gitspace 0.2.0-rc.2 → 0.2.0-rc.21

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (316) hide show
  1. package/README.md +68 -38
  2. package/package.json +36 -25
  3. package/.claude/settings.local.json +0 -21
  4. package/.gitspace/bundle.json +0 -50
  5. package/.gitspace/select/01-status.sh +0 -40
  6. package/.gitspace/setup/01-install-deps.sh +0 -12
  7. package/.gitspace/setup/02-typecheck.sh +0 -16
  8. package/AGENTS.md +0 -439
  9. package/CLAUDE.md +0 -1
  10. package/bun.lock +0 -647
  11. package/docs/CONNECTION.md +0 -623
  12. package/docs/GATEWAY-WORKER.md +0 -319
  13. package/docs/GETTING-STARTED.md +0 -448
  14. package/docs/GITSPACE-PLATFORM.md +0 -1819
  15. package/docs/INFRASTRUCTURE.md +0 -1347
  16. package/docs/PROTOCOL.md +0 -619
  17. package/docs/QUICKSTART.md +0 -174
  18. package/docs/RELAY.md +0 -327
  19. package/docs/REMOTE-DESIGN.md +0 -549
  20. package/docs/ROADMAP.md +0 -564
  21. package/docs/SITE_DOCS_FIGMA_MAKE.md +0 -1167
  22. package/docs/STACK-DESIGN.md +0 -588
  23. package/docs/UNIFIED_ARCHITECTURE.md +0 -292
  24. package/experiments/pty-benchmark.ts +0 -148
  25. package/experiments/pty-latency.ts +0 -100
  26. package/experiments/router/client.ts +0 -199
  27. package/experiments/router/protocol.ts +0 -74
  28. package/experiments/router/router.ts +0 -217
  29. package/experiments/router/session.ts +0 -180
  30. package/experiments/router/test.ts +0 -133
  31. package/experiments/socket-bandwidth.ts +0 -77
  32. package/homebrew/gitspace.rb +0 -45
  33. package/landing-page/ATTRIBUTIONS.md +0 -3
  34. package/landing-page/README.md +0 -11
  35. package/landing-page/bun.lock +0 -801
  36. package/landing-page/guidelines/Guidelines.md +0 -61
  37. package/landing-page/index.html +0 -37
  38. package/landing-page/package.json +0 -90
  39. package/landing-page/postcss.config.mjs +0 -15
  40. package/landing-page/public/_redirects +0 -1
  41. package/landing-page/public/favicon.png +0 -0
  42. package/landing-page/src/app/App.tsx +0 -53
  43. package/landing-page/src/app/components/figma/ImageWithFallback.tsx +0 -27
  44. package/landing-page/src/app/components/ui/accordion.tsx +0 -66
  45. package/landing-page/src/app/components/ui/alert-dialog.tsx +0 -157
  46. package/landing-page/src/app/components/ui/alert.tsx +0 -66
  47. package/landing-page/src/app/components/ui/aspect-ratio.tsx +0 -11
  48. package/landing-page/src/app/components/ui/avatar.tsx +0 -53
  49. package/landing-page/src/app/components/ui/badge.tsx +0 -46
  50. package/landing-page/src/app/components/ui/breadcrumb.tsx +0 -109
  51. package/landing-page/src/app/components/ui/button.tsx +0 -57
  52. package/landing-page/src/app/components/ui/calendar.tsx +0 -75
  53. package/landing-page/src/app/components/ui/card.tsx +0 -92
  54. package/landing-page/src/app/components/ui/carousel.tsx +0 -241
  55. package/landing-page/src/app/components/ui/chart.tsx +0 -353
  56. package/landing-page/src/app/components/ui/checkbox.tsx +0 -32
  57. package/landing-page/src/app/components/ui/collapsible.tsx +0 -33
  58. package/landing-page/src/app/components/ui/command.tsx +0 -177
  59. package/landing-page/src/app/components/ui/context-menu.tsx +0 -252
  60. package/landing-page/src/app/components/ui/dialog.tsx +0 -135
  61. package/landing-page/src/app/components/ui/drawer.tsx +0 -132
  62. package/landing-page/src/app/components/ui/dropdown-menu.tsx +0 -257
  63. package/landing-page/src/app/components/ui/form.tsx +0 -168
  64. package/landing-page/src/app/components/ui/hover-card.tsx +0 -44
  65. package/landing-page/src/app/components/ui/input-otp.tsx +0 -77
  66. package/landing-page/src/app/components/ui/input.tsx +0 -21
  67. package/landing-page/src/app/components/ui/label.tsx +0 -24
  68. package/landing-page/src/app/components/ui/menubar.tsx +0 -276
  69. package/landing-page/src/app/components/ui/navigation-menu.tsx +0 -168
  70. package/landing-page/src/app/components/ui/pagination.tsx +0 -127
  71. package/landing-page/src/app/components/ui/popover.tsx +0 -48
  72. package/landing-page/src/app/components/ui/progress.tsx +0 -31
  73. package/landing-page/src/app/components/ui/radio-group.tsx +0 -45
  74. package/landing-page/src/app/components/ui/resizable.tsx +0 -56
  75. package/landing-page/src/app/components/ui/scroll-area.tsx +0 -58
  76. package/landing-page/src/app/components/ui/select.tsx +0 -189
  77. package/landing-page/src/app/components/ui/separator.tsx +0 -28
  78. package/landing-page/src/app/components/ui/sheet.tsx +0 -139
  79. package/landing-page/src/app/components/ui/sidebar.tsx +0 -726
  80. package/landing-page/src/app/components/ui/skeleton.tsx +0 -13
  81. package/landing-page/src/app/components/ui/slider.tsx +0 -63
  82. package/landing-page/src/app/components/ui/sonner.tsx +0 -25
  83. package/landing-page/src/app/components/ui/switch.tsx +0 -31
  84. package/landing-page/src/app/components/ui/table.tsx +0 -116
  85. package/landing-page/src/app/components/ui/tabs.tsx +0 -66
  86. package/landing-page/src/app/components/ui/textarea.tsx +0 -18
  87. package/landing-page/src/app/components/ui/toggle-group.tsx +0 -73
  88. package/landing-page/src/app/components/ui/toggle.tsx +0 -47
  89. package/landing-page/src/app/components/ui/tooltip.tsx +0 -61
  90. package/landing-page/src/app/components/ui/use-mobile.ts +0 -21
  91. package/landing-page/src/app/components/ui/utils.ts +0 -6
  92. package/landing-page/src/components/docs/DocsContent.tsx +0 -718
  93. package/landing-page/src/components/docs/DocsSidebar.tsx +0 -84
  94. package/landing-page/src/components/landing/CTA.tsx +0 -59
  95. package/landing-page/src/components/landing/Comparison.tsx +0 -84
  96. package/landing-page/src/components/landing/FaultyTerminal.tsx +0 -424
  97. package/landing-page/src/components/landing/Features.tsx +0 -201
  98. package/landing-page/src/components/landing/Hero.tsx +0 -142
  99. package/landing-page/src/components/landing/Pricing.tsx +0 -140
  100. package/landing-page/src/components/landing/Roadmap.tsx +0 -86
  101. package/landing-page/src/components/landing/Security.tsx +0 -81
  102. package/landing-page/src/components/landing/TerminalWindow.tsx +0 -27
  103. package/landing-page/src/components/landing/UseCases.tsx +0 -55
  104. package/landing-page/src/components/landing/Workflow.tsx +0 -101
  105. package/landing-page/src/components/layout/DashboardNavbar.tsx +0 -37
  106. package/landing-page/src/components/layout/Footer.tsx +0 -55
  107. package/landing-page/src/components/layout/LandingNavbar.tsx +0 -82
  108. package/landing-page/src/components/ui/badge.tsx +0 -39
  109. package/landing-page/src/components/ui/breadcrumb.tsx +0 -115
  110. package/landing-page/src/components/ui/button.tsx +0 -57
  111. package/landing-page/src/components/ui/card.tsx +0 -79
  112. package/landing-page/src/components/ui/mock-terminal.tsx +0 -68
  113. package/landing-page/src/components/ui/separator.tsx +0 -28
  114. package/landing-page/src/lib/utils.ts +0 -6
  115. package/landing-page/src/main.tsx +0 -10
  116. package/landing-page/src/pages/Dashboard.tsx +0 -133
  117. package/landing-page/src/pages/DocsPage.tsx +0 -79
  118. package/landing-page/src/pages/LandingPage.tsx +0 -31
  119. package/landing-page/src/pages/TerminalView.tsx +0 -106
  120. package/landing-page/src/styles/fonts.css +0 -0
  121. package/landing-page/src/styles/index.css +0 -3
  122. package/landing-page/src/styles/tailwind.css +0 -4
  123. package/landing-page/src/styles/theme.css +0 -181
  124. package/landing-page/vite.config.ts +0 -19
  125. package/npm/darwin-arm64/bin/gssh +0 -0
  126. package/npm/darwin-arm64/package.json +0 -20
  127. package/scripts/build.ts +0 -298
  128. package/scripts/release.ts +0 -140
  129. package/src/__tests__/test-utils.ts +0 -298
