests__/test-utils.ts +298 -0
  132. package/src/commands/__tests__/serve-messages.test.ts +190 -0
  133. package/src/commands/access.ts +298 -0
  134. package/src/commands/add.ts +452 -0
  135. package/src/commands/auth.ts +364 -0
  136. package/src/commands/connect.ts +287 -0
  137. package/src/commands/directory.ts +16 -0
  138. package/src/commands/host.ts +396 -0
  139. package/src/commands/identity.ts +184 -0
  140. package/src/commands/list.ts +200 -0
  141. package/src/commands/relay.ts +315 -0
  142. package/src/commands/remove.ts +241 -0
  143. package/src/commands/serve.ts +1493 -0
  144. package/src/commands/share.ts +456 -0
  145. package/src/commands/status.ts +125 -0
  146. package/src/commands/switch.ts +353 -0
  147. package/src/commands/tmux.ts +317 -0
  148. package/src/core/__tests__/access.test.ts +240 -0
  149. package/src/core/access.ts +277 -0
  150. package/src/core/bundle.ts +342 -0
  151. package/src/core/config.ts +510 -0
  152. package/src/core/git.ts +317 -0
  153. package/src/core/github.ts +151 -0
  154. package/src/core/identity.ts +631 -0
  155. package/src/core/linear.ts +225 -0
  156. package/src/core/shell.ts +161 -0
  157. package/src/core/trusted-relays.ts +315 -0
  158. package/src/index.ts +821 -0
  159. package/src/lib/remote-session/index.ts +7 -0
  160. package/src/lib/remote-session/protocol.ts +267 -0
  161. package/src/lib/remote-session/session-handler.ts +581 -0
  162. package/src/lib/remote-session/workspace-scanner.ts +167 -0
  163. package/src/lib/tmux-lite/README.md +81 -0
  164. package/src/lib/tmux-lite/cli.ts +796 -0
  165. package/src/lib/tmux-lite/crypto/__tests__/helpers/handshake-runner.ts +349 -0
  166. package/src/lib/tmux-lite/crypto/__tests__/helpers/mock-relay.ts +291 -0
  167. package/src/lib/tmux-lite/crypto/__tests__/helpers/test-identities.ts +142 -0
  168. package/src/lib/tmux-lite/crypto/__tests__/integration/authorization.integration.test.ts +339 -0
  169. package/src/lib/tmux-lite/crypto/__tests__/integration/e2e-communication.integration.test.ts +477 -0
  170. package/src/lib/tmux-lite/crypto/__tests__/integration/error-handling.integration.test.ts +499 -0
  171. package/src/lib/tmux-lite/crypto/__tests__/integration/handshake.integration.test.ts +371 -0
  172. package/src/lib/tmux-lite/crypto/__tests__/integration/security.integration.test.ts +573 -0
  173. package/src/lib/tmux-lite/crypto/access-control.test.ts +512 -0
  174. package/src/lib/tmux-lite/crypto/access-control.ts +320 -0
  175. package/src/lib/tmux-lite/crypto/frames.test.ts +262 -0
  176. package/src/lib/tmux-lite/crypto/frames.ts +141 -0
  177. package/src/lib/tmux-lite/crypto/handshake.ts +894 -0
  178. package/src/lib/tmux-lite/crypto/identity.test.ts +220 -0
  179. package/src/lib/tmux-lite/crypto/identity.ts +286 -0
  180. package/src/lib/tmux-lite/crypto/index.ts +51 -0
  181. package/src/lib/tmux-lite/crypto/invites.test.ts +381 -0
  182. package/src/lib/tmux-lite/crypto/invites.ts +215 -0
  183. package/src/lib/tmux-lite/crypto/keyexchange.ts +435 -0
  184. package/src/lib/tmux-lite/crypto/keys.test.ts +58 -0
  185. package/src/lib/tmux-lite/crypto/keys.ts +47 -0
  186. package/src/lib/tmux-lite/crypto/secretbox.test.ts +169 -0
  187. package/src/lib/tmux-lite/crypto/secretbox.ts +124 -0
  188. package/src/lib/tmux-lite/handshake-handler.ts +451 -0
  189. package/src/lib/tmux-lite/protocol.test.ts +307 -0
  190. package/src/lib/tmux-lite/protocol.ts +266 -0
  191. package/src/lib/tmux-lite/relay-client.ts +506 -0
  192. package/src/lib/tmux-lite/server.ts +1250 -0
  193. package/src/lib/tmux-lite/shell-integration.sh +37 -0
  194. package/src/lib/tmux-lite/terminal-queries.test.ts +54 -0
  195. package/src/lib/tmux-lite/terminal-queries.ts +49 -0
  196. package/src/relay/__tests__/e2e-flow.test.ts +1284 -0
  197. package/src/relay/__tests__/helpers/auth.ts +354 -0
  198. package/src/relay/__tests__/helpers/ports.ts +51 -0
  199. package/src/relay/__tests__/protocol-validation.test.ts +265 -0
  200. package/src/relay/authorization.ts +303 -0
  201. package/src/relay/embedded-assets.generated.d.ts +15 -0
  202. package/src/relay/identity.ts +352 -0
  203. package/src/relay/index.ts +57 -0
  204. package/src/relay/pipes.test.ts +427 -0
  205. package/src/relay/pipes.ts +195 -0
  206. package/src/relay/protocol.ts +804 -0
  207. package/src/relay/registries.test.ts +437 -0
  208. package/src/relay/registries.ts +593 -0
  209. package/src/relay/server.test.ts +1323 -0
  210. package/src/relay/server.ts +1092 -0
  211. package/src/relay/signing.ts +238 -0
  212. package/src/relay/types.ts +69 -0
  213. package/src/serve/client-session-manager.ts +622 -0
  214. package/src/serve/daemon.ts +497 -0
  215. package/src/serve/pty-session.ts +236 -0
  216. package/src/serve/types.ts +169 -0
  217. package/src/shared/components/Flow.tsx +453 -0
  218. package/src/shared/components/Flow.tui.tsx +343 -0
  219. package/src/shared/components/Flow.web.tsx +442 -0
  220. package/src/shared/components/Inbox.tsx +446 -0
  221. package/src/shared/components/Inbox.tui.tsx +262 -0
  222. package/src/shared/components/Inbox.web.tsx +329 -0
  223. package/src/shared/components/MachineList.tsx +187 -0
  224. package/src/shared/components/MachineList.tui.tsx +161 -0
  225. package/src/shared/components/MachineList.web.tsx +210 -0
  226. package/src/shared/components/ProjectList.tsx +176 -0
  227. package/src/shared/components/ProjectList.tui.tsx +109 -0
  228. package/src/shared/components/ProjectList.web.tsx +143 -0
  229. package/src/shared/components/SpacesBrowser.tsx +332 -0
  230. package/src/shared/components/SpacesBrowser.tui.tsx +163 -0
  231. package/src/shared/components/SpacesBrowser.web.tsx +221 -0
  232. package/src/shared/components/index.ts +103 -0
  233. package/src/shared/hooks/index.ts +16 -0
  234. package/src/shared/hooks/useNavigation.ts +226 -0
  235. package/src/shared/index.ts +122 -0
  236. package/src/shared/providers/LocalMachineProvider.ts +425 -0
  237. package/src/shared/providers/MachineProvider.ts +165 -0
  238. package/src/shared/providers/RemoteMachineProvider.ts +444 -0
  239. package/src/shared/providers/index.ts +26 -0
  240. package/src/shared/types.ts +145 -0
  241. package/src/tui/adapters.ts +120 -0
  242. package/src/tui/app.tsx +1816 -0
  243. package/src/tui/components/Terminal.tsx +580 -0
  244. package/src/tui/hooks/index.ts +35 -0
  245. package/src/tui/hooks/useAppState.ts +314 -0
  246. package/src/tui/hooks/useDaemonStatus.ts +174 -0
  247. package/src/tui/hooks/useInboxTUI.ts +113 -0
  248. package/src/tui/hooks/useRemoteMachines.ts +209 -0
  249. package/src/tui/index.ts +24 -0
  250. package/src/tui/state.ts +299 -0
  251. package/src/tui/terminal-bracketed-paste.test.ts +45 -0
  252. package/src/tui/terminal-bracketed-paste.ts +47 -0
  253. package/src/types/bundle.ts +112 -0
  254. package/src/types/config.ts +89 -0
  255. package/src/types/errors.ts +206 -0
