feature: port from python client lib
This commit is contained in:
parent
129c6cd004
commit
fd1a3b50cb
29 changed files with 3141 additions and 2 deletions
79
src/api/SecureChatCompletion.ts
Normal file
79
src/api/SecureChatCompletion.ts
Normal file
|
|
@ -0,0 +1,79 @@
|
|||
/**
|
||||
* OpenAI-compatible secure chat completion API
|
||||
* Provides a drop-in replacement for OpenAI's ChatCompletion API with end-to-end encryption
|
||||
*/
|
||||
|
||||
import { SecureCompletionClient } from '../core/SecureCompletionClient';
|
||||
import { ChatCompletionConfig } from '../types/client';
|
||||
import { ChatCompletionRequest, ChatCompletionResponse } from '../types/api';
|
||||
|
||||
export class SecureChatCompletion {
|
||||
private client: SecureCompletionClient;
|
||||
private apiKey?: string;
|
||||
|
||||
constructor(config: ChatCompletionConfig = {}) {
|
||||
const {
|
||||
baseUrl = 'https://api.nomyo.ai:12434',
|
||||
allowHttp = false,
|
||||
apiKey,
|
||||
secureMemory = true,
|
||||
} = config;
|
||||
|
||||
this.apiKey = apiKey;
|
||||
this.client = new SecureCompletionClient({
|
||||
routerUrl: baseUrl,
|
||||
allowHttp,
|
||||
secureMemory,
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* Create a chat completion (matches OpenAI API)
|
||||
* @param request Chat completion request
|
||||
* @returns Chat completion response
|
||||
*/
|
||||
async create(request: ChatCompletionRequest): Promise<ChatCompletionResponse> {
|
||||
// Generate unique payload ID
|
||||
const payloadId = `openai-compat-${this.generatePayloadId()}`;
|
||||
|
||||
// Extract API key from request or use instance key
|
||||
const apiKey = (request as any).api_key || this.apiKey;
|
||||
|
||||
// Remove api_key from payload if present (it's in headers)
|
||||
const payload = { ...request };
|
||||
delete (payload as any).api_key;
|
||||
|
||||
// Validate required fields
|
||||
if (!payload.model) {
|
||||
throw new Error('Missing required field: model');
|
||||
}
|
||||
if (!payload.messages || !Array.isArray(payload.messages)) {
|
||||
throw new Error('Missing or invalid required field: messages');
|
||||
}
|
||||
|
||||
// Send secure request
|
||||
const response = await this.client.sendSecureRequest(
|
||||
payload,
|
||||
payloadId,
|
||||
apiKey
|
||||
);
|
||||
|
||||
return response as ChatCompletionResponse;
|
||||
}
|
||||
|
||||
/**
|
||||
* Async alias for create() (for compatibility with OpenAI SDK)
|
||||
*/
|
||||
async acreate(request: ChatCompletionRequest): Promise<ChatCompletionResponse> {
|
||||
return this.create(request);
|
||||
}
|
||||
|
||||
/**
|
||||
* Generate a unique payload ID
|
||||
*/
|
||||
private generatePayloadId(): string {
|
||||
const timestamp = Date.now();
|
||||
const random = Math.random().toString(36).substring(2, 15);
|
||||
return `${timestamp}-${random}`;
|
||||
}
|
||||
}
|
||||
6
src/browser.ts
Normal file
6
src/browser.ts
Normal file
|
|
@ -0,0 +1,6 @@
|
|||
/**
|
||||
* Browser-specific entry point
|
||||
* Ensures browser-specific implementations are used
|
||||
*/
|
||||
|
||||
export * from './index';
|
||||
454
src/core/SecureCompletionClient.ts
Normal file
454
src/core/SecureCompletionClient.ts
Normal file
|
|
@ -0,0 +1,454 @@
|
|||
/**
|
||||
* Secure Completion Client
|
||||
* Main client class for encrypted communication with NOMYO router
|
||||
*
|
||||