  130. package/src/commands/__tests__/serve-messages.test.ts +0 -190
  131. package/src/commands/access.ts +0 -298
  132. package/src/commands/add.ts +0 -452
  133. package/src/commands/auth.ts +0 -364
  134. package/src/commands/connect.ts +0 -287
  135. package/src/commands/directory.ts +0 -16
  136. package/src/commands/host.ts +0 -396
  137. package/src/commands/identity.ts +0 -184
  138. package/src/commands/list.ts +0 -200
  139. package/src/commands/relay.ts +0 -315
  140. package/src/commands/remove.ts +0 -241
  141. package/src/commands/serve.ts +0 -1493
  142. package/src/commands/share.ts +0 -456
  143. package/src/commands/status.ts +0 -125
  144. package/src/commands/switch.ts +0 -353
  145. package/src/commands/tmux.ts +0 -317
  146. package/src/core/__tests__/access.test.ts +0 -240
  147. package/src/core/access.ts +0 -277
  148. package/src/core/bundle.ts +0 -342
  149. package/src/core/config.ts +0 -510
  150. package/src/core/git.ts +0 -317
  151. package/src/core/github.ts +0 -151
  152. package/src/core/identity.ts +0 -631
  153. package/src/core/linear.ts +0 -225
  154. package/src/core/shell.ts +0 -161
  155. package/src/core/trusted-relays.ts +0 -315
  156. package/src/index.ts +0 -810
  157. package/src/lib/remote-session/index.ts +0 -7
  158. package/src/lib/remote-session/protocol.ts +0 -267
  159. package/src/lib/remote-session/session-handler.ts +0 -581
  160. package/src/lib/remote-session/workspace-scanner.ts +0 -167
  161. package/src/lib/tmux-lite/README.md +0 -81
  162. package/src/lib/tmux-lite/cli.ts +0 -796
  163. package/src/lib/tmux-lite/crypto/__tests__/helpers/handshake-runner.ts +0 -349
  164. package/src/lib/tmux-lite/crypto/__tests__/helpers/mock-relay.ts +0 -291
  165. package/src/lib/tmux-lite/crypto/__tests__/helpers/test-identities.ts +0 -142
  166. package/src/lib/tmux-lite/crypto/__tests__/integration/authorization.integration.test.ts +0 -339
  167. package/src/lib/tmux-lite/crypto/__tests__/integration/e2e-communication.integration.test.ts +0 -477
  168. package/src/lib/tmux-lite/crypto/__tests__/integration/error-handling.integration.test.ts +0 -499
  169. package/src/lib/tmux-lite/crypto/__tests__/integration/handshake.integration.test.ts +0 -371
  170. package/src/lib/tmux-lite/crypto/__tests__/integration/security.integration.test.ts +0 -573
  171. package/src/lib/tmux-lite/crypto/access-control.test.ts +0 -512
  172. package/src/lib/tmux-lite/crypto/access-control.ts +0 -320
  173. package/src/lib/tmux-lite/crypto/frames.test.ts +0 -262
  174. package/src/lib/tmux-lite/crypto/frames.ts +0 -141
  175. package/src/lib/tmux-lite/crypto/handshake.ts +0 -894
  176. package/src/lib/tmux-lite/crypto/identity.test.ts +0 -220
  177. package/src/lib/tmux-lite/crypto/identity.ts +0 -286
  178. package/src/lib/tmux-lite/crypto/index.ts +0 -51
  179. package/src/lib/tmux-lite/crypto/invites.test.ts +0 -381
  180. package/src/lib/tmux-lite/crypto/invites.ts +0 -215
  181. package/src/lib/tmux-lite/crypto/keyexchange.ts +0 -435
  182. package/src/lib/tmux-lite/crypto/keys.test.ts +0 -58
  183. package/src/lib/tmux-lite/crypto/keys.ts +0 -47
  184. package/src/lib/tmux-lite/crypto/secretbox.test.ts +0 -169
  185. package/src/lib/tmux-lite/crypto/secretbox.ts +0 -124
  186. package/src/lib/tmux-lite/handshake-handler.ts +0 -451
  187. package/src/lib/tmux-lite/protocol.test.ts +0 -307
  188. package/src/lib/tmux-lite/protocol.ts +0 -266
  189. package/src/lib/tmux-lite/relay-client.ts +0 -506
  190. package/src/lib/tmux-lite/server.ts +0 -1250
  191. package/src/lib/tmux-lite/shell-integration.sh +0 -37
  192. package/src/lib/tmux-lite/terminal-queries.test.ts +0 -54
  193. package/src/lib/tmux-lite/terminal-queries.ts +0 -49
  194. package/src/relay/__tests__/e2e-flow.test.ts +0 -1284
  195. package/src/relay/__tests__/helpers/auth.ts +0 -354
  196. package/src/relay/__tests__/helpers/ports.ts +0 -51
  197. package/src/relay/__tests__/protocol-validation.test.ts +0 -265
  198. package/src/relay/authorization.ts +0 -303
  199. package/src/relay/embedded-assets.generated.d.ts +0 -15
  200. package/src/relay/identity.ts +0 -352
  201. package/src/relay/index.ts +0 -57
  202. package/src/relay/pipes.test.ts +0 -427
  203. package/src/relay/pipes.ts +0 -195
  204. package/src/relay/protocol.ts +0 -804
  205. package/src/relay/registries.test.ts +0 -437
  206. package/src/relay/registries.ts +0 -593
  207. package/src/relay/server.test.ts +0 -1323
  208. package/src/relay/server.ts +0 -1092
  209. package/src/relay/signing.ts +0 -238
  210. package/src/relay/types.ts +0 -69
  211. package/src/serve/client-session-manager.ts +0 -622
  212. package/src/serve/daemon.ts +0 -497
  213. package/src/serve/pty-session.ts +0 -236
  214. package/src/serve/types.ts +0 -169
  215. package/src/shared/components/Flow.tsx +0 -453
  216. package/src/shared/components/Flow.tui.tsx +0 -343
  217. package/src/shared/components/Flow.web.tsx +0 -442
  218. package/src/shared/components/Inbox.tsx +0 -446
  219. package/src/shared/components/Inbox.tui.tsx +0 -262
  220. package/src/shared/components/Inbox.web.tsx +0 -329
  221. package/src/shared/components/MachineList.tsx +0 -187
  222. package/src/shared/components/MachineList.tui.tsx +0 -161
  223. package/src/shared/components/MachineList.web.tsx +0 -210
  224. package/src/shared/components/ProjectList.tsx +0 -176
  225. package/src/shared/components/ProjectList.tui.tsx +0 -109
  226. package/src/shared/components/ProjectList.web.tsx +0 -143
  227. package/src/shared/components/SpacesBrowser.tsx +0 -332
  228. package/src/shared/components/SpacesBrowser.tui.tsx +0 -163
  229. package/src/shared/components/SpacesBrowser.web.tsx +0 -221
  230. package/src/shared/components/index.ts +0 -103
  231. package/src/shared/hooks/index.ts +0 -16
  232. package/src/shared/hooks/useNavigation.ts +0 -226
  233. package/src/shared/index.ts +0 -122
  234. package/src/shared/providers/LocalMachineProvider.ts +0 -425
  235. package/src/shared/providers/MachineProvider.ts +0 -165
  236. package/src/shared/providers/RemoteMachineProvider.ts +0 -444
  237. package/src/shared/providers/index.ts +0 -26
  238. package/src/shared/types.ts +0 -145
  239. package/src/tui/adapters.ts +0 -120
  240. package/src/tui/app.tsx +0 -1816
  241. package/src/tui/components/Terminal.tsx +0 -580
  242. package/src/tui/hooks/index.ts +0 -35
  243. package/src/tui/hooks/useAppState.ts +0 -314
  244. package/src/tui/hooks/useDaemonStatus.ts +0 -174
  245. package/src/tui/hooks/useInboxTUI.ts +0 -113
  246. package/src/tui/hooks/useRemoteMachines.ts +0 -209
  247. package/src/tui/index.ts +0 -24
  248. package/src/tui/state.ts +0 -299
  249. package/src/tui/terminal-bracketed-paste.test.ts +0 -45
  250. package/src/tui/terminal-bracketed-paste.ts +0 -47
  251. package/src/types/bundle.ts +0 -112
  252. package/src/types/config.ts +0 -89
  253. package/src/types/errors.ts +0 -206
  254. package/src/types/identity.ts +0 -284
  255. package/src/types/workspace-fuzzy.ts +0 -49
  256. package/src/types/workspace.ts +0 -151
  257. package/src/utils/bun-socket-writer.ts +0 -80
  258. package/src/utils/deps.ts +0 -127
  259. package/src/utils/fuzzy-match.ts +0 -125
  260. package/src/utils/logger.ts +0 -127
  261. package/src/utils/markdown.ts +0 -254
  262. package/src/utils/onboarding.ts +0 -229
  263. package/src/utils/prompts.ts +0 -114
  264. package/src/utils/run-commands.ts +0 -112
  265. package/src/utils/run-scripts.ts +0 -142
  266. package/src/utils/sanitize.ts +0 -98
  267. package/src/utils/secrets.ts +0 -122
  268. package/src/utils/shell-escape.ts +0 -40
  269. package/src/utils/utf8.ts +0 -79
  270. package/src/utils/workspace-state.ts +0 -47
  271. package/src/web/README.md +0 -73
