gitspace 0.2.0-rc.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.claude/settings.local.json +21 -0
- package/.gitspace/bundle.json +50 -0
- package/.gitspace/select/01-status.sh +40 -0
- package/.gitspace/setup/01-install-deps.sh +12 -0
- package/.gitspace/setup/02-typecheck.sh +16 -0
- package/AGENTS.md +439 -0
- package/CLAUDE.md +1 -0
- package/LICENSE +25 -0
- package/README.md +607 -0
- package/bin/gssh +62 -0
- package/bun.lock +647 -0
- package/docs/CONNECTION.md +623 -0
- package/docs/GATEWAY-WORKER.md +319 -0
- package/docs/GETTING-STARTED.md +448 -0
- package/docs/GITSPACE-PLATFORM.md +1819 -0
- package/docs/INFRASTRUCTURE.md +1347 -0
- package/docs/PROTOCOL.md +619 -0
- package/docs/QUICKSTART.md +174 -0
- package/docs/RELAY.md +327 -0
- package/docs/REMOTE-DESIGN.md +549 -0
- package/docs/ROADMAP.md +564 -0
- package/docs/SITE_DOCS_FIGMA_MAKE.md +1167 -0
- package/docs/STACK-DESIGN.md +588 -0
- package/docs/UNIFIED_ARCHITECTURE.md +292 -0
- package/experiments/pty-benchmark.ts +148 -0
- package/experiments/pty-latency.ts +100 -0
- package/experiments/router/client.ts +199 -0
- package/experiments/router/protocol.ts +74 -0
- package/experiments/router/router.ts +217 -0
- package/experiments/router/session.ts +180 -0
- package/experiments/router/test.ts +133 -0
- package/experiments/socket-bandwidth.ts +77 -0
- package/homebrew/gitspace.rb +45 -0
- package/landing-page/ATTRIBUTIONS.md +3 -0
- package/landing-page/README.md +11 -0
- package/landing-page/bun.lock +801 -0
- package/landing-page/guidelines/Guidelines.md +61 -0
- package/landing-page/index.html +37 -0
- package/landing-page/package.json +90 -0
- package/landing-page/postcss.config.mjs +15 -0
- package/landing-page/public/_redirects +1 -0
- package/landing-page/public/favicon.png +0 -0
- package/landing-page/src/app/App.tsx +53 -0
- package/landing-page/src/app/components/figma/ImageWithFallback.tsx +27 -0
- package/landing-page/src/app/components/ui/accordion.tsx +66 -0
- package/landing-page/src/app/components/ui/alert-dialog.tsx +157 -0
- package/landing-page/src/app/components/ui/alert.tsx +66 -0
- package/landing-page/src/app/components/ui/aspect-ratio.tsx +11 -0
- package/landing-page/src/app/components/ui/avatar.tsx +53 -0
- package/landing-page/src/app/components/ui/badge.tsx +46 -0
- package/landing-page/src/app/components/ui/breadcrumb.tsx +109 -0
- package/landing-page/src/app/components/ui/button.tsx +57 -0
- package/landing-page/src/app/components/ui/calendar.tsx +75 -0
- package/landing-page/src/app/components/ui/card.tsx +92 -0
- package/landing-page/src/app/components/ui/carousel.tsx +241 -0
- package/landing-page/src/app/components/ui/chart.tsx +353 -0
- package/landing-page/src/app/components/ui/checkbox.tsx +32 -0
- package/landing-page/src/app/components/ui/collapsible.tsx +33 -0
- package/landing-page/src/app/components/ui/command.tsx +177 -0
- package/landing-page/src/app/components/ui/context-menu.tsx +252 -0
- package/landing-page/src/app/components/ui/dialog.tsx +135 -0
- package/landing-page/src/app/components/ui/drawer.tsx +132 -0
- package/landing-page/src/app/components/ui/dropdown-menu.tsx +257 -0
- package/landing-page/src/app/components/ui/form.tsx +168 -0
- package/landing-page/src/app/components/ui/hover-card.tsx +44 -0
- package/landing-page/src/app/components/ui/input-otp.tsx +77 -0
- package/landing-page/src/app/components/ui/input.tsx +21 -0
- package/landing-page/src/app/components/ui/label.tsx +24 -0
- package/landing-page/src/app/components/ui/menubar.tsx +276 -0
- package/landing-page/src/app/components/ui/navigation-menu.tsx +168 -0
- package/landing-page/src/app/components/ui/pagination.tsx +127 -0
- package/landing-page/src/app/components/ui/popover.tsx +48 -0
- package/landing-page/src/app/components/ui/progress.tsx +31 -0
- package/landing-page/src/app/components/ui/radio-group.tsx +45 -0
- package/landing-page/src/app/components/ui/resizable.tsx +56 -0
- package/landing-page/src/app/components/ui/scroll-area.tsx +58 -0
- package/landing-page/src/app/components/ui/select.tsx +189 -0
- package/landing-page/src/app/components/ui/separator.tsx +28 -0
- package/landing-page/src/app/components/ui/sheet.tsx +139 -0
- package/landing-page/src/app/components/ui/sidebar.tsx +726 -0
- package/landing-page/src/app/components/ui/skeleton.tsx +13 -0
- package/landing-page/src/app/components/ui/slider.tsx +63 -0
- package/landing-page/src/app/components/ui/sonner.tsx +25 -0
- package/landing-page/src/app/components/ui/switch.tsx +31 -0
- package/landing-page/src/app/components/ui/table.tsx +116 -0
- package/landing-page/src/app/components/ui/tabs.tsx +66 -0
- package/landing-page/src/app/components/ui/textarea.tsx +18 -0
- package/landing-page/src/app/components/ui/toggle-group.tsx +73 -0
- package/landing-page/src/app/components/ui/toggle.tsx +47 -0
- package/landing-page/src/app/components/ui/tooltip.tsx +61 -0
- package/landing-page/src/app/components/ui/use-mobile.ts +21 -0
