### Major changes
- **Client-side identity** — New session key store (`sessionKey.ts`) backed by
`sessionStorage` with a module-level caching, a `crypto.subtle` cache, a `useIdentityLock`
hook for decrypt-once signing, `followSignature.ts` for signed follows, and
two new UI modals (`IdentityBackup.tsx`, `UnlockIdentityModal.tsx`).
`CreateIdentity.tsx` is rewritten to generate BIP-39 mnemonics and encrypt the
Ed25519 keypair with AES-256-GCM via PBKDF2 (600k iterations) before storing
in IndexedDB.
- **Rate limiting** — New `rate-limit-config.ts` and `rate-limit.ts` provide a
per-IP sliding-window rate limiter backed by Redis. All external-facing routes
(`/discover`, `/discover/rotate/*`, `/proxy`, social API endpoints) now have
conservative defaults wired into the custom HTTP server before requests reach
Next.js handlers.
- **Proxy route hardening** — The `/proxy` route now enforces a 256 KB payload
limit (HTTP 413), validates JSON before parsing, applies a per-origin rate
limit (100 req/min), and imports the `blocks` table to reject requests from
blocked servers.
- **Docker integration-test cluster** — New `Dockerfile`, `.dockerignore`, and
`tests/docker-compose.yml` orchestrate three SiPher instances (A, B, C) plus
shared PostgreSQL and Redis. Key generation (`generate-keys.ts`) and discovery
setup (`setup-discovery.ts`) scripts automate cluster bootstrap. Three example
env files document required per-instance configuration.
- **Full test suite overhaul** — Replaces the old attack/auth/discover/key/proxy
tests with a structured suite:
* `tests/federation/` — Keytools unit tests + key-rotation e2e test
* `tests/proxy/` — Proxy relay e2e tests (single-server validation)
* `tests/integration/` — Multi-instance integration tests for discover,
proxy-chain relay, and federated post delivery via BullMQ
* `tests/helpers/` — Reusable DB, identity, and auth-user utilities
* Playwright config updated to match new file conventions
* Unused helpers (`tests/helpers/queue.ts`) removed
- **Social plugin endpoints** — Rewritten `follows.ts`, `blocks.ts`, `mutes.ts`,
and `posts.ts` with proper federation integration. `social.ts` gains helpers
for looking up posts by federation URL.
### Minor changes
- **README** — Expanded from a 42-line stub to a full architecture guide with
tables for every layer (auth, DB, queues, storage, real-time), API route
documentation, setup instructions, environment variables, test coverage, and
the updated roadmap.
- **Federation helpers** — `keytools.ts` refactors imports and cleans up the public surface.
`fetch.ts`, `registry.ts`, and `proxy-helpers/federated-post.ts` pick up small
improvements. `PostFederationSchema` simplifies its encryption type assertion.
- **Plugin infrastructure** — Oven plugin schema and server index gain minor
refactors. Social client adds a `muteUser` method.
- **UI components** — `switch.tsx` and `tooltip.tsx` rewritten for Radix v2 /
Tailwind 4; `accordion.tsx`, `dropdown-menu.tsx`, `form`, `button`, `card` get
minor consistency fixes. `dialog.tsx` removes unused `DialogHeader`.
- **Server bootstrap** — `server.ts` imports DB schema before `instrumentation`
for correct Drizzle initialization, rate-limiting routes are wired, and CORS
allows federation origins. `auth.ts` regenerates Oven and social plugin schemas.
- **Dependencies** — Added `@noble/ciphers` and `@noble/hashes` (crypto
primitives). Removed `@signalapp/libsignal-client`, `base58-js`, `nanostores`,
`tweetnacl-util`, `dexie-react-hooks`, `socket.io-client`. Updated all Better
Auth packages to 1.6.11, BullMQ to 5.76.10, and various dev deps across the
board.
- **.gitignore** — Added `/audits` and `tests/docker/*.env` to prevent secret
leakage.