  272. package/src/web/bun.lock +0 -575
  273. package/src/web/eslint.config.js +0 -23
  274. package/src/web/index.html +0 -16
  275. package/src/web/package.json +0 -37
  276. package/src/web/public/vite.svg +0 -1
  277. package/src/web/src/App.tsx +0 -604
  278. package/src/web/src/assets/react.svg +0 -1
  279. package/src/web/src/components/Terminal.tsx +0 -207
  280. package/src/web/src/hooks/useRelayConnection.ts +0 -224
  281. package/src/web/src/hooks/useTerminal.ts +0 -699
  282. package/src/web/src/index.css +0 -55
  283. package/src/web/src/lib/crypto/__tests__/web-terminal.test.ts +0 -1158
  284. package/src/web/src/lib/crypto/frames.ts +0 -205
  285. package/src/web/src/lib/crypto/handshake.ts +0 -396
  286. package/src/web/src/lib/crypto/identity.ts +0 -128
  287. package/src/web/src/lib/crypto/keyexchange.ts +0 -246
  288. package/src/web/src/lib/crypto/relay-signing.ts +0 -53
  289. package/src/web/src/lib/invite.ts +0 -58
  290. package/src/web/src/lib/storage/identity-store.ts +0 -94
  291. package/src/web/src/main.tsx +0 -10
  292. package/src/web/src/types/identity.ts +0 -45
  293. package/src/web/tsconfig.app.json +0 -28
  294. package/src/web/tsconfig.json +0 -7
  295. package/src/web/tsconfig.node.json +0 -26
  296. package/src/web/vite.config.ts +0 -31
  297. package/todo-security.md +0 -92
  298. package/tsconfig.json +0 -23
  299. package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/12b7107e435bf1b9a8713a7f320472a63e543104d633d89a26f8d21f4e4ef182.sqlite +0 -0
  300. package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/12b7107e435bf1b9a8713a7f320472a63e543104d633d89a26f8d21f4e4ef182.sqlite-shm +0 -0
  301. package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/12b7107e435bf1b9a8713a7f320472a63e543104d633d89a26f8d21f4e4ef182.sqlite-wal +0 -0
  302. package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/1a1ac3db1ab86ecf712f90322868a9aabc2c7dc9fe2dfbe94f9b075096276b0f.sqlite +0 -0
  303. package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/1a1ac3db1ab86ecf712f90322868a9aabc2c7dc9fe2dfbe94f9b075096276b0f.sqlite-shm +0 -0
  304. package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/1a1ac3db1ab86ecf712f90322868a9aabc2c7dc9fe2dfbe94f9b075096276b0f.sqlite-wal +0 -0
  305. package/worker/bun.lock +0 -237
  306. package/worker/package.json +0 -22
  307. package/worker/schema.sql +0 -96
  308. package/worker/src/handlers/auth.ts +0 -451
  309. package/worker/src/handlers/subdomains.ts +0 -376
  310. package/worker/src/handlers/user.ts +0 -98
  311. package/worker/src/index.ts +0 -70
  312. package/worker/src/middleware/auth.ts +0 -152
  313. package/worker/src/services/cloudflare.ts +0 -609
  314. package/worker/src/types.ts +0 -96
  315. package/worker/tsconfig.json +0 -15
  316. package/worker/wrangler.toml +0 -26
@@ -1,1158 +0,0 @@
1
- /**
2
- * Web Terminal Tests
3
- *
4
- * Comprehensive tests for the web terminal connection flow:
5
- * 1. Browser crypto unit tests (identity, keyexchange, handshake, frames)
6
- * 2. Browser ↔ Node crypto interop tests
7
- * 3. Web terminal E2E connection tests (with and without invite)
8
- *
9
- * These tests run in Bun but use the same noble-curves libraries as the browser.
10
- */
11
-
12
- import { describe, expect, test, beforeAll, afterAll, beforeEach } from "bun:test";
13
-
14
- // Browser crypto modules (same code runs in Bun)
15
- import {
16
- generateIdentity,
17
- generateSigningKeypair,
18
- generateKeyExchangeKeypair,
19
- sign,
20
- verify,
21
- deriveIdentityId,
22
- serializeIdentity,
23
- deserializeIdentity,
24
- } from "../identity";
25
-
26
- import {
27
- randomBytes,
28
- x25519SharedSecret,
29
- generateEphemeralKeypair,
30
- deriveSessionKeys,
31
- deriveSessionKeysFromMultiple,
32
- validateX25519PublicKey,
33
- X25519_KEY_LENGTH,
34
- } from "../keyexchange";
35
-
36
- import {
37
- createClientHello,
38
- processServerHello,
39
- createClientAuth,
40
- processServerAuth,
41
- type X3DHResponseMessage,
42
- type X3DHResultMessage,
43
- } from "../handshake";
44
- import { signRelayMessage } from "../relay-signing";
45
-
46
- import {
47
- encrypt,
48
- decrypt,
49
- createFrame,
50
- openFrame,
51
- encodeFrame,
52
- decodeFrame,
53
- MASTER_STREAM_ID,
54
- } from "../frames";
55
-
56
- // Node crypto modules (for interop testing)
57
- import { generateRelayIdentity } from "../../../../../relay/identity";
58
- import { clearAllRegistries } from "../../../../../relay/registries";
59
- import {
60
- createTestIdentity as createNodeIdentity,
61
- toPublicIdentity,
62
- } from "../../../../../lib/tmux-lite/crypto/__tests__/helpers/test-identities";
63
- import { HandshakeHandler } from "../../../../../lib/tmux-lite/handshake-handler";
64
- import { AccessControlList } from "../../../../../lib/tmux-lite/crypto/access-control";
65
- import { createInviteToken } from "../../../../../lib/tmux-lite/crypto/invites";
66
- import { signChallenge, getSigningKeyBase64 } from "../../../../../relay/__tests__/helpers/auth";
67
- import { startRelayServer } from "../../../../../relay/__tests__/helpers/ports";
68
- import { createHash } from "crypto";
69
- import type { Server } from "bun";
70
-
71
- // ============================================================================
72
- // Part 1: Browser Crypto Unit Tests
73
- // ============================================================================
74
-
75
- describe("Browser Crypto: Identity", () => {
76
- test("generates valid signing keypair", () => {
77
- const keypair = generateSigningKeypair();
78
- expect(keypair.publicKey).toBeInstanceOf(Uint8Array);
79
- expect(keypair.secretKey).toBeInstanceOf(Uint8Array);
80
- expect(keypair.publicKey.length).toBe(32);
81
- expect(keypair.secretKey.length).toBe(64); // Ed25519 convention
82
- });
83
-
84
- test("generates valid key exchange keypair", () => {
85
- const keypair = generateKeyExchangeKeypair();
86
- expect(keypair.publicKey).toBeInstanceOf(Uint8Array);
87
- expect(keypair.privateKey).toBeInstanceOf(Uint8Array);
88
- expect(keypair.publicKey.length).toBe(32);
89
- expect(keypair.privateKey.length).toBe(32);
90
- });
91
-
92
- test("generates complete identity", () => {
93
- const identity = generateIdentity("Test Browser");
94
- expect(identity.id).toBeDefined();
95
- expect(identity.id.length).toBe(16);
96
- expect(identity.signing).toBeDefined();
97
- expect(identity.keyExchange).toBeDefined();
98
- expect(identity.label).toBe("Test Browser");
99
- expect(identity.createdAt).toBeGreaterThan(0);
100
- });
101
-
102
- test("sign and verify work correctly", () => {
103
- const keypair = generateSigningKeypair();
104
- const message = new TextEncoder().encode("Hello, World!");
105
-
106
- const signature = sign(message, keypair.secretKey);
107
- expect(signature.length).toBe(64);
108
-
109
- const isValid = verify(message, signature, keypair.publicKey);
110
- expect(isValid).toBe(true);
111
- });
112
-
113
- test("verify rejects invalid signature", () => {
114
- const keypair = generateSigningKeypair();
115
- const message = new TextEncoder().encode("Hello, World!");
116
-
117
- const signature = sign(message, keypair.secretKey);
118
-
119
- // Tamper with signature
120
- const badSignature = new Uint8Array(signature);
121
- badSignature[0] ^= 0xff;
122
-
123
- const isValid = verify(message, badSignature, keypair.publicKey);
124
- expect(isValid).toBe(false);
125
- });
126
-
127
- test("verify rejects wrong message", () => {
128
- const keypair = generateSigningKeypair();
129
- const message = new TextEncoder().encode("Hello, World!");
130
- const wrongMessage = new TextEncoder().encode("Wrong message");
131
-
132
- const signature = sign(message, keypair.secretKey);
133
- const isValid = verify(wrongMessage, signature, keypair.publicKey);