  256. package/src/types/identity.ts +284 -0
  257. package/src/types/workspace-fuzzy.ts +49 -0
  258. package/src/types/workspace.ts +151 -0
  259. package/src/utils/bun-socket-writer.ts +80 -0
  260. package/src/utils/deps.ts +127 -0
  261. package/src/utils/fuzzy-match.ts +125 -0
  262. package/src/utils/logger.ts +127 -0
  263. package/src/utils/markdown.ts +254 -0
  264. package/src/utils/onboarding.ts +229 -0
  265. package/src/utils/prompts.ts +114 -0
  266. package/src/utils/run-commands.ts +112 -0
  267. package/src/utils/run-scripts.ts +142 -0
  268. package/src/utils/sanitize.ts +98 -0
  269. package/src/utils/secrets.ts +122 -0
  270. package/src/utils/shell-escape.ts +40 -0
  271. package/src/utils/utf8.ts +79 -0
  272. package/src/utils/workspace-state.ts +47 -0
  273. package/src/web/README.md +73 -0
  274. package/src/web/bun.lock +575 -0
  275. package/src/web/eslint.config.js +23 -0
  276. package/src/web/index.html +16 -0
  277. package/src/web/package.json +37 -0
  278. package/src/web/public/vite.svg +1 -0
  279. package/src/web/src/App.tsx +604 -0
  280. package/src/web/src/assets/react.svg +1 -0
  281. package/src/web/src/components/Terminal.tsx +207 -0
  282. package/src/web/src/hooks/useRelayConnection.ts +224 -0
  283. package/src/web/src/hooks/useTerminal.ts +699 -0
  284. package/src/web/src/index.css +55 -0
  285. package/src/web/src/lib/crypto/__tests__/web-terminal.test.ts +1158 -0
  286. package/src/web/src/lib/crypto/frames.ts +205 -0
  287. package/src/web/src/lib/crypto/handshake.ts +396 -0
  288. package/src/web/src/lib/crypto/identity.ts +128 -0
  289. package/src/web/src/lib/crypto/keyexchange.ts +246 -0
  290. package/src/web/src/lib/crypto/relay-signing.ts +53 -0
  291. package/src/web/src/lib/invite.ts +58 -0
  292. package/src/web/src/lib/storage/identity-store.ts +94 -0
  293. package/src/web/src/main.tsx +10 -0
  294. package/src/web/src/types/identity.ts +45 -0
  295. package/src/web/tsconfig.app.json +28 -0
  296. package/src/web/tsconfig.json +7 -0
  297. package/src/web/tsconfig.node.json +26 -0
  298. package/src/web/vite.config.ts +31 -0
  299. package/todo-security.md +92 -0
  300. package/tsconfig.json +23 -0
  301. package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/12b7107e435bf1b9a8713a7f320472a63e543104d633d89a26f8d21f4e4ef182.sqlite +0 -0
  302. package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/12b7107e435bf1b9a8713a7f320472a63e543104d633d89a26f8d21f4e4ef182.sqlite-shm +0 -0
  303. package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/12b7107e435bf1b9a8713a7f320472a63e543104d633d89a26f8d21f4e4ef182.sqlite-wal +0 -0
  304. package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/1a1ac3db1ab86ecf712f90322868a9aabc2c7dc9fe2dfbe94f9b075096276b0f.sqlite +0 -0
  305. package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/1a1ac3db1ab86ecf712f90322868a9aabc2c7dc9fe2dfbe94f9b075096276b0f.sqlite-shm +0 -0
  306. package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/1a1ac3db1ab86ecf712f90322868a9aabc2c7dc9fe2dfbe94f9b075096276b0f.sqlite-wal +0 -0
  307. package/worker/bun.lock +237 -0
  308. package/worker/package.json +22 -0
  309. package/worker/schema.sql +96 -0
  310. package/worker/src/handlers/auth.ts +451 -0
  311. package/worker/src/handlers/subdomains.ts +376 -0
  312. package/worker/src/handlers/user.ts +98 -0
  313. package/worker/src/index.ts +70 -0
  314. package/worker/src/middleware/auth.ts +152 -0
  315. package/worker/src/services/cloudflare.ts +609 -0
  316. package/worker/src/types.ts +96 -0
  317. package/worker/tsconfig.json +15 -0
  318. package/worker/wrangler.toml +26 -0
@@ -0,0 +1,1158 @@
1
+ /**
2
+ * Web Terminal Tests
3
+ *
4
+ * Comprehensive tests for the web terminal connection flow:
5
+ * 1. Browser crypto unit tests (identity, keyexchange, handshake, frames)
6
+ * 2. Browser ↔ Node crypto interop tests
7
+ * 3. Web terminal E2E connection tests (with and without invite)
8
+ *
9
+ * These tests run in Bun but use the same noble-curves libraries as the browser.
10
+ */
11
+
12
+ import { describe, expect, test, beforeAll, afterAll, beforeEach } from "bun:test";
13
+
14
+ // Browser crypto modules (same code runs in Bun)
15
+ import {
16
+ generateIdentity,
17
+ generateSigningKeypair,
18
+ generateKeyExchangeKeypair,
19
+ sign,
20
+ verify,
21
+ deriveIdentityId,
22
+ serializeIdentity,
23
+ deserializeIdentity,
24
+ } from "../identity";
25
+
26
+ import {
27
+ randomBytes,
28
+ x25519SharedSecret,
29
+ generateEphemeralKeypair,
30
+ deriveSessionKeys,
31
+ deriveSessionKeysFromMultiple,
32
+ validateX25519PublicKey,
33
+ X25519_KEY_LENGTH,
34
+ } from "../keyexchange";
35
+
36
+ import {
37
+ createClientHello,
38
+ processServerHello,
39
+ createClientAuth,
40
+ processServerAuth,
41
+ type X3DHResponseMessage,
42
+ type X3DHResultMessage,
43
+ } from "../handshake";
44
+ import { signRelayMessage } from "../relay-signing";
45
+
46
+ import {
47
+ encrypt,
48
+ decrypt,
49
+ createFrame,
50
+ openFrame,
51
+ encodeFrame,
52
+ decodeFrame,
53
+ MASTER_STREAM_ID,
54
+ } from "../frames";
55
+
56
+ // Node crypto modules (for interop testing)
57
+ import { generateRelayIdentity } from "../../../../../relay/identity";
58
+ import { clearAllRegistries } from "../../../../../relay/registries";
59
+ import {
60
+ createTestIdentity as createNodeIdentity,
61
+ toPublicIdentity,
62
+ } from "../../../../../lib/tmux-lite/crypto/__tests__/helpers/test-identities";
63
+ import { HandshakeHandler } from "../../../../../lib/tmux-lite/handshake-handler";
64
+ import { AccessControlList } from "../../../../../lib/tmux-lite/crypto/access-control";
65
+ import { createInviteToken } from "../../../../../lib/tmux-lite/crypto/invites";
66
+ import { signChallenge, getSigningKeyBase64 } from "../../../../../relay/__tests__/helpers/auth";
67
+ import { startRelayServer } from "../../../../../relay/__tests__/helpers/ports";
68
+ import { createHash } from "crypto";
69
+ import type { Server } from "bun";
70
+
71
+ // ============================================================================
72
+ // Part 1: Browser Crypto Unit Tests
73
+ // ============================================================================
74
+
75
+ describe("Browser Crypto: Identity", () => {
76
+ test("generates valid signing keypair", () => {
77
+ const keypair = generateSigningKeypair();
78
+ expect(keypair.publicKey).toBeInstanceOf(Uint8Array);
79
+ expect(keypair.secretKey).toBeInstanceOf(Uint8Array);
80
+ expect(keypair.publicKey.length).toBe(32);
81
+ expect(keypair.secretKey.length).toBe(64); // Ed25519 convention
82
+ });
83
+
84
+ test("generates valid key exchange keypair", () => {
85
+ const keypair = generateKeyExchangeKeypair();
86
+ expect(keypair.publicKey).toBeInstanceOf(Uint8Array);
87
+ expect(keypair.privateKey).toBeInstanceOf(Uint8Array);
88
+ expect(keypair.publicKey.length).toBe(32);
89
+ expect(keypair.privateKey.length).toBe(32);
