gitspace 0.2.0-rc.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.claude/settings.local.json +21 -0
- package/.gitspace/bundle.json +50 -0
- package/.gitspace/select/01-status.sh +40 -0
- package/.gitspace/setup/01-install-deps.sh +12 -0
- package/.gitspace/setup/02-typecheck.sh +16 -0
- package/AGENTS.md +439 -0
- package/CLAUDE.md +1 -0
- package/LICENSE +25 -0
- package/README.md +607 -0
- package/bin/gssh +62 -0
- package/bun.lock +647 -0
- package/docs/CONNECTION.md +623 -0
- package/docs/GATEWAY-WORKER.md +319 -0
- package/docs/GETTING-STARTED.md +448 -0
- package/docs/GITSPACE-PLATFORM.md +1819 -0
- package/docs/INFRASTRUCTURE.md +1347 -0
- package/docs/PROTOCOL.md +619 -0
- package/docs/QUICKSTART.md +174 -0
- package/docs/RELAY.md +327 -0
- package/docs/REMOTE-DESIGN.md +549 -0
- package/docs/ROADMAP.md +564 -0
- package/docs/SITE_DOCS_FIGMA_MAKE.md +1167 -0
- package/docs/STACK-DESIGN.md +588 -0
- package/docs/UNIFIED_ARCHITECTURE.md +292 -0
- package/experiments/pty-benchmark.ts +148 -0
- package/experiments/pty-latency.ts +100 -0
- package/experiments/router/client.ts +199 -0
- package/experiments/router/protocol.ts +74 -0
- package/experiments/router/router.ts +217 -0
- package/experiments/router/session.ts +180 -0
- package/experiments/router/test.ts +133 -0
- package/experiments/socket-bandwidth.ts +77 -0
- package/homebrew/gitspace.rb +45 -0
- package/landing-page/ATTRIBUTIONS.md +3 -0
- package/landing-page/README.md +11 -0
- package/landing-page/bun.lock +801 -0
- package/landing-page/guidelines/Guidelines.md +61 -0
- package/landing-page/index.html +37 -0
- package/landing-page/package.json +90 -0
- package/landing-page/postcss.config.mjs +15 -0
- package/landing-page/public/_redirects +1 -0
- package/landing-page/public/favicon.png +0 -0
- package/landing-page/src/app/App.tsx +53 -0
- package/landing-page/src/app/components/figma/ImageWithFallback.tsx +27 -0
- package/landing-page/src/app/components/ui/accordion.tsx +66 -0
- package/landing-page/src/app/components/ui/alert-dialog.tsx +157 -0
- package/landing-page/src/app/components/ui/alert.tsx +66 -0
- package/landing-page/src/app/components/ui/aspect-ratio.tsx +11 -0
- package/landing-page/src/app/components/ui/avatar.tsx +53 -0
- package/landing-page/src/app/components/ui/badge.tsx +46 -0
- package/landing-page/src/app/components/ui/breadcrumb.tsx +109 -0
- package/landing-page/src/app/components/ui/button.tsx +57 -0
- package/landing-page/src/app/components/ui/calendar.tsx +75 -0
- package/landing-page/src/app/components/ui/card.tsx +92 -0
- package/landing-page/src/app/components/ui/carousel.tsx +241 -0
- package/landing-page/src/app/components/ui/chart.tsx +353 -0
- package/landing-page/src/app/components/ui/checkbox.tsx +32 -0
- package/landing-page/src/app/components/ui/collapsible.tsx +33 -0
- package/landing-page/src/app/components/ui/command.tsx +177 -0
- package/landing-page/src/app/components/ui/context-menu.tsx +252 -0
- package/landing-page/src/app/components/ui/dialog.tsx +135 -0
- package/landing-page/src/app/components/ui/drawer.tsx +132 -0
- package/landing-page/src/app/components/ui/dropdown-menu.tsx +257 -0
- package/landing-page/src/app/components/ui/form.tsx +168 -0
- package/landing-page/src/app/components/ui/hover-card.tsx +44 -0
- package/landing-page/src/app/components/ui/input-otp.tsx +77 -0
- package/landing-page/src/app/components/ui/input.tsx +21 -0
- package/landing-page/src/app/components/ui/label.tsx +24 -0
- package/landing-page/src/app/components/ui/menubar.tsx +276 -0
- package/landing-page/src/app/components/ui/navigation-menu.tsx +168 -0
- package/landing-page/src/app/components/ui/pagination.tsx +127 -0
- package/landing-page/src/app/components/ui/popover.tsx +48 -0
- package/landing-page/src/app/components/ui/progress.tsx +31 -0
- package/landing-page/src/app/components/ui/radio-group.tsx +45 -0
- package/landing-page/src/app/components/ui/resizable.tsx +56 -0
- package/landing-page/src/app/components/ui/scroll-area.tsx +58 -0
- package/landing-page/src/app/components/ui/select.tsx +189 -0
- package/landing-page/src/app/components/ui/separator.tsx +28 -0
- package/landing-page/src/app/components/ui/sheet.tsx +139 -0
- package/landing-page/src/app/components/ui/sidebar.tsx +726 -0
- package/landing-page/src/app/components/ui/skeleton.tsx +13 -0
- package/landing-page/src/app/components/ui/slider.tsx +63 -0
- package/landing-page/src/app/components/ui/sonner.tsx +25 -0
- package/landing-page/src/app/components/ui/switch.tsx +31 -0
- package/landing-page/src/app/components/ui/table.tsx +116 -0
- package/landing-page/src/app/components/ui/tabs.tsx +66 -0
- package/landing-page/src/app/components/ui/textarea.tsx +18 -0
- package/landing-page/src/app/components/ui/toggle-group.tsx +73 -0
- package/landing-page/src/app/components/ui/toggle.tsx +47 -0
- package/landing-page/src/app/components/ui/tooltip.tsx +61 -0
- package/landing-page/src/app/components/ui/use-mobile.ts +21 -0
- package/landing-page/src/app/components/ui/utils.ts +6 -0
- package/landing-page/src/components/docs/DocsContent.tsx +718 -0
- package/landing-page/src/components/docs/DocsSidebar.tsx +84 -0
- package/landing-page/src/components/landing/CTA.tsx +59 -0
- package/landing-page/src/components/landing/Comparison.tsx +84 -0
- package/landing-page/src/components/landing/FaultyTerminal.tsx +424 -0
- package/landing-page/src/components/landing/Features.tsx +201 -0
- package/landing-page/src/components/landing/Hero.tsx +142 -0
- package/landing-page/src/components/landing/Pricing.tsx +140 -0
- package/landing-page/src/components/landing/Roadmap.tsx +86 -0
- package/landing-page/src/components/landing/Security.tsx +81 -0
- package/landing-page/src/components/landing/TerminalWindow.tsx +27 -0
- package/landing-page/src/components/landing/UseCases.tsx +55 -0
- package/landing-page/src/components/landing/Workflow.tsx +101 -0
- package/landing-page/src/components/layout/DashboardNavbar.tsx +37 -0
- package/landing-page/src/components/layout/Footer.tsx +55 -0
- package/landing-page/src/components/layout/LandingNavbar.tsx +82 -0
- package/landing-page/src/components/ui/badge.tsx +39 -0
- package/landing-page/src/components/ui/breadcrumb.tsx +115 -0
- package/landing-page/src/components/ui/button.tsx +57 -0
- package/landing-page/src/components/ui/card.tsx +79 -0
- package/landing-page/src/components/ui/mock-terminal.tsx +68 -0
- package/landing-page/src/components/ui/separator.tsx +28 -0
- package/landing-page/src/lib/utils.ts +6 -0
- package/landing-page/src/main.tsx +10 -0
- package/landing-page/src/pages/Dashboard.tsx +133 -0
- package/landing-page/src/pages/DocsPage.tsx +79 -0
- package/landing-page/src/pages/LandingPage.tsx +31 -0
- package/landing-page/src/pages/TerminalView.tsx +106 -0
- package/landing-page/src/styles/fonts.css +0 -0
- package/landing-page/src/styles/index.css +3 -0
- package/landing-page/src/styles/tailwind.css +4 -0
- package/landing-page/src/styles/theme.css +181 -0
- package/landing-page/vite.config.ts +19 -0
- package/npm/darwin-arm64/bin/gssh +0 -0
- package/npm/darwin-arm64/package.json +20 -0
- package/package.json +74 -0
- package/scripts/build.ts +284 -0
- package/scripts/release.ts +140 -0
- package/src/__tests__/test-utils.ts +298 -0
- package/src/commands/__tests__/serve-messages.test.ts +190 -0
- package/src/commands/access.ts +298 -0
- package/src/commands/add.ts +452 -0
- package/src/commands/auth.ts +364 -0
- package/src/commands/connect.ts +287 -0
- package/src/commands/directory.ts +16 -0
- package/src/commands/host.ts +396 -0
- package/src/commands/identity.ts +184 -0
- package/src/commands/list.ts +200 -0
- package/src/commands/relay.ts +315 -0
- package/src/commands/remove.ts +241 -0
- package/src/commands/serve.ts +1493 -0
- package/src/commands/share.ts +456 -0
- package/src/commands/status.ts +125 -0
- package/src/commands/switch.ts +353 -0
- package/src/commands/tmux.ts +317 -0
- package/src/core/__tests__/access.test.ts +240 -0
- package/src/core/access.ts +277 -0
- package/src/core/bundle.ts +342 -0
- package/src/core/config.ts +510 -0
- package/src/core/git.ts +317 -0
- package/src/core/github.ts +151 -0
- package/src/core/identity.ts +631 -0
- package/src/core/linear.ts +225 -0
- package/src/core/shell.ts +161 -0
- package/src/core/trusted-relays.ts +315 -0
- package/src/index.ts +821 -0
- package/src/lib/remote-session/index.ts +7 -0
- package/src/lib/remote-session/protocol.ts +267 -0
- package/src/lib/remote-session/session-handler.ts +581 -0
- package/src/lib/remote-session/workspace-scanner.ts +167 -0
- package/src/lib/tmux-lite/README.md +81 -0
- package/src/lib/tmux-lite/cli.ts +796 -0
- package/src/lib/tmux-lite/crypto/__tests__/helpers/handshake-runner.ts +349 -0
- package/src/lib/tmux-lite/crypto/__tests__/helpers/mock-relay.ts +291 -0
- package/src/lib/tmux-lite/crypto/__tests__/helpers/test-identities.ts +142 -0
- package/src/lib/tmux-lite/crypto/__tests__/integration/authorization.integration.test.ts +339 -0
- package/src/lib/tmux-lite/crypto/__tests__/integration/e2e-communication.integration.test.ts +477 -0
- package/src/lib/tmux-lite/crypto/__tests__/integration/error-handling.integration.test.ts +499 -0
- package/src/lib/tmux-lite/crypto/__tests__/integration/handshake.integration.test.ts +371 -0
- package/src/lib/tmux-lite/crypto/__tests__/integration/security.integration.test.ts +573 -0
- package/src/lib/tmux-lite/crypto/access-control.test.ts +512 -0