- package/landing-page/src/app/components/ui/utils.ts +6 -0
- package/landing-page/src/components/docs/DocsContent.tsx +718 -0
- package/landing-page/src/components/docs/DocsSidebar.tsx +84 -0
- package/landing-page/src/components/landing/CTA.tsx +59 -0
- package/landing-page/src/components/landing/Comparison.tsx +84 -0
- package/landing-page/src/components/landing/FaultyTerminal.tsx +424 -0
- package/landing-page/src/components/landing/Features.tsx +201 -0
- package/landing-page/src/components/landing/Hero.tsx +142 -0
- package/landing-page/src/components/landing/Pricing.tsx +140 -0
- package/landing-page/src/components/landing/Roadmap.tsx +86 -0
- package/landing-page/src/components/landing/Security.tsx +81 -0
- package/landing-page/src/components/landing/TerminalWindow.tsx +27 -0
- package/landing-page/src/components/landing/UseCases.tsx +55 -0
- package/landing-page/src/components/landing/Workflow.tsx +101 -0
- package/landing-page/src/components/layout/DashboardNavbar.tsx +37 -0
- package/landing-page/src/components/layout/Footer.tsx +55 -0
- package/landing-page/src/components/layout/LandingNavbar.tsx +82 -0
- package/landing-page/src/components/ui/badge.tsx +39 -0
- package/landing-page/src/components/ui/breadcrumb.tsx +115 -0
- package/landing-page/src/components/ui/button.tsx +57 -0
- package/landing-page/src/components/ui/card.tsx +79 -0
- package/landing-page/src/components/ui/mock-terminal.tsx +68 -0
- package/landing-page/src/components/ui/separator.tsx +28 -0
- package/landing-page/src/lib/utils.ts +6 -0
- package/landing-page/src/main.tsx +10 -0
- package/landing-page/src/pages/Dashboard.tsx +133 -0
- package/landing-page/src/pages/DocsPage.tsx +79 -0
- package/landing-page/src/pages/LandingPage.tsx +31 -0
- package/landing-page/src/pages/TerminalView.tsx +106 -0
- package/landing-page/src/styles/fonts.css +0 -0
- package/landing-page/src/styles/index.css +3 -0
- package/landing-page/src/styles/tailwind.css +4 -0
- package/landing-page/src/styles/theme.css +181 -0
- package/landing-page/vite.config.ts +19 -0
- package/npm/darwin-arm64/bin/gssh +0 -0
- package/npm/darwin-arm64/package.json +20 -0
- package/package.json +74 -0
- package/scripts/build.ts +284 -0
- package/scripts/release.ts +140 -0
- package/src/__tests__/test-utils.ts +298 -0
- package/src/commands/__tests__/serve-messages.test.ts +190 -0
- package/src/commands/access.ts +298 -0
- package/src/commands/add.ts +452 -0
- package/src/commands/auth.ts +364 -0
- package/src/commands/connect.ts +287 -0
- package/src/commands/directory.ts +16 -0
- package/src/commands/host.ts +396 -0
- package/src/commands/identity.ts +184 -0
- package/src/commands/list.ts +200 -0
- package/src/commands/relay.ts +315 -0
- package/src/commands/remove.ts +241 -0
- package/src/commands/serve.ts +1493 -0
- package/src/commands/share.ts +456 -0
- package/src/commands/status.ts +125 -0
- package/src/commands/switch.ts +353 -0
- package/src/commands/tmux.ts +317 -0
- package/src/core/__tests__/access.test.ts +240 -0
- package/src/core/access.ts +277 -0
- package/src/core/bundle.ts +342 -0
- package/src/core/config.ts +510 -0
- package/src/core/git.ts +317 -0
- package/src/core/github.ts +151 -0
- package/src/core/identity.ts +631 -0
- package/src/core/linear.ts +225 -0
- package/src/core/shell.ts +161 -0
- package/src/core/trusted-relays.ts +315 -0
- package/src/index.ts +821 -0
- package/src/lib/remote-session/index.ts +7 -0
- package/src/lib/remote-session/protocol.ts +267 -0
- package/src/lib/remote-session/session-handler.ts +581 -0
- package/src/lib/remote-session/workspace-scanner.ts +167 -0
- package/src/lib/tmux-lite/README.md +81 -0
- package/src/lib/tmux-lite/cli.ts +796 -0
- package/src/lib/tmux-lite/crypto/__tests__/helpers/handshake-runner.ts +349 -0
- package/src/lib/tmux-lite/crypto/__tests__/helpers/mock-relay.ts +291 -0
- package/src/lib/tmux-lite/crypto/__tests__/helpers/test-identities.ts +142 -0
- package/src/lib/tmux-lite/crypto/__tests__/integration/authorization.integration.test.ts +339 -0
- package/src/lib/tmux-lite/crypto/__tests__/integration/e2e-communication.integration.test.ts +477 -0
- package/src/lib/tmux-lite/crypto/__tests__/integration/error-handling.integration.test.ts +499 -0
- package/src/lib/tmux-lite/crypto/__tests__/integration/handshake.integration.test.ts +371 -0
- package/src/lib/tmux-lite/crypto/__tests__/integration/security.integration.test.ts +573 -0
- package/src/lib/tmux-lite/crypto/access-control.test.ts +512 -0
- package/src/lib/tmux-lite/crypto/access-control.ts +320 -0
- package/src/lib/tmux-lite/crypto/frames.test.ts +262 -0
- package/src/lib/tmux-lite/crypto/frames.ts +141 -0
- package/src/lib/tmux-lite/crypto/handshake.ts +894 -0
- package/src/lib/tmux-lite/crypto/identity.test.ts +220 -0
- package/src/lib/tmux-lite/crypto/identity.ts +286 -0
- package/src/lib/tmux-lite/crypto/index.ts +51 -0
- package/src/lib/tmux-lite/crypto/invites.test.ts +381 -0
- package/src/lib/tmux-lite/crypto/invites.ts +215 -0