90
+ });
91
+
92
+ test("generates complete identity", () => {
93
+ const identity = generateIdentity("Test Browser");
94
+ expect(identity.id).toBeDefined();
95
+ expect(identity.id.length).toBe(16);
96
+ expect(identity.signing).toBeDefined();
97
+ expect(identity.keyExchange).toBeDefined();
98
+ expect(identity.label).toBe("Test Browser");
99
+ expect(identity.createdAt).toBeGreaterThan(0);
100
+ });
101
+
102
+ test("sign and verify work correctly", () => {
103
+ const keypair = generateSigningKeypair();
104
+ const message = new TextEncoder().encode("Hello, World!");
105
+
106
+ const signature = sign(message, keypair.secretKey);
107
+ expect(signature.length).toBe(64);
108
+
109
+ const isValid = verify(message, signature, keypair.publicKey);
110
+ expect(isValid).toBe(true);
111
+ });
112
+
113
+ test("verify rejects invalid signature", () => {
114
+ const keypair = generateSigningKeypair();
115
+ const message = new TextEncoder().encode("Hello, World!");
116
+
117
+ const signature = sign(message, keypair.secretKey);
118
+
119
+ // Tamper with signature
120
+ const badSignature = new Uint8Array(signature);
121
+ badSignature[0] ^= 0xff;
122
+
123
+ const isValid = verify(message, badSignature, keypair.publicKey);
124
+ expect(isValid).toBe(false);
125
+ });
126
+
127
+ test("verify rejects wrong message", () => {
128
+ const keypair = generateSigningKeypair();
129
+ const message = new TextEncoder().encode("Hello, World!");
130
+ const wrongMessage = new TextEncoder().encode("Wrong message");
131
+
132
+ const signature = sign(message, keypair.secretKey);
133
+ const isValid = verify(wrongMessage, signature, keypair.publicKey);
134
+ expect(isValid).toBe(false);
135
+ });
136
+
137
+ test("deriveIdentityId produces consistent IDs", () => {
138
+ const keypair = generateSigningKeypair();
139
+ const id1 = deriveIdentityId(keypair.publicKey);
140
+ const id2 = deriveIdentityId(keypair.publicKey);
141
+ expect(id1).toBe(id2);
142
+ expect(id1.length).toBe(16);
143
+ });
144
+
145
+ test("serialize and deserialize identity", () => {
146
+ const identity = generateIdentity("Test");
147
+ const serialized = serializeIdentity(identity);
148
+ const deserialized = deserializeIdentity(serialized);
149
+
150
+ expect(deserialized.id).toBe(identity.id);
151
+ expect(deserialized.label).toBe(identity.label);
152
+ expect(deserialized.createdAt).toBe(identity.createdAt);
153
+
154
+ // Keys should match (convert to Array for comparison to avoid ArrayBuffer type issues)
155
+ expect(Array.from(new Uint8Array(deserialized.signing.publicKey))).toEqual(Array.from(identity.signing.publicKey));
156
+ expect(Array.from(new Uint8Array(deserialized.signing.secretKey))).toEqual(Array.from(identity.signing.secretKey));
157
+ expect(Array.from(new Uint8Array(deserialized.keyExchange.publicKey))).toEqual(Array.from(identity.keyExchange.publicKey));
158
+ expect(Array.from(new Uint8Array(deserialized.keyExchange.privateKey))).toEqual(Array.from(identity.keyExchange.privateKey));
159
+ });
160
+ });
161
+
162
+ describe("Browser Crypto: Key Exchange", () => {
163
+ test("randomBytes generates correct length", () => {
164
+ const bytes16 = randomBytes(16);
165
+ const bytes32 = randomBytes(32);
166
+ expect(bytes16.length).toBe(16);
167
+ expect(bytes32.length).toBe(32);
168
+ });
169
+
170
+ test("randomBytes generates different values", () => {
171
+ const a = randomBytes(32);
172
+ const b = randomBytes(32);
173
+ expect(a).not.toEqual(b);
174
+ });
175
+
176
+ test("generateEphemeralKeypair produces valid keys", () => {
177
+ const keypair = generateEphemeralKeypair();
178
+ expect(keypair.publicKey.length).toBe(X25519_KEY_LENGTH);
179
+ expect(keypair.privateKey.length).toBe(X25519_KEY_LENGTH);
180
+ expect(validateX25519PublicKey(keypair.publicKey)).toBe(true);
181
+ });
182
+
183
+ test("x25519SharedSecret produces same result for both parties", () => {
184
+ const alice = generateEphemeralKeypair();
185
+ const bob = generateEphemeralKeypair();
186
+
187
+ const sharedA = x25519SharedSecret(alice.privateKey, bob.publicKey);
188
+ const sharedB = x25519SharedSecret(bob.privateKey, alice.publicKey);
189
+
190
+ expect(sharedA).toEqual(sharedB);
191
+ expect(sharedA.length).toBe(X25519_KEY_LENGTH);
192
+ });
193
+
194
+ test("deriveSessionKeys produces symmetric keys", () => {
195
+ const alice = generateEphemeralKeypair();
196
+ const bob = generateEphemeralKeypair();
197
+
198
+ const sharedSecret = x25519SharedSecret(alice.privateKey, bob.publicKey);
199
+ const salt = randomBytes(32);
200
+
201
+ const aliceKeys = deriveSessionKeys(sharedSecret, salt, true);
202
+ const bobKeys = deriveSessionKeys(sharedSecret, salt, false);
203
+
204
+ // Alice's sendKey should match Bob's receiveKey
205
+ expect(aliceKeys.sendKey).toEqual(bobKeys.receiveKey);
206
+ expect(aliceKeys.receiveKey).toEqual(bobKeys.sendKey);
207
+ expect(aliceKeys.sessionId).toBe(bobKeys.sessionId);
208
+ });
209
+
210
+ test("deriveSessionKeysFromMultiple combines secrets correctly", () => {
211
+ const ephemeral1 = generateEphemeralKeypair();
212
+ const ephemeral2 = generateEphemeralKeypair();
213
+ const ephemeral3 = generateEphemeralKeypair();
214
+
215
+ const dh1 = x25519SharedSecret(ephemeral1.privateKey, ephemeral2.publicKey);
216
+ const dh2 = x25519SharedSecret(ephemeral1.privateKey, ephemeral3.publicKey);
217
+
218
+ const salt = randomBytes(32);
219
+ const keys = deriveSessionKeysFromMultiple([dh1, dh2], salt, true);
220
+
221
+ expect(keys.sendKey.length).toBe(32);
222
+ expect(keys.receiveKey.length).toBe(32);
223
+ expect(keys.sessionId.length).toBeGreaterThan(0);
224
+ });
225
+
226
+ test("validateX25519PublicKey rejects invalid keys", () => {
227
+ // All zeros
228
+ expect(validateX25519PublicKey(new Uint8Array(32))).toBe(false);
229
+
230
+ // Wrong length
231
+ expect(validateX25519PublicKey(new Uint8Array(16))).toBe(false);
232
+
233
+ // Valid key
234
+ const keypair = generateEphemeralKeypair();
235
+ expect(validateX25519PublicKey(keypair.publicKey)).toBe(true);
236
+ });
237
+ });
238
+
239
+ describe("Browser Crypto: Frames (AES-GCM)", () => {
240
+ test("encrypt and decrypt round-trip", async () => {
241
+ const key = randomBytes(32);
242
+ const plaintext = new TextEncoder().encode("Hello, encrypted world!");
243
+
244
+ const { nonce, ciphertext } = await encrypt(plaintext, key);
245
+
246
+ expect(nonce.length).toBe(12);
247
+ expect(ciphertext.length).toBeGreaterThan(plaintext.length); // Includes auth tag
248
+
249
+ const decrypted = await decrypt(ciphertext, nonce, key);
250
+ expect(decrypted).not.toBeNull();
251
+ expect(new TextDecoder().decode(decrypted!)).toBe("Hello, encrypted world!");
252
+ });
253
+
254
+ test("decrypt fails with wrong key", async () => {
255
+ const key1 = randomBytes(32);
256
+ const key2 = randomBytes(32);
257
+ const plaintext = new TextEncoder().encode("Secret message");
258
+
259
