gitspace 0.2.0-rc.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.claude/settings.local.json +21 -0
- package/.gitspace/bundle.json +50 -0
- package/.gitspace/select/01-status.sh +40 -0
- package/.gitspace/setup/01-install-deps.sh +12 -0
- package/.gitspace/setup/02-typecheck.sh +16 -0
- package/AGENTS.md +439 -0
- package/CLAUDE.md +1 -0
- package/LICENSE +25 -0
- package/README.md +607 -0
- package/bin/gssh +62 -0
- package/bun.lock +647 -0
- package/docs/CONNECTION.md +623 -0
- package/docs/GATEWAY-WORKER.md +319 -0
- package/docs/GETTING-STARTED.md +448 -0
- package/docs/GITSPACE-PLATFORM.md +1819 -0
- package/docs/INFRASTRUCTURE.md +1347 -0
- package/docs/PROTOCOL.md +619 -0
- package/docs/QUICKSTART.md +174 -0
- package/docs/RELAY.md +327 -0
- package/docs/REMOTE-DESIGN.md +549 -0
- package/docs/ROADMAP.md +564 -0
- package/docs/SITE_DOCS_FIGMA_MAKE.md +1167 -0
- package/docs/STACK-DESIGN.md +588 -0
- package/docs/UNIFIED_ARCHITECTURE.md +292 -0
- package/experiments/pty-benchmark.ts +148 -0
- package/experiments/pty-latency.ts +100 -0
- package/experiments/router/client.ts +199 -0
- package/experiments/router/protocol.ts +74 -0
- package/experiments/router/router.ts +217 -0
- package/experiments/router/session.ts +180 -0
- package/experiments/router/test.ts +133 -0
- package/experiments/socket-bandwidth.ts +77 -0
- package/homebrew/gitspace.rb +45 -0
- package/landing-page/ATTRIBUTIONS.md +3 -0
- package/landing-page/README.md +11 -0
- package/landing-page/bun.lock +801 -0
- package/landing-page/guidelines/Guidelines.md +61 -0
- package/landing-page/index.html +37 -0
- package/landing-page/package.json +90 -0
- package/landing-page/postcss.config.mjs +15 -0
- package/landing-page/public/_redirects +1 -0
- package/landing-page/public/favicon.png +0 -0
- package/landing-page/src/app/App.tsx +53 -0
- package/landing-page/src/app/components/figma/ImageWithFallback.tsx +27 -0
- package/landing-page/src/app/components/ui/accordion.tsx +66 -0
- package/landing-page/src/app/components/ui/alert-dialog.tsx +157 -0
- package/landing-page/src/app/components/ui/alert.tsx +66 -0
- package/landing-page/src/app/components/ui/aspect-ratio.tsx +11 -0
- package/landing-page/src/app/components/ui/avatar.tsx +53 -0
- package/landing-page/src/app/components/ui/badge.tsx +46 -0
- package/landing-page/src/app/components/ui/breadcrumb.tsx +109 -0
- package/landing-page/src/app/components/ui/button.tsx +57 -0
- package/landing-page/src/app/components/ui/calendar.tsx +75 -0
- package/landing-page/src/app/components/ui/card.tsx +92 -0
- package/landing-page/src/app/components/ui/carousel.tsx +241 -0
- package/landing-page/src/app/components/ui/chart.tsx +353 -0
- package/landing-page/src/app/components/ui/checkbox.tsx +32 -0
- package/landing-page/src/app/components/ui/collapsible.tsx +33 -0
- package/landing-page/src/app/components/ui/command.tsx +177 -0
- package/landing-page/src/app/components/ui/context-menu.tsx +252 -0
- package/landing-page/src/app/components/ui/dialog.tsx +135 -0
- package/landing-page/src/app/components/ui/drawer.tsx +132 -0
- package/landing-page/src/app/components/ui/dropdown-menu.tsx +257 -0
- package/landing-page/src/app/components/ui/form.tsx +168 -0
- package/landing-page/src/app/components/ui/hover-card.tsx +44 -0
- package/landing-page/src/app/components/ui/input-otp.tsx +77 -0
- package/landing-page/src/app/components/ui/input.tsx +21 -0
- package/landing-page/src/app/components/ui/label.tsx +24 -0
- package/landing-page/src/app/components/ui/menubar.tsx +276 -0
- package/landing-page/src/app/components/ui/navigation-menu.tsx +168 -0
- package/landing-page/src/app/components/ui/pagination.tsx +127 -0
- package/landing-page/src/app/components/ui/popover.tsx +48 -0
- package/landing-page/src/app/components/ui/progress.tsx +31 -0
- package/landing-page/src/app/components/ui/radio-group.tsx +45 -0
- package/landing-page/src/app/components/ui/resizable.tsx +56 -0
- package/landing-page/src/app/components/ui/scroll-area.tsx +58 -0
- package/landing-page/src/app/components/ui/select.tsx +189 -0
- package/landing-page/src/app/components/ui/separator.tsx +28 -0
- package/landing-page/src/app/components/ui/sheet.tsx +139 -0
- package/landing-page/src/app/components/ui/sidebar.tsx +726 -0
- package/landing-page/src/app/components/ui/skeleton.tsx +13 -0
- package/landing-page/src/app/components/ui/slider.tsx +63 -0
- package/landing-page/src/app/components/ui/sonner.tsx +25 -0
- package/landing-page/src/app/components/ui/switch.tsx +31 -0
- package/landing-page/src/app/components/ui/table.tsx +116 -0
- package/landing-page/src/app/components/ui/tabs.tsx +66 -0
- package/landing-page/src/app/components/ui/textarea.tsx +18 -0
- package/landing-page/src/app/components/ui/toggle-group.tsx +73 -0
- package/landing-page/src/app/components/ui/toggle.tsx +47 -0
- package/landing-page/src/app/components/ui/tooltip.tsx +61 -0
- package/landing-page/src/app/components/ui/use-mobile.ts +21 -0
- package/landing-page/src/app/components/ui/utils.ts +6 -0
- package/landing-page/src/components/docs/DocsContent.tsx +718 -0
- package/landing-page/src/components/docs/DocsSidebar.tsx +84 -0