* Port of Python's SecureCompletionClient with full API compatibility
|
||||
*/
|
||||
|
||||
import { ClientConfig } from '../types/client';
|
||||
import { EncryptedPackage } from '../types/crypto';
|
||||
import { KeyManager } from './crypto/keys';
|
||||
import { AESEncryption } from './crypto/encryption';
|
||||
import { RSAOperations } from './crypto/rsa';
|
||||
import { createHttpClient, HttpClient } from './http/client';
|
||||
import { createSecureMemory, SecureByteContext } from './memory/secure';
|
||||
import { SecurityError, APIConnectionError } from '../errors';
|
||||
import {
|
||||
arrayBufferToBase64,
|
||||
base64ToArrayBuffer,
|
||||
stringToArrayBuffer,
|
||||
arrayBufferToString,
|
||||
} from './crypto/utils';
|
||||
|
||||
export class SecureCompletionClient {
|
||||
private routerUrl: string;
|
||||
private allowHttp: boolean;
|
||||
private secureMemory: boolean;
|
||||
private keyManager: KeyManager;
|
||||
private aes: AESEncryption;
|
||||
private rsa: RSAOperations;
|
||||
private httpClient: HttpClient;
|
||||
private secureMemoryImpl = createSecureMemory();
|
||||
|
||||
constructor(config: ClientConfig = { routerUrl: 'https://api.nomyo.ai:12434' }) {
|
||||
const {
|
||||
routerUrl = 'https://api.nomyo.ai:12434',
|
||||
allowHttp = false,
|
||||
secureMemory = true,
|
||||
keySize = 4096,
|
||||
} = config;
|
||||
|
||||
this.routerUrl = routerUrl.replace(/\/$/, ''); // Remove trailing slash
|
||||
this.allowHttp = allowHttp;
|
||||
this.secureMemory = secureMemory;
|
||||
|
||||
// Validate HTTPS for security
|
||||
if (!this.routerUrl.startsWith('https://')) {
|
||||
if (!allowHttp) {
|
||||
console.warn(
|
||||
'⚠️ WARNING: Using HTTP instead of HTTPS. ' +
|
||||
'This is INSECURE and should only be used for local development. ' +
|
||||
'Man-in-the-middle attacks are possible!'
|
||||
);
|
||||
} else {
|
||||
console.log('HTTP mode enabled for local development (INSECURE)');
|
||||
}
|
||||
}
|
||||
|
||||
// Initialize components
|
||||
this.keyManager = new KeyManager();
|
||||
this.aes = new AESEncryption();
|
||||
this.rsa = new RSAOperations();
|
||||
this.httpClient = createHttpClient();
|
||||
|
||||
// Log memory protection info
|
||||
const protectionInfo = this.secureMemoryImpl.getProtectionInfo();
|
||||
console.log(`Memory protection: ${protectionInfo.method} (${protectionInfo.details})`);
|
||||
}
|
||||
|
||||
/**
|
||||
* Generate RSA key pair
|
||||
*/
|
||||
async generateKeys(options: {
|
||||
saveToFile?: boolean;
|
||||
keyDir?: string;
|
||||
password?: string;
|
||||
} = {}): Promise<void> {
|
||||
await this.keyManager.generateKeys({
|
||||
keySize: 4096,
|
||||
...options,
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* Load existing keys from files (Node.js only)
|
||||
*/
|
||||
async loadKeys(
|
||||
privateKeyPath: string,
|
||||
publicKeyPath?: string,
|
||||
password?: string
|
||||
): Promise<void> {
|
||||
await this.keyManager.loadKeys(
|
||||
{ privateKeyPath, publicKeyPath },
|
||||
password
|
||||
);
|
||||
}
|
||||
|
||||
/**
|
||||
* Ensure keys are loaded, generate if necessary
|
||||
*/
|
||||
private async ensureKeys(): Promise<void> {
|
||||
if (this.keyManager.hasKeys()) {
|
||||
return;
|
||||
}
|
||||
|
||||
// Try to load keys from default location (Node.js only)
|
||||
if (typeof window === 'undefined') {
|