- package/src/lib/tmux-lite/crypto/keyexchange.ts +435 -0
- package/src/lib/tmux-lite/crypto/keys.test.ts +58 -0
- package/src/lib/tmux-lite/crypto/keys.ts +47 -0
- package/src/lib/tmux-lite/crypto/secretbox.test.ts +169 -0
- package/src/lib/tmux-lite/crypto/secretbox.ts +124 -0
- package/src/lib/tmux-lite/handshake-handler.ts +451 -0
- package/src/lib/tmux-lite/protocol.test.ts +307 -0
- package/src/lib/tmux-lite/protocol.ts +266 -0
- package/src/lib/tmux-lite/relay-client.ts +506 -0
- package/src/lib/tmux-lite/server.ts +1250 -0
- package/src/lib/tmux-lite/shell-integration.sh +37 -0
- package/src/lib/tmux-lite/terminal-queries.test.ts +54 -0
- package/src/lib/tmux-lite/terminal-queries.ts +49 -0
- package/src/relay/__tests__/e2e-flow.test.ts +1284 -0
- package/src/relay/__tests__/helpers/auth.ts +354 -0
- package/src/relay/__tests__/helpers/ports.ts +51 -0
- package/src/relay/__tests__/protocol-validation.test.ts +265 -0
- package/src/relay/authorization.ts +303 -0
- package/src/relay/embedded-assets.generated.d.ts +15 -0
- package/src/relay/identity.ts +352 -0
- package/src/relay/index.ts +57 -0
- package/src/relay/pipes.test.ts +427 -0
- package/src/relay/pipes.ts +195 -0
- package/src/relay/protocol.ts +804 -0
- package/src/relay/registries.test.ts +437 -0
- package/src/relay/registries.ts +593 -0
- package/src/relay/server.test.ts +1323 -0
- package/src/relay/server.ts +1092 -0
- package/src/relay/signing.ts +238 -0
- package/src/relay/types.ts +69 -0
- package/src/serve/client-session-manager.ts +622 -0
- package/src/serve/daemon.ts +497 -0
- package/src/serve/pty-session.ts +236 -0
- package/src/serve/types.ts +169 -0
- package/src/shared/components/Flow.tsx +453 -0
- package/src/shared/components/Flow.tui.tsx +343 -0
- package/src/shared/components/Flow.web.tsx +442 -0
- package/src/shared/components/Inbox.tsx +446 -0
- package/src/shared/components/Inbox.tui.tsx +262 -0
- package/src/shared/components/Inbox.web.tsx +329 -0
- package/src/shared/components/MachineList.tsx +187 -0
- package/src/shared/components/MachineList.tui.tsx +161 -0
- package/src/shared/components/MachineList.web.tsx +210 -0
- package/src/shared/components/ProjectList.tsx +176 -0
- package/src/shared/components/ProjectList.tui.tsx +109 -0
- package/src/shared/components/ProjectList.web.tsx +143 -0
- package/src/shared/components/SpacesBrowser.tsx +332 -0
- package/src/shared/components/SpacesBrowser.tui.tsx +163 -0
- package/src/shared/components/SpacesBrowser.web.tsx +221 -0
- package/src/shared/components/index.ts +103 -0
- package/src/shared/hooks/index.ts +16 -0
- package/src/shared/hooks/useNavigation.ts +226 -0
- package/src/shared/index.ts +122 -0
- package/src/shared/providers/LocalMachineProvider.ts +425 -0
- package/src/shared/providers/MachineProvider.ts +165 -0
- package/src/shared/providers/RemoteMachineProvider.ts +444 -0
- package/src/shared/providers/index.ts +26 -0
- package/src/shared/types.ts +145 -0
- package/src/tui/adapters.ts +120 -0
- package/src/tui/app.tsx +1816 -0
- package/src/tui/components/Terminal.tsx +580 -0
- package/src/tui/hooks/index.ts +35 -0
- package/src/tui/hooks/useAppState.ts +314 -0
- package/src/tui/hooks/useDaemonStatus.ts +174 -0
- package/src/tui/hooks/useInboxTUI.ts +113 -0
- package/src/tui/hooks/useRemoteMachines.ts +209 -0
- package/src/tui/index.ts +24 -0
- package/src/tui/state.ts +299 -0
- package/src/tui/terminal-bracketed-paste.test.ts +45 -0
- package/src/tui/terminal-bracketed-paste.ts +47 -0
- package/src/types/bundle.ts +112 -0
- package/src/types/config.ts +89 -0
- package/src/types/errors.ts +206 -0
- package/src/types/identity.ts +284 -0
- package/src/types/workspace-fuzzy.ts +49 -0
- package/src/types/workspace.ts +151 -0
- package/src/utils/bun-socket-writer.ts +80 -0
- package/src/utils/deps.ts +127 -0
- package/src/utils/fuzzy-match.ts +125 -0
- package/src/utils/logger.ts +127 -0
- package/src/utils/markdown.ts +254 -0
- package/src/utils/onboarding.ts +229 -0
- package/src/utils/prompts.ts +114 -0
- package/src/utils/run-commands.ts +112 -0
- package/src/utils/run-scripts.ts +142 -0
- package/src/utils/sanitize.ts +98 -0
- package/src/utils/secrets.ts +122 -0
- package/src/utils/shell-escape.ts +40 -0
- package/src/utils/utf8.ts +79 -0
- package/src/utils/workspace-state.ts +47 -0
- package/src/web/README.md +73 -0
- package/src/web/bun.lock +575 -0
- package/src/web/eslint.config.js +23 -0
- package/src/web/index.html +16 -0
- package/src/web/package.json +37 -0
- package/src/web/public/vite.svg +1 -0
- package/src/web/src/App.tsx +604 -0
- package/src/web/src/assets/react.svg +1 -0
- package/src/web/src/components/Terminal.tsx +207 -0
- package/src/web/src/hooks/useRelayConnection.ts +224 -0
- package/src/web/src/hooks/useTerminal.ts +699 -0
- package/src/web/src/index.css +55 -0
- package/src/web/src/lib/crypto/__tests__/web-terminal.test.ts +1158 -0
- package/src/web/src/lib/crypto/frames.ts +205 -0
- package/src/web/src/lib/crypto/handshake.ts +396 -0