- package/landing-page/src/components/landing/CTA.tsx +59 -0
- package/landing-page/src/components/landing/Comparison.tsx +84 -0
- package/landing-page/src/components/landing/FaultyTerminal.tsx +424 -0
- package/landing-page/src/components/landing/Features.tsx +201 -0
- package/landing-page/src/components/landing/Hero.tsx +142 -0
- package/landing-page/src/components/landing/Pricing.tsx +140 -0
- package/landing-page/src/components/landing/Roadmap.tsx +86 -0
- package/landing-page/src/components/landing/Security.tsx +81 -0
- package/landing-page/src/components/landing/TerminalWindow.tsx +27 -0
- package/landing-page/src/components/landing/UseCases.tsx +55 -0
- package/landing-page/src/components/landing/Workflow.tsx +101 -0
- package/landing-page/src/components/layout/DashboardNavbar.tsx +37 -0
- package/landing-page/src/components/layout/Footer.tsx +55 -0
- package/landing-page/src/components/layout/LandingNavbar.tsx +82 -0
- package/landing-page/src/components/ui/badge.tsx +39 -0
- package/landing-page/src/components/ui/breadcrumb.tsx +115 -0
- package/landing-page/src/components/ui/button.tsx +57 -0
- package/landing-page/src/components/ui/card.tsx +79 -0
- package/landing-page/src/components/ui/mock-terminal.tsx +68 -0
- package/landing-page/src/components/ui/separator.tsx +28 -0
- package/landing-page/src/lib/utils.ts +6 -0
- package/landing-page/src/main.tsx +10 -0
- package/landing-page/src/pages/Dashboard.tsx +133 -0
- package/landing-page/src/pages/DocsPage.tsx +79 -0
- package/landing-page/src/pages/LandingPage.tsx +31 -0
- package/landing-page/src/pages/TerminalView.tsx +106 -0
- package/landing-page/src/styles/fonts.css +0 -0
- package/landing-page/src/styles/index.css +3 -0
- package/landing-page/src/styles/tailwind.css +4 -0
- package/landing-page/src/styles/theme.css +181 -0
- package/landing-page/vite.config.ts +19 -0
- package/npm/darwin-arm64/bin/gssh +0 -0
- package/npm/darwin-arm64/package.json +20 -0
- package/package.json +74 -0
- package/scripts/build.ts +284 -0
- package/scripts/release.ts +140 -0
- package/src/__tests__/test-utils.ts +298 -0
- package/src/commands/__tests__/serve-messages.test.ts +190 -0
- package/src/commands/access.ts +298 -0
- package/src/commands/add.ts +452 -0
- package/src/commands/auth.ts +364 -0
- package/src/commands/connect.ts +287 -0
- package/src/commands/directory.ts +16 -0
- package/src/commands/host.ts +396 -0
- package/src/commands/identity.ts +184 -0
- package/src/commands/list.ts +200 -0
- package/src/commands/relay.ts +315 -0
- package/src/commands/remove.ts +241 -0
- package/src/commands/serve.ts +1493 -0
- package/src/commands/share.ts +456 -0
- package/src/commands/status.ts +125 -0
- package/src/commands/switch.ts +353 -0
- package/src/commands/tmux.ts +317 -0
- package/src/core/__tests__/access.test.ts +240 -0
- package/src/core/access.ts +277 -0
- package/src/core/bundle.ts +342 -0
- package/src/core/config.ts +510 -0
- package/src/core/git.ts +317 -0
- package/src/core/github.ts +151 -0
- package/src/core/identity.ts +631 -0
- package/src/core/linear.ts +225 -0
- package/src/core/shell.ts +161 -0
- package/src/core/trusted-relays.ts +315 -0
- package/src/index.ts +821 -0
- package/src/lib/remote-session/index.ts +7 -0
- package/src/lib/remote-session/protocol.ts +267 -0
- package/src/lib/remote-session/session-handler.ts +581 -0
- package/src/lib/remote-session/workspace-scanner.ts +167 -0
- package/src/lib/tmux-lite/README.md +81 -0
- package/src/lib/tmux-lite/cli.ts +796 -0
- package/src/lib/tmux-lite/crypto/__tests__/helpers/handshake-runner.ts +349 -0
- package/src/lib/tmux-lite/crypto/__tests__/helpers/mock-relay.ts +291 -0
- package/src/lib/tmux-lite/crypto/__tests__/helpers/test-identities.ts +142 -0
- package/src/lib/tmux-lite/crypto/__tests__/integration/authorization.integration.test.ts +339 -0
- package/src/lib/tmux-lite/crypto/__tests__/integration/e2e-communication.integration.test.ts +477 -0
- package/src/lib/tmux-lite/crypto/__tests__/integration/error-handling.integration.test.ts +499 -0
- package/src/lib/tmux-lite/crypto/__tests__/integration/handshake.integration.test.ts +371 -0
- package/src/lib/tmux-lite/crypto/__tests__/integration/security.integration.test.ts +573 -0
- package/src/lib/tmux-lite/crypto/access-control.test.ts +512 -0
- package/src/lib/tmux-lite/crypto/access-control.ts +320 -0
- package/src/lib/tmux-lite/crypto/frames.test.ts +262 -0
- package/src/lib/tmux-lite/crypto/frames.ts +141 -0
- package/src/lib/tmux-lite/crypto/handshake.ts +894 -0
- package/src/lib/tmux-lite/crypto/identity.test.ts +220 -0
- package/src/lib/tmux-lite/crypto/identity.ts +286 -0
- package/src/lib/tmux-lite/crypto/index.ts +51 -0
- package/src/lib/tmux-lite/crypto/invites.test.ts +381 -0
- package/src/lib/tmux-lite/crypto/invites.ts +215 -0
- package/src/lib/tmux-lite/crypto/keyexchange.ts +435 -0
- package/src/lib/tmux-lite/crypto/keys.test.ts +58 -0
- package/src/lib/tmux-lite/crypto/keys.ts +47 -0
- package/src/lib/tmux-lite/crypto/secretbox.test.ts +169 -0
- package/src/lib/tmux-lite/crypto/secretbox.ts +124 -0
- package/src/lib/tmux-lite/handshake-handler.ts +451 -0
- package/src/lib/tmux-lite/protocol.test.ts +307 -0