- package/src/lib/tmux-lite/crypto/access-control.ts +320 -0
- package/src/lib/tmux-lite/crypto/frames.test.ts +262 -0
- package/src/lib/tmux-lite/crypto/frames.ts +141 -0
- package/src/lib/tmux-lite/crypto/handshake.ts +894 -0
- package/src/lib/tmux-lite/crypto/identity.test.ts +220 -0
- package/src/lib/tmux-lite/crypto/identity.ts +286 -0
- package/src/lib/tmux-lite/crypto/index.ts +51 -0
- package/src/lib/tmux-lite/crypto/invites.test.ts +381 -0
- package/src/lib/tmux-lite/crypto/invites.ts +215 -0
- package/src/lib/tmux-lite/crypto/keyexchange.ts +435 -0
- package/src/lib/tmux-lite/crypto/keys.test.ts +58 -0
- package/src/lib/tmux-lite/crypto/keys.ts +47 -0
- package/src/lib/tmux-lite/crypto/secretbox.test.ts +169 -0
- package/src/lib/tmux-lite/crypto/secretbox.ts +124 -0
- package/src/lib/tmux-lite/handshake-handler.ts +451 -0
- package/src/lib/tmux-lite/protocol.test.ts +307 -0
- package/src/lib/tmux-lite/protocol.ts +266 -0
- package/src/lib/tmux-lite/relay-client.ts +506 -0
- package/src/lib/tmux-lite/server.ts +1250 -0
- package/src/lib/tmux-lite/shell-integration.sh +37 -0
- package/src/lib/tmux-lite/terminal-queries.test.ts +54 -0
- package/src/lib/tmux-lite/terminal-queries.ts +49 -0
- package/src/relay/__tests__/e2e-flow.test.ts +1284 -0
- package/src/relay/__tests__/helpers/auth.ts +354 -0
- package/src/relay/__tests__/helpers/ports.ts +51 -0
- package/src/relay/__tests__/protocol-validation.test.ts +265 -0
- package/src/relay/authorization.ts +303 -0
- package/src/relay/embedded-assets.generated.d.ts +15 -0
- package/src/relay/identity.ts +352 -0
- package/src/relay/index.ts +57 -0
- package/src/relay/pipes.test.ts +427 -0
- package/src/relay/pipes.ts +195 -0
- package/src/relay/protocol.ts +804 -0
- package/src/relay/registries.test.ts +437 -0
- package/src/relay/registries.ts +593 -0
- package/src/relay/server.test.ts +1323 -0
- package/src/relay/server.ts +1092 -0
- package/src/relay/signing.ts +238 -0
- package/src/relay/types.ts +69 -0
- package/src/serve/client-session-manager.ts +622 -0
- package/src/serve/daemon.ts +497 -0
- package/src/serve/pty-session.ts +236 -0
- package/src/serve/types.ts +169 -0
- package/src/shared/components/Flow.tsx +453 -0
- package/src/shared/components/Flow.tui.tsx +343 -0
- package/src/shared/components/Flow.web.tsx +442 -0
- package/src/shared/components/Inbox.tsx +446 -0
- package/src/shared/components/Inbox.tui.tsx +262 -0
- package/src/shared/components/Inbox.web.tsx +329 -0
- package/src/shared/components/MachineList.tsx +187 -0
- package/src/shared/components/MachineList.tui.tsx +161 -0
- package/src/shared/components/MachineList.web.tsx +210 -0
- package/src/shared/components/ProjectList.tsx +176 -0
- package/src/shared/components/ProjectList.tui.tsx +109 -0
- package/src/shared/components/ProjectList.web.tsx +143 -0
- package/src/shared/components/SpacesBrowser.tsx +332 -0
- package/src/shared/components/SpacesBrowser.tui.tsx +163 -0
- package/src/shared/components/SpacesBrowser.web.tsx +221 -0
- package/src/shared/components/index.ts +103 -0
- package/src/shared/hooks/index.ts +16 -0
- package/src/shared/hooks/useNavigation.ts +226 -0
- package/src/shared/index.ts +122 -0
- package/src/shared/providers/LocalMachineProvider.ts +425 -0
- package/src/shared/providers/MachineProvider.ts +165 -0
- package/src/shared/providers/RemoteMachineProvider.ts +444 -0
- package/src/shared/providers/index.ts +26 -0
- package/src/shared/types.ts +145 -0
- package/src/tui/adapters.ts +120 -0
- package/src/tui/app.tsx +1816 -0
- package/src/tui/components/Terminal.tsx +580 -0
- package/src/tui/hooks/index.ts +35 -0
- package/src/tui/hooks/useAppState.ts +314 -0
- package/src/tui/hooks/useDaemonStatus.ts +174 -0
- package/src/tui/hooks/useInboxTUI.ts +113 -0
- package/src/tui/hooks/useRemoteMachines.ts +209 -0
- package/src/tui/index.ts +24 -0
- package/src/tui/state.ts +299 -0
- package/src/tui/terminal-bracketed-paste.test.ts +45 -0
- package/src/tui/terminal-bracketed-paste.ts +47 -0
- package/src/types/bundle.ts +112 -0
- package/src/types/config.ts +89 -0
- package/src/types/errors.ts +206 -0
- package/src/types/identity.ts +284 -0
- package/src/types/workspace-fuzzy.ts +49 -0
- package/src/types/workspace.ts +151 -0
- package/src/utils/bun-socket-writer.ts +80 -0
- package/src/utils/deps.ts +127 -0
- package/src/utils/fuzzy-match.ts +125 -0
- package/src/utils/logger.ts +127 -0
- package/src/utils/markdown.ts +254 -0
- package/src/utils/onboarding.ts +229 -0
- package/src/utils/prompts.ts +114 -0
- package/src/utils/run-commands.ts +112 -0
- package/src/utils/run-scripts.ts +142 -0
- package/src/utils/sanitize.ts +98 -0
- package/src/utils/secrets.ts +122 -0
- package/src/utils/shell-escape.ts +40 -0
- package/src/utils/utf8.ts +79 -0
- package/src/utils/workspace-state.ts +47 -0
- package/src/web/README.md +73 -0
- package/src/web/bun.lock +575 -0
- package/src/web/eslint.config.js +23 -0
- package/src/web/index.html +16 -0
- package/src/web/package.json +37 -0
- package/src/web/public/vite.svg +1 -0
- package/src/web/src/App.tsx +604 -0
- package/src/web/src/assets/react.svg +1 -0
- package/src/web/src/components/Terminal.tsx +207 -0
- package/src/web/src/hooks/useRelayConnection.ts +224 -0
- package/src/web/src/hooks/useTerminal.ts +699 -0
- package/src/web/src/index.css +55 -0
- package/src/web/src/lib/crypto/__tests__/web-terminal.test.ts +1158 -0
- package/src/web/src/lib/crypto/frames.ts +205 -0
- package/src/web/src/lib/crypto/handshake.ts +396 -0
- package/src/web/src/lib/crypto/identity.ts +128 -0
- package/src/web/src/lib/crypto/keyexchange.ts +246 -0
- package/src/web/src/lib/crypto/relay-signing.ts +53 -0
- package/src/web/src/lib/invite.ts +58 -0
- package/src/web/src/lib/storage/identity-store.ts +94 -0
- package/src/web/src/main.tsx +10 -0
- package/src/web/src/types/identity.ts +45 -0
- package/src/web/tsconfig.app.json +28 -0
- package/src/web/tsconfig.json +7 -0
- package/src/web/tsconfig.node.json +26 -0
- package/src/web/vite.config.ts +31 -0
- package/todo-security.md +92 -0
- package/tsconfig.json +23 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/12b7107e435bf1b9a8713a7f320472a63e543104d633d89a26f8d21f4e4ef182.sqlite +0 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/12b7107e435bf1b9a8713a7f320472a63e543104d633d89a26f8d21f4e4ef182.sqlite-shm +0 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/12b7107e435bf1b9a8713a7f320472a63e543104d633d89a26f8d21f4e4ef182.sqlite-wal +0 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/1a1ac3db1ab86ecf712f90322868a9aabc2c7dc9fe2dfbe94f9b075096276b0f.sqlite +0 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/1a1ac3db1ab86ecf712f90322868a9aabc2c7dc9fe2dfbe94f9b075096276b0f.sqlite-shm +0 -0
- package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/1a1ac3db1ab86ecf712f90322868a9aabc2c7dc9fe2dfbe94f9b075096276b0f.sqlite-wal +0 -0
- package/worker/bun.lock +237 -0
- package/worker/package.json +22 -0
- package/worker/schema.sql +96 -0
- package/worker/src/handlers/auth.ts +451 -0
- package/worker/src/handlers/subdomains.ts +376 -0
- package/worker/src/handlers/user.ts +98 -0
- package/worker/src/index.ts +70 -0
- package/worker/src/middleware/auth.ts +152 -0
- package/worker/src/services/cloudflare.ts +609 -0
- package/worker/src/types.ts +96 -0
- package/worker/tsconfig.json +15 -0
- package/worker/wrangler.toml +26 -0
|
@@ -0,0 +1,1323 @@
|
|
|
1
|
+
import { describe, expect, test, beforeAll, afterAll, beforeEach } from "bun:test";
|
|
2
|
+
import { createRelayServer } from "./server";
|
|
3
|
+
import { generateRelayIdentity } from "./identity";
|
|
4
|
+
import { clearAllRegistries } from "./registries";
|
|
5
|
+
import {
|
|
6
|
+
createTestIdentity,
|
|
7
|
+
toPublicIdentity,
|
|
8
|
+
} from "../lib/tmux-lite/crypto/__tests__/helpers/test-identities";
|
|
9
|
+
import {
|
|
10
|
+
signChallenge,
|
|
11
|
+
getSigningKeyBase64,
|
|
12
|
+
connectMachineWithAuth,
|
|
13
|
+
connectClient,
|
|
14
|
+
signClientMessage,
|
|
15
|
+
sendAndWait,
|
|
16
|
+
waitForMessage,
|
|
17
|
+
} from "./__tests__/helpers/auth";
|
|
18
|
+
import { startRelayServer } from "./__tests__/helpers/ports";
|
|
19
|
+
import type { Server } from "bun";
|
|
20
|
+
import type { Identity } from "../types/identity";
|
|
21
|
+
|
|
22
|
+
const TEST_HOST = "127.0.0.1";
|
|
23
|
+
let relayUrl = "";
|
|
24
|
+
let relayHttpBase = "";
|
|
25
|
+
|
|
26
|
+
// Generate identities for testing
|
|
27
|
+
const testRelayIdentity = generateRelayIdentity("test-relay");
|
|
28
|
+
const testMachine1 = createTestIdentity("Test Machine 1");
|
|
29
|
+
const testMachine2 = createTestIdentity("Test Machine 2");
|
|
30
|
+
const testClient1 = createTestIdentity("Test Client 1");
|
|
31
|
+
const testClient2 = createTestIdentity("Test Client 2");
|
|
32
|
+
|
|
33
|
+
let server: Server<any>;
|
|
34
|
+
|
|
35
|
+
beforeAll(async () => {
|
|
36
|
+
server = startRelayServer({
|
|
37
|
+
bind: TEST_HOST,
|
|
38
|
+
hostname: TEST_HOST,
|
|
39
|
+
disableRateLimit: true,
|
|
40
|
+
identity: testRelayIdentity,
|
|
41
|
+
preAuthorizedMachines: new Set([
|
|
42
|
+
getSigningKeyBase64(testMachine1),
|
|
43
|
+
getSigningKeyBase64(testMachine2),
|
|
44
|
+
]),
|
|
45
|
+
});
|
|
46
|
+
relayUrl = `ws://${TEST_HOST}:${server.port}/ws`;
|
|
47
|
+
relayHttpBase = `http://${TEST_HOST}:${server.port}`;
|
|
48
|
+
|
|
49
|
+
// Wait for server to start accepting requests to avoid flakiness.