||||
try {
|
||||
const fs = require('fs').promises;
|
||||
const path = require('path');
|
||||
|
||||
const privateKeyPath = path.join('client_keys', 'private_key.pem');
|
||||
const publicKeyPath = path.join('client_keys', 'public_key.pem');
|
||||
|
||||
// Check if keys exist
|
||||
await fs.access(privateKeyPath);
|
||||
await fs.access(publicKeyPath);
|
||||
|
||||
// Load keys
|
||||
await this.loadKeys(privateKeyPath, publicKeyPath);
|
||||
console.log('Loaded existing keys from client_keys/');
|
||||
return;
|
||||
} catch (error) {
|
||||
// Keys don't exist, generate new ones
|
||||
console.log('No existing keys found, generating new keys...');
|
||||
}
|
||||
}
|
||||
|
||||
// Generate new keys
|
||||
await this.generateKeys({
|
||||
saveToFile: typeof window === 'undefined', // Only save in Node.js
|
||||
keyDir: 'client_keys',
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* Fetch server's public key from /pki/public_key endpoint
|
||||
*/
|
||||
async fetchServerPublicKey(): Promise<string> {
|
||||
console.log("Fetching server's public key...");
|
||||
|
||||
// Security check: Ensure HTTPS is used unless HTTP explicitly allowed
|
||||
if (!this.routerUrl.startsWith('https://')) {
|
||||
if (!this.allowHttp) {
|
||||
throw new SecurityError(
|
||||
'Server public key must be fetched over HTTPS to prevent MITM attacks. ' +
|
||||
'For local development, initialize with allowHttp=true: ' +
|
||||
'new SecureChatCompletion({ baseUrl: "http://localhost:12434", allowHttp: true })'
|
||||
);
|
||||
} else {
|
||||
console.warn('Fetching key over HTTP (local development mode)');
|
||||
}
|
||||
}
|
||||
|
||||
const url = `${this.routerUrl}/pki/public_key`;
|
||||
|
||||
try {
|
||||
const response = await this.httpClient.get(url, { timeout: 60000 });
|
||||
|
||||
if (response.statusCode === 200) {
|
||||
const serverPublicKey = arrayBufferToString(response.body);
|
||||
|
||||
// Validate it's a valid PEM key
|
||||
try {
|
||||
await this.rsa.importPublicKey(serverPublicKey);
|
||||
} catch (error) {
|
||||
throw new Error('Server returned invalid public key format');
|
||||
}
|
||||
|
||||
if (this.routerUrl.startsWith('https://')) {
|
||||
console.log("Server's public key fetched securely over HTTPS");
|
||||
} else {
|
||||
console.warn("Server's public key fetched over HTTP (INSECURE)");
|
||||
}
|
||||
|
||||
return serverPublicKey;
|
||||
} else {
|
||||
throw new Error(`Failed to fetch server's public key: HTTP ${response.statusCode}`);
|
||||
}
|
||||
} catch (error) {
|
||||
if (error instanceof SecurityError) {
|
||||
throw error;
|
||||
}
|
||||
if (error instanceof Error) {
|
||||
throw new APIConnectionError(`Failed to fetch server's public key: ${error.message}`);
|
||||
}
|
||||
throw error;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Encrypt a payload using hybrid encryption (AES-256-GCM + RSA-OAEP)
|
||||
*/
|
||||
async encryptPayload(payload: object): Promise<ArrayBuffer> {
|
||||
console.log('Encrypting payload...');
|
||||
|
||||
// Validate payload
|
||||
if (!payload || typeof payload !== 'object') {
|
||||
throw new Error('Payload must be an object');
|
||||
}
|
||||
|
||||
// Ensure keys are loaded
|
||||
await this.ensureKeys();
|
||||
|
||||
// Serialize payload to JSON
|
||||
const payloadJson = JSON.stringify(payload);
|
||||