134
- expect(isValid).toBe(false);
135
- });
136
-
137
- test("deriveIdentityId produces consistent IDs", () => {
138
- const keypair = generateSigningKeypair();
139
- const id1 = deriveIdentityId(keypair.publicKey);
140
- const id2 = deriveIdentityId(keypair.publicKey);
141
- expect(id1).toBe(id2);
142
- expect(id1.length).toBe(16);
143
- });
144
-
145
- test("serialize and deserialize identity", () => {
146
- const identity = generateIdentity("Test");
147
- const serialized = serializeIdentity(identity);
148
- const deserialized = deserializeIdentity(serialized);
149
-
150
- expect(deserialized.id).toBe(identity.id);
151
- expect(deserialized.label).toBe(identity.label);
152
- expect(deserialized.createdAt).toBe(identity.createdAt);
153
-
154
- // Keys should match (convert to Array for comparison to avoid ArrayBuffer type issues)
155
- expect(Array.from(new Uint8Array(deserialized.signing.publicKey))).toEqual(Array.from(identity.signing.publicKey));
156
- expect(Array.from(new Uint8Array(deserialized.signing.secretKey))).toEqual(Array.from(identity.signing.secretKey));
157
- expect(Array.from(new Uint8Array(deserialized.keyExchange.publicKey))).toEqual(Array.from(identity.keyExchange.publicKey));
158
- expect(Array.from(new Uint8Array(deserialized.keyExchange.privateKey))).toEqual(Array.from(identity.keyExchange.privateKey));
159
- });
160
- });
161
-
162
- describe("Browser Crypto: Key Exchange", () => {
163
- test("randomBytes generates correct length", () => {
164
- const bytes16 = randomBytes(16);
165
- const bytes32 = randomBytes(32);
166
- expect(bytes16.length).toBe(16);
167
- expect(bytes32.length).toBe(32);
168
- });
169
-
170
- test("randomBytes generates different values", () => {
171
- const a = randomBytes(32);
172
- const b = randomBytes(32);
173
- expect(a).not.toEqual(b);
174
- });
175
-
176
- test("generateEphemeralKeypair produces valid keys", () => {
177
- const keypair = generateEphemeralKeypair();
178
- expect(keypair.publicKey.length).toBe(X25519_KEY_LENGTH);
179
- expect(keypair.privateKey.length).toBe(X25519_KEY_LENGTH);
180
- expect(validateX25519PublicKey(keypair.publicKey)).toBe(true);
181
- });
182
-
183
- test("x25519SharedSecret produces same result for both parties", () => {
184
- const alice = generateEphemeralKeypair();
185
- const bob = generateEphemeralKeypair();
186
-
187
- const sharedA = x25519SharedSecret(alice.privateKey, bob.publicKey);
188
- const sharedB = x25519SharedSecret(bob.privateKey, alice.publicKey);
189
-
190
- expect(sharedA).toEqual(sharedB);
191
- expect(sharedA.length).toBe(X25519_KEY_LENGTH);
192
- });
193
-
194
- test("deriveSessionKeys produces symmetric keys", () => {
195
- const alice = generateEphemeralKeypair();
196
- const bob = generateEphemeralKeypair();
197
-
198
- const sharedSecret = x25519SharedSecret(alice.privateKey, bob.publicKey);
199
- const salt = randomBytes(32);
200
-
201
- const aliceKeys = deriveSessionKeys(sharedSecret, salt, true);
202
- const bobKeys = deriveSessionKeys(sharedSecret, salt, false);
203
-
204
- // Alice's sendKey should match Bob's receiveKey
205
- expect(aliceKeys.sendKey).toEqual(bobKeys.receiveKey);
206
- expect(aliceKeys.receiveKey).toEqual(bobKeys.sendKey);
207
- expect(aliceKeys.sessionId).toBe(bobKeys.sessionId);
208
- });
209
-
210
- test("deriveSessionKeysFromMultiple combines secrets correctly", () => {
211
- const ephemeral1 = generateEphemeralKeypair();
212
- const ephemeral2 = generateEphemeralKeypair();
213
- const ephemeral3 = generateEphemeralKeypair();
214
-
215
- const dh1 = x25519SharedSecret(ephemeral1.privateKey, ephemeral2.publicKey);
216
- const dh2 = x25519SharedSecret(ephemeral1.privateKey, ephemeral3.publicKey);
217
-
218
- const salt = randomBytes(32);
219
- const keys = deriveSessionKeysFromMultiple([dh1, dh2], salt, true);
220
-
221
- expect(keys.sendKey.length).toBe(32);
222
- expect(keys.receiveKey.length).toBe(32);
223
- expect(keys.sessionId.length).toBeGreaterThan(0);
224
- });
225
-
226
- test("validateX25519PublicKey rejects invalid keys", () => {
227
- // All zeros
228
- expect(validateX25519PublicKey(new Uint8Array(32))).toBe(false);
229
-
230
- // Wrong length
231
- expect(validateX25519PublicKey(new Uint8Array(16))).toBe(false);
232
-
233
- // Valid key
234
- const keypair = generateEphemeralKeypair();
235
- expect(validateX25519PublicKey(keypair.publicKey)).toBe(true);
236
- });
237
- });
238
-
239
- describe("Browser Crypto: Frames (AES-GCM)", () => {
240
- test("encrypt and decrypt round-trip", async () => {
241
- const key = randomBytes(32);
242
- const plaintext = new TextEncoder().encode("Hello, encrypted world!");
243
-
244
- const { nonce, ciphertext } = await encrypt(plaintext, key);
245
-
246
- expect(nonce.length).toBe(12);
247
- expect(ciphertext.length).toBeGreaterThan(plaintext.length); // Includes auth tag
248
-
249
- const decrypted = await decrypt(ciphertext, nonce, key);
250
- expect(decrypted).not.toBeNull();
251
- expect(new TextDecoder().decode(decrypted!)).toBe("Hello, encrypted world!");
252
- });
253
-
254
- test("decrypt fails with wrong key", async () => {
255
- const key1 = randomBytes(32);
256
- const key2 = randomBytes(32);
257
- const plaintext = new TextEncoder().encode("Secret message");
258
-
259
- const { nonce, ciphertext } = await encrypt(plaintext, key1);
260
- const decrypted = await decrypt(ciphertext, nonce, key2);
261
-
262
- expect(decrypted).toBeNull();
263
- });
264
-
265
- test("decrypt fails with tampered ciphertext", async () => {
266
- const key = randomBytes(32);
267
- const plaintext = new TextEncoder().encode("Secret message");
268
-
269
- const { nonce, ciphertext } = await encrypt(plaintext, key);
270
-
271
- // Tamper with ciphertext
272
- const tampered = new Uint8Array(ciphertext);
273
- tampered[0] ^= 0xff;
274
-
275
- const decrypted = await decrypt(tampered, nonce, key);
276
- expect(decrypted).toBeNull();
277
- });
278
-
279
- test("encodeFrame and decodeFrame round-trip", () => {
280
- const frame = {
281
- streamId: MASTER_STREAM_ID,
282
- nonce: randomBytes(12),
283
- ciphertext: randomBytes(100),
284
- };
285
-
286
- const encoded = encodeFrame(frame);
287
- const decoded = decodeFrame(encoded);
288
-
289
- expect(decoded).not.toBeNull();
290
- expect(decoded!.streamId).toBe(frame.streamId);
291
- expect(decoded!.nonce).toEqual(frame.nonce);
292
- expect(decoded!.ciphertext).toEqual(frame.ciphertext);
293
- });
294
-
295
- test("createFrame and openFrame round-trip", async () => {
296
- const key = randomBytes(32);
297
- const data = new TextEncoder().encode("Terminal output data");
298
-
299
- const frame = await createFrame(MASTER_STREAM_ID, data, key);
300
- const result = await openFrame(frame, key);
301
-
302
- expect(result).not.toBeNull();
303
- expect(result!.streamId).toBe(MASTER_STREAM_ID);
304
- expect(new TextDecoder().decode(result!.data)).toBe("Terminal output data");
305
- });
306
- });
307
-
308
- describe("Browser Crypto: X3DH Handshake", () => {
309
- test("createClientHello produces valid message", () => {
310
- const { state, message } = createClientHello("test-machine");
311
-
312
- expect(state.phase).toBe("awaiting_server_hello");
313
- expect(state.ephemeral).toBeDefined();
314
- expect(state.clientNonce.length).toBe(32);
315
-
316
- expect(message.version).toBe(1);
317
- expect(message.ephemeralKey).toBeDefined();
318
- expect(message.timestamp).toBeGreaterThan(0);
319
- expect(message.clientNonce).toBeDefined();
320
- expect(message.machineIdHint).toBe("test-machine");
321
- });
322
-
323
- test("full handshake flow (simulated)", () => {
324
- // This simulates what the server would do
325
- const browserClient = generateIdentity("Browser Client");
326
- const serverMachine = generateIdentity("Server Machine");