|
|
50
|
+
const deadline = Date.now() + 3000;
|
|
51
|
+
// eslint-disable-next-line no-constant-condition
|
|
52
|
+
while (true) {
|
|
53
|
+
try {
|
|
54
|
+
const res = await fetch(`${relayHttpBase}/health`);
|
|
55
|
+
if (res.ok) break;
|
|
56
|
+
} catch {
|
|
57
|
+
// ignore until deadline
|
|
58
|
+
}
|
|
59
|
+
if (Date.now() > deadline) {
|
|
60
|
+
throw new Error("Relay server did not become healthy in time");
|
|
61
|
+
}
|
|
62
|
+
await new Promise((r) => setTimeout(r, 50));
|
|
63
|
+
}
|
|
64
|
+
});
|
|
65
|
+
|
|
66
|
+
afterAll(() => {
|
|
67
|
+
server.stop(true);
|
|
68
|
+
});
|
|
69
|
+
|
|
70
|
+
beforeEach(() => {
|
|
71
|
+
// Clear registries between tests
|
|
72
|
+
clearAllRegistries();
|
|
73
|
+
});
|
|
74
|
+
|
|
75
|
+
// ============================================================================
|
|
76
|
+
// Helper to connect a machine with full challenge-response flow
|
|
77
|
+
// ============================================================================
|
|
78
|
+
|
|
79
|
+
async function connectAndRegisterMachine(
|
|
80
|
+
identity: Identity,
|
|
81
|
+
options?: { label?: string }
|
|
82
|
+
): Promise<WebSocket> {
|
|
83
|
+
const { label = identity.label } = options ?? {};
|
|
84
|
+
|
|
85
|
+
const url = new URL(relayUrl);
|
|
86
|
+
url.searchParams.set("role", "machine");
|
|
87
|
+
|
|
88
|
+
const ws = new WebSocket(url.toString());
|
|
89
|
+
ws.binaryType = "arraybuffer";
|
|
90
|
+
|
|
91
|
+
// Wait for open
|
|
92
|
+
await new Promise<void>((resolve, reject) => {
|
|
93
|
+
ws.onopen = () => resolve();
|
|
94
|
+
ws.onerror = () => reject(new Error("Connection failed"));
|
|
95
|
+
setTimeout(() => reject(new Error("Timeout")), 5000);
|
|
96
|
+
});
|
|
97
|
+
|
|
98
|
+
// Wait for relay_identity with challenge
|
|
99
|
+
const challenge = await new Promise<Uint8Array>((resolve, reject) => {
|
|
100
|
+
const timeout = setTimeout(() => reject(new Error("Challenge timeout")), 5000);
|
|
101
|
+
ws.onmessage = (event) => {
|
|
102
|
+
try {
|
|
103
|
+
const data = typeof event.data === "string" ? event.data : new TextDecoder().decode(event.data);
|
|
104
|
+
const msg = JSON.parse(data);
|
|
105
|
+
if (msg.type === "relay_identity" && msg.challenge) {
|
|
106
|
+
clearTimeout(timeout);
|
|
107
|
+
resolve(Buffer.from(msg.challenge, "base64"));
|
|
108
|
+
}
|
|
109
|
+
} catch {
|
|
110
|
+
// Ignore
|
|
111
|
+
}
|
|
112
|
+
};
|
|
113
|
+
});
|
|
114
|
+
|
|
115
|
+
// Sign challenge
|
|
116
|
+
const signature = signChallenge(challenge, identity.signing.secretKey);
|
|
117
|
+
const publicIdentity = toPublicIdentity(identity);
|
|
118
|
+
|
|
119
|
+
// Send register_machine
|
|
120
|
+
ws.send(JSON.stringify({
|
|
121
|
+
type: "register_machine",
|
|
122
|
+
machineId: identity.id,
|
|
123
|
+
signingKey: publicIdentity.signingPublicKey,
|
|
124
|
+
keyExchangeKey: publicIdentity.keyExchangePublicKey,
|
|
125
|
+
challengeResponse: signature,
|
|
126
|
+
label,
|
|
127
|
+
}));
|
|
128
|
+
|
|
129
|
+
// Wait for registered
|
|
130
|
+
await new Promise<void>((resolve, reject) => {
|
|
131
|
+
const timeout = setTimeout(() => reject(new Error("Registration timeout")), 5000);
|
|
132
|
+
ws.onmessage = (event) => {
|
|
133
|
+
try {
|
|
134
|
+
const data = typeof event.data === "string" ? event.data : new TextDecoder().decode(event.data);
|
|
135
|
+
const msg = JSON.parse(data);
|
|
136
|
+
if (msg.type === "registered") {
|
|
137
|
+
clearTimeout(timeout);
|
|
138
|
+
resolve();
|
|
139
|
+
} else if (msg.type === "error") {
|
|
140
|
+
clearTimeout(timeout);
|
|
141
|
+
reject(new Error(msg.message || "Registration failed"));
|
|
142
|
+
}
|
|
143
|
+
} catch {
|
|
144
|
+
// Ignore
|
|
145
|
+
}
|
|
146
|
+
};
|
|
147
|
+
});
|
|
148
|
+
|
|
149
|
+
return ws;
|
|
150
|
+
}
|
|
151
|
+
|
|
152
|
+
// ============================================================================
|
|
153
|
+
// HTTP Endpoints
|
|
154
|
+
// ============================================================================
|
|
155
|
+
|
|
156
|
+
describe("HTTP endpoints", () => {
|
|
157
|
+
test("GET /health returns stats", async () => {
|
|
158
|
+
const res = await fetch(`${relayHttpBase}/health`);
|
|
159
|
+
expect(res.status).toBe(200);
|
|
160
|
+
|
|
161
|
+
const data = await res.json();
|
|
162
|
+
expect(data.status).toBe("ok");
|
|
163
|
+
expect(typeof data.machineCount).toBe("number");
|
|
164
|
+
expect(typeof data.connectedClients).toBe("number");
|
|
165
|
+
});
|
|
166
|
+
|
|
167
|
+
test("GET /unknown returns 404", async () => {
|
|
168
|
+
const res = await fetch(`${relayHttpBase}/unknown`);
|
|
169
|
+
expect(res.status).toBe(404);
|
|
170
|
+
});
|
|
171
|
+
});
|
|
172
|
+
|
|
173
|
+
// ============================================================================
|
|
174
|
+
// WebSocket Connections
|
|
175
|
+
// ============================================================================
|
|
176
|
+
|
|
177
|
+
describe("WebSocket connections", () => {
|
|
178
|
+
test("rejects connection without role", async () => {
|
|
179
|
+
// No role parameter - should be rejected with 400
|
|
180
|
+
const ws = new WebSocket(relayUrl);
|
|
181
|
+
|
|
182
|
+
const result = await new Promise<{ opened: boolean; error?: string }>((resolve) => {
|
|
183
|
+
ws.onerror = () => {
|
|
184
|
+
resolve({ opened: false, error: "Connection error" });
|
|
185
|
+
};
|
|
186
|
+
ws.onclose = (event) => {
|
|
187
|
+
resolve({ opened: false, error: `Closed: ${event.code}` });
|
|
188
|
+
};
|
|
189
|
+
ws.onopen = () => {
|
|
190
|
+
ws.close();
|
|
191
|
+
resolve({ opened: true });
|
|
192
|
+
};
|
|
193
|
+
setTimeout(() => {
|
|
194
|
+
ws.close();
|
|
195
|
+
resolve({ opened: false, error: "Timeout" });
|
|
196
|
+
}, 1000);
|
|
197
|
+
});
|
|
198
|
+
|
|
199
|
+
// Should be rejected at upgrade (role missing)
|
|
200
|
+
expect(result.opened).toBe(false);
|
|
201
|
+
});
|
|
202
|
+
|
|
203
|
+
test("accepts machine connection and sends relay_identity", async () => {
|
|
204
|
+
const ws = new WebSocket(`${relayUrl}?role=machine`);
|
|
205
|
+
|
|
206
|
+
await new Promise<void>((resolve, reject) => {
|
|
207
|
+
ws.onopen = () => resolve();
|
|
208
|
+
ws.onerror = () => reject(new Error("Connection failed"));
|
|
209
|
+
setTimeout(() => reject(new Error("Timeout")), 2000);
|
|
210
|
+
});
|
|
211
|
+
|
|
212
|
+
expect(ws.readyState).toBe(WebSocket.OPEN);
|
|
213
|
+
|
|
214
|
+
// Should receive relay_identity with challenge
|
|
215
|
+
const relayIdentity = await new Promise<any>((resolve, reject) => {
|
|
216
|
+
ws.onmessage = (event) => {
|
|
217
|
+
const msg = JSON.parse(event.data);
|
|
218
|
+
if (msg.type === "relay_identity") {
|
|
219
|
+
resolve(msg);
|
|
220
|
+
}
|
|
221
|
+
};
|
|
222
|
+
setTimeout(() => reject(new Error("Timeout waiting for relay_identity")), 2000);
|
|
223
|
+
});
|
|
224
|
+
|
|
225
|
+
expect(relayIdentity.type).toBe("relay_identity");
|
|
226
|
+
expect(relayIdentity.publicKey).toBeDefined();
|
|
227
|
+
expect(relayIdentity.fingerprint).toBeDefined();
|
|
228
|
+
expect(relayIdentity.challenge).toBeDefined();
|
|
229
|
+
|
|
230
|
+
ws.close();
|
|
231
|
+
});
|
|
232
|
+
|
|
233
|
+
test("accepts client connection", async () => {
|
|
234
|
+
const ws = new WebSocket(`${relayUrl}?role=client`);
|
|
235
|
+
|
|
236
|
+
await new Promise<void>((resolve, reject) => {
|
|
237
|
+
ws.onopen = () => resolve();
|
|
238
|
+
ws.onerror = () => reject(new Error("Connection failed"));
|
|
239
|
+
setTimeout(() => reject(new Error("Timeout")), 2000);
|
|
240
|
+
});
|
|
241
|
+
|
|
242
|
+
expect(ws.readyState).toBe(WebSocket.OPEN);
|
|
243
|
+
ws.close();
|
|
244
|
+
});
|
|
245
|
+
});
|
|
246
|
+
|
|
247
|
+
// ============================================================================
|
|
248
|
+
// Challenge-Response Authentication
|
|
249
|
+
// ============================================================================
|
|
250
|
+
|
|
251
|
+
describe("Challenge-response authentication", () => {
|
|
252
|
+
test("machine registration with valid challenge response succeeds", async () => {
|
|
253
|
+
const ws = await connectAndRegisterMachine(testMachine1);