+ const { nonce, ciphertext } = await encrypt(plaintext, key1);
260
+ const decrypted = await decrypt(ciphertext, nonce, key2);
261
+
262
+ expect(decrypted).toBeNull();
263
+ });
264
+
265
+ test("decrypt fails with tampered ciphertext", async () => {
266
+ const key = randomBytes(32);
267
+ const plaintext = new TextEncoder().encode("Secret message");
268
+
269
+ const { nonce, ciphertext } = await encrypt(plaintext, key);
270
+
271
+ // Tamper with ciphertext
272
+ const tampered = new Uint8Array(ciphertext);
273
+ tampered[0] ^= 0xff;
274
+
275
+ const decrypted = await decrypt(tampered, nonce, key);
276
+ expect(decrypted).toBeNull();
277
+ });
278
+
279
+ test("encodeFrame and decodeFrame round-trip", () => {
280
+ const frame = {
281
+ streamId: MASTER_STREAM_ID,
282
+ nonce: randomBytes(12),
283
+ ciphertext: randomBytes(100),
284
+ };
285
+
286
+ const encoded = encodeFrame(frame);
287
+ const decoded = decodeFrame(encoded);
288
+
289
+ expect(decoded).not.toBeNull();
290
+ expect(decoded!.streamId).toBe(frame.streamId);
291
+ expect(decoded!.nonce).toEqual(frame.nonce);
292
+ expect(decoded!.ciphertext).toEqual(frame.ciphertext);
293
+ });
294
+
295
+ test("createFrame and openFrame round-trip", async () => {
296
+ const key = randomBytes(32);
297
+ const data = new TextEncoder().encode("Terminal output data");
298
+
299
+ const frame = await createFrame(MASTER_STREAM_ID, data, key);
300
+ const result = await openFrame(frame, key);
301
+
302
+ expect(result).not.toBeNull();
303
+ expect(result!.streamId).toBe(MASTER_STREAM_ID);
304
+ expect(new TextDecoder().decode(result!.data)).toBe("Terminal output data");
305
+ });
306
+ });
307
+
308
+ describe("Browser Crypto: X3DH Handshake", () => {
309
+ test("createClientHello produces valid message", () => {
310
+ const { state, message } = createClientHello("test-machine");
311
+
312
+ expect(state.phase).toBe("awaiting_server_hello");
313
+ expect(state.ephemeral).toBeDefined();
314
+ expect(state.clientNonce.length).toBe(32);
315
+
316
+ expect(message.version).toBe(1);
317
+ expect(message.ephemeralKey).toBeDefined();
318
+ expect(message.timestamp).toBeGreaterThan(0);
319
+ expect(message.clientNonce).toBeDefined();
320
+ expect(message.machineIdHint).toBe("test-machine");
321
+ });
322
+
323
+ test("full handshake flow (simulated)", () => {
324
+ // This simulates what the server would do
325
+ const browserClient = generateIdentity("Browser Client");
326
+ const serverMachine = generateIdentity("Server Machine");
327
+
328
+ // Step 1: Browser creates ClientHello
329
+ const { state: clientState1, message: _clientHello } = createClientHello();
330
+
331
+ // Step 2: Simulate server creating ServerHello
332
+ const serverEphemeral = generateEphemeralKeypair();
333
+ const signedPreKey = generateEphemeralKeypair();
334
+ const serverNonce = randomBytes(32);
335
+
336
+ // Server signs its pre-key
337
+ const preKeySignature = sign(signedPreKey.publicKey, serverMachine.signing.secretKey);
338
+
339
+ const serverHello: X3DHResponseMessage = {
340
+ version: 1,
341
+ identityKey: btoa(String.fromCharCode(...serverMachine.signing.publicKey)),
342
+ keyExchangeKey: btoa(String.fromCharCode(...serverMachine.keyExchange.publicKey)),
343
+ ephemeralKey: btoa(String.fromCharCode(...serverEphemeral.publicKey)),
344
+ signedPreKey: btoa(String.fromCharCode(...signedPreKey.publicKey)),
345
+ preKeySignature: btoa(String.fromCharCode(...preKeySignature)),
346
+ serverNonce: btoa(String.fromCharCode(...serverNonce)),
347
+ timestamp: Date.now(),
348
+ };
349
+
350
+ // Step 3: Browser processes ServerHello
351
+ const clientState2 = processServerHello(clientState1, serverHello);
352
+ expect(clientState2).not.toBeNull();
353
+ expect(clientState2!.phase).toBe("awaiting_server_auth");
354
+
355
+ // Step 4: Browser creates ClientAuth
356
+ const { message: clientAuth, sessionKeys: browserSessionKeys } = createClientAuth(
357
+ clientState2!,
358
+ browserClient,
359
+ { type: "access_list" }
360
+ );
361
+
362
+ expect(clientAuth.version).toBe(1);
363
+ expect(clientAuth.identityKey).toBeDefined();
364
+ expect(clientAuth.keyExchangeKey).toBeDefined();
365
+ expect(clientAuth.identityProof).toBeDefined();
366
+
367
+ expect(browserSessionKeys.sendKey.length).toBe(32);
368
+ expect(browserSessionKeys.receiveKey.length).toBe(32);
369
+ expect(browserSessionKeys.sessionId.length).toBeGreaterThan(0);
370
+ });
371
+
372
+ test("processServerHello rejects invalid signature", () => {
373
+ const { state } = createClientHello();
374
+
375
+ const serverHello: X3DHResponseMessage = {
376
+ version: 1,
377
+ identityKey: btoa(String.fromCharCode(...randomBytes(32))),
378
+ keyExchangeKey: btoa(String.fromCharCode(...randomBytes(32))),
379
+ ephemeralKey: btoa(String.fromCharCode(...generateEphemeralKeypair().publicKey)),
380
+ signedPreKey: btoa(String.fromCharCode(...generateEphemeralKeypair().publicKey)),
381
+ preKeySignature: btoa(String.fromCharCode(...randomBytes(64))), // Invalid signature
382
+ serverNonce: btoa(String.fromCharCode(...randomBytes(32))),
383
+ timestamp: Date.now(),
384
+ };
385
+
386
+ const result = processServerHello(state, serverHello);
387
+ expect(result).toBeNull();
388
+ });
389
+
390
+ test("processServerHello rejects expired timestamp", () => {
391
+ const serverMachine = generateIdentity("Server");
392
+ const signedPreKey = generateEphemeralKeypair();
393
+ const preKeySignature = sign(signedPreKey.publicKey, serverMachine.signing.secretKey);
394
+
395
+ const { state } = createClientHello();
396
+
397
+ const serverHello: X3DHResponseMessage = {
398
+ version: 1,
399
+ identityKey: btoa(String.fromCharCode(...serverMachine.signing.publicKey)),
400
+ keyExchangeKey: btoa(String.fromCharCode(...serverMachine.keyExchange.publicKey)),
401
+ ephemeralKey: btoa(String.fromCharCode(...generateEphemeralKeypair().publicKey)),
402
+ signedPreKey: btoa(String.fromCharCode(...signedPreKey.publicKey)),
403
+ preKeySignature: btoa(String.fromCharCode(...preKeySignature)),
404
+ serverNonce: btoa(String.fromCharCode(...randomBytes(32))),
405
+ timestamp: Date.now() - 10 * 60 * 1000, // 10 minutes ago - too old
406
+ };
407
+
408
+ const result = processServerHello(state, serverHello);
409
+ expect(result).toBeNull();
410
+ });
411
+ });
412
+
413
+ // ============================================================================
414
+ // Part 2: Browser ↔ Node Crypto Interop Tests
415
+ // ============================================================================
416
+
417
+ describe("Browser ↔ Node Interop: Identity", () => {
418
+ test("browser-generated identity can be verified by node identity module", () => {
419
+ const browserIdentity = generateIdentity("Browser");
420
+ const message = new TextEncoder().encode("Test message");
421
+
422
+ // Browser signs
423
+ const signature = sign(message, browserIdentity.signing.secretKey);
424
+
425