- package/src/lib/tmux-lite/protocol.ts +266 -0
- package/src/lib/tmux-lite/relay-client.ts +506 -0
- package/src/lib/tmux-lite/server.ts +1250 -0
- package/src/lib/tmux-lite/shell-integration.sh +37 -0
- package/src/lib/tmux-lite/terminal-queries.test.ts +54 -0
- package/src/lib/tmux-lite/terminal-queries.ts +49 -0
- package/src/relay/__tests__/e2e-flow.test.ts +1284 -0
- package/src/relay/__tests__/helpers/auth.ts +354 -0
- package/src/relay/__tests__/helpers/ports.ts +51 -0
- package/src/relay/__tests__/protocol-validation.test.ts +265 -0
- package/src/relay/authorization.ts +303 -0
- package/src/relay/embedded-assets.generated.d.ts +15 -0
- package/src/relay/identity.ts +352 -0
- package/src/relay/index.ts +57 -0
- package/src/relay/pipes.test.ts +427 -0
- package/src/relay/pipes.ts +195 -0
- package/src/relay/protocol.ts +804 -0
- package/src/relay/registries.test.ts +437 -0
- package/src/relay/registries.ts +593 -0
- package/src/relay/server.test.ts +1323 -0
- package/src/relay/server.ts +1092 -0
- package/src/relay/signing.ts +238 -0
- package/src/relay/types.ts +69 -0
- package/src/serve/client-session-manager.ts +622 -0
- package/src/serve/daemon.ts +497 -0
- package/src/serve/pty-session.ts +236 -0
- package/src/serve/types.ts +169 -0
- package/src/shared/components/Flow.tsx +453 -0
- package/src/shared/components/Flow.tui.tsx +343 -0
- package/src/shared/components/Flow.web.tsx +442 -0
- package/src/shared/components/Inbox.tsx +446 -0
- package/src/shared/components/Inbox.tui.tsx +262 -0
- package/src/shared/components/Inbox.web.tsx +329 -0
- package/src/shared/components/MachineList.tsx +187 -0
- package/src/shared/components/MachineList.tui.tsx +161 -0
- package/src/shared/components/MachineList.web.tsx +210 -0
- package/src/shared/components/ProjectList.tsx +176 -0
- package/src/shared/components/ProjectList.tui.tsx +109 -0
- package/src/shared/components/ProjectList.web.tsx +143 -0
- package/src/shared/components/SpacesBrowser.tsx +332 -0
- package/src/shared/components/SpacesBrowser.tui.tsx +163 -0
- package/src/shared/components/SpacesBrowser.web.tsx +221 -0
- package/src/shared/components/index.ts +103 -0
- package/src/shared/hooks/index.ts +16 -0
- package/src/shared/hooks/useNavigation.ts +226 -0
- package/src/shared/index.ts +122 -0
- package/src/shared/providers/LocalMachineProvider.ts +425 -0
- package/src/shared/providers/MachineProvider.ts +165 -0
- package/src/shared/providers/RemoteMachineProvider.ts +444 -0
- package/src/shared/providers/index.ts +26 -0
- package/src/shared/types.ts +145 -0
- package/src/tui/adapters.ts +120 -0
- package/src/tui/app.tsx +1816 -0
- package/src/tui/components/Terminal.tsx +580 -0
- package/src/tui/hooks/index.ts +35 -0
- package/src/tui/hooks/useAppState.ts +314 -0
- package/src/tui/hooks/useDaemonStatus.ts +174 -0
- package/src/tui/hooks/useInboxTUI.ts +113 -0
- package/src/tui/hooks/useRemoteMachines.ts +209 -0
- package/src/tui/index.ts +24 -0
- package/src/tui/state.ts +299 -0
- package/src/tui/terminal-bracketed-paste.test.ts +45 -0
- package/src/tui/terminal-bracketed-paste.ts +47 -0
- package/src/types/bundle.ts +112 -0
- package/src/types/config.ts +89 -0
- package/src/types/errors.ts +206 -0
- package/src/types/identity.ts +284 -0
- package/src/types/workspace-fuzzy.ts +49 -0
- package/src/types/workspace.ts +151 -0
- package/src/utils/bun-socket-writer.ts +80 -0
- package/src/utils/deps.ts +127 -0
- package/src/utils/fuzzy-match.ts +125 -0
- package/src/utils/logger.ts +127 -0
- package/src/utils/markdown.ts +254 -0
- package/src/utils/onboarding.ts +229 -0
- package/src/utils/prompts.ts +114 -0
- package/src/utils/run-commands.ts +112 -0
- package/src/utils/run-scripts.ts +142 -0
- package/src/utils/sanitize.ts +98 -0
- package/src/utils/secrets.ts +122 -0
- package/src/utils/shell-escape.ts +40 -0
- package/src/utils/utf8.ts +79 -0
- package/src/utils/workspace-state.ts +47 -0
- package/src/web/README.md +73 -0
- package/src/web/bun.lock +575 -0
- package/src/web/eslint.config.js +23 -0
- package/src/web/index.html +16 -0
- package/src/web/package.json +37 -0
- package/src/web/public/vite.svg +1 -0
- package/src/web/src/App.tsx +604 -0
- package/src/web/src/assets/react.svg +1 -0
- package/src/web/src/components/Terminal.tsx +207 -0
- package/src/web/src/hooks/useRelayConnection.ts +224 -0
- package/src/web/src/hooks/useTerminal.ts +699 -0
- package/src/web/src/index.css +55 -0
- package/src/web/src/lib/crypto/__tests__/web-terminal.test.ts +1158 -0
- package/src/web/src/lib/crypto/frames.ts +205 -0
- package/src/web/src/lib/crypto/handshake.ts +396 -0
- package/src/web/src/lib/crypto/identity.ts +128 -0
- package/src/web/src/lib/crypto/keyexchange.ts +246 -0
- package/src/web/src/lib/crypto/relay-signing.ts +53 -0
- package/src/web/src/lib/invite.ts +58 -0
- package/src/web/src/lib/storage/identity-store.ts +94 -0
- package/src/web/src/main.tsx +10 -0
- package/src/web/src/types/identity.ts +45 -0
- package/src/web/tsconfig.app.json +28 -0
- package/src/web/tsconfig.json +7 -0
- package/src/web/tsconfig.node.json +26 -0
- package/src/web/vite.config.ts +31 -0
- package/todo-security.md +92 -0