|
|
254
|
+
expect(ws.readyState).toBe(WebSocket.OPEN);
|
|
255
|
+
ws.close();
|
|
256
|
+
});
|
|
257
|
+
|
|
258
|
+
test("machine registration with invalid challenge response fails", async () => {
|
|
259
|
+
const ws = new WebSocket(`${relayUrl}?role=machine`);
|
|
260
|
+
|
|
261
|
+
await new Promise<void>((resolve) => {
|
|
262
|
+
ws.onopen = () => resolve();
|
|
263
|
+
});
|
|
264
|
+
|
|
265
|
+
// Wait for challenge
|
|
266
|
+
await new Promise<void>((resolve) => {
|
|
267
|
+
ws.onmessage = (event) => {
|
|
268
|
+
const msg = JSON.parse(event.data);
|
|
269
|
+
if (msg.type === "relay_identity") resolve();
|
|
270
|
+
};
|
|
271
|
+
});
|
|
272
|
+
|
|
273
|
+
// Send register_machine with invalid signature
|
|
274
|
+
ws.send(JSON.stringify({
|
|
275
|
+
type: "register_machine",
|
|
276
|
+
machineId: testMachine1.id,
|
|
277
|
+
signingKey: toPublicIdentity(testMachine1).signingPublicKey,
|
|
278
|
+
keyExchangeKey: toPublicIdentity(testMachine1).keyExchangePublicKey,
|
|
279
|
+
challengeResponse: Buffer.from("invalid-signature").toString("base64"),
|
|
280
|
+
label: "Test",
|
|
281
|
+
}));
|
|
282
|
+
|
|
283
|
+
const response = await new Promise<any>((resolve) => {
|
|
284
|
+
ws.onmessage = (event) => {
|
|
285
|
+
resolve(JSON.parse(event.data));
|
|
286
|
+
};
|
|
287
|
+
ws.onclose = () => {
|
|
288
|
+
resolve({ type: "closed" });
|
|
289
|
+
};
|
|
290
|
+
setTimeout(() => resolve({ type: "timeout" }), 2000);
|
|
291
|
+
});
|
|
292
|
+
|
|
293
|
+
expect(response.type).toBe("error");
|
|
294
|
+
expect(response.message?.toLowerCase()).toMatch(/signature|verification|challenge/);
|
|
295
|
+
|
|
296
|
+
ws.close();
|
|
297
|
+
});
|
|
298
|
+
|
|
299
|
+
test("unauthorized machine is rejected", async () => {
|
|
300
|
+
// Create a machine that's not pre-authorized
|
|
301
|
+
const unauthorizedMachine = createTestIdentity("Unauthorized Machine");
|
|
302
|
+
|
|
303
|
+
const ws = new WebSocket(`${relayUrl}?role=machine`);
|
|
304
|
+
|
|
305
|
+
await new Promise<void>((resolve) => {
|
|
306
|
+
ws.onopen = () => resolve();
|
|
307
|
+
});
|
|
308
|
+
|
|
309
|
+
// Wait for challenge
|
|
310
|
+
const challenge = await new Promise<Uint8Array>((resolve) => {
|
|
311
|
+
ws.onmessage = (event) => {
|
|
312
|
+
const msg = JSON.parse(event.data);
|
|
313
|
+
if (msg.type === "relay_identity") {
|
|
314
|
+
resolve(Buffer.from(msg.challenge, "base64"));
|
|
315
|
+
}
|
|
316
|
+
};
|
|
317
|
+
});
|
|
318
|
+
|
|
319
|
+
// Sign correctly but with unauthorized key
|
|
320
|
+
const signature = signChallenge(challenge, unauthorizedMachine.signing.secretKey);
|
|
321
|
+
const publicIdentity = toPublicIdentity(unauthorizedMachine);
|
|
322
|
+
|
|
323
|
+
ws.send(JSON.stringify({
|
|
324
|
+
type: "register_machine",
|
|
325
|
+
machineId: unauthorizedMachine.id,
|
|
326
|
+
signingKey: publicIdentity.signingPublicKey,
|
|
327
|
+
keyExchangeKey: publicIdentity.keyExchangePublicKey,
|
|
328
|
+
challengeResponse: signature,
|
|
329
|
+
label: "Unauthorized",
|
|
330
|
+
}));
|
|
331
|
+
|
|
332
|
+
const response = await new Promise<any>((resolve) => {
|
|
333
|
+
ws.onmessage = (event) => {
|
|
334
|
+
resolve(JSON.parse(event.data));
|
|
335
|
+
};
|
|
336
|
+
ws.onclose = () => resolve({ type: "closed" });
|
|
337
|
+
setTimeout(() => resolve({ type: "timeout" }), 2000);
|
|
338
|
+
});
|
|
339
|
+
|
|
340
|
+
expect(response.type).toBe("error");
|
|
341
|
+
expect(response.message?.toLowerCase()).toMatch(/not authorized|unauthorized/);
|
|
342
|
+
|
|
343
|
+
ws.close();
|
|
344
|
+
});
|
|
345
|
+
|
|
346
|
+
test("missing challengeResponse is rejected", async () => {
|
|
347
|
+
const ws = new WebSocket(`${relayUrl}?role=machine`);
|
|
348
|
+
|
|
349
|
+
await new Promise<void>((resolve) => {
|
|
350
|
+
ws.onopen = () => resolve();
|
|
351
|
+
});
|
|
352
|
+
|
|
353
|
+
// Wait for challenge
|
|
354
|
+
await new Promise<void>((resolve) => {
|
|
355
|
+
ws.onmessage = (event) => {
|
|
356
|
+
const msg = JSON.parse(event.data);
|
|
357
|
+
if (msg.type === "relay_identity") resolve();
|
|
358
|
+
};
|
|
359
|
+
});
|
|
360
|
+
|
|
361
|
+
// Send register_machine WITHOUT challengeResponse
|
|
362
|
+
ws.send(JSON.stringify({
|
|
363
|
+
type: "register_machine",
|
|
364
|
+
machineId: testMachine1.id,
|
|
365
|
+
signingKey: toPublicIdentity(testMachine1).signingPublicKey,
|
|
366
|
+
keyExchangeKey: toPublicIdentity(testMachine1).keyExchangePublicKey,
|
|
367
|
+
// challengeResponse is missing
|
|
368
|
+
label: "Test",
|
|
369
|
+
}));
|
|
370
|
+
|
|
371
|
+
const response = await new Promise<any>((resolve) => {
|
|
372
|
+
ws.onmessage = (event) => {
|
|
373
|
+
resolve(JSON.parse(event.data));
|
|
374
|
+
};
|
|
375
|
+
setTimeout(() => resolve({ type: "timeout" }), 2000);
|
|
376
|
+
});
|
|
377
|
+
|
|
378
|
+
expect(response.type).toBe("error");
|
|
379
|
+
expect(response.message?.toLowerCase()).toContain("challenge");
|
|
380
|
+
|
|
381
|
+
ws.close();
|
|
382
|
+
});
|
|
383
|
+
});
|
|
384
|
+
|
|
385
|
+
// ============================================================================
|
|
386
|
+
// Protocol Messages
|
|
387
|
+
// ============================================================================
|
|
388
|
+
|
|
389
|
+
describe("Protocol messages", () => {
|
|
390
|
+
test("invite registration flow", async () => {
|
|
391
|
+
const machineWs = await connectAndRegisterMachine(testMachine1);
|
|
392
|
+
const inviteId = "test-invite-001";
|
|
393
|
+
|
|
394
|
+
// Register invite
|
|
395
|
+
machineWs.send(JSON.stringify({
|
|
396
|
+
type: "register_invite",
|
|
397
|
+
inviteId,
|
|
398
|
+
machineId: testMachine1.id,
|
|
399
|
+
expiresAt: Date.now() + 3600000,
|
|
400
|
+
maxUses: 5,
|
|
401
|
+
}));
|
|
402
|
+
|
|
403
|
+
const response = await new Promise<any>((resolve, reject) => {
|
|
404
|
+
machineWs.onmessage = (event) => {
|
|
405
|
+
resolve(JSON.parse(event.data));
|
|
406
|
+
};
|
|
407
|
+
setTimeout(() => reject(new Error("Timeout")), 2000);
|
|
408
|
+
});
|
|
409
|
+
|
|
410
|
+
expect(response.type).toBe("registered");
|
|
411
|
+
expect(response.machineId).toBe(testMachine1.id);
|
|
412
|
+
|
|
413
|
+
machineWs.close();
|
|
414
|
+
});
|
|
415
|
+
|
|
416
|
+
test("client connect with invite flow", async () => {
|
|
417
|
+
const machineWs = await connectAndRegisterMachine(testMachine1);
|
|
418
|
+
const inviteId = "test-invite-002";
|
|
419
|
+
const clientIdentityId = testClient1.id;
|
|
420
|
+
|
|
421
|
+
// Register invite
|
|
422
|
+
machineWs.send(JSON.stringify({
|
|
423
|
+
type: "register_invite",
|
|
424
|
+
inviteId,
|
|
425
|
+
machineId: testMachine1.id,
|
|
426
|
+
expiresAt: Date.now() + 3600000,
|
|
427
|
+
maxUses: null,
|
|
428
|
+
}));
|
|
429
|
+
|
|
430
|
+
await new Promise<void>((resolve) => {
|
|
431
|
+
machineWs.onmessage = () => resolve();
|
|
432
|
+
});
|
|
433
|
+
|
|
434
|
+
// Set up machine to receive client_connected
|
|
435
|
+
const machineReceivedConnection = new Promise<any>((resolve) => {
|
|
436
|
+
machineWs.onmessage = (event) => {
|
|
437
|
+
resolve(JSON.parse(event.data));
|
|
438
|
+
};
|
|
439
|
+
});
|
|
440
|
+
|
|
441
|
+
// Connect client (no token needed)
|
|
442
|
+
const clientWs = new WebSocket(`${relayUrl}?role=client`);
|
|
443
|
+
|
|
444
|
+
await new Promise<void>((resolve, reject) => {
|
|
445
|
+
clientWs.onopen = () => resolve();
|
|
446
|
+
clientWs.onerror = () => reject(new Error("Client connection failed"));
|
|
447
|
+
setTimeout(() => reject(new Error("Timeout")), 2000);
|
|
448
|
+
});
|
|
449
|
+
|
|
450
|
+
// Client connects with invite
|
|
451
|
+
const signedConnect = signClientMessage({
|
|
452
|
+
type: "connect_with_invite",
|
|
453
|
+
inviteId,
|
|
454
|
+
clientIdentityId,
|
|
455
|
+
}, testClient1);
|
|
456
|
+
clientWs.send(JSON.stringify(signedConnect));
|
|
457
|
+
|
|
458
|
+
// Wait for connection_established
|
|
459
|
+
const clientResponse = await new Promise<any>((resolve, reject) => {
|
|
460
|
+
clientWs.onmessage = (event) => {
|
|
461
|
+
resolve(JSON.parse(event.data));
|
|
462
|
+
};
|
|
463
|
+
setTimeout(() => reject(new Error("Timeout")), 2000);
|
|
464
|
+
});
|
|
465
|