+ // Verify using browser verify function (same code path as node would use)
426
+ const isValid = verify(message, signature, browserIdentity.signing.publicKey);
427
+ expect(isValid).toBe(true);
428
+ });
429
+
430
+ test("node-generated identity can be verified by browser crypto", () => {
431
+ const nodeIdentity = createNodeIdentity("Node Machine");
432
+ const message = new TextEncoder().encode("Test message");
433
+
434
+ // Node signs using the same sign function from browser module
435
+ // (both use @noble/curves/ed25519)
436
+ const signature = sign(message, nodeIdentity.signing.secretKey);
437
+
438
+ // Browser verifies
439
+ const isValid = verify(message, signature, nodeIdentity.signing.publicKey);
440
+ expect(isValid).toBe(true);
441
+ });
442
+ });
443
+
444
+ describe("Browser ↔ Node Interop: Key Exchange", () => {
445
+ test("browser and node keypairs can compute same shared secret", () => {
446
+ // Browser generates keypair
447
+ const browserKeypair = generateEphemeralKeypair();
448
+
449
+ // Node generates keypair (using same function - both use noble)
450
+ const nodeKeypair = generateEphemeralKeypair();
451
+
452
+ // Compute shared secrets from both sides
453
+ const browserShared = x25519SharedSecret(browserKeypair.privateKey, nodeKeypair.publicKey);
454
+ const nodeShared = x25519SharedSecret(nodeKeypair.privateKey, browserKeypair.publicKey);
455
+
456
+ expect(browserShared).toEqual(nodeShared);
457
+ });
458
+
459
+ test("browser and node derive same session keys", () => {
460
+ const browserKeypair = generateEphemeralKeypair();
461
+ const nodeKeypair = generateEphemeralKeypair();
462
+
463
+ const sharedSecret = x25519SharedSecret(browserKeypair.privateKey, nodeKeypair.publicKey);
464
+ const salt = randomBytes(32);
465
+
466
+ // Browser derives as initiator
467
+ const browserKeys = deriveSessionKeys(sharedSecret, salt, true);
468
+
469
+ // Node derives as responder
470
+ const nodeKeys = deriveSessionKeys(sharedSecret, salt, false);
471
+
472
+ // Should be symmetric
473
+ expect(browserKeys.sendKey).toEqual(nodeKeys.receiveKey);
474
+ expect(browserKeys.receiveKey).toEqual(nodeKeys.sendKey);
475
+ expect(browserKeys.sessionId).toBe(nodeKeys.sessionId);
476
+ });
477
+ });
478
+
479
+ // ============================================================================
480
+ // Part 3: Web Terminal E2E Connection Tests
481
+ // ============================================================================
482
+
483
+ const TEST_HOST = "127.0.0.1";
484
+ let relayUrl = "";
485
+ let relayHttpBase = "";
486
+
487
+ // Generate test identities
488
+ const testRelayIdentity = generateRelayIdentity("web-terminal-test-relay");
489
+ const testMachineIdentity = createNodeIdentity("Test Machine");
490
+
491
+ let server: Server<any>;
492
+
493
+ describe("Web Terminal E2E", () => {
494
+ beforeAll(async () => {
495
+ // Pre-authorize the test machine
496
+ server = startRelayServer({
497
+ bind: TEST_HOST,
498
+ hostname: TEST_HOST,
499
+ disableRateLimit: true,
500
+ identity: testRelayIdentity,
501
+ preAuthorizedMachines: new Set([
502
+ getSigningKeyBase64(testMachineIdentity),
503
+ ]),
504
+ });
505
+ relayUrl = `ws://${TEST_HOST}:${server.port}/ws`;
506
+ relayHttpBase = `http://${TEST_HOST}:${server.port}`;
507
+
508
+ // Wait for server to start accepting requests to avoid flakiness.
509
+ const deadline = Date.now() + 3000;
510
+ // eslint-disable-next-line no-constant-condition
511
+ while (true) {
512
+ try {
513
+ const res = await fetch(`${relayHttpBase}/health`);
514
+ if (res.ok) break;
515
+ } catch {
516
+ // ignore until deadline
517
+ }
518
+ if (Date.now() > deadline) {
519
+ throw new Error("Relay server did not become healthy in time");
520
+ }
521
+ await new Promise((r) => setTimeout(r, 50));
522
+ }
523
+ });
524
+
525
+ afterAll(() => {
526
+ server.stop(true);
527
+ });
528
+
529
+ beforeEach(() => {
530
+ clearAllRegistries();
531
+ });
532
+
533
+ /**
534
+ * Helper: Create and register a machine connection with challenge-response auth
535
+ */
536
+ async function setupMachine(machineIdentity: ReturnType<typeof createNodeIdentity>, accessList: AccessControlList) {
537
+ const url = new URL(relayUrl);
538
+ url.searchParams.set("role", "machine");
539
+ // No token needed - auth via challenge-response
540
+
541
+ const ws = new WebSocket(url.toString());
542
+ ws.binaryType = "arraybuffer";
543
+
544
+ await new Promise<void>((resolve, reject) => {
545
+ ws.onopen = () => resolve();
546
+ ws.onerror = () => reject(new Error("Machine connection failed"));
547
+ setTimeout(() => reject(new Error("Timeout")), 5000);
548
+ });
549
+
550
+ // Wait for relay_identity with challenge
551
+ const challenge = await new Promise<Uint8Array>((resolve, reject) => {
552
+ const timeout = setTimeout(() => reject(new Error("Challenge timeout")), 5000);
553
+ ws.onmessage = (event) => {
554
+ try {
555
+ const data = typeof event.data === "string" ? event.data : new TextDecoder().decode(event.data);
556
+ const msg = JSON.parse(data);
557
+ if (msg.type === "relay_identity" && msg.challenge) {
558
+ clearTimeout(timeout);
559
+ resolve(Buffer.from(msg.challenge, "base64"));
560
+ }
561
+ } catch {
562
+ // Ignore
563
+ }
564
+ };
565
+ });
566
+
567
+ // Sign challenge
568
+ const signature = signChallenge(challenge, machineIdentity.signing.secretKey);
569
+ const publicIdentity = toPublicIdentity(machineIdentity);
570
+
571
+ // Register machine with challenge response
572
+ ws.send(JSON.stringify({
573
+ type: "register_machine",
574
+ machineId: machineIdentity.id,
575
+ signingKey: publicIdentity.signingPublicKey,
576
+ keyExchangeKey: publicIdentity.keyExchangePublicKey,
577
+ challengeResponse: signature,
578
+ label: machineIdentity.label,
579
+ }));
580
+
581
+ await new Promise<void>((resolve, reject) => {
582
+ const timeout = setTimeout(() => reject(new Error("Registration timeout")), 5000);
583
+ ws.onmessage = (event) => {
584
+ try {
585
+ const data = typeof event.data === "string" ? event.data : new TextDecoder().decode(event.data);
586
+ const msg = JSON.parse(data);
587
+ if (msg.type === "registered") {
588
+ clearTimeout(timeout);
589
+ resolve();
590
+ } else if (msg.type === "error") {
591
+ clearTimeout(timeout);
592
+ reject(new Error(msg.message));
593
+ }
594
+ } catch {
595
+ // Ignore
596
+ }
597
+ };
598
+ });
599
+
600
+ const handshakeHandler = new HandshakeHandler({
601
+ identity: machineIdentity,
602
+ accessList,
603
+ handshakeTimeoutMs: 30000,
604
+ });
605
+
606
+ return { ws, handshakeHandler };
607
+ }
608
+
609
+ /**
610
+ * Helper: Set up machine to handle handshake messages
611
+ */
612
+ function setupMachineHandshakeHandler(ws: WebSocket, handler: HandshakeHandler, onComplete: (clientId: string) => void) {
613
+ ws.onmessage = async (event) => {
614
+ const data = typeof event.data === "string" ? event.data : new TextDecoder().decode(event.data);
615
+ const msg = JSON.parse(data);