- package/src/web/src/lib/crypto/identity.ts +128 -0
- package/src/web/src/lib/crypto/keyexchange.ts +246 -0
- package/src/web/src/lib/crypto/relay-signing.ts +53 -0
- package/src/web/src/lib/invite.ts +58 -0
- package/src/web/src/lib/storage/identity-store.ts +94 -0
- package/src/web/src/main.tsx +10 -0
- package/src/web/src/types/identity.ts +45 -0
- package/src/web/tsconfig.app.json +28 -0
- package/src/web/tsconfig.json +7 -0
- package/src/web/tsconfig.node.json +26 -0
- package/src/web/vite.config.ts +31 -0
- package/todo-security.md +92 -0
- package/tsconfig.json +23 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/12b7107e435bf1b9a8713a7f320472a63e543104d633d89a26f8d21f4e4ef182.sqlite +0 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/12b7107e435bf1b9a8713a7f320472a63e543104d633d89a26f8d21f4e4ef182.sqlite-shm +0 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/12b7107e435bf1b9a8713a7f320472a63e543104d633d89a26f8d21f4e4ef182.sqlite-wal +0 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/1a1ac3db1ab86ecf712f90322868a9aabc2c7dc9fe2dfbe94f9b075096276b0f.sqlite +0 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/1a1ac3db1ab86ecf712f90322868a9aabc2c7dc9fe2dfbe94f9b075096276b0f.sqlite-shm +0 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/1a1ac3db1ab86ecf712f90322868a9aabc2c7dc9fe2dfbe94f9b075096276b0f.sqlite-wal +0 -0
- package/worker/bun.lock +237 -0
- package/worker/package.json +22 -0
- package/worker/schema.sql +96 -0
- package/worker/src/handlers/auth.ts +451 -0
- package/worker/src/handlers/subdomains.ts +376 -0
- package/worker/src/handlers/user.ts +98 -0
- package/worker/src/index.ts +70 -0
- package/worker/src/middleware/auth.ts +152 -0
- package/worker/src/services/cloudflare.ts +609 -0
- package/worker/src/types.ts +96 -0
- package/worker/tsconfig.json +15 -0
- package/worker/wrangler.toml +26 -0
|
@@ -0,0 +1,381 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Tests for invite token creation and verification
|
|
3
|
+
*/
|
|
4
|
+
|
|
5
|
+
import { describe, it, expect } from "bun:test";
|
|
6
|
+
import { ed25519, x25519 } from "@noble/curves/ed25519.js";
|
|
7
|
+
import type { Identity } from "../../../types/identity.js";
|
|
8
|
+
import {
|
|
9
|
+
createInviteToken,
|
|
10
|
+
parseInviteToken,
|
|
11
|
+
getPublicIdentityFromInvite,
|
|
12
|
+
isInviteExpired,
|
|
13
|
+
} from "./invites.js";
|
|
14
|
+
|
|
15
|
+
/**
|
|
16
|
+
* Create a mock machine identity for testing
|
|
17
|
+
*/
|
|
18
|
+
function createMockIdentity(label = "test-machine"): Identity {
|
|
19
|
+
// Generate Ed25519 keypair for signing
|
|
20
|
+
const signingKeypair = ed25519.keygen();
|
|
21
|
+
|
|
22
|
+
// Generate X25519 keypair for key exchange
|
|
23
|
+
const keyExchangeKeypair = x25519.keygen();
|
|
24
|
+
|
|
25
|
+
// Create Ed25519 secret key (64 bytes: 32 private + 32 public)
|
|
26
|
+
const secretKey = new Uint8Array(64);
|
|
27
|
+
secretKey.set(signingKeypair.secretKey, 0);
|
|
28
|
+
secretKey.set(signingKeypair.publicKey, 32);
|
|
29
|
+
|
|
30
|
+
const id = Buffer.from(signingKeypair.publicKey)
|
|
31
|
+
.toString("base64url")
|
|
32
|
+
.slice(0, 16);
|
|
33
|
+
|
|
34
|
+
return {
|
|
35
|
+
id,
|
|
36
|
+
signing: {
|
|
37
|
+
publicKey: signingKeypair.publicKey,
|
|
38
|
+
secretKey,
|
|
39
|
+
},
|
|
40
|
+
keyExchange: {
|
|
41
|
+
publicKey: keyExchangeKeypair.publicKey,
|
|
42
|
+
privateKey: keyExchangeKeypair.secretKey,
|
|
43
|
+
},
|
|
44
|
+
label,
|
|
45
|
+
createdAt: Date.now(),
|
|
46
|
+
};
|
|
47
|
+
}
|
|
48
|
+
|
|
49
|
+
describe("invites", () => {
|
|
50
|
+
describe("createInviteToken", () => {
|
|
51
|
+
it("creates a valid base64url-encoded token", () => {
|
|
52
|
+
const identity = createMockIdentity();
|
|
53
|
+
const token = createInviteToken(identity, "wss://relay.example.com");
|
|
54
|
+
|
|
55
|
+
expect(token).toBeString();
|
|
56
|
+
expect(token.length).toBeGreaterThan(0);
|
|
57
|
+
|
|
58
|
+
// Should be valid base64url (no +, /, or =)
|
|
59
|
+
expect(token).not.toContain("+");
|
|
60
|
+
expect(token).not.toContain("/");
|
|
61
|
+
expect(token).not.toContain("=");
|
|
62
|
+
});
|
|
63
|
+
|
|
64
|
+
it("includes machine identity in token", () => {
|
|
65
|
+
const identity = createMockIdentity();
|
|
66
|
+
const encoded = createInviteToken(identity, "wss://relay.example.com");
|
|
67
|
+
const token = parseInviteToken(encoded);
|
|
68
|
+
|
|
69
|
+
expect(token).not.toBeNull();
|
|
70
|
+
expect(token!.machineId).toBe(identity.id);
|
|
71
|
+
expect(token!.machineSigningKey).toBe(
|
|
72
|
+
Buffer.from(identity.signing.publicKey).toString("base64")
|
|
73
|
+
);
|
|
74
|
+
expect(token!.machineKeyExchangeKey).toBe(
|
|
75
|
+
Buffer.from(identity.keyExchange.publicKey).toString("base64")
|
|
76
|
+
);
|
|
77
|
+
});
|
|
78
|
+
|
|
79
|
+
it("includes relay URL in token", () => {
|
|
80
|
+
const identity = createMockIdentity();
|
|
81
|
+
const relayUrl = "wss://relay.example.com";