327
-
328
- // Step 1: Browser creates ClientHello
329
- const { state: clientState1, message: _clientHello } = createClientHello();
330
-
331
- // Step 2: Simulate server creating ServerHello
332
- const serverEphemeral = generateEphemeralKeypair();
333
- const signedPreKey = generateEphemeralKeypair();
334
- const serverNonce = randomBytes(32);
335
-
336
- // Server signs its pre-key
337
- const preKeySignature = sign(signedPreKey.publicKey, serverMachine.signing.secretKey);
338
-
339
- const serverHello: X3DHResponseMessage = {
340
- version: 1,
341
- identityKey: btoa(String.fromCharCode(...serverMachine.signing.publicKey)),
342
- keyExchangeKey: btoa(String.fromCharCode(...serverMachine.keyExchange.publicKey)),
343
- ephemeralKey: btoa(String.fromCharCode(...serverEphemeral.publicKey)),
344
- signedPreKey: btoa(String.fromCharCode(...signedPreKey.publicKey)),
345
- preKeySignature: btoa(String.fromCharCode(...preKeySignature)),
346
- serverNonce: btoa(String.fromCharCode(...serverNonce)),
347
- timestamp: Date.now(),
348
- };
349
-
350
- // Step 3: Browser processes ServerHello
351
- const clientState2 = processServerHello(clientState1, serverHello);
352
- expect(clientState2).not.toBeNull();
353
- expect(clientState2!.phase).toBe("awaiting_server_auth");
354
-
355
- // Step 4: Browser creates ClientAuth
356
- const { message: clientAuth, sessionKeys: browserSessionKeys } = createClientAuth(
357
- clientState2!,
358
- browserClient,
359
- { type: "access_list" }
360
- );
361
-
362
- expect(clientAuth.version).toBe(1);
363
- expect(clientAuth.identityKey).toBeDefined();
364
- expect(clientAuth.keyExchangeKey).toBeDefined();
365
- expect(clientAuth.identityProof).toBeDefined();
366
-
367
- expect(browserSessionKeys.sendKey.length).toBe(32);
368
- expect(browserSessionKeys.receiveKey.length).toBe(32);
369
- expect(browserSessionKeys.sessionId.length).toBeGreaterThan(0);
370
- });
371
-
372
- test("processServerHello rejects invalid signature", () => {
373
- const { state } = createClientHello();
374
-
375
- const serverHello: X3DHResponseMessage = {
376
- version: 1,
377
- identityKey: btoa(String.fromCharCode(...randomBytes(32))),
378
- keyExchangeKey: btoa(String.fromCharCode(...randomBytes(32))),
379
- ephemeralKey: btoa(String.fromCharCode(...generateEphemeralKeypair().publicKey)),
380
- signedPreKey: btoa(String.fromCharCode(...generateEphemeralKeypair().publicKey)),
381
- preKeySignature: btoa(String.fromCharCode(...randomBytes(64))), // Invalid signature
382
- serverNonce: btoa(String.fromCharCode(...randomBytes(32))),
383
- timestamp: Date.now(),
384
- };
385
-
386
- const result = processServerHello(state, serverHello);
387
- expect(result).toBeNull();
388
- });
389
-
390
- test("processServerHello rejects expired timestamp", () => {
391
- const serverMachine = generateIdentity("Server");
392
- const signedPreKey = generateEphemeralKeypair();
393
- const preKeySignature = sign(signedPreKey.publicKey, serverMachine.signing.secretKey);
394
-
395
- const { state } = createClientHello();
396
-
397
- const serverHello: X3DHResponseMessage = {
398
- version: 1,
399
- identityKey: btoa(String.fromCharCode(...serverMachine.signing.publicKey)),
400
- keyExchangeKey: btoa(String.fromCharCode(...serverMachine.keyExchange.publicKey)),
401
- ephemeralKey: btoa(String.fromCharCode(...generateEphemeralKeypair().publicKey)),
402
- signedPreKey: btoa(String.fromCharCode(...signedPreKey.publicKey)),
403
- preKeySignature: btoa(String.fromCharCode(...preKeySignature)),
404
- serverNonce: btoa(String.fromCharCode(...randomBytes(32))),
405
- timestamp: Date.now() - 10 * 60 * 1000, // 10 minutes ago - too old
406
- };
407
-
408
- const result = processServerHello(state, serverHello);
409
- expect(result).toBeNull();
410
- });
411
- });
412
-
413
- // ============================================================================
414
- // Part 2: Browser ↔ Node Crypto Interop Tests
415
- // ============================================================================
416
-
417
- describe("Browser ↔ Node Interop: Identity", () => {
418
- test("browser-generated identity can be verified by node identity module", () => {
419
- const browserIdentity = generateIdentity("Browser");
420
- const message = new TextEncoder().encode("Test message");
421
-
422
- // Browser signs
423
- const signature = sign(message, browserIdentity.signing.secretKey);
424
-
425
- // Verify using browser verify function (same code path as node would use)
426
- const isValid = verify(message, signature, browserIdentity.signing.publicKey);
427
- expect(isValid).toBe(true);
428
- });
429
-
430
- test("node-generated identity can be verified by browser crypto", () => {
431
- const nodeIdentity = createNodeIdentity("Node Machine");
432
- const message = new TextEncoder().encode("Test message");
433
-
434
- // Node signs using the same sign function from browser module
435
- // (both use @noble/curves/ed25519)
436
- const signature = sign(message, nodeIdentity.signing.secretKey);
437
-
438
- // Browser verifies
439
- const isValid = verify(message, signature, nodeIdentity.signing.publicKey);
440
- expect(isValid).toBe(true);
441
- });
442
- });
443
-
444
- describe("Browser ↔ Node Interop: Key Exchange", () => {
445
- test("browser and node keypairs can compute same shared secret", () => {
446
- // Browser generates keypair
447
- const browserKeypair = generateEphemeralKeypair();
448
-
449
- // Node generates keypair (using same function - both use noble)
450
- const nodeKeypair = generateEphemeralKeypair();
451
-
452
- // Compute shared secrets from both sides
453
- const browserShared = x25519SharedSecret(browserKeypair.privateKey, nodeKeypair.publicKey);
454
- const nodeShared = x25519SharedSecret(nodeKeypair.privateKey, browserKeypair.publicKey);
455
-
456
- expect(browserShared).toEqual(nodeShared);
457
- });
458
-
459
- test("browser and node derive same session keys", () => {
460
- const browserKeypair = generateEphemeralKeypair();
461
- const nodeKeypair = generateEphemeralKeypair();
462
-
463
- const sharedSecret = x25519SharedSecret(browserKeypair.privateKey, nodeKeypair.publicKey);
464
- const salt = randomBytes(32);
465
-
466
- // Browser derives as initiator
467
- const browserKeys = deriveSessionKeys(sharedSecret, salt, true);
468
-
469
- // Node derives as responder
470
- const nodeKeys = deriveSessionKeys(sharedSecret, salt, false);
471
-
472
- // Should be symmetric
473
- expect(browserKeys.sendKey).toEqual(nodeKeys.receiveKey);
474
- expect(browserKeys.receiveKey).toEqual(nodeKeys.sendKey);
475
- expect(browserKeys.sessionId).toBe(nodeKeys.sessionId);
476
- });
477
- });
478
-
479
- // ============================================================================
480
- // Part 3: Web Terminal E2E Connection Tests
481
- // ============================================================================
482
-
483
- const TEST_HOST = "127.0.0.1";
484
- let relayUrl = "";
485
- let relayHttpBase = "";
486
-
487
- // Generate test identities
488
- const testRelayIdentity = generateRelayIdentity("web-terminal-test-relay");
489
- const testMachineIdentity = createNodeIdentity("Test Machine");
490
-
491
- let server: Server<any>;
492
-
493
- describe("Web Terminal E2E", () => {
494
- beforeAll(async () => {
495
- // Pre-authorize the test machine
496
- server = startRelayServer({
497
- bind: TEST_HOST,
498
- hostname: TEST_HOST,
499
- disableRateLimit: true,
500
- identity: testRelayIdentity,
501
- preAuthorizedMachines: new Set([
502
- getSigningKeyBase64(testMachineIdentity),
503
- ]),
504
- });
505
- relayUrl = `ws://${TEST_HOST}:${server.port}/ws`;
506
- relayHttpBase = `http://${TEST_HOST}:${server.port}`;
507
-
508
- // Wait for server to start accepting requests to avoid flakiness.