- package/tsconfig.json +23 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/12b7107e435bf1b9a8713a7f320472a63e543104d633d89a26f8d21f4e4ef182.sqlite +0 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/12b7107e435bf1b9a8713a7f320472a63e543104d633d89a26f8d21f4e4ef182.sqlite-shm +0 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/12b7107e435bf1b9a8713a7f320472a63e543104d633d89a26f8d21f4e4ef182.sqlite-wal +0 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/1a1ac3db1ab86ecf712f90322868a9aabc2c7dc9fe2dfbe94f9b075096276b0f.sqlite +0 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/1a1ac3db1ab86ecf712f90322868a9aabc2c7dc9fe2dfbe94f9b075096276b0f.sqlite-shm +0 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/1a1ac3db1ab86ecf712f90322868a9aabc2c7dc9fe2dfbe94f9b075096276b0f.sqlite-wal +0 -0
- package/worker/bun.lock +237 -0
- package/worker/package.json +22 -0
- package/worker/schema.sql +96 -0
- package/worker/src/handlers/auth.ts +451 -0
- package/worker/src/handlers/subdomains.ts +376 -0
- package/worker/src/handlers/user.ts +98 -0
- package/worker/src/index.ts +70 -0
- package/worker/src/middleware/auth.ts +152 -0
- package/worker/src/services/cloudflare.ts +609 -0
- package/worker/src/types.ts +96 -0
- package/worker/tsconfig.json +15 -0
- package/worker/wrangler.toml +26 -0
|
@@ -0,0 +1,220 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Tests for identity cryptography module
|
|
3
|
+
*/
|
|
4
|
+
|
|
5
|
+
import { describe, expect, test } from "bun:test";
|
|
6
|
+
import {
|
|
7
|
+
generateSigningKeypair,
|
|
8
|
+
generateKeyExchangeKeypair,
|
|
9
|
+
generateIdentity,
|
|
10
|
+
deriveIdentityId,
|
|
11
|
+
sign,
|
|
12
|
+
verify,
|
|
13
|
+
serializeIdentity,
|
|
14
|
+
deserializeIdentity,
|
|
15
|
+
getPublicIdentity,
|
|
16
|
+
} from "./identity";
|
|
17
|
+
|
|
18
|
+
describe("Identity - Keypair Generation", () => {
|
|
19
|
+
test("generateSigningKeypair creates valid Ed25519 keypair", () => {
|
|
20
|
+
const keypair = generateSigningKeypair();
|
|
21
|
+
expect(keypair.publicKey).toBeInstanceOf(Uint8Array);
|
|
22
|
+
expect(keypair.publicKey.length).toBe(32);
|
|
23
|
+
expect(keypair.secretKey).toBeInstanceOf(Uint8Array);
|
|
24
|
+
expect(keypair.secretKey.length).toBe(64);
|
|
25
|
+
});
|
|
26
|
+
|
|
27
|
+
test("generateKeyExchangeKeypair creates valid X25519 keypair", () => {
|
|
28
|
+
const keypair = generateKeyExchangeKeypair();
|
|
29
|
+
expect(keypair.publicKey).toBeInstanceOf(Uint8Array);
|
|
30
|
+
expect(keypair.publicKey.length).toBe(32);
|
|
31
|
+
expect(keypair.privateKey).toBeInstanceOf(Uint8Array);
|
|
32
|
+
expect(keypair.privateKey.length).toBe(32);
|
|
33
|
+
});
|
|
34
|
+
|
|
35
|
+
test("generateIdentity creates complete identity", () => {
|
|
36
|
+
const identity = generateIdentity("Test Label");
|
|
37
|
+
expect(identity.id).toBeTruthy();
|
|
38
|
+
expect(identity.id.length).toBe(16);
|
|
39
|
+
expect(identity.label).toBe("Test Label");
|
|
40
|
+
expect(identity.createdAt).toBeGreaterThan(0);
|
|
41
|
+
expect(identity.signing.publicKey.length).toBe(32);
|
|
42
|
+
expect(identity.signing.secretKey.length).toBe(64);
|
|
43
|
+
expect(identity.keyExchange.publicKey.length).toBe(32);
|
|
44
|
+
expect(identity.keyExchange.privateKey.length).toBe(32);
|
|
45
|
+
});
|
|
46
|
+
|
|
47
|
+
test("generateIdentity creates identity without label", () => {
|
|
48
|
+
const identity = generateIdentity();
|
|
49
|
+
expect(identity.id).toBeTruthy();
|
|
50
|
+
expect(identity.label).toBeUndefined();
|
|
51
|
+
});
|
|
52
|
+
});
|
|
53
|
+
|
|
54
|
+
describe("Identity - ID Derivation", () => {
|
|
55
|
+
test("deriveIdentityId produces 16 character base64url string", () => {
|
|
56
|
+
const keypair = generateSigningKeypair();
|
|
57
|
+
const id = deriveIdentityId(keypair.publicKey);
|
|
58
|
+
expect(id.length).toBe(16);
|
|
59
|
+
expect(id).toMatch(/^[A-Za-z0-9_-]+$/); // base64url chars
|
|
60
|
+
});
|
|
61
|
+
|
|
62
|
+
test("deriveIdentityId is deterministic", () => {
|
|
63
|
+
const keypair = generateSigningKeypair();
|
|
64
|
+
const id1 = deriveIdentityId(keypair.publicKey);
|
|
65
|
+
const id2 = deriveIdentityId(keypair.publicKey);
|
|
66
|
+
expect(id1).toBe(id2);
|
|
67
|
+
});
|
|
68
|
+
|
|
69
|
+
test("deriveIdentityId throws on invalid key length", () => {
|
|
70
|
+
const invalidKey = new Uint8Array(31); // Wrong length
|
|
71
|
+
expect(() => deriveIdentityId(invalidKey)).toThrow();
|
|
72
|
+
});
|
|
73
|
+
|
|
74
|
+
test("identity ID matches derived ID", () => {
|
|
75
|
+
const identity = generateIdentity();
|
|
76
|
+
const derivedId = deriveIdentityId(identity.signing.publicKey);
|
|
77
|
+
expect(identity.id).toBe(derivedId);
|
|
78
|
+
});
|
|
79
|
+
});
|
|
80
|
+
|
|
81
|
+
describe("Identity - Signing and Verification", () => {
|
|
82
|
+
test("sign creates 64-byte signature", () => {
|
|
83
|
+
const keypair = generateSigningKeypair();
|
|
84
|
+
const message = new TextEncoder().encode("Hello, World!");
|
|
85
|
+
const signature = sign(message, keypair.secretKey);
|
|
86
|
+
expect(signature).toBeInstanceOf(Uint8Array);
|
|
87
|
+
expect(signature.length).toBe(64);
|
|
88
|
+
});
|
|
89
|
+
|
|
90
|
+
test("verify accepts valid signature", () => {