+
|
|
466
|
+
expect(clientResponse.type).toBe("connection_established");
|
|
467
|
+
expect(clientResponse.machineId).toBe(testMachine1.id);
|
|
468
|
+
|
|
469
|
+
// Machine should have received client_connected
|
|
470
|
+
const machineMsg = await machineReceivedConnection;
|
|
471
|
+
expect(machineMsg.type).toBe("client_connected");
|
|
472
|
+
expect(machineMsg.clientIdentityId).toBe(clientIdentityId);
|
|
473
|
+
expect(machineMsg.viaInvite).toBe(inviteId);
|
|
474
|
+
|
|
475
|
+
machineWs.close();
|
|
476
|
+
clientWs.close();
|
|
477
|
+
});
|
|
478
|
+
|
|
479
|
+
test("machine to client data routing", async () => {
|
|
480
|
+
const machineWs = await connectAndRegisterMachine(testMachine1);
|
|
481
|
+
const inviteId = "test-invite-003";
|
|
482
|
+
const clientIdentityId = testClient1.id;
|
|
483
|
+
|
|
484
|
+
// Register invite
|
|
485
|
+
machineWs.send(JSON.stringify({
|
|
486
|
+
type: "register_invite",
|
|
487
|
+
inviteId,
|
|
488
|
+
machineId: testMachine1.id,
|
|
489
|
+
expiresAt: Date.now() + 3600000,
|
|
490
|
+
maxUses: null,
|
|
491
|
+
}));
|
|
492
|
+
|
|
493
|
+
await new Promise<void>((resolve) => {
|
|
494
|
+
machineWs.onmessage = () => resolve();
|
|
495
|
+
});
|
|
496
|
+
|
|
497
|
+
// Store connectionId when machine receives client_connected
|
|
498
|
+
let clientConnectionId = "";
|
|
499
|
+
const gotConnectionId = new Promise<void>((resolve) => {
|
|
500
|
+
machineWs.onmessage = (event) => {
|
|
501
|
+
const msg = JSON.parse(event.data);
|
|
502
|
+
if (msg.type === "client_connected") {
|
|
503
|
+
clientConnectionId = msg.connectionId;
|
|
504
|
+
resolve();
|
|
505
|
+
}
|
|
506
|
+
};
|
|
507
|
+
});
|
|
508
|
+
|
|
509
|
+
// Connect client
|
|
510
|
+
const clientWs = new WebSocket(`${relayUrl}?role=client`);
|
|
511
|
+
|
|
512
|
+
await new Promise<void>((resolve, reject) => {
|
|
513
|
+
clientWs.onopen = () => resolve();
|
|
514
|
+
clientWs.onerror = () => reject(new Error("Client connection failed"));
|
|
515
|
+
setTimeout(() => reject(new Error("Timeout")), 2000);
|
|
516
|
+
});
|
|
517
|
+
|
|
518
|
+
const signedConnect = signClientMessage({
|
|
519
|
+
type: "connect_with_invite",
|
|
520
|
+
inviteId,
|
|
521
|
+
clientIdentityId,
|
|
522
|
+
}, testClient1);
|
|
523
|
+
clientWs.send(JSON.stringify(signedConnect));
|
|
524
|
+
|
|
525
|
+
// Wait for connection established
|
|
526
|
+
await new Promise<void>((resolve) => {
|
|
527
|
+
clientWs.onmessage = (event) => {
|
|
528
|
+
const msg = JSON.parse(event.data);
|
|
529
|
+
if (msg.type === "connection_established") resolve();
|
|
530
|
+
};
|
|
531
|
+
});
|
|
532
|
+
|
|
533
|
+
await gotConnectionId;
|
|
534
|
+
|
|
535
|
+
// Set up client to receive data
|
|
536
|
+
const clientReceivedData = new Promise<any>((resolve) => {
|
|
537
|
+
clientWs.onmessage = (event) => {
|
|
538
|
+
resolve(JSON.parse(event.data));
|
|
539
|
+
};
|
|
540
|
+
});
|
|
541
|
+
|
|
542
|
+
// Machine sends data to client
|
|
543
|
+
const testData = Buffer.from("Hello from machine").toString("base64");
|
|
544
|
+
machineWs.send(JSON.stringify({
|
|
545
|
+
type: "data",
|
|
546
|
+
connectionId: clientConnectionId,
|
|
547
|
+
data: testData,
|
|
548
|
+
}));
|
|
549
|
+
|
|
550
|
+
const receivedMsg = await clientReceivedData;
|
|
551
|
+
expect(receivedMsg.type).toBe("data");
|
|
552
|
+
expect(receivedMsg.data).toBe(testData);
|
|
553
|
+
|
|
554
|
+
machineWs.close();
|
|
555
|
+
clientWs.close();
|
|
556
|
+
});
|
|
557
|
+
|
|
558
|
+
test("client to machine data routing", async () => {
|
|
559
|
+
const machineWs = await connectAndRegisterMachine(testMachine1);
|
|
560
|
+
const inviteId = "test-invite-004";
|
|
561
|
+
const clientIdentityId = testClient1.id;
|
|
562
|
+
|
|
563
|
+
// Register invite
|
|
564
|
+
machineWs.send(JSON.stringify({
|
|
565
|
+
type: "register_invite",
|
|
566
|
+
inviteId,
|
|
567
|
+
machineId: testMachine1.id,
|
|
568
|
+
expiresAt: Date.now() + 3600000,
|
|
569
|
+
maxUses: null,
|
|
570
|
+
}));
|
|
571
|
+
|
|
572
|
+
await new Promise<void>((resolve) => {
|
|
573
|
+
machineWs.onmessage = () => resolve();
|
|
574
|
+
});
|
|
575
|
+
|
|
576
|
+
// Wait for client_connected
|
|
577
|
+
let expectedClientConnectionId = "";
|
|
578
|
+
const clientConnectedPromise = new Promise<void>((resolve) => {
|
|
579
|
+
machineWs.onmessage = (event) => {
|
|
580
|
+
const msg = JSON.parse(event.data);
|
|
581
|
+
if (msg.type === "client_connected") {
|
|
582
|
+
expectedClientConnectionId = msg.connectionId;
|
|
583
|
+
resolve();
|
|
584
|
+
}
|
|
585
|
+
};
|
|
586
|
+
});
|
|
587
|
+
|
|
588
|
+
// Connect client
|
|
589
|
+
const clientWs = new WebSocket(`${relayUrl}?role=client`);
|
|
590
|
+
|
|
591
|
+
await new Promise<void>((resolve, reject) => {
|
|
592
|
+
clientWs.onopen = () => resolve();
|
|
593
|
+
clientWs.onerror = () => reject(new Error("Client connection failed"));
|
|
594
|
+
setTimeout(() => reject(new Error("Timeout")), 2000);
|
|
595
|
+
});
|
|
596
|
+
|
|
597
|
+
const signedConnect = signClientMessage({
|
|
598
|
+
type: "connect_with_invite",
|
|
599
|
+
inviteId,
|
|
600
|
+
clientIdentityId,
|
|
601
|
+
}, testClient1);
|
|
602
|
+
clientWs.send(JSON.stringify(signedConnect));
|
|
603
|
+
|
|
604
|
+
// Wait for connection established
|
|
605
|
+
await new Promise<void>((resolve) => {
|
|
606
|
+
clientWs.onmessage = (event) => {
|
|
607
|
+
const msg = JSON.parse(event.data);
|
|
608
|
+
if (msg.type === "connection_established") resolve();
|
|
609
|
+
};
|
|
610
|
+
});
|
|
611
|
+
|
|
612
|
+
await clientConnectedPromise;
|
|
613
|
+
|
|
614
|
+
// Set up machine to receive data
|
|
615
|
+
const machineReceivedData = new Promise<any>((resolve) => {
|
|
616
|
+
machineWs.onmessage = (event) => {
|
|
617
|
+
resolve(JSON.parse(event.data));
|
|
618
|
+
};
|
|
619
|
+
});
|
|
620
|
+
|
|
621
|
+
// Client sends data to machine
|
|
622
|
+
const testData = Buffer.from("Hello from client").toString("base64");
|
|
623
|
+
clientWs.send(JSON.stringify({
|
|
624
|
+
type: "data",
|
|
625
|
+
data: testData,
|
|
626
|
+
}));
|
|
627
|
+
|
|
628
|
+
const receivedMsg = await machineReceivedData;
|
|
629
|
+
expect(receivedMsg.type).toBe("data");
|
|
630
|
+
expect(receivedMsg.data).toBe(testData);
|
|
631
|
+
expect(receivedMsg.connectionId).toBe(expectedClientConnectionId);
|
|
632
|
+
|
|
633
|
+
machineWs.close();
|
|
634
|
+
clientWs.close();
|
|
635
|
+
});
|
|
636
|
+
});
|
|
637
|
+
|
|
638
|
+
// ============================================================================
|
|
639
|
+
// Client Signature Enforcement
|
|
640
|
+
// ============================================================================
|
|
641
|
+
|
|
642
|
+
describe("Client signature enforcement", () => {
|
|
643
|
+
test("list_machines rejects missing signature", async () => {
|
|
644
|
+
const clientWs = await connectClient(relayUrl);
|
|
645
|
+
|
|
646
|
+
const response = await sendAndWait<any>(
|
|
647
|
+
clientWs,
|
|
648
|
+
{
|
|
649
|
+
type: "list_machines",
|
|
650
|
+
clientIdentityId: testClient1.id,
|
|
651
|
+
},
|
|
652
|
+
"error"
|
|
653
|
+
);
|
|
654
|
+
|
|
655
|
+
expect(response.type).toBe("error");
|
|
656
|
+
expect(response.code).toBe("INVALID_SIGNATURE");
|
|
657
|
+
|
|
658
|
+
clientWs.close();
|
|
659
|
+
});
|
|
660
|
+
|
|
661
|
+
test("connect_with_invite rejects missing signature", async () => {
|
|
662
|
+
const machineWs = await connectAndRegisterMachine(testMachine1);
|
|
663
|
+
const inviteId = "test-invite-unsigned";
|
|
664
|
+
|
|
665
|
+
machineWs.send(JSON.stringify({
|
|
666
|
+
type: "register_invite",
|
|
667
|
+
inviteId,
|
|
668
|
+
machineId: testMachine1.id,
|
|
669
|
+
expiresAt: Date.now() + 3600000,
|
|
670
|
+
maxUses: 1,
|
|
671
|
+
}));
|
|
672
|
+
|
|
673
|
+
await new Promise<void>((resolve) => {
|
|
674
|
+
machineWs.onmessage = () => resolve();
|
|
675
|
+
});
|
|
676
|
+
|
|
677
|
+
const clientWs = await connectClient(relayUrl);
|
|
678
|
+
|
|
679
|
+
const response = await sendAndWait<any>(
|
|
680
|
+
clientWs,
|
|
681
|
+
{
|
|
682
|
+
type: "connect_with_invite",
|
|
683
|
+
inviteId,
|
|
684
|
+
clientIdentityId: testClient1.id,
|
|
685
|
+
},
|
|