509
- const deadline = Date.now() + 3000;
510
- // eslint-disable-next-line no-constant-condition
511
- while (true) {
512
- try {
513
- const res = await fetch(`${relayHttpBase}/health`);
514
- if (res.ok) break;
515
- } catch {
516
- // ignore until deadline
517
- }
518
- if (Date.now() > deadline) {
519
- throw new Error("Relay server did not become healthy in time");
520
- }
521
- await new Promise((r) => setTimeout(r, 50));
522
- }
523
- });
524
-
525
- afterAll(() => {
526
- server.stop(true);
527
- });
528
-
529
- beforeEach(() => {
530
- clearAllRegistries();
531
- });
532
-
533
- /**
534
- * Helper: Create and register a machine connection with challenge-response auth
535
- */
536
- async function setupMachine(machineIdentity: ReturnType<typeof createNodeIdentity>, accessList: AccessControlList) {
537
- const url = new URL(relayUrl);
538
- url.searchParams.set("role", "machine");
539
- // No token needed - auth via challenge-response
540
-
541
- const ws = new WebSocket(url.toString());
542
- ws.binaryType = "arraybuffer";
543
-
544
- await new Promise<void>((resolve, reject) => {
545
- ws.onopen = () => resolve();
546
- ws.onerror = () => reject(new Error("Machine connection failed"));
547
- setTimeout(() => reject(new Error("Timeout")), 5000);
548
- });
549
-
550
- // Wait for relay_identity with challenge
551
- const challenge = await new Promise<Uint8Array>((resolve, reject) => {
552
- const timeout = setTimeout(() => reject(new Error("Challenge timeout")), 5000);
553
- ws.onmessage = (event) => {
554
- try {
555
- const data = typeof event.data === "string" ? event.data : new TextDecoder().decode(event.data);
556
- const msg = JSON.parse(data);
557
- if (msg.type === "relay_identity" && msg.challenge) {
558
- clearTimeout(timeout);
559
- resolve(Buffer.from(msg.challenge, "base64"));
560
- }
561
- } catch {
562
- // Ignore
563
- }
564
- };
565
- });
566
-
567
- // Sign challenge
568
- const signature = signChallenge(challenge, machineIdentity.signing.secretKey);
569
- const publicIdentity = toPublicIdentity(machineIdentity);
570
-
571
- // Register machine with challenge response
572
- ws.send(JSON.stringify({
573
- type: "register_machine",
574
- machineId: machineIdentity.id,
575
- signingKey: publicIdentity.signingPublicKey,
576
- keyExchangeKey: publicIdentity.keyExchangePublicKey,
577
- challengeResponse: signature,
578
- label: machineIdentity.label,
579
- }));
580
-
581
- await new Promise<void>((resolve, reject) => {
582
- const timeout = setTimeout(() => reject(new Error("Registration timeout")), 5000);
583
- ws.onmessage = (event) => {
584
- try {
585
- const data = typeof event.data === "string" ? event.data : new TextDecoder().decode(event.data);
586
- const msg = JSON.parse(data);
587
- if (msg.type === "registered") {
588
- clearTimeout(timeout);
589
- resolve();
590
- } else if (msg.type === "error") {
591
- clearTimeout(timeout);
592
- reject(new Error(msg.message));
593
- }
594
- } catch {
595
- // Ignore
596
- }
597
- };
598
- });
599
-
600
- const handshakeHandler = new HandshakeHandler({
601
- identity: machineIdentity,
602
- accessList,
603
- handshakeTimeoutMs: 30000,
604
- });
605
-
606
- return { ws, handshakeHandler };
607
- }
608
-
609
- /**
610
- * Helper: Set up machine to handle handshake messages
611
- */
612
- function setupMachineHandshakeHandler(ws: WebSocket, handler: HandshakeHandler, onComplete: (clientId: string) => void) {
613
- ws.onmessage = async (event) => {
614
- const data = typeof event.data === "string" ? event.data : new TextDecoder().decode(event.data);
615
- const msg = JSON.parse(data);
616
-
617
- if (msg.type === "client_connected") {
618
- console.log("[machine] Client connected:", msg.connectionId);
619
- }
620
-
621
- if (msg.type === "data" && msg.connectionId) {
622
- const msgData = Buffer.from(msg.data, "base64");
623
- try {
624
- const jsonStr = new TextDecoder().decode(msgData);
625
- const envelope = JSON.parse(jsonStr);
626
-
627
- if (envelope.type === "handshake") {
628
- // Convert browser format (step + spread fields) to HandshakeHandler format (phase + data)
629
- // Browser sends: { type: "handshake", step: "client_hello", ...clientHelloFields }
630
- // Handler expects: { type: "handshake", phase: "client_hello", data: clientHelloFields }
631
- const { type: _type, step, ...handshakeData } = envelope;
632
- const handlerMessage = {
633
- type: "handshake" as const,
634
- phase: step as "client_hello" | "client_auth",
635
- data: handshakeData,
636
- };
637
-
638
- const result = await handler.processMessage(msg.connectionId, handlerMessage);
639
-
640
- if (result.type === "reply" || result.type === "established") {
641
- // Convert response back to browser format
642
- // Handler returns: { type: "handshake", phase: "server_hello", data: serverHelloFields }
643
- // Browser expects: { type: "handshake", step: "server_hello", ...serverHelloFields }
644
- const responseData = result.message.data as Record<string, unknown>;
645
- const browserFormatResponse = {
646
- type: "handshake",
647
- step: result.message.phase,
648
- ...responseData,
649
- };
650
-
651
- ws.send(JSON.stringify({
652
- type: "data",
653
- connectionId: msg.connectionId,
654
- data: Buffer.from(JSON.stringify(browserFormatResponse)).toString("base64"),
655
- }));
656
-
657
- if (result.type === "established") {
658
- console.log("[machine] Handshake established with:", result.session.peerIdentityId);
659
- onComplete(result.session.peerIdentityId);
660
- }
661
- } else if (result.type === "error") {
662
- console.error("[machine] Handshake error:", result.reason);
663
- }
664
- }
665
- } catch (e) {
666
- console.error("[machine] Handshake handler error:", e);
667
- }
668
- }
669
- };
670
- }
671
-
672
- test("browser client can connect with pre-authorization", async () => {
673
- // Browser client generates its own identity
674
- const browserIdentity = generateIdentity("Browser Client");
675
-
676
- // Pre-authorize the browser identity
677
- const accessList = new AccessControlList();
678
- accessList.addEntry({
679
- id: browserIdentity.id,
680
- signingPublicKey: Buffer.from(browserIdentity.signing.publicKey).toString("base64"),
681
- keyExchangePublicKey: Buffer.from(browserIdentity.keyExchange.publicKey).toString("base64"),
682
- }, 'full');
683
-
684
- const { ws: machineWs, handshakeHandler } = await setupMachine(testMachineIdentity, accessList);
685
-
686
- // Also authorize with relay (using accessType format)
687
- machineWs.send(JSON.stringify({
688
- type: "authorize_client",
689
- machineId: testMachineIdentity.id,
690
- clientIdentityId: browserIdentity.id,
691
- signingKey: Buffer.from(browserIdentity.signing.publicKey).toString("base64"),
692
- keyExchangeKey: Buffer.from(browserIdentity.keyExchange.publicKey).toString("base64"),
693
- accessType: "full",
694
- }));
695
-
696
- await new Promise<void>((resolve) => {
697
- const handler = (event: MessageEvent) => {
698
- const data = typeof event.data === "string" ? event.data : new TextDecoder().decode(event.data);
699
- const msg = JSON.parse(data);
700
- if (msg.type === "client_authorized") {
701
- machineWs.removeEventListener("message", handler);
702
- resolve();
703
- }
704
- };
705
- machineWs.addEventListener("message", handler);
706
- });
707
-
708
- // Track handshake completion
709
- let machineHandshakeComplete = false;
710
- let machineReceivedClientId: string | null = null;
711
-
712
- setupMachineHandshakeHandler(machineWs, handshakeHandler, (clientId) => {
713
- machineHandshakeComplete = true;
714
- machineReceivedClientId = clientId;
715
- });
716
-
717
- // Browser connects (no token needed)
718
- const clientUrl = new URL(relayUrl);
719
- clientUrl.searchParams.set("role", "client");
720
-
721
- const clientWs = new WebSocket(clientUrl.toString());
722
-
723
- await new Promise<void>((resolve) => {
724
- clientWs.onopen = () => resolve();
725
- });
726
-
727
- // Browser sends connect_to_machine
728
- const signedConnect = signRelayMessage({
729
- type: "connect_to_machine",