|
|
82
|
+
const encoded = createInviteToken(identity, relayUrl);
|
|
83
|
+
const token = parseInviteToken(encoded);
|
|
84
|
+
|
|
85
|
+
expect(token).not.toBeNull();
|
|
86
|
+
expect(token!.relayUrl).toBe(relayUrl);
|
|
87
|
+
});
|
|
88
|
+
|
|
89
|
+
it("uses default access type (session-invite)", () => {
|
|
90
|
+
const identity = createMockIdentity();
|
|
91
|
+
const encoded = createInviteToken(identity, "wss://relay.example.com");
|
|
92
|
+
const token = parseInviteToken(encoded);
|
|
93
|
+
|
|
94
|
+
expect(token).not.toBeNull();
|
|
95
|
+
expect(token!.accessType).toBe('session-invite');
|
|
96
|
+
});
|
|
97
|
+
|
|
98
|
+
it("accepts custom access type", () => {
|
|
99
|
+
const identity = createMockIdentity();
|
|
100
|
+
const encoded = createInviteToken(identity, "wss://relay.example.com", {
|
|
101
|
+
accessType: 'full',
|
|
102
|
+
});
|
|
103
|
+
const token = parseInviteToken(encoded);
|
|
104
|
+
|
|
105
|
+
expect(token).not.toBeNull();
|
|
106
|
+
expect(token!.accessType).toBe('full');
|
|
107
|
+
});
|
|
108
|
+
|
|
109
|
+
it("accepts session ID for session-invite", () => {
|
|
110
|
+
const identity = createMockIdentity();
|
|
111
|
+
const encoded = createInviteToken(identity, "wss://relay.example.com", {
|
|
112
|
+
accessType: 'session-invite',
|
|
113
|
+
sessionId: 'session-123',
|
|
114
|
+
});
|
|
115
|
+
const token = parseInviteToken(encoded);
|
|
116
|
+
|
|
117
|
+
expect(token).not.toBeNull();
|
|
118
|
+
expect(token!.accessType).toBe('session-invite');
|
|
119
|
+
expect(token!.sessionId).toBe('session-123');
|
|
120
|
+
});
|
|
121
|
+
|
|
122
|
+
it("sets expiry to 24 hours by default", () => {
|
|
123
|
+
const identity = createMockIdentity();
|
|
124
|
+
const before = Date.now() + 24 * 60 * 60 * 1000;
|
|
125
|
+
const encoded = createInviteToken(identity, "wss://relay.example.com");
|
|
126
|
+
const after = Date.now() + 24 * 60 * 60 * 1000;
|
|
127
|
+
const token = parseInviteToken(encoded);
|
|
128
|
+
|
|
129
|
+
expect(token).not.toBeNull();
|
|
130
|
+
expect(token!.expiresAt).toBeGreaterThanOrEqual(before);
|
|
131
|
+
expect(token!.expiresAt).toBeLessThanOrEqual(after);
|
|
132
|
+
});
|
|
133
|
+
|
|
134
|
+
it("accepts custom validity duration", () => {
|
|
135
|
+
const identity = createMockIdentity();
|
|
136
|
+
const oneHour = 60 * 60 * 1000;
|
|
137
|
+
const before = Date.now() + oneHour;
|
|
138
|
+
const encoded = createInviteToken(identity, "wss://relay.example.com", {
|
|
139
|
+
validityMs: oneHour,
|
|
140
|
+
});
|
|
141
|
+
const after = Date.now() + oneHour;
|
|
142
|
+
const token = parseInviteToken(encoded);
|
|
143
|
+
|
|
144
|
+
expect(token).not.toBeNull();
|
|
145
|
+
expect(token!.expiresAt).toBeGreaterThanOrEqual(before);
|
|
146
|
+
expect(token!.expiresAt).toBeLessThanOrEqual(after);
|
|
147
|
+
});
|
|
148
|
+
|
|
149
|
+
it("sets singleUse to false by default", () => {
|
|
150
|
+
const identity = createMockIdentity();
|
|
151
|
+
const encoded = createInviteToken(identity, "wss://relay.example.com");
|
|
152
|
+
const token = parseInviteToken(encoded);
|
|
153
|
+
|
|
154
|
+
expect(token).not.toBeNull();
|
|
155
|
+
expect(token!.singleUse).toBe(false);
|
|
156
|
+
});
|
|
157
|
+
|
|
158
|
+
it("accepts singleUse option", () => {
|
|
159
|
+
const identity = createMockIdentity();
|
|
160
|
+
const encoded = createInviteToken(identity, "wss://relay.example.com", {
|
|
161
|
+
singleUse: true,
|
|
162
|
+
});
|
|
163
|
+
const token = parseInviteToken(encoded);
|
|
164
|
+
|
|
165
|
+
expect(token).not.toBeNull();
|
|
166
|
+
expect(token!.singleUse).toBe(true);
|
|
167
|
+
});
|
|
168
|
+
|
|
169
|
+
it("creates valid signature", () => {
|
|
170
|
+
const identity = createMockIdentity();
|
|
171
|
+
const encoded = createInviteToken(identity, "wss://relay.example.com");
|
|
172
|
+
const token = parseInviteToken(encoded);
|
|
173
|
+
|
|
174
|
+
expect(token).not.toBeNull();
|
|
175
|
+
expect(token!.signature).toBeString();
|
|
176
|
+
expect(token!.signature.length).toBeGreaterThan(0);
|
|
177
|
+
});
|
|
178
|
+
});
|
|
179
|
+
|
|
180
|
+
describe("parseInviteToken", () => {
|
|
181
|
+
it("parses valid token", () => {
|
|
182
|
+
const identity = createMockIdentity();
|
|
183
|
+
const encoded = createInviteToken(identity, "wss://relay.example.com");
|
|
184
|
+
const token = parseInviteToken(encoded);
|
|
185
|
+
|
|
186
|
+
expect(token).not.toBeNull();
|
|
187
|
+
expect(token!.version).toBe(1);
|
|
188
|
+
expect(token!.machineId).toBe(identity.id);
|
|
189
|
+
});
|
|
190
|
+
|
|
191
|
+
it("returns null for invalid base64", () => {
|
|
192
|
+
const token = parseInviteToken("not-valid-base64!!!");
|
|
193
|
+
expect(token).toBeNull();
|
|
194
|
+
});
|
|
195
|
+
|
|
196
|
+
it("returns null for invalid JSON", () => {
|
|
197
|
+
const invalidJson = Buffer.from("not json").toString("base64url");
|
|
198
|
+
const token = parseInviteToken(invalidJson);
|
|
199
|
+