616
+
617
+ if (msg.type === "client_connected") {
618
+ console.log("[machine] Client connected:", msg.connectionId);
619
+ }
620
+
621
+ if (msg.type === "data" && msg.connectionId) {
622
+ const msgData = Buffer.from(msg.data, "base64");
623
+ try {
624
+ const jsonStr = new TextDecoder().decode(msgData);
625
+ const envelope = JSON.parse(jsonStr);
626
+
627
+ if (envelope.type === "handshake") {
628
+ // Convert browser format (step + spread fields) to HandshakeHandler format (phase + data)
629
+ // Browser sends: { type: "handshake", step: "client_hello", ...clientHelloFields }
630
+ // Handler expects: { type: "handshake", phase: "client_hello", data: clientHelloFields }
631
+ const { type: _type, step, ...handshakeData } = envelope;
632
+ const handlerMessage = {
633
+ type: "handshake" as const,
634
+ phase: step as "client_hello" | "client_auth",
635
+ data: handshakeData,
636
+ };
637
+
638
+ const result = await handler.processMessage(msg.connectionId, handlerMessage);
639
+
640
+ if (result.type === "reply" || result.type === "established") {
641
+ // Convert response back to browser format
642
+ // Handler returns: { type: "handshake", phase: "server_hello", data: serverHelloFields }
643
+ // Browser expects: { type: "handshake", step: "server_hello", ...serverHelloFields }
644
+ const responseData = result.message.data as Record<string, unknown>;
645
+ const browserFormatResponse = {
646
+ type: "handshake",
647
+ step: result.message.phase,
648
+ ...responseData,
649
+ };
650
+
651
+ ws.send(JSON.stringify({
652
+ type: "data",
653
+ connectionId: msg.connectionId,
654
+ data: Buffer.from(JSON.stringify(browserFormatResponse)).toString("base64"),
655
+ }));
656
+
657
+ if (result.type === "established") {
658
+ console.log("[machine] Handshake established with:", result.session.peerIdentityId);
659
+ onComplete(result.session.peerIdentityId);
660
+ }
661
+ } else if (result.type === "error") {
662
+ console.error("[machine] Handshake error:", result.reason);
663
+ }
664
+ }
665
+ } catch (e) {
666
+ console.error("[machine] Handshake handler error:", e);
667
+ }
668
+ }
669
+ };
670
+ }
671
+
672
+ test("browser client can connect with pre-authorization", async () => {
673
+ // Browser client generates its own identity
674
+ const browserIdentity = generateIdentity("Browser Client");
675
+
676
+ // Pre-authorize the browser identity
677
+ const accessList = new AccessControlList();
678
+ accessList.addEntry({
679
+ id: browserIdentity.id,
680
+ signingPublicKey: Buffer.from(browserIdentity.signing.publicKey).toString("base64"),
681
+ keyExchangePublicKey: Buffer.from(browserIdentity.keyExchange.publicKey).toString("base64"),
682
+ }, 'full');
683
+
684
+ const { ws: machineWs, handshakeHandler } = await setupMachine(testMachineIdentity, accessList);
685
+
686
+ // Also authorize with relay (using accessType format)
687
+ machineWs.send(JSON.stringify({
688
+ type: "authorize_client",
689
+ machineId: testMachineIdentity.id,
690
+ clientIdentityId: browserIdentity.id,
691
+ signingKey: Buffer.from(browserIdentity.signing.publicKey).toString("base64"),
692
+ keyExchangeKey: Buffer.from(browserIdentity.keyExchange.publicKey).toString("base64"),
693
+ accessType: "full",
694
+ }));
695
+
696
+ await new Promise<void>((resolve) => {
697
+ const handler = (event: MessageEvent) => {
698
+ const data = typeof event.data === "string" ? event.data : new TextDecoder().decode(event.data);
699
+ const msg = JSON.parse(data);
700
+ if (msg.type === "client_authorized") {
701
+ machineWs.removeEventListener("message", handler);
702
+ resolve();
703
+ }
704
+ };
705
+ machineWs.addEventListener("message", handler);
706
+ });
707
+
708
+ // Track handshake completion
709
+ let machineHandshakeComplete = false;
710
+ let machineReceivedClientId: string | null = null;
711
+
712
+ setupMachineHandshakeHandler(machineWs, handshakeHandler, (clientId) => {
713
+ machineHandshakeComplete = true;
714
+ machineReceivedClientId = clientId;
715
+ });
716
+
717
+ // Browser connects (no token needed)
718
+ const clientUrl = new URL(relayUrl);
719
+ clientUrl.searchParams.set("role", "client");
720
+
721
+ const clientWs = new WebSocket(clientUrl.toString());
722
+
723
+ await new Promise<void>((resolve) => {
724
+ clientWs.onopen = () => resolve();
725
+ });
726
+
727
+ // Browser sends connect_to_machine
728
+ const signedConnect = signRelayMessage({
729
+ type: "connect_to_machine",
730
+ machineId: testMachineIdentity.id,
731
+ clientIdentityId: browserIdentity.id,
732
+ }, browserIdentity);
733
+ clientWs.send(JSON.stringify(signedConnect));
734
+
735
+ // Wait for connection_established
736
+ let connectionEstablished = false;
737
+ await new Promise<void>((resolve) => {
738
+ clientWs.onmessage = (event) => {
739
+ const msg = JSON.parse(event.data);
740
+ if (msg.type === "connection_established") {
741
+ connectionEstablished = true;
742
+ resolve();
743
+ } else if (msg.type === "error") {
744
+ console.error("Connection error:", msg.message);
745
+ resolve();
746
+ }
747
+ };
748
+ setTimeout(resolve, 5000);
749
+ });
750
+
751
+ expect(connectionEstablished).toBe(true);
752
+
753
+ // Now browser should do X3DH handshake
754
+ const { state: clientState, message: clientHello } = createClientHello(testMachineIdentity.id);
755
+
756
+ // Wrap handshake message like useTerminal does
757
+ clientWs.send(JSON.stringify({
758
+ type: "data",
759
+ data: Buffer.from(JSON.stringify({
760
+ type: "handshake",
761
+ step: "client_hello",
762
+ ...clientHello,
763
+ })).toString("base64"),
764
+ }));
765
+
766
+ // Wait for handshake messages
767
+ let browserSessionKeys: ReturnType<typeof deriveSessionKeys> | null = null;
768
+ let handshakeComplete = false;
769
+ let currentState = clientState;
770
+
771
+ await new Promise<void>((resolve) => {
772
+ const handler = (event: MessageEvent) => {
773
+ const msg = JSON.parse(event.data);
774
+
775
+ if (msg.type === "data" && msg.data) {
776
+ try {
777
+ const data = Buffer.from(msg.data, "base64");
778
+ const envelope = JSON.parse(new TextDecoder().decode(data));
779
+
780
+ if (envelope.type === "handshake") {
781
+ if (envelope.step === "server_hello") {
782
+ const newState = processServerHello(currentState, envelope as X3DHResponseMessage);
783
+ if (newState) {
784
+ currentState = newState;
785
+ const { message: authMessage, sessionKeys } = createClientAuth(
786
+ newState,
787
+ browserIdentity,
788
+ { type: "access_list" }
789
+ );
790
+ browserSessionKeys = sessionKeys;
791
+
792
+ clientWs.send(JSON.stringify({
793
+ type: "data",
794
+ data: Buffer.from(JSON.stringify({
795
+ type: "handshake",
796
+ step: "client_auth",
797
+ ...authMessage,
798
+ })).toString("base64"),
799
+ }));
800
+ }
801
+ } else if (envelope.step === "server_auth") {
802
+ const result = processServerAuth(
803
+ currentState,
804
+ envelope as X3DHResultMessage,
805
+ browserSessionKeys!