686
|
+
"error"
|
|
687
|
+
);
|
|
688
|
+
|
|
689
|
+
expect(response.type).toBe("error");
|
|
690
|
+
expect(response.code).toBe("INVALID_SIGNATURE");
|
|
691
|
+
|
|
692
|
+
machineWs.close();
|
|
693
|
+
clientWs.close();
|
|
694
|
+
});
|
|
695
|
+
|
|
696
|
+
test("connect_to_machine rejects mismatched signature", async () => {
|
|
697
|
+
const machineWs = await connectAndRegisterMachine(testMachine1);
|
|
698
|
+
const clientWs = await connectClient(relayUrl);
|
|
699
|
+
|
|
700
|
+
const signed = signClientMessage({
|
|
701
|
+
type: "connect_to_machine",
|
|
702
|
+
machineId: testMachine1.id,
|
|
703
|
+
clientIdentityId: testClient2.id,
|
|
704
|
+
}, testClient1);
|
|
705
|
+
|
|
706
|
+
const response = await sendAndWait<any>(clientWs, signed, "error");
|
|
707
|
+
|
|
708
|
+
expect(response.type).toBe("error");
|
|
709
|
+
expect(response.code).toBe("INVALID_SIGNATURE");
|
|
710
|
+
|
|
711
|
+
machineWs.close();
|
|
712
|
+
clientWs.close();
|
|
713
|
+
});
|
|
714
|
+
});
|
|
715
|
+
|
|
716
|
+
// ============================================================================
|
|
717
|
+
// Machine Listing
|
|
718
|
+
// ============================================================================
|
|
719
|
+
|
|
720
|
+
describe("Machine listing flow", () => {
|
|
721
|
+
test("client can list machines they are authorized for", async () => {
|
|
722
|
+
const clientIdentityId = testClient1.id;
|
|
723
|
+
|
|
724
|
+
// Register two machines
|
|
725
|
+
const machine1Ws = await connectAndRegisterMachine(testMachine1, { label: "Machine One" });
|
|
726
|
+
const machine2Ws = await connectAndRegisterMachine(testMachine2, { label: "Machine Two" });
|
|
727
|
+
|
|
728
|
+
// Authorize client on both machines
|
|
729
|
+
machine1Ws.send(JSON.stringify({
|
|
730
|
+
type: "authorize_client",
|
|
731
|
+
machineId: testMachine1.id,
|
|
732
|
+
clientIdentityId,
|
|
733
|
+
signingKey: "client-key",
|
|
734
|
+
keyExchangeKey: "client-kx",
|
|
735
|
+
accessType: "full",
|
|
736
|
+
}));
|
|
737
|
+
|
|
738
|
+
await new Promise<void>((resolve) => {
|
|
739
|
+
machine1Ws.onmessage = () => resolve();
|
|
740
|
+
});
|
|
741
|
+
|
|
742
|
+
machine2Ws.send(JSON.stringify({
|
|
743
|
+
type: "authorize_client",
|
|
744
|
+
machineId: testMachine2.id,
|
|
745
|
+
clientIdentityId,
|
|
746
|
+
signingKey: "client-key",
|
|
747
|
+
keyExchangeKey: "client-kx",
|
|
748
|
+
accessType: "full",
|
|
749
|
+
}));
|
|
750
|
+
|
|
751
|
+
await new Promise<void>((resolve) => {
|
|
752
|
+
machine2Ws.onmessage = () => resolve();
|
|
753
|
+
});
|
|
754
|
+
|
|
755
|
+
// Connect client and list machines
|
|
756
|
+
const clientWs = new WebSocket(`${relayUrl}?role=client`);
|
|
757
|
+
|
|
758
|
+
await new Promise<void>((resolve) => {
|
|
759
|
+
clientWs.onopen = () => resolve();
|
|
760
|
+
});
|
|
761
|
+
|
|
762
|
+
const signedList = signClientMessage({
|
|
763
|
+
type: "list_machines",
|
|
764
|
+
clientIdentityId,
|
|
765
|
+
}, testClient1);
|
|
766
|
+
clientWs.send(JSON.stringify(signedList));
|
|
767
|
+
|
|
768
|
+
const response = await new Promise<any>((resolve, reject) => {
|
|
769
|
+
clientWs.onmessage = (event) => {
|
|
770
|
+
resolve(JSON.parse(event.data));
|
|
771
|
+
};
|
|
772
|
+
setTimeout(() => reject(new Error("Timeout")), 2000);
|
|
773
|
+
});
|
|
774
|
+
|
|
775
|
+
expect(response.type).toBe("machine_list");
|
|
776
|
+
expect(response.machines).toHaveLength(2);
|
|
777
|
+
|
|
778
|
+
const machineIds = response.machines.map((m: any) => m.machineId).sort();
|
|
779
|
+
expect(machineIds).toEqual([testMachine1.id, testMachine2.id].sort());
|
|
780
|
+
|
|
781
|
+
// Both should be online
|
|
782
|
+
expect(response.machines.every((m: any) => m.online)).toBe(true);
|
|
783
|
+
|
|
784
|
+
machine1Ws.close();
|
|
785
|
+
machine2Ws.close();
|
|
786
|
+
clientWs.close();
|
|
787
|
+
});
|
|
788
|
+
|
|
789
|
+
test("client sees empty list when not authorized for any machine", async () => {
|
|
790
|
+
const clientIdentityId = testClient2.id;
|
|
791
|
+
|
|
792
|
+
// Register a machine but don't authorize the client
|
|
793
|
+
const machineWs = await connectAndRegisterMachine(testMachine1);
|
|
794
|
+
|
|
795
|
+
// Connect client and list machines
|
|
796
|
+
const clientWs = new WebSocket(`${relayUrl}?role=client`);
|
|
797
|
+
|
|
798
|
+
await new Promise<void>((resolve) => {
|
|
799
|
+
clientWs.onopen = () => resolve();
|
|
800
|
+
});
|
|
801
|
+
|
|
802
|
+
const signedList = signClientMessage({
|
|
803
|
+
type: "list_machines",
|
|
804
|
+
clientIdentityId,
|
|
805
|
+
}, testClient2);
|
|
806
|
+
clientWs.send(JSON.stringify(signedList));
|
|
807
|
+
|
|
808
|
+
const response = await new Promise<any>((resolve, reject) => {
|
|
809
|
+
clientWs.onmessage = (event) => {
|
|
810
|
+
resolve(JSON.parse(event.data));
|
|
811
|
+
};
|
|
812
|
+
setTimeout(() => reject(new Error("Timeout")), 2000);
|
|
813
|
+
});
|
|
814
|
+
|
|
815
|
+
expect(response.type).toBe("machine_list");
|
|
816
|
+
expect(response.machines).toHaveLength(0);
|
|
817
|
+
|
|
818
|
+
machineWs.close();
|
|
819
|
+
clientWs.close();
|
|
820
|
+
});
|
|
821
|
+
|
|
822
|
+
test("machine shows offline status when disconnected", async () => {
|
|
823
|
+
const clientIdentityId = testClient2.id;
|
|
824
|
+
|
|
825
|
+
// Register machine
|
|
826
|
+
const machineWs = await connectAndRegisterMachine(testMachine1, { label: "Offline Test Machine" });
|
|
827
|
+
|
|
828
|
+
// Authorize client
|
|
829
|
+
machineWs.send(JSON.stringify({
|
|
830
|
+
type: "authorize_client",
|
|
831
|
+
machineId: testMachine1.id,
|
|
832
|
+
clientIdentityId,
|
|
833
|
+
signingKey: "client-key",
|
|
834
|
+
keyExchangeKey: "client-kx",
|
|
835
|
+
accessType: "full",
|
|
836
|
+
}));
|
|
837
|
+
|
|
838
|
+
await new Promise<void>((resolve) => {
|
|
839
|
+
machineWs.onmessage = () => resolve();
|
|
840
|
+
});
|
|
841
|
+
|
|
842
|
+
// Disconnect machine
|
|
843
|
+
machineWs.close();
|
|
844
|
+
|
|
845
|
+
// Give server time to process disconnect
|
|
846
|
+
await new Promise((resolve) => setTimeout(resolve, 100));
|
|
847
|
+
|
|
848
|
+
// Connect client and list machines
|
|
849
|
+
const clientWs = new WebSocket(`${relayUrl}?role=client`);
|
|
850
|
+
|
|
851
|
+
await new Promise<void>((resolve) => {
|
|
852
|
+
clientWs.onopen = () => resolve();
|
|
853
|
+
});
|
|
854
|
+
|
|
855
|
+
const signedList = signClientMessage({
|
|
856
|
+
type: "list_machines",
|
|
857
|
+
clientIdentityId,
|
|
858
|
+
}, testClient2);
|
|
859
|
+
clientWs.send(JSON.stringify(signedList));
|
|
860
|
+
|
|
861
|
+
const response = await new Promise<any>((resolve, reject) => {
|
|
862
|
+
clientWs.onmessage = (event) => {
|
|
863
|
+
resolve(JSON.parse(event.data));
|
|
864
|
+
};
|
|
865
|
+
setTimeout(() => reject(new Error("Timeout")), 2000);
|
|
866
|
+
});
|
|
867
|
+
|
|
868
|
+
expect(response.type).toBe("machine_list");
|
|
869
|
+
expect(response.machines).toHaveLength(1);
|
|
870
|
+
expect(response.machines[0].machineId).toBe(testMachine1.id);
|
|
871
|
+
expect(response.machines[0].online).toBe(false);
|
|
872
|
+
|
|
873
|
+
clientWs.close();
|
|
874
|
+
});
|
|
875
|
+
});
|
|
876
|
+
|
|
877
|
+
// ============================================================================
|
|
878
|
+
// Direct Machine Connection
|
|
879
|
+
// ============================================================================
|
|
880
|
+
|
|
881
|
+
describe("Direct machine connection", () => {
|
|
882
|
+
test("client can connect directly to machine", async () => {
|
|
883
|
+
const clientIdentityId = testClient1.id;
|
|
884
|
+
|
|
885
|
+
// Register machine
|
|
886
|
+
const machineWs = await connectAndRegisterMachine(testMachine1);
|
|
887
|
+
|
|
888
|
+
// Set up machine to receive client_connected
|
|
889
|
+
const machineReceivedConnection = new Promise<any>((resolve) => {
|
|
890
|
+
machineWs.onmessage = (event) => {
|
|
891
|
+
resolve(JSON.parse(event.data));
|
|
892
|
+
};
|
|
893
|
+
});
|
|
894
|
+
|
|
895
|
+
// Connect client directly (no invite needed in new flow - auth at X3DH level)
|
|
896
|
+
const clientWs = new WebSocket(`${relayUrl}?role=client`);
|
|
897
|
+
|