|
|
91
|
+
const keypair = generateSigningKeypair();
|
|
92
|
+
const message = new TextEncoder().encode("Test message");
|
|
93
|
+
const signature = sign(message, keypair.secretKey);
|
|
94
|
+
const isValid = verify(message, signature, keypair.publicKey);
|
|
95
|
+
expect(isValid).toBe(true);
|
|
96
|
+
});
|
|
97
|
+
|
|
98
|
+
test("verify rejects invalid signature", () => {
|
|
99
|
+
const keypair = generateSigningKeypair();
|
|
100
|
+
const message = new TextEncoder().encode("Original message");
|
|
101
|
+
const signature = sign(message, keypair.secretKey);
|
|
102
|
+
|
|
103
|
+
const wrongMessage = new TextEncoder().encode("Wrong message");
|
|
104
|
+
const isValid = verify(wrongMessage, signature, keypair.publicKey);
|
|
105
|
+
expect(isValid).toBe(false);
|
|
106
|
+
});
|
|
107
|
+
|
|
108
|
+
test("verify rejects signature from different keypair", () => {
|
|
109
|
+
const keypair1 = generateSigningKeypair();
|
|
110
|
+
const keypair2 = generateSigningKeypair();
|
|
111
|
+
const message = new TextEncoder().encode("Test");
|
|
112
|
+
const signature = sign(message, keypair1.secretKey);
|
|
113
|
+
const isValid = verify(message, signature, keypair2.publicKey);
|
|
114
|
+
expect(isValid).toBe(false);
|
|
115
|
+
});
|
|
116
|
+
|
|
117
|
+
test("sign throws on invalid secret key length", () => {
|
|
118
|
+
const message = new TextEncoder().encode("Test");
|
|
119
|
+
const invalidKey = new Uint8Array(63);
|
|
120
|
+
expect(() => sign(message, invalidKey)).toThrow();
|
|
121
|
+
});
|
|
122
|
+
|
|
123
|
+
test("verify throws on invalid signature length", () => {
|
|
124
|
+
const keypair = generateSigningKeypair();
|
|
125
|
+
const message = new TextEncoder().encode("Test");
|
|
126
|
+
const invalidSig = new Uint8Array(63);
|
|
127
|
+
expect(() => verify(message, invalidSig, keypair.publicKey)).toThrow();
|
|
128
|
+
});
|
|
129
|
+
|
|
130
|
+
test("verify throws on invalid public key length", () => {
|
|
131
|
+
const message = new TextEncoder().encode("Test");
|
|
132
|
+
const signature = new Uint8Array(64);
|
|
133
|
+
const invalidKey = new Uint8Array(31);
|
|
134
|
+
expect(() => verify(message, signature, invalidKey)).toThrow();
|
|
135
|
+
});
|
|
136
|
+
});
|
|
137
|
+
|
|
138
|
+
describe("Identity - Serialization", () => {
|
|
139
|
+
test("serializeIdentity converts to base64 strings", () => {
|
|
140
|
+
const identity = generateIdentity("Test");
|
|
141
|
+
const stored = serializeIdentity(identity);
|
|
142
|
+
|
|
143
|
+
expect(stored.id).toBe(identity.id);
|
|
144
|
+
expect(stored.label).toBe(identity.label);
|
|
145
|
+
expect(stored.createdAt).toBe(identity.createdAt);
|
|
146
|
+
expect(typeof stored.signingPublicKey).toBe("string");
|
|
147
|
+
expect(typeof stored.signingSecretKey).toBe("string");
|
|
148
|
+
expect(typeof stored.keyExchangePublicKey).toBe("string");
|
|
149
|
+
expect(typeof stored.keyExchangePrivateKey).toBe("string");
|
|
150
|
+
});
|
|
151
|
+
|
|
152
|
+
test("deserializeIdentity restores identity", () => {
|
|
153
|
+
const original = generateIdentity("Original");
|
|
154
|
+
const stored = serializeIdentity(original);
|
|
155
|
+
const restored = deserializeIdentity(stored);
|
|
156
|
+
|
|
157
|
+
expect(restored.id).toBe(original.id);
|
|
158
|
+
expect(restored.label).toBe(original.label);
|
|
159
|
+
expect(restored.createdAt).toBe(original.createdAt);
|
|
160
|
+
expect(restored.signing.publicKey).toEqual(original.signing.publicKey);
|
|
161
|
+
expect(restored.signing.secretKey).toEqual(original.signing.secretKey);
|
|
162
|
+
expect(restored.keyExchange.publicKey).toEqual(original.keyExchange.publicKey);
|
|
163
|
+
expect(restored.keyExchange.privateKey).toEqual(original.keyExchange.privateKey);
|
|
164
|
+
});
|
|
165
|
+
|
|
166
|
+
test("deserializeIdentity validates ID match", () => {
|
|
167
|
+
const identity = generateIdentity();
|
|
168
|
+
const stored = serializeIdentity(identity);
|
|
169
|
+
|
|
170
|
+
// Tamper with ID
|
|
171
|
+
stored.id = "InvalidID1234567";
|
|
172
|
+
|
|
173
|
+
expect(() => deserializeIdentity(stored)).toThrow(/Identity ID mismatch/);
|
|
174
|
+
});
|
|
175
|
+
|
|
176
|
+
test("serialization round-trip maintains signature validity", () => {
|
|
177
|
+
const original = generateIdentity();
|
|
178
|
+
const message = new TextEncoder().encode("Test");
|
|
179
|
+
const signature = sign(message, original.signing.secretKey);
|
|
180
|
+
|
|
181
|
+
const stored = serializeIdentity(original);
|
|
182
|
+
const restored = deserializeIdentity(stored);
|
|
183
|
+
|
|
184
|
+
const isValid = verify(message, signature, restored.signing.publicKey);
|
|
185
|
+
expect(isValid).toBe(true);
|
|
186
|
+
});
|
|
187
|
+
});
|
|
188
|
+
|
|
189
|
+
describe("Identity - Public Identity Extraction", () => {
|
|
190
|
+
test("getPublicIdentity returns only public information", () => {
|
|
191
|
+
const identity = generateIdentity("Public Test");
|
|
192
|
+
const publicIdentity = getPublicIdentity(identity);
|
|
193
|
+
|
|
194
|
+
expect(publicIdentity.id).toBe(identity.id);
|
|
195
|
+
expect(publicIdentity.label).toBe(identity.label);
|
|
196
|
+