806
+ );
807
+ if (result) {
808
+ handshakeComplete = true;
809
+ clientWs.removeEventListener("message", handler);
810
+ resolve();
811
+ }
812
+ }
813
+ }
814
+ } catch (e) {
815
+ console.error("Handshake error:", e);
816
+ }
817
+ }
818
+ };
819
+ clientWs.addEventListener("message", handler);
820
+ setTimeout(() => {
821
+ clientWs.removeEventListener("message", handler);
822
+ resolve();
823
+ }, 10000);
824
+ });
825
+
826
+ expect(handshakeComplete).toBe(true);
827
+ expect(browserSessionKeys).not.toBeNull();
828
+ expect(machineHandshakeComplete).toBe(true);
829
+ expect(machineReceivedClientId).not.toBeNull();
830
+ expect(machineReceivedClientId!).toBe(browserIdentity.id);
831
+
832
+ clientWs.close();
833
+ machineWs.close();
834
+ });
835
+
836
+ test("browser client can connect via invite", async () => {
837
+ const accessList = new AccessControlList();
838
+ // Note: accessList is empty - we'll use invite for authorization
839
+
840
+ const { ws: machineWs, handshakeHandler } = await setupMachine(testMachineIdentity, accessList);
841
+
842
+ // Browser generates its own identity
843
+ const browserIdentity = generateIdentity("Browser Client");
844
+
845
+ // Create invite token
846
+ const inviteToken = createInviteToken(testMachineIdentity, relayUrl, {
847
+ accessType: 'full',
848
+ validityMs: 3600000,
849
+ });
850
+
851
+ const inviteId = createHash("sha256")
852
+ .update(inviteToken)
853
+ .digest("hex")
854
+ .substring(0, 16);
855
+
856
+ // Register invite with relay
857
+ machineWs.send(JSON.stringify({
858
+ type: "register_invite",
859
+ inviteId,
860
+ machineId: testMachineIdentity.id,
861
+ expiresAt: Date.now() + 3600000,
862
+ maxUses: null,
863
+ }));
864
+
865
+ await new Promise<void>((resolve, reject) => {
866
+ const handler = (event: MessageEvent) => {
867
+ const data = typeof event.data === "string" ? event.data : new TextDecoder().decode(event.data);
868
+ const msg = JSON.parse(data);
869
+ if (msg.type === "registered") {
870
+ machineWs.removeEventListener("message", handler);
871
+ resolve();
872
+ } else if (msg.type === "error") {
873
+ machineWs.removeEventListener("message", handler);
874
+ reject(new Error(msg.message));
875
+ }
876
+ };
877
+ machineWs.addEventListener("message", handler);
878
+ setTimeout(() => reject(new Error("Invite registration timeout")), 5000);
879
+ });
880
+
881
+ // Track handshake
882
+ let machineHandshakeComplete = false;
883
+ setupMachineHandshakeHandler(machineWs, handshakeHandler, () => {
884
+ machineHandshakeComplete = true;
885
+ });
886
+
887
+ // Browser connects and uses invite (no token needed)
888
+ const clientUrl = new URL(relayUrl);
889
+ clientUrl.searchParams.set("role", "client");
890
+
891
+ const clientWs = new WebSocket(clientUrl.toString());
892
+
893
+ await new Promise<void>((resolve) => {
894
+ clientWs.onopen = () => resolve();
895
+ });
896
+
897
+ // Browser sends connect_with_invite (like useTerminal does with inviteId)
898
+ const signedConnect = signRelayMessage({
899
+ type: "connect_with_invite",
900
+ inviteId,
901
+ clientIdentityId: browserIdentity.id,
902
+ }, browserIdentity);
903
+ clientWs.send(JSON.stringify(signedConnect));
904
+
905
+ // Wait for connection_established
906
+ let connectionEstablished = false;
907
+ await new Promise<void>((resolve) => {
908
+ clientWs.onmessage = (event) => {
909
+ const msg = JSON.parse(event.data);
910
+ if (msg.type === "connection_established") {
911
+ connectionEstablished = true;
912
+ resolve();
913
+ } else if (msg.type === "error") {
914
+ console.error("Connection error:", msg.message);
915
+ resolve();
916
+ }
917
+ };
918
+ setTimeout(resolve, 5000);
919
+ });
920
+
921
+ expect(connectionEstablished).toBe(true);
922
+
923
+ // Do X3DH handshake
924
+ const { state: clientState, message: clientHello } = createClientHello(testMachineIdentity.id);
925
+
926
+ clientWs.send(JSON.stringify({
927
+ type: "data",
928
+ data: Buffer.from(JSON.stringify({
929
+ type: "handshake",
930
+ step: "client_hello",
931
+ ...clientHello,
932
+ })).toString("base64"),
933
+ }));
934
+
935
+ let browserSessionKeys: ReturnType<typeof deriveSessionKeys> | null = null;
936
+ let handshakeComplete = false;
937
+ let currentState = clientState;
938
+
939
+ await new Promise<void>((resolve) => {
940
+ const handler = (event: MessageEvent) => {
941
+ const msg = JSON.parse(event.data);
942
+
943
+ if (msg.type === "data" && msg.data) {
944
+ try {
945
+ const data = Buffer.from(msg.data, "base64");
946
+ const envelope = JSON.parse(new TextDecoder().decode(data));
947
+
948
+ if (envelope.type === "handshake") {
949
+ if (envelope.step === "server_hello") {
950
+ const newState = processServerHello(currentState, envelope as X3DHResponseMessage);
951
+ if (newState) {
952
+ currentState = newState;
953
+ // Note: use full inviteToken (not inviteId) for X3DH authorization
954
+ // inviteId is only for relay's connect_with_invite message
955
+ const { message: authMessage, sessionKeys } = createClientAuth(
956
+ newState,
957
+ browserIdentity,
958
+ { type: "invite", inviteToken: inviteToken }
959
+ );
960
+ browserSessionKeys = sessionKeys;
961
+
962
+ clientWs.send(JSON.stringify({
963
+ type: "data",
964
+ data: Buffer.from(JSON.stringify({
965
+ type: "handshake",
966
+ step: "client_auth",
967
+ ...authMessage,
968
+ })).toString("base64"),
969
+ }));
970
+ }
971
+ } else if (envelope.step === "server_auth") {
972
+ const result = processServerAuth(
973
+ currentState,
974
+ envelope as X3DHResultMessage,
975
+ browserSessionKeys!