|
898
|
+
await new Promise<void>((resolve) => {
|
|
899
|
+
clientWs.onopen = () => resolve();
|
|
900
|
+
});
|
|
901
|
+
|
|
902
|
+
const signedConnect = signClientMessage({
|
|
903
|
+
type: "connect_to_machine",
|
|
904
|
+
machineId: testMachine1.id,
|
|
905
|
+
clientIdentityId,
|
|
906
|
+
}, testClient1);
|
|
907
|
+
clientWs.send(JSON.stringify(signedConnect));
|
|
908
|
+
|
|
909
|
+
const response = await new Promise<any>((resolve, reject) => {
|
|
910
|
+
clientWs.onmessage = (event) => {
|
|
911
|
+
resolve(JSON.parse(event.data));
|
|
912
|
+
};
|
|
913
|
+
setTimeout(() => reject(new Error("Timeout")), 2000);
|
|
914
|
+
});
|
|
915
|
+
|
|
916
|
+
// In new auth model, connect_to_machine succeeds - auth happens via X3DH
|
|
917
|
+
expect(response.type).toBe("connection_established");
|
|
918
|
+
expect(response.machineId).toBe(testMachine1.id);
|
|
919
|
+
|
|
920
|
+
// Machine should receive client_connected WITHOUT viaInvite
|
|
921
|
+
const machineMsg = await machineReceivedConnection;
|
|
922
|
+
expect(machineMsg.type).toBe("client_connected");
|
|
923
|
+
expect(machineMsg.clientIdentityId).toBe(clientIdentityId);
|
|
924
|
+
expect(machineMsg.viaInvite).toBeUndefined();
|
|
925
|
+
|
|
926
|
+
machineWs.close();
|
|
927
|
+
clientWs.close();
|
|
928
|
+
});
|
|
929
|
+
|
|
930
|
+
test("client cannot connect to non-existent machine", async () => {
|
|
931
|
+
const clientIdentityId = testClient2.id;
|
|
932
|
+
|
|
933
|
+
const clientWs = new WebSocket(`${relayUrl}?role=client`);
|
|
934
|
+
|
|
935
|
+
await new Promise<void>((resolve) => {
|
|
936
|
+
clientWs.onopen = () => resolve();
|
|
937
|
+
});
|
|
938
|
+
|
|
939
|
+
const signedConnect = signClientMessage({
|
|
940
|
+
type: "connect_to_machine",
|
|
941
|
+
machineId: "non-existent-machine",
|
|
942
|
+
clientIdentityId,
|
|
943
|
+
}, testClient2);
|
|
944
|
+
clientWs.send(JSON.stringify(signedConnect));
|
|
945
|
+
|
|
946
|
+
const response = await new Promise<any>((resolve, reject) => {
|
|
947
|
+
clientWs.onmessage = (event) => {
|
|
948
|
+
resolve(JSON.parse(event.data));
|
|
949
|
+
};
|
|
950
|
+
setTimeout(() => reject(new Error("Timeout")), 2000);
|
|
951
|
+
});
|
|
952
|
+
|
|
953
|
+
expect(response.type).toBe("error");
|
|
954
|
+
expect(response.message.toLowerCase()).toContain("not found");
|
|
955
|
+
|
|
956
|
+
clientWs.close();
|
|
957
|
+
});
|
|
958
|
+
|
|
959
|
+
test("client cannot connect to offline machine", async () => {
|
|
960
|
+
const clientIdentityId = testClient2.id;
|
|
961
|
+
|
|
962
|
+
// Register machine then disconnect
|
|
963
|
+
const machineWs = await connectAndRegisterMachine(testMachine1);
|
|
964
|
+
machineWs.close();
|
|
965
|
+
await new Promise((resolve) => setTimeout(resolve, 100));
|
|
966
|
+
|
|
967
|
+
// Try to connect
|
|
968
|
+
const clientWs = new WebSocket(`${relayUrl}?role=client`);
|
|
969
|
+
|
|
970
|
+
await new Promise<void>((resolve) => {
|
|
971
|
+
clientWs.onopen = () => resolve();
|
|
972
|
+
});
|
|
973
|
+
|
|
974
|
+
const signedConnect = signClientMessage({
|
|
975
|
+
type: "connect_to_machine",
|
|
976
|
+
machineId: testMachine1.id,
|
|
977
|
+
clientIdentityId,
|
|
978
|
+
}, testClient2);
|
|
979
|
+
clientWs.send(JSON.stringify(signedConnect));
|
|
980
|
+
|
|
981
|
+
const response = await new Promise<any>((resolve, reject) => {
|
|
982
|
+
clientWs.onmessage = (event) => {
|
|
983
|
+
resolve(JSON.parse(event.data));
|
|
984
|
+
};
|
|
985
|
+
setTimeout(() => reject(new Error("Timeout")), 2000);
|
|
986
|
+
});
|
|
987
|
+
|
|
988
|
+
expect(response.type).toBe("error");
|
|
989
|
+
expect(response.message.toLowerCase()).toContain("offline");
|
|
990
|
+
|
|
991
|
+
clientWs.close();
|
|
992
|
+
});
|
|
993
|
+
});
|
|
994
|
+
|
|
995
|
+
// ============================================================================
|
|
996
|
+
// Authorization Management
|
|
997
|
+
// ============================================================================
|
|
998
|
+
|
|
999
|
+
describe("Authorization management", () => {
|
|
1000
|
+
test("machine can authorize a client", async () => {
|
|
1001
|
+
const clientIdentityId = testClient1.id;
|
|
1002
|
+
|
|
1003
|
+
// Register machine
|
|
1004
|
+
const machineWs = await connectAndRegisterMachine(testMachine1);
|
|
1005
|
+
|
|
1006
|
+
// Authorize client
|
|
1007
|
+
machineWs.send(JSON.stringify({
|
|
1008
|
+
type: "authorize_client",
|
|
1009
|
+
machineId: testMachine1.id,
|
|
1010
|
+
clientIdentityId,
|
|
1011
|
+
signingKey: "client-key",
|
|
1012
|
+
keyExchangeKey: "client-kx",
|
|
1013
|
+
accessType: "full",
|
|
1014
|
+
}));
|
|
1015
|
+
|
|
1016
|
+
const response = await new Promise<any>((resolve, reject) => {
|
|
1017
|
+
machineWs.onmessage = (event) => {
|
|
1018
|
+
resolve(JSON.parse(event.data));
|
|
1019
|
+
};
|
|
1020
|
+
setTimeout(() => reject(new Error("Timeout")), 2000);
|
|
1021
|
+
});
|
|
1022
|
+
|
|
1023
|
+
expect(response.type).toBe("client_authorized");
|
|
1024
|
+
expect(response.clientIdentityId).toBe(clientIdentityId);
|
|
1025
|
+
|
|
1026
|
+
// Verify by listing machines from client
|
|
1027
|
+
const clientWs = new WebSocket(`${relayUrl}?role=client`);
|
|
1028
|
+
|
|
1029
|
+
await new Promise<void>((resolve) => {
|
|
1030
|
+
clientWs.onopen = () => resolve();
|
|
1031
|
+
});
|
|
1032
|
+
|
|
1033
|
+
const signedList = signClientMessage({
|
|
1034
|
+
type: "list_machines",
|
|
1035
|
+
clientIdentityId,
|
|
1036
|
+
}, testClient1);
|
|
1037
|
+
clientWs.send(JSON.stringify(signedList));
|
|
1038
|
+
|
|
1039
|
+
const listResponse = await new Promise<any>((resolve, reject) => {
|
|
1040
|
+
clientWs.onmessage = (event) => {
|
|
1041
|
+
resolve(JSON.parse(event.data));
|
|
1042
|
+
};
|
|
1043
|
+
setTimeout(() => reject(new Error("Timeout")), 2000);
|
|
1044
|
+
});
|
|
1045
|
+
|
|
1046
|
+
expect(listResponse.machines).toHaveLength(1);
|
|
1047
|
+
expect(listResponse.machines[0].machineId).toBe(testMachine1.id);
|
|
1048
|
+
|
|
1049
|
+
machineWs.close();
|
|
1050
|
+
clientWs.close();
|
|
1051
|
+
});
|
|
1052
|
+
|
|
1053
|
+
test("machine can revoke client authorization", async () => {
|
|
1054
|
+
const clientIdentityId = testClient2.id;
|
|
1055
|
+
|
|
1056
|
+
// Register machine
|
|
1057
|
+
const machineWs = await connectAndRegisterMachine(testMachine1);
|
|
1058
|
+
|
|
1059
|
+
// Authorize client
|
|
1060
|
+
machineWs.send(JSON.stringify({
|
|
1061
|
+
type: "authorize_client",
|
|
1062
|
+
machineId: testMachine1.id,
|
|
1063
|
+
clientIdentityId,
|
|
1064
|
+
signingKey: "client-key",
|
|
1065
|
+
keyExchangeKey: "client-kx",
|
|
1066
|
+
accessType: "full",
|
|
1067
|
+
}));
|
|
1068
|
+
|
|
1069
|
+
await new Promise<void>((resolve) => {
|
|
1070
|
+
machineWs.onmessage = () => resolve();
|
|
1071
|
+
});
|
|
1072
|
+
|
|
1073
|
+
// Now revoke
|
|
1074
|
+
machineWs.send(JSON.stringify({
|
|
1075
|
+
type: "revoke_client",
|
|
1076
|
+
machineId: testMachine1.id,
|
|
1077
|
+
clientIdentityId,
|
|
1078
|
+
}));
|
|
1079
|
+
|
|
1080
|
+
const response = await new Promise<any>((resolve, reject) => {
|
|
1081
|
+
machineWs.onmessage = (event) => {
|
|
1082
|
+
resolve(JSON.parse(event.data));
|
|
1083
|
+
};
|
|
1084
|
+
setTimeout(() => reject(new Error("Timeout")), 2000);
|
|
1085
|
+
});
|
|
1086
|
+
|
|
1087
|
+
expect(response.type).toBe("client_revoked");
|
|
1088
|
+
expect(response.clientIdentityId).toBe(clientIdentityId);
|
|
1089
|
+
|
|
1090
|
+
// Verify by listing machines from client - should be empty
|
|
1091
|
+
const clientWs = new WebSocket(`${relayUrl}?role=client`);
|
|
1092
|
+
|
|
1093
|
+
await new Promise<void>((resolve) => {
|
|
1094
|
+
clientWs.onopen = () => resolve();
|
|
1095
|
+
});
|
|
1096
|
+
|
|
1097
|
+
const signedList = signClientMessage({
|
|
1098
|
+
type: "list_machines",
|
|
1099
|
+
clientIdentityId,
|
|
1100
|
+
}, testClient2);
|
|
1101
|
+
clientWs.send(JSON.stringify(signedList));
|
|
1102
|
+
|
|
1103
|
+
const listResponse = await new Promise<any>((resolve, reject) => {
|
|
1104
|
+
clientWs.onmessage = (event) => {
|
|
1105
|
+
resolve(JSON.parse(event.data));
|
|
1106
|
+
};
|
|
1107
|
+