expect(token).toBeNull();
|
|
200
|
+
});
|
|
201
|
+
|
|
202
|
+
it("returns null for missing fields", () => {
|
|
203
|
+
const incomplete = {
|
|
204
|
+
version: 1,
|
|
205
|
+
machineId: "test",
|
|
206
|
+
// Missing other required fields
|
|
207
|
+
};
|
|
208
|
+
const encoded = Buffer.from(JSON.stringify(incomplete)).toString(
|
|
209
|
+
"base64url"
|
|
210
|
+
);
|
|
211
|
+
const token = parseInviteToken(encoded);
|
|
212
|
+
expect(token).toBeNull();
|
|
213
|
+
});
|
|
214
|
+
|
|
215
|
+
it("returns null for invalid signature", () => {
|
|
216
|
+
const identity = createMockIdentity();
|
|
217
|
+
const encoded = createInviteToken(identity, "wss://relay.example.com");
|
|
218
|
+
|
|
219
|
+
// Decode and tamper with signature
|
|
220
|
+
const tokenJson = Buffer.from(encoded, "base64url").toString("utf-8");
|
|
221
|
+
const token = JSON.parse(tokenJson);
|
|
222
|
+
token.signature = "invalid-signature";
|
|
223
|
+
const tamperedEncoded = Buffer.from(JSON.stringify(token)).toString(
|
|
224
|
+
"base64url"
|
|
225
|
+
);
|
|
226
|
+
|
|
227
|
+
const parsed = parseInviteToken(tamperedEncoded);
|
|
228
|
+
expect(parsed).toBeNull();
|
|
229
|
+
});
|
|
230
|
+
|
|
231
|
+
it("returns null if payload was modified", () => {
|
|
232
|
+
const identity = createMockIdentity();
|
|
233
|
+
const encoded = createInviteToken(identity, "wss://relay.example.com");
|
|
234
|
+
|
|
235
|
+
// Decode and tamper with payload (keep signature)
|
|
236
|
+
const tokenJson = Buffer.from(encoded, "base64url").toString("utf-8");
|
|
237
|
+
const token = JSON.parse(tokenJson);
|
|
238
|
+
token.relayUrl = "wss://evil.example.com"; // Change payload
|
|
239
|
+
const tamperedEncoded = Buffer.from(JSON.stringify(token)).toString(
|
|
240
|
+
"base64url"
|
|
241
|
+
);
|
|
242
|
+
|
|
243
|
+
const parsed = parseInviteToken(tamperedEncoded);
|
|
244
|
+
expect(parsed).toBeNull();
|
|
245
|
+
});
|
|
246
|
+
|
|
247
|
+
it("verifies signature with correct public key", () => {
|
|
248
|
+
const identity = createMockIdentity();
|
|
249
|
+
const encoded = createInviteToken(identity, "wss://relay.example.com");
|
|
250
|
+
|
|
251
|
+
// Should succeed - signature is valid
|
|
252
|
+
const token = parseInviteToken(encoded);
|
|
253
|
+
expect(token).not.toBeNull();
|
|
254
|
+
});
|
|
255
|
+
|
|
256
|
+
it("rejects token signed with different key", () => {
|
|
257
|
+
const identity1 = createMockIdentity("machine1");
|
|
258
|
+
const identity2 = createMockIdentity("machine2");
|
|
259
|
+
|
|
260
|
+
// Create token with identity1
|
|
261
|
+
const encoded = createInviteToken(identity1, "wss://relay.example.com");
|
|
262
|
+
|
|
263
|
+
// Decode and replace public key with identity2's key
|
|
264
|
+
const tokenJson = Buffer.from(encoded, "base64url").toString("utf-8");
|
|
265
|
+
const token = JSON.parse(tokenJson);
|
|
266
|
+
token.machineSigningKey = Buffer.from(
|
|
267
|
+
identity2.signing.publicKey
|
|
268
|
+
).toString("base64");
|
|
269
|
+
const tamperedEncoded = Buffer.from(JSON.stringify(token)).toString(
|
|
270
|
+
"base64url"
|
|
271
|
+
);
|
|
272
|
+
|
|
273
|
+
// Should fail - signature doesn't match new public key
|
|
274
|
+
const parsed = parseInviteToken(tamperedEncoded);
|
|
275
|
+
expect(parsed).toBeNull();
|
|
276
|
+
});
|
|
277
|
+
});
|
|
278
|
+
|
|
279
|
+
describe("getPublicIdentityFromInvite", () => {
|
|
280
|
+
it("extracts public identity from token", () => {
|
|
281
|
+
const identity = createMockIdentity("my-machine");
|
|
282
|
+
const encoded = createInviteToken(identity, "wss://relay.example.com");
|
|
283
|
+
const token = parseInviteToken(encoded);
|
|
284
|
+
|
|
285
|
+
expect(token).not.toBeNull();
|
|
286
|
+
|
|
287
|
+
const publicIdentity = getPublicIdentityFromInvite(token!);
|
|
288
|
+
|
|
289
|
+
expect(publicIdentity.id).toBe(identity.id);
|
|
290
|
+
expect(publicIdentity.signingPublicKey).toBe(
|
|
291
|
+
Buffer.from(identity.signing.publicKey).toString("base64")
|
|
292
|
+
);
|
|
293
|
+
expect(publicIdentity.keyExchangePublicKey).toBe(
|
|
294
|
+
Buffer.from(identity.keyExchange.publicKey).toString("base64")
|
|
295
|
+
);
|
|
296
|
+
expect(publicIdentity.label).toBeUndefined();
|
|
297
|
+
});
|
|
298
|
+
|
|
299
|
+
it("omits label (not included in invite tokens)", () => {
|
|
300
|
+
const identity = createMockIdentity("my-machine");
|
|
301
|
+
const encoded = createInviteToken(identity, "wss://relay.example.com");
|
|
302
|
+
const token = parseInviteToken(encoded);
|
|
303
|
+
|
|
304
|
+
const publicIdentity = getPublicIdentityFromInvite(token!);
|
|
305
|
+
|
|
306
|
+
expect(publicIdentity.label).toBeUndefined();
|
|
307
|
+
});
|
|
308
|
+
});
|
|
309
|
+
|
|
310
|
+
describe("isInviteExpired", () => {
|
|
311
|
+
it("returns false for valid token", () => {
|
|
312
|
+
const identity = createMockIdentity();
|
|
313
|
+
const encoded = createInviteToken(identity, "wss://relay.example.com", {
|
|
314
|
+
validityMs: 60 * 60 * 1000, // 1 hour