expect(typeof publicIdentity.signingPublicKey).toBe("string");
|
|
197
|
+
expect(typeof publicIdentity.keyExchangePublicKey).toBe("string");
|
|
198
|
+
|
|
199
|
+
// Ensure no secret keys are present
|
|
200
|
+
expect(publicIdentity).not.toHaveProperty("signing");
|
|
201
|
+
expect(publicIdentity).not.toHaveProperty("keyExchange");
|
|
202
|
+
expect(publicIdentity).not.toHaveProperty("createdAt");
|
|
203
|
+
});
|
|
204
|
+
|
|
205
|
+
test("public identity can be used for verification", () => {
|
|
206
|
+
const identity = generateIdentity();
|
|
207
|
+
const publicIdentity = getPublicIdentity(identity);
|
|
208
|
+
|
|
209
|
+
const message = new TextEncoder().encode("Verify me");
|
|
210
|
+
const signature = sign(message, identity.signing.secretKey);
|
|
211
|
+
|
|
212
|
+
// Decode public key from base64
|
|
213
|
+
const publicKey = new Uint8Array(
|
|
214
|
+
Buffer.from(publicIdentity.signingPublicKey, "base64")
|
|
215
|
+
);
|
|
216
|
+
|
|
217
|
+
const isValid = verify(message, signature, publicKey);
|
|
218
|
+
expect(isValid).toBe(true);
|
|
219
|
+
});
|
|
220
|
+
});
|
|
@@ -0,0 +1,286 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Identity management using Ed25519 signing and X25519 key exchange
|
|
3
|
+
*
|
|
4
|
+
* This module provides cryptographic identity generation and management:
|
|
5
|
+
* - Ed25519 for digital signatures (authentication)
|
|
6
|
+
* - X25519 for Diffie-Hellman key exchange (encryption)
|
|
7
|
+
*
|
|
8
|
+
* @module identity
|
|
9
|
+
*/
|
|
10
|
+
|
|
11
|
+
import { ed25519, x25519 } from "@noble/curves/ed25519.js";
|
|
12
|
+
import type {
|
|
13
|
+
SigningKeypair,
|
|
14
|
+
KeyExchangeKeypair,
|
|
15
|
+
Identity,
|
|
16
|
+
StoredIdentity,
|
|
17
|
+
PublicIdentity,
|
|
18
|
+
} from "../../../types/identity.js";
|
|
19
|
+
|
|
20
|
+
// ============================================================================
|
|
21
|
+
// Constants
|
|
22
|
+
// ============================================================================
|
|
23
|
+
|
|
24
|
+
/** Length of identity ID (first 16 chars of base64url encoded public key) */
|
|
25
|
+
const IDENTITY_ID_LENGTH = 16;
|
|
26
|
+
|
|
27
|
+
// ============================================================================
|
|
28
|
+
// Keypair Generation
|
|
29
|
+
// ============================================================================
|
|
30
|
+
|
|
31
|
+
/**
|
|
32
|
+
* Generate a new Ed25519 signing keypair
|
|
33
|
+
*
|
|
34
|
+
* Ed25519 is used for digital signatures to authenticate messages and identities.
|
|
35
|
+
* The secret key is 64 bytes (32-byte seed + 32-byte public key).
|
|
36
|
+
*
|
|
37
|
+
* @returns New signing keypair
|
|
38
|
+
*/
|
|
39
|
+
export function generateSigningKeypair(): SigningKeypair {
|
|
40
|
+
const privateKey = ed25519.utils.randomSecretKey();
|
|
41
|
+
const publicKey = ed25519.getPublicKey(privateKey);
|
|
42
|
+
|
|
43
|
+
// Ed25519 convention: secretKey = privateKey (32 bytes) + publicKey (32 bytes)
|
|
44
|
+
const secretKey = new Uint8Array(64);
|
|
45
|
+
secretKey.set(privateKey, 0);
|
|
46
|
+
secretKey.set(publicKey, 32);
|
|
47
|
+
|
|
48
|
+
return {
|
|
49
|
+
publicKey,
|
|
50
|
+
secretKey,
|
|
51
|
+
};
|
|
52
|
+
}
|
|
53
|
+
|
|
54
|
+
/**
|
|
55
|
+
* Generate a new X25519 key exchange keypair
|
|
56
|
+
*
|
|
57
|
+
* X25519 is used for Diffie-Hellman key exchange to establish shared secrets
|
|
58
|
+
* for encryption.
|
|
59
|
+
*
|
|
60
|
+
* @returns New key exchange keypair
|
|
61
|
+
*/
|
|
62
|
+
export function generateKeyExchangeKeypair(): KeyExchangeKeypair {
|
|
63
|
+
const privateKey = x25519.utils.randomSecretKey();
|
|
64
|
+
const publicKey = x25519.getPublicKey(privateKey);
|
|
65
|
+
|
|
66
|
+
return {
|
|
67
|
+
publicKey,
|
|
68
|
+
privateKey,
|
|
69
|
+
};
|
|
70
|
+
}
|
|
71
|
+
|
|
72
|
+
/**
|
|
73
|
+
* Generate a complete identity with both signing and key exchange keypairs
|
|
74
|
+
*
|
|
75
|
+
* Creates a new identity with:
|
|
76
|
+
* - Unique ID derived from signing public key
|
|
77
|
+
* - Ed25519 signing keypair
|
|
78
|
+
* - X25519 key exchange keypair
|
|
79
|
+
* - Optional human-readable label
|
|
80
|
+
* - Creation timestamp
|
|
81
|
+
*
|
|
82
|
+
* @param label - Optional human-readable label for this identity
|
|
83
|
+
* @returns Complete identity
|
|
84
|
+
*/
|
|
85
|
+
export function generateIdentity(label?: string): Identity {
|
|
86
|
+
const signing = generateSigningKeypair();
|
|
87
|
+
const keyExchange = generateKeyExchangeKeypair();
|
|
88
|
+
const id = deriveIdentityId(signing.publicKey);
|
|
89
|
+
|
|
90
|
+
return {
|
|
91
|
+
id,
|
|
92
|
+
signing,
|
|
93
|
+
keyExchange,
|
|
94
|
+
label,
|
|
95
|
+
createdAt: Date.now(),
|
|
96
|
+
};
|
|
97
|
+
}
|
|
98
|
+
|
|
99
|
+
// ============================================================================
|
|
100
|
+
// Identity ID Derivation
|
|
101
|
+
// ============================================================================
|
|
102
|
+
|
|
103
|
+
/**
|
|
104
|
+
* Derive a short identity ID from a signing public key
|
|
105
|
+
*
|
|
106
|
+
* Takes the first 16 characters of the base64url-encoded public key.