setTimeout(() => reject(new Error("Timeout")), 2000);
|
|
1108
|
+
});
|
|
1109
|
+
|
|
1110
|
+
expect(listResponse.machines).toHaveLength(0);
|
|
1111
|
+
|
|
1112
|
+
machineWs.close();
|
|
1113
|
+
clientWs.close();
|
|
1114
|
+
});
|
|
1115
|
+
});
|
|
1116
|
+
|
|
1117
|
+
// ============================================================================
|
|
1118
|
+
// Invite Edge Cases
|
|
1119
|
+
// ============================================================================
|
|
1120
|
+
|
|
1121
|
+
describe("Invite edge cases", () => {
|
|
1122
|
+
test("rejects expired invite", async () => {
|
|
1123
|
+
const machineWs = await connectAndRegisterMachine(testMachine1);
|
|
1124
|
+
const inviteId = "expired-invite-001";
|
|
1125
|
+
const clientIdentityId = testClient1.id;
|
|
1126
|
+
|
|
1127
|
+
// Register expired invite
|
|
1128
|
+
machineWs.send(JSON.stringify({
|
|
1129
|
+
type: "register_invite",
|
|
1130
|
+
inviteId,
|
|
1131
|
+
machineId: testMachine1.id,
|
|
1132
|
+
expiresAt: Date.now() - 1000, // Already expired
|
|
1133
|
+
maxUses: null,
|
|
1134
|
+
}));
|
|
1135
|
+
|
|
1136
|
+
await new Promise<void>((resolve) => {
|
|
1137
|
+
machineWs.onmessage = () => resolve();
|
|
1138
|
+
});
|
|
1139
|
+
|
|
1140
|
+
// Try to use expired invite
|
|
1141
|
+
const clientWs = new WebSocket(`${relayUrl}?role=client`);
|
|
1142
|
+
|
|
1143
|
+
await new Promise<void>((resolve) => {
|
|
1144
|
+
clientWs.onopen = () => resolve();
|
|
1145
|
+
});
|
|
1146
|
+
|
|
1147
|
+
const signedConnect = signClientMessage({
|
|
1148
|
+
type: "connect_with_invite",
|
|
1149
|
+
inviteId,
|
|
1150
|
+
clientIdentityId,
|
|
1151
|
+
}, testClient1);
|
|
1152
|
+
clientWs.send(JSON.stringify(signedConnect));
|
|
1153
|
+
|
|
1154
|
+
const response = await new Promise<any>((resolve, reject) => {
|
|
1155
|
+
clientWs.onmessage = (event) => {
|
|
1156
|
+
resolve(JSON.parse(event.data));
|
|
1157
|
+
};
|
|
1158
|
+
setTimeout(() => reject(new Error("Timeout")), 2000);
|
|
1159
|
+
});
|
|
1160
|
+
|
|
1161
|
+
expect(response.type).toBe("error");
|
|
1162
|
+
expect(response.message.toLowerCase()).toMatch(/expired|invalid/);
|
|
1163
|
+
|
|
1164
|
+
machineWs.close();
|
|
1165
|
+
clientWs.close();
|
|
1166
|
+
});
|
|
1167
|
+
|
|
1168
|
+
test("rejects invite after max uses exhausted", async () => {
|
|
1169
|
+
const machineWs = await connectAndRegisterMachine(testMachine1);
|
|
1170
|
+
const inviteId = "limited-invite-001";
|
|
1171
|
+
|
|
1172
|
+
// Register invite with maxUses = 1
|
|
1173
|
+
machineWs.send(JSON.stringify({
|
|
1174
|
+
type: "register_invite",
|
|
1175
|
+
inviteId,
|
|
1176
|
+
machineId: testMachine1.id,
|
|
1177
|
+
expiresAt: Date.now() + 3600000,
|
|
1178
|
+
maxUses: 1,
|
|
1179
|
+
}));
|
|
1180
|
+
|
|
1181
|
+
await new Promise<void>((resolve) => {
|
|
1182
|
+
machineWs.onmessage = () => resolve();
|
|
1183
|
+
});
|
|
1184
|
+
|
|
1185
|
+
// Set up machine to receive client_connected
|
|
1186
|
+
const machineReceivedFirst = new Promise<void>((resolve) => {
|
|
1187
|
+
machineWs.onmessage = (event) => {
|
|
1188
|
+
const msg = JSON.parse(event.data);
|
|
1189
|
+
if (msg.type === "client_connected") resolve();
|
|
1190
|
+
};
|
|
1191
|
+
});
|
|
1192
|
+
|
|
1193
|
+
// First client uses the invite
|
|
1194
|
+
const client1Ws = new WebSocket(`${relayUrl}?role=client`);
|
|
1195
|
+
|
|
1196
|
+
await new Promise<void>((resolve) => {
|
|
1197
|
+
client1Ws.onopen = () => resolve();
|
|
1198
|
+
});
|
|
1199
|
+
|
|
1200
|
+
const signedFirst = signClientMessage({
|
|
1201
|
+
type: "connect_with_invite",
|
|
1202
|
+
inviteId,
|
|
1203
|
+
clientIdentityId: testClient1.id,
|
|
1204
|
+
}, testClient1);
|
|
1205
|
+
client1Ws.send(JSON.stringify(signedFirst));
|
|
1206
|
+
|
|
1207
|
+
await new Promise<void>((resolve) => {
|
|
1208
|
+
client1Ws.onmessage = (event) => {
|
|
1209
|
+
const msg = JSON.parse(event.data);
|
|
1210
|
+
if (msg.type === "connection_established") resolve();
|
|
1211
|
+
};
|
|
1212
|
+
});
|
|
1213
|
+
|
|
1214
|
+
await machineReceivedFirst;
|
|
1215
|
+
|
|
1216
|
+
// Second client tries to use the same invite
|
|
1217
|
+
const client2Ws = new WebSocket(`${relayUrl}?role=client`);
|
|
1218
|
+
|
|
1219
|
+
await new Promise<void>((resolve) => {
|
|
1220
|
+
client2Ws.onopen = () => resolve();
|
|
1221
|
+
});
|
|
1222
|
+
|
|
1223
|
+
const signedSecond = signClientMessage({
|
|
1224
|
+
type: "connect_with_invite",
|
|
1225
|
+
inviteId,
|
|
1226
|
+
clientIdentityId: testClient2.id,
|
|
1227
|
+
}, testClient2);
|
|
1228
|
+
client2Ws.send(JSON.stringify(signedSecond));
|
|
1229
|
+
|
|
1230
|
+
const response = await new Promise<any>((resolve, reject) => {
|
|
1231
|
+
client2Ws.onmessage = (event) => {
|
|
1232
|
+
resolve(JSON.parse(event.data));
|
|
1233
|
+
};
|
|
1234
|
+
setTimeout(() => reject(new Error("Timeout")), 2000);
|
|
1235
|
+
});
|
|
1236
|
+
|
|
1237
|
+
expect(response.type).toBe("error");
|
|
1238
|
+
expect(response.message.toLowerCase()).toMatch(/not found|invalid|expired|exhausted/);
|
|
1239
|
+
|
|
1240
|
+
machineWs.close();
|
|
1241
|
+
client1Ws.close();
|
|
1242
|
+
client2Ws.close();
|
|
1243
|
+
});
|
|
1244
|
+
|
|
1245
|
+
test("rejects non-existent invite", async () => {
|
|
1246
|
+
const clientIdentityId = testClient1.id;
|
|
1247
|
+
|
|
1248
|
+
const clientWs = new WebSocket(`${relayUrl}?role=client`);
|
|
1249
|
+
|
|
1250
|
+
await new Promise<void>((resolve) => {
|
|
1251
|
+
clientWs.onopen = () => resolve();
|
|
1252
|
+
});
|
|
1253
|
+
|
|
1254
|
+
const signedConnect = signClientMessage({
|
|
1255
|
+
type: "connect_with_invite",
|
|
1256
|
+
inviteId: "non-existent-invite",
|
|
1257
|
+
clientIdentityId,
|
|
1258
|
+
}, testClient1);
|
|
1259
|
+
clientWs.send(JSON.stringify(signedConnect));
|
|
1260
|
+
|
|
1261
|
+
const response = await new Promise<any>((resolve, reject) => {
|
|
1262
|
+
clientWs.onmessage = (event) => {
|
|
1263
|
+
resolve(JSON.parse(event.data));
|
|
1264
|
+
};
|
|
1265
|
+
setTimeout(() => reject(new Error("Timeout")), 2000);
|
|
1266
|
+
});
|
|
1267
|
+
|
|
1268
|
+
expect(response.type).toBe("error");
|
|
1269
|
+
expect(response.message.toLowerCase()).toContain("not found");
|
|
1270
|
+
|
|
1271
|
+
clientWs.close();
|
|
1272
|
+
});
|
|
1273
|
+
|
|
1274
|
+
test("invite fails when machine is offline", async () => {
|
|
1275
|
+
const machineWs = await connectAndRegisterMachine(testMachine1);
|
|
1276
|
+
const inviteId = "offline-machine-invite";
|
|
1277
|
+
const clientIdentityId = testClient1.id;
|
|
1278
|
+
|
|
1279
|
+
// Register invite
|
|
1280
|
+
machineWs.send(JSON.stringify({
|
|
1281
|
+
type: "register_invite",
|
|
1282
|
+
inviteId,
|
|
1283
|
+
machineId: testMachine1.id,
|
|
1284
|
+
expiresAt: Date.now() + 3600000,
|
|
1285
|
+
maxUses: null,
|
|
1286
|
+
}));
|
|
1287
|
+
|
|
1288
|
+
await new Promise<void>((resolve) => {
|
|
1289
|
+
machineWs.onmessage = () => resolve();
|
|
1290
|
+
});
|
|
1291
|
+
|
|
1292
|
+
// Disconnect machine
|
|
1293
|
+
machineWs.close();
|
|
1294
|
+
await new Promise((resolve) => setTimeout(resolve, 100));
|
|
1295
|
+
|
|
1296
|
+
// Try to use invite while machine is offline
|
|
1297
|
+
const clientWs = new WebSocket(`${relayUrl}?role=client`);
|
|
1298
|
+
|
|
1299
|
+
await new Promise<void>((resolve) => {
|
|
1300
|
+
clientWs.onopen = () => resolve();
|
|
1301
|
+
});
|
|
1302
|
+
|
|
1303
|
+
const signedConnect = signClientMessage({
|
|
1304
|
+
type: "connect_with_invite",
|
|
1305
|
+
inviteId,
|
|
1306
|
+
clientIdentityId,
|
|
1307
|
+
}, testClient1);
|
|
1308
|
+
clientWs.send(JSON.stringify(signedConnect));
|
|
1309
|
+
|
|
1310
|
+
const response = await new Promise<any>((resolve, reject) => {
|
|
1311
|
+
clientWs.onmessage = (event) => {
|
|
1312
|
+
resolve(JSON.parse(event.data));
|
|
1313
|
+
};
|
|
1314
|
+
setTimeout(() => reject(new Error("Timeout")), 2000);
|
|
1315
|
+
});
|
|
1316
|
+
|
|
1317
|
+
// Should fail because machine is offline
|
|
1318
|
+
expect(response.type).toBe("error");
|
|
1319
|
+
expect(response.message.toLowerCase()).toContain("offline");
|
|
1320
|
+
|
|
1321
|
+
clientWs.close();
|
|
1322
|
+
});
|
|
1323
|
+
});
|