|
|
315
|
+
});
|
|
316
|
+
const token = parseInviteToken(encoded);
|
|
317
|
+
|
|
318
|
+
expect(token).not.toBeNull();
|
|
319
|
+
expect(isInviteExpired(token!)).toBe(false);
|
|
320
|
+
});
|
|
321
|
+
|
|
322
|
+
it("returns true for expired token", () => {
|
|
323
|
+
const identity = createMockIdentity();
|
|
324
|
+
const encoded = createInviteToken(identity, "wss://relay.example.com", {
|
|
325
|
+
validityMs: -1000, // Expired 1 second ago
|
|
326
|
+
});
|
|
327
|
+
const token = parseInviteToken(encoded);
|
|
328
|
+
|
|
329
|
+
expect(token).not.toBeNull();
|
|
330
|
+
expect(isInviteExpired(token!)).toBe(true);
|
|
331
|
+
});
|
|
332
|
+
|
|
333
|
+
it("returns true for token expiring at current time", () => {
|
|
334
|
+
const identity = createMockIdentity();
|
|
335
|
+
const encoded = createInviteToken(identity, "wss://relay.example.com", {
|
|
336
|
+
validityMs: 0, // Expires now
|
|
337
|
+
});
|
|
338
|
+
const token = parseInviteToken(encoded);
|
|
339
|
+
|
|
340
|
+
expect(token).not.toBeNull();
|
|
341
|
+
// Might be flaky, but should generally be true
|
|
342
|
+
expect(isInviteExpired(token!)).toBe(true);
|
|
343
|
+
});
|
|
344
|
+
});
|
|
345
|
+
|
|
346
|
+
describe("integration", () => {
|
|
347
|
+
it("roundtrips token creation and parsing", () => {
|
|
348
|
+
const identity = createMockIdentity("test-machine");
|
|
349
|
+
const relayUrl = "wss://relay.example.com";
|
|
350
|
+
const options = {
|
|
351
|
+
accessType: 'full' as const,
|
|
352
|
+
validityMs: 3600000, // 1 hour
|
|
353
|
+
singleUse: true,
|
|
354
|
+
};
|
|
355
|
+
|
|
356
|
+
const encoded = createInviteToken(identity, relayUrl, options);
|
|
357
|
+
const token = parseInviteToken(encoded);
|
|
358
|
+
|
|
359
|
+
expect(token).not.toBeNull();
|
|
360
|
+
expect(token!.version).toBe(1);
|
|
361
|
+
expect(token!.machineId).toBe(identity.id);
|
|
362
|
+
expect(token!.relayUrl).toBe(relayUrl);
|
|
363
|
+
expect(token!.accessType).toBe('full');
|
|
364
|
+
expect(token!.singleUse).toBe(true);
|
|
365
|
+
expect(isInviteExpired(token!)).toBe(false);
|
|
366
|
+
|
|
367
|
+
const publicIdentity = getPublicIdentityFromInvite(token!);
|
|
368
|
+
expect(publicIdentity.id).toBe(identity.id);
|
|
369
|
+
});
|
|
370
|
+
|
|
371
|
+
it("creates URL-safe tokens", () => {
|
|
372
|
+
const identity = createMockIdentity();
|
|
373
|
+
const token = createInviteToken(identity, "wss://relay.example.com");
|
|
374
|
+
|
|
375
|
+
// Should be safe to use in URLs
|
|
376
|
+
const url = `https://app.example.com/join?token=${token}`;
|
|
377
|
+
const parsed = new URL(url);
|
|
378
|
+
expect(parsed.searchParams.get("token")).toBe(token);
|
|
379
|
+
});
|
|
380
|
+
});
|
|
381
|
+
});
|
|
@@ -0,0 +1,215 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Invite token creation and verification
|
|
3
|
+
*
|
|
4
|
+
* Invite tokens are signed JSON tokens that allow sharing access to a machine.
|
|
5
|
+
* They are base64url encoded for URL-safe transport.
|
|
6
|
+
*
|
|
7
|
+
* Token flow:
|
|
8
|
+
* 1. Create token payload (without signature)
|
|
9
|
+
* 2. Sign JSON-stringified payload with machine's signing key
|
|
10
|
+
* 3. Add signature to token
|
|
11
|
+
* 4. Base64url encode the full token JSON
|
|
12
|
+
*/
|
|
13
|
+
|
|
14
|
+
import type {
|
|
15
|
+
Identity,
|
|
16
|
+
InviteToken,
|
|
17
|
+
CreateInviteOptions,
|
|
18
|
+
AccessType,
|
|
19
|
+
PublicIdentity,
|
|
20
|
+
} from "../../../types/identity.js";
|
|
21
|
+
import { sign, verify } from "./identity.js";
|
|
22
|
+
|
|
23
|
+
/** Default invite validity: 24 hours */
|
|
24
|
+
const DEFAULT_VALIDITY_MS = 24 * 60 * 60 * 1000;
|
|
25
|
+
|
|
26
|
+
/** Default access type for invites: session-invite (view-only) */
|
|
27
|
+
const DEFAULT_ACCESS_TYPE: AccessType = 'session-invite';
|
|
28
|
+
|
|
29
|
+
/**
|
|
30
|
+
* Create a signed invite token for sharing machine access
|
|
31
|
+
*
|
|
32
|
+
* The token contains:
|
|
33
|
+
* - Machine's public identity (signing and key exchange keys)
|
|
34
|
+
* - Relay URL to connect
|
|
35
|
+
* - Access type being granted
|
|
36
|
+
* - Expiry timestamp
|
|
37
|
+
* - Signature over the token data
|
|
38
|
+
*
|
|
39
|
+
* @param machineIdentity - The machine's complete identity (needs secret key for signing)
|
|
40
|
+
* @param relayUrl - The relay server URL to connect to
|
|
41
|
+
* @param options - Optional configuration (accessType, sessionId, validity, single-use)
|
|
42
|
+
* @returns Base64url-encoded signed token
|
|
43
|
+
*
|
|
44
|
+
* @example
|
|
45
|
+
* ```typescript
|
|
46
|
+
* const token = createInviteToken(
|
|
47
|
+
* machineIdentity,
|
|
48
|
+
* 'wss://relay.example.com',
|
|
49
|
+
* {
|
|
50
|
+
* accessType: 'session-invite',
|
|
51
|
+
* sessionId: 'session-123',
|
|
52
|
+
* validityMs: 3600000, // 1 hour
|
|
53
|
+
* singleUse: true
|
|
54
|
+
* }
|
|
55
|
+
* );
|
|
56
|
+
* // Share token via URL: https://app.example.com/join?token=...