730
- machineId: testMachineIdentity.id,
731
- clientIdentityId: browserIdentity.id,
732
- }, browserIdentity);
733
- clientWs.send(JSON.stringify(signedConnect));
734
-
735
- // Wait for connection_established
736
- let connectionEstablished = false;
737
- await new Promise<void>((resolve) => {
738
- clientWs.onmessage = (event) => {
739
- const msg = JSON.parse(event.data);
740
- if (msg.type === "connection_established") {
741
- connectionEstablished = true;
742
- resolve();
743
- } else if (msg.type === "error") {
744
- console.error("Connection error:", msg.message);
745
- resolve();
746
- }
747
- };
748
- setTimeout(resolve, 5000);
749
- });
750
-
751
- expect(connectionEstablished).toBe(true);
752
-
753
- // Now browser should do X3DH handshake
754
- const { state: clientState, message: clientHello } = createClientHello(testMachineIdentity.id);
755
-
756
- // Wrap handshake message like useTerminal does
757
- clientWs.send(JSON.stringify({
758
- type: "data",
759
- data: Buffer.from(JSON.stringify({
760
- type: "handshake",
761
- step: "client_hello",
762
- ...clientHello,
763
- })).toString("base64"),
764
- }));
765
-
766
- // Wait for handshake messages
767
- let browserSessionKeys: ReturnType<typeof deriveSessionKeys> | null = null;
768
- let handshakeComplete = false;
769
- let currentState = clientState;
770
-
771
- await new Promise<void>((resolve) => {
772
- const handler = (event: MessageEvent) => {
773
- const msg = JSON.parse(event.data);
774
-
775
- if (msg.type === "data" && msg.data) {
776
- try {
777
- const data = Buffer.from(msg.data, "base64");
778
- const envelope = JSON.parse(new TextDecoder().decode(data));
779
-
780
- if (envelope.type === "handshake") {
781
- if (envelope.step === "server_hello") {
782
- const newState = processServerHello(currentState, envelope as X3DHResponseMessage);
783
- if (newState) {
784
- currentState = newState;
785
- const { message: authMessage, sessionKeys } = createClientAuth(
786
- newState,
787
- browserIdentity,
788
- { type: "access_list" }
789
- );
790
- browserSessionKeys = sessionKeys;
791
-
792
- clientWs.send(JSON.stringify({
793
- type: "data",
794
- data: Buffer.from(JSON.stringify({
795
- type: "handshake",
796
- step: "client_auth",
797
- ...authMessage,
798
- })).toString("base64"),
799
- }));
800
- }
801
- } else if (envelope.step === "server_auth") {
802
- const result = processServerAuth(
803
- currentState,
804
- envelope as X3DHResultMessage,
805
- browserSessionKeys!
806
- );
807
- if (result) {
808
- handshakeComplete = true;
809
- clientWs.removeEventListener("message", handler);
810
- resolve();
811
- }
812
- }
813
- }
814
- } catch (e) {
815
- console.error("Handshake error:", e);
816
- }
817
- }
818
- };
819
- clientWs.addEventListener("message", handler);
820
- setTimeout(() => {
821
- clientWs.removeEventListener("message", handler);
822
- resolve();
823
- }, 10000);
824
- });
825
-
826
- expect(handshakeComplete).toBe(true);
827
- expect(browserSessionKeys).not.toBeNull();
828
- expect(machineHandshakeComplete).toBe(true);
829
- expect(machineReceivedClientId).not.toBeNull();
830
- expect(machineReceivedClientId!).toBe(browserIdentity.id);
831
-
832
- clientWs.close();
833
- machineWs.close();
834
- });
835
-
836
- test("browser client can connect via invite", async () => {
837
- const accessList = new AccessControlList();
838
- // Note: accessList is empty - we'll use invite for authorization
839
-
840
- const { ws: machineWs, handshakeHandler } = await setupMachine(testMachineIdentity, accessList);
841
-
842
- // Browser generates its own identity
843
- const browserIdentity = generateIdentity("Browser Client");
844
-
845
- // Create invite token
846
- const inviteToken = createInviteToken(testMachineIdentity, relayUrl, {
847
- accessType: 'full',
848
- validityMs: 3600000,
849
- });
850
-
851
- const inviteId = createHash("sha256")
852
- .update(inviteToken)
853
- .digest("hex")
854
- .substring(0, 16);
855
-
856
- // Register invite with relay
857
- machineWs.send(JSON.stringify({
858
- type: "register_invite",
859
- inviteId,
860
- machineId: testMachineIdentity.id,
861
- expiresAt: Date.now() + 3600000,
862
- maxUses: null,
863
- }));
864
-
865
- await new Promise<void>((resolve, reject) => {
866
- const handler = (event: MessageEvent) => {
867
- const data = typeof event.data === "string" ? event.data : new TextDecoder().decode(event.data);
868
- const msg = JSON.parse(data);
869
- if (msg.type === "registered") {
870
- machineWs.removeEventListener("message", handler);
871
- resolve();
872
- } else if (msg.type === "error") {
873
- machineWs.removeEventListener("message", handler);
874
- reject(new Error(msg.message));
875
- }
876
- };
877
- machineWs.addEventListener("message", handler);
878
- setTimeout(() => reject(new Error("Invite registration timeout")), 5000);
879
- });
880
-
881
- // Track handshake
882
- let machineHandshakeComplete = false;
883
- setupMachineHandshakeHandler(machineWs, handshakeHandler, () => {
884
- machineHandshakeComplete = true;
885
- });
886
-
887
- // Browser connects and uses invite (no token needed)
888
- const clientUrl = new URL(relayUrl);
889
- clientUrl.searchParams.set("role", "client");
890
-
891
- const clientWs = new WebSocket(clientUrl.toString());
892
-
893
- await new Promise<void>((resolve) => {
894
- clientWs.onopen = () => resolve();
895
- });
896
-
897
- // Browser sends connect_with_invite (like useTerminal does with inviteId)
898
- const signedConnect = signRelayMessage({
899
- type: "connect_with_invite",
900
- inviteId,
901
- clientIdentityId: browserIdentity.id,
902
- }, browserIdentity);
903
- clientWs.send(JSON.stringify(signedConnect));
904
-
905
- // Wait for connection_established
906
- let connectionEstablished = false;
907
- await new Promise<void>((resolve) => {
908
- clientWs.onmessage = (event) => {
909
- const msg = JSON.parse(event.data);
910
- if (msg.type === "connection_established") {
911
- connectionEstablished = true;
912
- resolve();
913
- } else if (msg.type === "error") {
914
- console.error("Connection error:", msg.message);
915
- resolve();
916
- }
917
- };
918
- setTimeout(resolve, 5000);
919
- });
920
-
921
- expect(connectionEstablished).toBe(true);
922
-
923
- // Do X3DH handshake
924
- const { state: clientState, message: clientHello } = createClientHello(testMachineIdentity.id);
925
-
926
- clientWs.send(JSON.stringify({
927
- type: "data",
928
- data: Buffer.from(JSON.stringify({
929
- type: "handshake",
930
- step: "client_hello",
931
- ...clientHello,
932
- })).toString("base64"),
933
- }));
934
-
935
- let browserSessionKeys: ReturnType<typeof deriveSessionKeys> | null = null;
936
- let handshakeComplete = false;
937
- let currentState = clientState;
938
-
939
- await new Promise<void>((resolve) => {
940
- const handler = (event: MessageEvent) => {
941
- const msg = JSON.parse(event.data);
942
-
943
- if (msg.type === "data" && msg.data) {
944
- try {
945
- const data = Buffer.from(msg.data, "base64");
946
- const envelope = JSON.parse(new TextDecoder().decode(data));
947
-
948
- if (envelope.type === "handshake") {
949
- if (envelope.step === "server_hello") {
950
- const newState = processServerHello(currentState, envelope as X3DHResponseMessage);
951
- if (newState) {
952
- currentState = newState;
953
- // Note: use full inviteToken (not inviteId) for X3DH authorization
954
- // inviteId is only for relay's connect_with_invite message
955
- const { message: authMessage, sessionKeys } = createClientAuth(
956
- newState,
957
- browserIdentity,
958
- { type: "invite", inviteToken: inviteToken }
959
- );
960
- browserSessionKeys = sessionKeys;
961
-
962
- clientWs.send(JSON.stringify({
963
- type: "data",
964
- data: Buffer.from(JSON.stringify({
965
- type: "handshake",
966
- step: "client_auth",
967
- ...authMessage,
968
- })).toString("base64"),
969
- }));
970
- }
971
- } else if (envelope.step === "server_auth") {
972
- const result = processServerAuth(
973
- currentState,
974
- envelope as X3DHResultMessage,
975
- browserSessionKeys!