|
|
107
|
+
* This provides a compact, URL-safe identifier while maintaining uniqueness
|
|
108
|
+
* (collision probability ~1 in 2^96).
|
|
109
|
+
*
|
|
110
|
+
* @param signingPublicKey - Ed25519 public key (32 bytes)
|
|
111
|
+
* @returns Identity ID (16 character base64url string)
|
|
112
|
+
*/
|
|
113
|
+
export function deriveIdentityId(signingPublicKey: Uint8Array): string {
|
|
114
|
+
if (signingPublicKey.length !== 32) {
|
|
115
|
+
throw new Error(
|
|
116
|
+
`Invalid signing public key length: ${signingPublicKey.length}, expected 32`
|
|
117
|
+
);
|
|
118
|
+
}
|
|
119
|
+
|
|
120
|
+
const base64url = Buffer.from(signingPublicKey).toString("base64url");
|
|
121
|
+
return base64url.slice(0, IDENTITY_ID_LENGTH);
|
|
122
|
+
}
|
|
123
|
+
|
|
124
|
+
// ============================================================================
|
|
125
|
+
// Signing and Verification
|
|
126
|
+
// ============================================================================
|
|
127
|
+
|
|
128
|
+
/**
|
|
129
|
+
* Sign a message using Ed25519
|
|
130
|
+
*
|
|
131
|
+
* Creates a detached signature that can be verified with the corresponding
|
|
132
|
+
* public key. Signatures are deterministic (same message + key = same signature).
|
|
133
|
+
*
|
|
134
|
+
* @param message - Message to sign
|
|
135
|
+
* @param secretKey - Ed25519 secret key (64 bytes)
|
|
136
|
+
* @returns Signature (64 bytes)
|
|
137
|
+
*/
|
|
138
|
+
export function sign(message: Uint8Array, secretKey: Uint8Array): Uint8Array {
|
|
139
|
+
if (secretKey.length !== 64) {
|
|
140
|
+
throw new Error(
|
|
141
|
+
`Invalid secret key length: ${secretKey.length}, expected 64`
|
|
142
|
+
);
|
|
143
|
+
}
|
|
144
|
+
|
|
145
|
+
// Extract the 32-byte private key from the 64-byte secret key
|
|
146
|
+
const privateKey = secretKey.slice(0, 32);
|
|
147
|
+
return ed25519.sign(message, privateKey);
|
|
148
|
+
}
|
|
149
|
+
|
|
150
|
+
/**
|
|
151
|
+
* Verify an Ed25519 signature
|
|
152
|
+
*
|
|
153
|
+
* Verifies that a signature was created by the holder of the secret key
|
|
154
|
+
* corresponding to the given public key.
|
|
155
|
+
*
|
|
156
|
+
* @param message - Original message that was signed
|
|
157
|
+
* @param signature - Signature to verify (64 bytes)
|
|
158
|
+
* @param publicKey - Ed25519 public key (32 bytes)
|
|
159
|
+
* @returns True if signature is valid, false otherwise
|
|
160
|
+
*/
|
|
161
|
+
export function verify(
|
|
162
|
+
message: Uint8Array,
|
|
163
|
+
signature: Uint8Array,
|
|
164
|
+
publicKey: Uint8Array
|
|
165
|
+
): boolean {
|
|
166
|
+
if (signature.length !== 64) {
|
|
167
|
+
throw new Error(
|
|
168
|
+
`Invalid signature length: ${signature.length}, expected 64`
|
|
169
|
+
);
|
|
170
|
+
}
|
|
171
|
+
if (publicKey.length !== 32) {
|
|
172
|
+
throw new Error(
|
|
173
|
+
`Invalid public key length: ${publicKey.length}, expected 32`
|
|
174
|
+
);
|
|
175
|
+
}
|
|
176
|
+
|
|
177
|
+
try {
|
|
178
|
+
return ed25519.verify(signature, message, publicKey);
|
|
179
|
+
} catch {
|
|
180
|
+
// Invalid signature format or verification failed
|
|
181
|
+
return false;
|
|
182
|
+
}
|
|
183
|
+
}
|
|
184
|
+
|
|
185
|
+
// ============================================================================
|
|
186
|
+
// Serialization
|
|
187
|
+
// ============================================================================
|
|
188
|
+
|
|
189
|
+
/**
|
|
190
|
+
* Serialize an identity for storage
|
|
191
|
+
*
|
|
192
|
+
* Converts binary keys to base64 strings for JSON serialization.
|
|
193
|
+
* WARNING: This does NOT encrypt the secret keys. Use appropriate
|
|
194
|
+
* encryption before storing to disk.
|
|
195
|
+
*
|
|
196
|
+
* @param identity - Identity to serialize
|
|
197
|
+
* @returns Serializable identity with base64-encoded keys
|
|
198
|
+
*/
|
|
199
|
+
export function serializeIdentity(identity: Identity): StoredIdentity {
|
|
200
|
+
return {
|
|
201
|
+
id: identity.id,
|
|
202
|
+
signingPublicKey: Buffer.from(identity.signing.publicKey).toString(
|
|
203
|
+
"base64"
|
|
204
|
+
),
|
|
205
|
+
signingSecretKey: Buffer.from(identity.signing.secretKey).toString(
|
|
206
|
+
"base64"
|
|
207
|
+
),
|
|
208
|
+
keyExchangePublicKey: Buffer.from(
|
|
209
|
+
identity.keyExchange.publicKey
|
|
210
|
+
).toString("base64"),
|
|
211
|
+
keyExchangePrivateKey: Buffer.from(
|
|
212
|
+
identity.keyExchange.privateKey
|
|
213
|
+
).toString("base64"),
|
|
214
|
+
label: identity.label,
|
|
215
|
+
createdAt: identity.createdAt,
|
|
216
|
+
};
|
|
217
|
+
}
|
|
218
|
+
|
|
219
|
+
/**
|
|
220
|
+
* Deserialize a stored identity
|
|
221
|
+
*
|
|
222
|
+
* Converts base64 strings back to binary Uint8Arrays.