- **DB schema** — `blocks` table imported in `src/lib/db/schema/index.ts`.
Co-authored-by: Cursor <cursoragent@cursor.com>
73 lines
2.5 KiB
TypeScript
73 lines
2.5 KiB
TypeScript
import type { EncryptedEnvelope } from "@/lib/federation/keytools";
|
|
import {
|
|
decryptPayload,
|
|
encryptPayload,
|
|
fingerprintKey,
|
|
signMessage,
|
|
verifySignature,
|
|
} from "@/lib/federation/keytools";
|
|
import { expect, test } from "bun:test";
|
|
import nacl from "tweetnacl";
|
|
|
|
test("encryptPayload round-trips through decryptPayload for matching recipient keys", () => {
|
|
const recipient = nacl.box.keyPair();
|
|
const pub = new Uint8Array(recipient.publicKey);
|
|
const secret = new Uint8Array(recipient.secretKey);
|
|
const plaintext = JSON.stringify({ probe: true, n: 42 });
|
|
const env = encryptPayload(plaintext, pub);
|
|
expect(decryptPayload(env, secret)).toBe(plaintext);
|
|
});
|
|
|
|
test("decryptPayload rejects tampered authTag", () => {
|
|
const recipient = nacl.box.keyPair();
|
|
const plaintext = "tamper-me";
|
|
const env = encryptPayload(plaintext, new Uint8Array(recipient.publicKey));
|
|
const tag = Buffer.from(env.authTag, "base64");
|
|
tag[0] ^= 0xff;
|
|
env.authTag = tag.toString("base64");
|
|
expect(() =>
|
|
decryptPayload(env, new Uint8Array(recipient.secretKey)),
|
|
).toThrow();
|
|
});
|
|
|
|
test("decryptPayload rejects wrong recipient secret key", () => {
|
|
const a = nacl.box.keyPair();
|
|
const b = nacl.box.keyPair();
|
|
const env = encryptPayload("secret", new Uint8Array(a.publicKey));
|
|
expect(() => decryptPayload(env, new Uint8Array(b.secretKey))).toThrow();
|
|
});
|
|
|
|
test("signMessage / verifySignature: happy path and tamper rejection", () => {
|
|
const signing = nacl.sign.keyPair();
|
|
const msg = 'canonical-message-bytes';
|
|
const sig = signMessage(msg, new Uint8Array(signing.secretKey));
|
|
expect(
|
|
verifySignature(msg, sig, new Uint8Array(signing.publicKey)),
|
|
).toBe(true);
|
|
|
|
expect(
|
|
verifySignature(msg + "x", sig, new Uint8Array(signing.publicKey)),
|
|
).toBe(false);
|
|
|
|
const other = nacl.sign.keyPair();
|
|
expect(
|
|
verifySignature(msg, sig, new Uint8Array(other.publicKey)),
|
|
).toBe(false);
|
|
});
|
|
|
|
test("fingerprintKey is hex-stable across repeated calls", () => {
|
|
const b64 = Buffer.alloc(nacl.box.publicKeyLength, 9).toString("base64");
|
|
expect(fingerprintKey(b64)).toMatch(/^[0-9a-f]{64}$/);
|
|
expect(fingerprintKey(b64)).toBe(fingerprintKey(b64));
|
|
});
|
|
|
|
test("encryptPayload ciphertext mutation breaks decryption", () => {
|
|
const recipient = nacl.box.keyPair();
|
|
const env: EncryptedEnvelope = encryptPayload("payload", new Uint8Array(recipient.publicKey));
|
|
const ct = Buffer.from(env.ciphertext, "base64");
|
|
if (ct.length > 0) ct[0] ^= 1;
|
|
env.ciphertext = ct.toString("base64");
|
|
expect(() =>
|
|
decryptPayload(env, new Uint8Array(recipient.secretKey)),
|
|
).toThrow();
|
|
});
|