976
- );
977
- if (result) {
978
- handshakeComplete = true;
979
- clientWs.removeEventListener("message", handler);
980
- resolve();
981
- }
982
- }
983
- }
984
- } catch (e) {
985
- console.error("Handshake error:", e);
986
- }
987
- }
988
- };
989
- clientWs.addEventListener("message", handler);
990
- setTimeout(() => {
991
- clientWs.removeEventListener("message", handler);
992
- resolve();
993
- }, 10000);
994
- });
995
-
996
- expect(handshakeComplete).toBe(true);
997
- expect(browserSessionKeys).not.toBeNull();
998
- expect(machineHandshakeComplete).toBe(true);
999
-
1000
- // Test encrypted data exchange
1001
- const testData = new TextEncoder().encode("Hello from browser!");
1002
- const frame = await createFrame(MASTER_STREAM_ID, testData, browserSessionKeys!.sendKey);
1003
-
1004
- clientWs.send(JSON.stringify({
1005
- type: "data",
1006
- data: btoa(String.fromCharCode(...frame)),
1007
- }));
1008
-
1009
- // Give time for data to reach machine
1010
- await new Promise((r) => setTimeout(r, 200));
1011
-
1012
- clientWs.close();
1013
- machineWs.close();
1014
- });
1015
- });
1016
-
1017
- // ============================================================================
1018
- // Part 4: Regression Tests
1019
- // ============================================================================
1020
-
1021
- describe("Regression: Handshake Message Parsing", () => {
1022
- /**
1023
- * Regression test for race condition bug:
1024
- * Session keys are stored when sending client_auth, BEFORE server_auth arrives.
1025
- * The handleDataMessage function must correctly parse JSON handshake messages
1026
- * even when session keys are already set, otherwise it will try to decrypt
1027
- * the JSON as an encrypted frame and fail.
1028
- */
1029
- test("server_auth is correctly parsed as JSON when session keys are already set", async () => {
1030
- // Simulate the browser's handleDataMessage logic
1031
- const sessionKeys = deriveSessionKeys(randomBytes(32), randomBytes(32), true);
1032
-
1033
- // Create a mock server_auth message (what the machine sends)
1034
- const serverAuth = {
1035
- type: "handshake",
1036
- phase: "server_auth",
1037
- data: {
1038
- version: 1,
1039
- identityKey: btoa(String.fromCharCode(...randomBytes(32))),
1040
- identityProof: btoa(String.fromCharCode(...randomBytes(32))),
1041
- result: { type: "accepted", permissions: { read: true, write: true, manage: false } },
1042
- },
1043
- };
1044
-
1045
- // Encode as base64 (like relay does)
1046
- const base64Data = btoa(JSON.stringify(serverAuth));
1047
-
1048
- // Decode and check - this is the critical path that was buggy
1049
- const bytes = Uint8Array.from(atob(base64Data), c => c.charCodeAt(0));
1050
-
1051
- // The fix: try JSON parsing first, regardless of session keys
1052
- let isHandshakeMessage = false;
1053
- let parsedPhase: string | null = null;
1054
-
1055
- try {
1056
- const jsonStr = new TextDecoder().decode(bytes);
1057
- const envelope = JSON.parse(jsonStr);
1058
-
1059
- if (envelope.type === "handshake") {
1060
- isHandshakeMessage = true;
1061
- parsedPhase = envelope.phase;
1062
- }
1063
- } catch {
1064
- // Not JSON - would be encrypted data
1065
- }
1066
-
1067
- expect(isHandshakeMessage).toBe(true);
1068
- expect(parsedPhase).toBe("server_auth");
1069
-
1070
- // Verify that trying to decrypt as frame would fail
1071
- // (this is what the old buggy code would do)
1072
- const decryptResult = await openFrame(bytes, sessionKeys.receiveKey);
1073
- expect(decryptResult).toBeNull();
1074
- });
1075
-
1076
- test("encrypted frames are correctly decrypted when session keys are set", async () => {
1077
- const sessionKeys = deriveSessionKeys(randomBytes(32), randomBytes(32), true);
1078
-
1079
- // Create an encrypted frame (what PTY output looks like)
1080
- const plaintext = new TextEncoder().encode("Hello from terminal!");
1081
- const frame = await createFrame(MASTER_STREAM_ID, plaintext, sessionKeys.sendKey);
1082
-
1083
- // This is NOT valid JSON, so JSON parsing should fail
1084
- let isHandshakeMessage = false;
1085
-
1086
- try {
1087
- const jsonStr = new TextDecoder().decode(frame);
1088
- const envelope = JSON.parse(jsonStr);
1089
- if (envelope.type === "handshake") {
1090
- isHandshakeMessage = true;
1091
- }
1092
- } catch {
1093
- // Expected - encrypted data is not valid JSON
1094
- }
1095
-
1096
- expect(isHandshakeMessage).toBe(false);
1097
-
1098
- // But decryption should work (using receiveKey since we encrypted with sendKey, simulating peer)
1099
- const decryptResult = await openFrame(frame, sessionKeys.sendKey);
1100
- expect(decryptResult).not.toBeNull();
1101
- expect(new TextDecoder().decode(decryptResult!.data)).toBe("Hello from terminal!");
1102
- });
1103
-
1104
- test("handshake and encrypted data can be correctly distinguished", async () => {
1105
- const sessionKeys = deriveSessionKeys(randomBytes(32), randomBytes(32), true);
1106
-
1107
- // Test both message types in sequence
1108
- const messages = [
1109
- // server_auth arrives first (JSON handshake)
1110
- btoa(JSON.stringify({
1111
- type: "handshake",
1112
- phase: "server_auth",
1113
- data: {
1114
- version: 1,
1115
- identityKey: btoa(String.fromCharCode(...randomBytes(32))),
1116
- identityProof: btoa(String.fromCharCode(...randomBytes(32))),
1117
- result: { type: "accepted", permissions: { read: true, write: true, manage: false } },
1118
- },
1119
- })),
1120
- // Then encrypted PTY output arrives
1121
- btoa(String.fromCharCode(...await createFrame(
1122
- MASTER_STREAM_ID,
1123
- new TextEncoder().encode("$ "),
1124
- sessionKeys.sendKey
1125
- ))),
1126
- ];
1127
-
1128
- const results: Array<{ type: "handshake" | "encrypted"; data?: string }> = [];
1129
-
1130
- for (const base64Data of messages) {
1131
- const bytes = Uint8Array.from(atob(base64Data), c => c.charCodeAt(0));
1132
-
1133
- // Try JSON first (the fix)
1134
- try {
1135
- const jsonStr = new TextDecoder().decode(bytes);
1136
- const envelope = JSON.parse(jsonStr);
1137
-
1138
- if (envelope.type === "handshake") {
1139
- results.push({ type: "handshake" });
1140
- continue;
1141
- }
1142
- } catch {
1143
- // Not JSON
1144
- }
1145
-
1146
- // Try decryption
1147
- const frame = await openFrame(bytes, sessionKeys.sendKey);
1148
- if (frame) {
1149
- results.push({ type: "encrypted", data: new TextDecoder().decode(frame.data) });
1150
- }
1151
- }
1152
-
1153
- expect(results).toHaveLength(2);
1154
- expect(results[0].type).toBe("handshake");
1155
- expect(results[1].type).toBe("encrypted");
1156
- expect(results[1].data).toBe("$ ");
1157
- });
1158
- });