|
|
223
|
+
* Verifies that the identity ID matches the signing public key.
|
|
224
|
+
*
|
|
225
|
+
* @param stored - Stored identity with base64-encoded keys
|
|
226
|
+
* @returns Identity with binary keys
|
|
227
|
+
* @throws {Error} If identity ID doesn't match signing public key
|
|
228
|
+
*/
|
|
229
|
+
export function deserializeIdentity(stored: StoredIdentity): Identity {
|
|
230
|
+
const signingPublicKey = new Uint8Array(
|
|
231
|
+
Buffer.from(stored.signingPublicKey, "base64")
|
|
232
|
+
);
|
|
233
|
+
const signingSecretKey = new Uint8Array(
|
|
234
|
+
Buffer.from(stored.signingSecretKey, "base64")
|
|
235
|
+
);
|
|
236
|
+
const keyExchangePublicKey = new Uint8Array(
|
|
237
|
+
Buffer.from(stored.keyExchangePublicKey, "base64")
|
|
238
|
+
);
|
|
239
|
+
const keyExchangePrivateKey = new Uint8Array(
|
|
240
|
+
Buffer.from(stored.keyExchangePrivateKey, "base64")
|
|
241
|
+
);
|
|
242
|
+
|
|
243
|
+
// Verify identity ID matches signing public key
|
|
244
|
+
const derivedId = deriveIdentityId(signingPublicKey);
|
|
245
|
+
if (derivedId !== stored.id) {
|
|
246
|
+
throw new Error(
|
|
247
|
+
`Identity ID mismatch: stored=${stored.id}, derived=${derivedId}`
|
|
248
|
+
);
|
|
249
|
+
}
|
|
250
|
+
|
|
251
|
+
return {
|
|
252
|
+
id: stored.id,
|
|
253
|
+
signing: {
|
|
254
|
+
publicKey: signingPublicKey,
|
|
255
|
+
secretKey: signingSecretKey,
|
|
256
|
+
},
|
|
257
|
+
keyExchange: {
|
|
258
|
+
publicKey: keyExchangePublicKey,
|
|
259
|
+
privateKey: keyExchangePrivateKey,
|
|
260
|
+
},
|
|
261
|
+
label: stored.label,
|
|
262
|
+
createdAt: stored.createdAt,
|
|
263
|
+
};
|
|
264
|
+
}
|
|
265
|
+
|
|
266
|
+
/**
|
|
267
|
+
* Extract public identity information
|
|
268
|
+
*
|
|
269
|
+
* Returns only the public parts of an identity that are safe to share.
|
|
270
|
+
* This includes public keys but NOT secret/private keys.
|
|
271
|
+
*
|
|
272
|
+
* @param identity - Complete identity
|
|
273
|
+
* @returns Public identity info (safe to share)
|
|
274
|
+
*/
|
|
275
|
+
export function getPublicIdentity(identity: Identity): PublicIdentity {
|
|
276
|
+
return {
|
|
277
|
+
id: identity.id,
|
|
278
|
+
signingPublicKey: Buffer.from(identity.signing.publicKey).toString(
|
|
279
|
+
"base64"
|
|
280
|
+
),
|
|
281
|
+
keyExchangePublicKey: Buffer.from(identity.keyExchange.publicKey).toString(
|
|
282
|
+
"base64"
|
|
283
|
+
),
|
|
284
|
+
label: identity.label,
|
|
285
|
+
};
|
|
286
|
+
}
|
|
@@ -0,0 +1,51 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* E2E encryption module exports
|
|
3
|
+
*/
|
|
4
|
+
|
|
5
|
+
export {
|
|
6
|
+
generateSalt,
|
|
7
|
+
deriveKey,
|
|
8
|
+
SALT_LENGTH,
|
|
9
|
+
KEY_LENGTH,
|
|
10
|
+
} from "./keys";
|
|
11
|
+
|
|
12
|
+
export {
|
|
13
|
+
encrypt,
|
|
14
|
+
decrypt,
|
|
15
|
+
seal,
|
|
16
|
+
open,
|
|
17
|
+
generateNonce,
|
|
18
|
+
NONCE_LENGTH,
|
|
19
|
+
AUTH_TAG_LENGTH,
|
|
20
|
+
} from "./secretbox";
|
|
21
|
+
|
|
22
|
+
export {
|
|
23
|
+
encodeFrame,
|
|
24
|
+
decodeFrame,
|
|
25
|
+
peekStreamId,
|
|
26
|
+
createFrame,
|
|
27
|
+
openFrame,
|
|
28
|
+
MASTER_STREAM_ID,
|
|
29
|
+
STREAM_ID_LENGTH,
|
|
30
|
+
MIN_FRAME_LENGTH,
|
|
31
|
+
type EncryptedFrame,
|
|
32
|
+
} from "./frames";
|
|
33
|
+
|
|
34
|
+
export {
|
|
35
|
+
generateSigningKeypair,
|
|
36
|
+
generateKeyExchangeKeypair,
|
|
37
|
+
generateIdentity,
|
|
38
|
+
deriveIdentityId,
|
|
39
|
+
sign,
|
|
40
|
+
verify,
|
|
41
|
+
serializeIdentity,
|
|
42
|
+
deserializeIdentity,
|
|
43
|
+
getPublicIdentity,
|
|
44
|
+
} from "./identity";
|
|
45
|
+
|
|
46
|
+
export {
|
|
47
|
+
createInviteToken,
|
|
48
|
+
parseInviteToken,
|
|
49
|
+
getPublicIdentityFromInvite,
|
|
50
|
+
isInviteExpired,
|
|
51
|
+
} from "./invites";
|