|
|
57
|
+
* ```
|
|
58
|
+
*/
|
|
59
|
+
export function createInviteToken(
|
|
60
|
+
machineIdentity: Identity,
|
|
61
|
+
relayUrl: string,
|
|
62
|
+
options?: CreateInviteOptions
|
|
63
|
+
): string {
|
|
64
|
+
const validityMs = options?.validityMs ?? DEFAULT_VALIDITY_MS;
|
|
65
|
+
const accessType = options?.accessType ?? DEFAULT_ACCESS_TYPE;
|
|
66
|
+
const sessionId = options?.sessionId;
|
|
67
|
+
const singleUse = options?.singleUse ?? false;
|
|
68
|
+
|
|
69
|
+
// Create unsigned token payload
|
|
70
|
+
const unsignedToken: Omit<InviteToken, "signature"> = {
|
|
71
|
+
version: 1,
|
|
72
|
+
machineId: machineIdentity.id,
|
|
73
|
+
machineSigningKey: Buffer.from(
|
|
74
|
+
machineIdentity.signing.publicKey
|
|
75
|
+
).toString("base64"),
|
|
76
|
+
machineKeyExchangeKey: Buffer.from(
|
|
77
|
+
machineIdentity.keyExchange.publicKey
|
|
78
|
+
).toString("base64"),
|
|
79
|
+
relayUrl,
|
|
80
|
+
accessType,
|
|
81
|
+
sessionId,
|
|
82
|
+
expiresAt: Date.now() + validityMs,
|
|
83
|
+
singleUse,
|
|
84
|
+
};
|
|
85
|
+
|
|
86
|
+
// Sign the JSON-stringified payload
|
|
87
|
+
const payloadString = JSON.stringify(unsignedToken);
|
|
88
|
+
const payloadBytes = new TextEncoder().encode(payloadString);
|
|
89
|
+
const signatureBytes = sign(payloadBytes, machineIdentity.signing.secretKey);
|
|
90
|
+
const signature = Buffer.from(signatureBytes).toString("base64");
|
|
91
|
+
|
|
92
|
+
// Add signature to create complete token
|
|
93
|
+
const signedToken: InviteToken = {
|
|
94
|
+
...unsignedToken,
|
|
95
|
+
signature,
|
|
96
|
+
};
|
|
97
|
+
|
|
98
|
+
// Encode as base64url for URL-safe transport
|
|
99
|
+
const tokenJson = JSON.stringify(signedToken);
|
|
100
|
+
return Buffer.from(tokenJson).toString("base64url");
|
|
101
|
+
}
|
|
102
|
+
|
|
103
|
+
/**
|
|
104
|
+
* Parse and verify a base64url-encoded invite token
|
|
105
|
+
*
|
|
106
|
+
* This function:
|
|
107
|
+
* 1. Decodes the base64url token
|
|
108
|
+
* 2. Parses the JSON
|
|
109
|
+
* 3. Validates the structure
|
|
110
|
+
* 4. Verifies the signature
|
|
111
|
+
*
|
|
112
|
+
* @param encodedToken - Base64url-encoded token string
|
|
113
|
+
* @returns Parsed token if valid, null if invalid or signature verification fails
|
|
114
|
+
*
|
|
115
|
+
* @example
|
|
116
|
+
* ```typescript
|
|
117
|
+
* const token = parseInviteToken(encodedToken);
|
|
118
|
+
* if (!token) {
|
|
119
|
+
* console.error('Invalid token');
|
|
120
|
+
* return;
|
|
121
|
+
* }
|
|
122
|
+
* if (isInviteExpired(token)) {
|
|
123
|
+
* console.error('Token has expired');
|
|
124
|
+
* return;
|
|
125
|
+
* }
|
|
126
|
+
* // Token is valid, use it to connect
|
|
127
|
+
* ```
|
|
128
|
+
*/
|
|
129
|
+
export function parseInviteToken(encodedToken: string): InviteToken | null {
|
|
130
|
+
try {
|
|
131
|
+
// Decode base64url
|
|
132
|
+
const tokenJson = Buffer.from(encodedToken, "base64url").toString("utf-8");
|
|
133
|
+
const token = JSON.parse(tokenJson) as InviteToken;
|
|
134
|
+
|
|
135
|
+
// Validate structure
|
|
136
|
+
if (
|
|
137
|
+
token.version !== 1 ||
|
|
138
|
+
!token.machineId ||
|
|
139
|
+
!token.machineSigningKey ||
|
|
140
|
+
!token.machineKeyExchangeKey ||
|
|
141
|
+
!token.relayUrl ||
|
|
142
|
+
!token.accessType ||
|
|
143
|
+
!token.expiresAt ||
|
|
144
|
+
typeof token.singleUse !== "boolean" ||
|
|
145
|
+
!token.signature
|
|
146
|
+
) {
|
|
147
|
+
return null;
|
|
148
|
+
}
|
|
149
|
+
|
|
150
|
+
// Extract signature and recreate unsigned payload
|
|
151
|
+
const { signature, ...unsignedToken } = token;
|
|
152
|
+
const payloadString = JSON.stringify(unsignedToken);
|
|
153
|
+
const payloadBytes = new TextEncoder().encode(payloadString);
|
|
154
|
+
|
|
155
|
+
// Verify signature with machine's public signing key
|
|
156
|
+
const publicKey = new Uint8Array(
|
|
157
|
+
Buffer.from(token.machineSigningKey, "base64")
|
|
158
|
+
);
|
|
159
|
+
const signatureBytes = new Uint8Array(Buffer.from(signature, "base64"));
|
|
160
|
+
const isValid = verify(payloadBytes, signatureBytes, publicKey);
|
|
161
|
+
|
|
162
|
+
if (!isValid) {
|
|
163
|
+
return null;
|
|
164
|
+
}
|
|
165
|
+
|
|
166
|
+
return token;
|
|
167
|
+
} catch {
|
|
168
|
+
return null;
|
|
169
|
+
}
|
|
170
|
+
}
|
|
171
|
+
|
|
172
|
+
/**
|
|
173
|
+
* Extract public identity information from an invite token
|
|
174
|
+
*
|
|
175
|
+
* This creates a PublicIdentity object that can be added to an access list.
|
|
176
|
+
*
|
|
177
|
+
* @param token - Parsed invite token
|
|
178
|
+
* @returns Public identity of the machine that created the token
|
|
179
|
+
*
|
|
180
|
+
* @example
|
|
181
|
+
* ```typescript
|
|
182
|
+
* const token = parseInviteToken(encodedToken);
|
|
183
|
+
* if (token) {
|
|
184
|
+
* const machineIdentity = getPublicIdentityFromInvite(token);
|
|
185
|
+
* // Add to access list, display in UI, etc.
|
|
186
|
+
* }
|
|
187
|
+
* ```
|
|
188
|
+
*/
|
|
189
|
+
export function getPublicIdentityFromInvite(token: InviteToken): PublicIdentity {
|
|
190
|
+
return {
|
|
191
|
+
id: token.machineId,
|
|
192
|
+
signingPublicKey: token.machineSigningKey,
|
|
193
|
+
keyExchangePublicKey: token.machineKeyExchangeKey,
|
|
194
|
+
label: undefined, // Invite tokens don't include labels
|
|
195
|
+
};
|
|
196
|
+
}
|
|
197
|
+
|
|
198
|
+
/**
|
|
199
|
+
* Check if an invite token has expired
|
|
200
|
+
*
|
|
201
|
+
* @param token - Parsed invite token
|
|
202
|
+
* @returns True if the current time is past the token's expiry
|
|
203
|
+
*
|
|
204
|
+
* @example
|
|
205
|
+
* ```typescript
|
|
206
|
+
* const token = parseInviteToken(encodedToken);
|
|
207
|
+
* if (token && isInviteExpired(token)) {
|
|
208
|
+
* console.error('This invite has expired');
|
|
209
|
+
* return;
|
|
210
|
+
* }
|
|
211
|
+
* ```
|
|
212
|
+
*/
|
|
213
|
+
export function isInviteExpired(token: InviteToken): boolean {
|
|
214
|
+
return Date.now() > token.expiresAt;
|
|
215
|
+
}
|