976
+ );
977
+ if (result) {
978
+ handshakeComplete = true;
979
+ clientWs.removeEventListener("message", handler);
980
+ resolve();
981
+ }
982
+ }
983
+ }
984
+ } catch (e) {
985
+ console.error("Handshake error:", e);
986
+ }
987
+ }
988
+ };
989
+ clientWs.addEventListener("message", handler);
990
+ setTimeout(() => {
991
+ clientWs.removeEventListener("message", handler);
992
+ resolve();
993
+ }, 10000);
994
+ });
995
+
996
+ expect(handshakeComplete).toBe(true);
997
+ expect(browserSessionKeys).not.toBeNull();
998
+ expect(machineHandshakeComplete).toBe(true);
999
+
1000
+ // Test encrypted data exchange
1001
+ const testData = new TextEncoder().encode("Hello from browser!");
1002
+ const frame = await createFrame(MASTER_STREAM_ID, testData, browserSessionKeys!.sendKey);
1003
+
1004
+ clientWs.send(JSON.stringify({
1005
+ type: "data",
1006
+ data: btoa(String.fromCharCode(...frame)),
1007
+ }));
1008
+
1009
+ // Give time for data to reach machine
1010
+ await new Promise((r) => setTimeout(r, 200));
1011
+
1012
+ clientWs.close();
1013
+ machineWs.close();
1014
+ });
1015
+ });
1016
+
1017
+ // ============================================================================
1018
+ // Part 4: Regression Tests
1019
+ // ============================================================================
1020
+
1021
+ describe("Regression: Handshake Message Parsing", () => {
1022
+ /**
1023
+ * Regression test for race condition bug:
1024
+ * Session keys are stored when sending client_auth, BEFORE server_auth arrives.
1025
+ * The handleDataMessage function must correctly parse JSON handshake messages
1026
+ * even when session keys are already set, otherwise it will try to decrypt
1027
+ * the JSON as an encrypted frame and fail.
1028
+ */
1029
+ test("server_auth is correctly parsed as JSON when session keys are already set", async () => {
1030
+ // Simulate the browser's handleDataMessage logic
1031
+ const sessionKeys = deriveSessionKeys(randomBytes(32), randomBytes(32), true);
1032
+
1033
+ // Create a mock server_auth message (what the machine sends)
1034
+ const serverAuth = {
1035
+ type: "handshake",
1036
+ phase: "server_auth",
1037
+ data: {
1038
+ version: 1,
1039
+ identityKey: btoa(String.fromCharCode(...randomBytes(32))),
1040
+ identityProof: btoa(String.fromCharCode(...randomBytes(32))),
1041
+ result: { type: "accepted", permissions: { read: true, write: true, manage: false } },
1042
+ },
1043
+ };
1044
+
1045
+ // Encode as base64 (like relay does)
1046
+ const base64Data = btoa(JSON.stringify(serverAuth));
1047
+
1048
+ // Decode and check - this is the critical path that was buggy
1049
+ const bytes = Uint8Array.from(atob(base64Data), c => c.charCodeAt(0));
1050
+
1051
+ // The fix: try JSON parsing first, regardless of session keys
1052
+ let isHandshakeMessage = false;
1053
+ let parsedPhase: string | null = null;
1054
+
1055
+ try {
1056
+ const jsonStr = new TextDecoder().decode(bytes);
1057
+ const envelope = JSON.parse(jsonStr);
1058
+
1059
+ if (envelope.type === "handshake") {
1060
+ isHandshakeMessage = true;
1061
+ parsedPhase = envelope.phase;
1062
+ }
1063
+ } catch {
1064
+ // Not JSON - would be encrypted data
1065
+ }
1066
+
1067
+ expect(isHandshakeMessage).toBe(true);
1068
+ expect(parsedPhase).toBe("server_auth");
1069
+
1070
+ // Verify that trying to decrypt as frame would fail
1071
+ // (this is what the old buggy code would do)
1072
+ const decryptResult = await openFrame(bytes, sessionKeys.receiveKey);
1073
+ expect(decryptResult).toBeNull();
1074
+ });
1075
+
1076
+ test("encrypted frames are correctly decrypted when session keys are set", async () => {
1077
+ const sessionKeys = deriveSessionKeys(randomBytes(32), randomBytes(32), true);
1078
+
1079
+ // Create an encrypted frame (what PTY output looks like)
1080
+ const plaintext = new TextEncoder().encode("Hello from terminal!");
1081
+ const frame = await createFrame(MASTER_STREAM_ID, plaintext, sessionKeys.sendKey);
1082
+
1083
+ // This is NOT valid JSON, so JSON parsing should fail
1084
+ let isHandshakeMessage = false;
1085
+
1086
+ try {
1087
+ const jsonStr = new TextDecoder().decode(frame);
1088
+ const envelope = JSON.parse(jsonStr);
1089
+ if (envelope.type === "handshake") {
1090
+ isHandshakeMessage = true;
1091
+ }
1092
+ } catch {
1093
+ // Expected - encrypted data is not valid JSON
1094
+ }
1095
+
1096
+ expect(isHandshakeMessage).toBe(false);
1097
+
1098
+ // But decryption should work (using receiveKey since we encrypted with sendKey, simulating peer)
1099
+ const decryptResult = await openFrame(frame, sessionKeys.sendKey);
1100
+ expect(decryptResult).not.toBeNull();
1101
+ expect(new TextDecoder().decode(decryptResult!.data)).toBe("Hello from terminal!");
1102
+ });
1103
+
1104
+ test("handshake and encrypted data can be correctly distinguished", async () => {
1105
+ const sessionKeys = deriveSessionKeys(randomBytes(32), randomBytes(32), true);
1106
+
1107
+ // Test both message types in sequence
1108
+ const messages = [
1109
+ // server_auth arrives first (JSON handshake)
1110
+ btoa(JSON.stringify({
1111
+ type: "handshake",
1112
+ phase: "server_auth",
1113
+ data: {
1114
+ version: 1,
1115
+ identityKey: btoa(String.fromCharCode(...randomBytes(32))),
1116
+ identityProof: btoa(String.fromCharCode(...randomBytes(32))),
1117
+ result: { type: "accepted", permissions: { read: true, write: true, manage: false } },
1118
+ },
1119
+ })),
1120
+ // Then encrypted PTY output arrives
1121
+ btoa(String.fromCharCode(...await createFrame(
1122
+ MASTER_STREAM_ID,
1123
+ new TextEncoder().encode("$ "),
1124
+ sessionKeys.sendKey
1125
+ ))),
1126
+ ];
1127
+
1128
+ const results: Array<{ type: "handshake" | "encrypted"; data?: string }> = [];
1129
+
1130
+ for (const base64Data of messages) {
1131
+ const bytes = Uint8Array.from(atob(base64Data), c => c.charCodeAt(0));
1132
+
1133
+ // Try JSON first (the fix)
1134
+ try {
1135
+ const jsonStr = new TextDecoder().decode(bytes);
1136
+ const envelope = JSON.parse(jsonStr);
1137
+
1138
+ if (envelope.type === "handshake") {
1139
+ results.push({ type: "handshake" });
1140
+ continue;
1141
+ }
1142
+ } catch {
1143
+ // Not JSON
1144
+ }
1145
+
1146
+ // Try decryption
1147
+ const frame = await openFrame(bytes, sessionKeys.sendKey);
1148
+ if (frame) {
1149
+ results.push({ type: "encrypted", data: new TextDecoder().decode(frame.data) });
1150
+ }
1151
+ }
1152
+
1153
+ expect(results).toHaveLength(2);
1154
+ expect(results[0].type).toBe("handshake");
1155
+ expect(results[1].type).toBe("encrypted");
1156
+ expect(results[1].data).toBe("$ ");
1157
+ });
1158
+ });