const payloadBytes = stringToArrayBuffer(payloadJson);
|
||||
|
||||
// Validate payload size (prevent DoS)
|
||||
const MAX_PAYLOAD_SIZE = 10 * 1024 * 1024; // 10MB limit
|
||||
if (payloadBytes.byteLength > MAX_PAYLOAD_SIZE) {
|
||||
throw new Error(`Payload too large: ${payloadBytes.byteLength} bytes (max: ${MAX_PAYLOAD_SIZE})`);
|
||||
}
|
||||
|
||||
console.log(`Payload size: ${payloadBytes.byteLength} bytes`);
|
||||
|
||||
// Use secure memory context if enabled
|
||||
if (this.secureMemory) {
|
||||
const context = new SecureByteContext(payloadBytes, true);
|
||||
return await context.use(async (protectedPayload) => {
|
||||
return await this.performEncryption(protectedPayload);
|
||||
});
|
||||
} else {
|
||||
return await this.performEncryption(payloadBytes);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Perform the actual encryption (separated for secure memory context)
|
||||
*/
|
||||
private async performEncryption(payloadBytes: ArrayBuffer): Promise<ArrayBuffer> {
|
||||
// Generate AES key
|
||||
const aesKey = await this.aes.generateKey();
|
||||
const aesKeyBytes = await this.aes.exportKey(aesKey);
|
||||
|
||||
// Protect AES key in memory
|
||||
const aesContext = new SecureByteContext(aesKeyBytes, this.secureMemory);
|
||||
return await aesContext.use(async (protectedAesKey) => {
|
||||
// Encrypt payload with AES-GCM
|
||||
const { ciphertext, nonce } = await this.aes.encrypt(payloadBytes, aesKey);
|
||||
|
||||
// Fetch server's public key
|
||||
const serverPublicKeyPem = await this.fetchServerPublicKey();
|
||||
const serverPublicKey = await this.rsa.importPublicKey(serverPublicKeyPem);
|
||||
|
||||
// Encrypt AES key with server's RSA public key
|
||||
const encryptedAesKey = await this.rsa.encryptKey(protectedAesKey, serverPublicKey);
|
||||
|
||||
// Create encrypted package (matching Python format)
|
||||
const encryptedPackage = {
|
||||
version: '1.0',
|
||||
algorithm: 'hybrid-aes256-rsa4096',
|
||||
encrypted_payload: {
|
||||
ciphertext: arrayBufferToBase64(ciphertext),
|
||||
nonce: arrayBufferToBase64(nonce),
|
||||
// Note: GCM tag is included in ciphertext in Web Crypto API
|
||||
},
|
||||
encrypted_aes_key: arrayBufferToBase64(encryptedAesKey),
|
||||
key_algorithm: 'RSA-OAEP-SHA256',
|
||||
payload_algorithm: 'AES-256-GCM',
|
||||
};
|
||||
|
||||
// Serialize package to JSON
|
||||
const packageJson = JSON.stringify(encryptedPackage);
|
||||
const packageBytes = stringToArrayBuffer(packageJson);
|
||||
|
||||
console.log(`Encrypted package size: ${packageBytes.byteLength} bytes`);
|
||||
|
||||
return packageBytes;
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* Decrypt a response from the secure endpoint
|
||||
*/
|
||||
async decryptResponse(encryptedResponse: ArrayBuffer, payloadId: string): Promise<object> {
|
||||
console.log('Decrypting response...');
|
||||
|
||||
// Validate input
|
||||
if (!encryptedResponse || encryptedResponse.byteLength === 0) {
|
||||
throw new Error('Empty encrypted response');
|
||||
}
|
||||
|
||||
// Parse encrypted package
|
||||
let packageData: any;
|
||||
try {
|
||||
const packageJson = arrayBufferToString(encryptedResponse);
|
||||
packageData = JSON.parse(packageJson);
|
||||
} catch (error) {
|
||||
throw new Error('Invalid encrypted package format: malformed JSON');
|
||||
}
|
||||
|
||||
// Validate package structure
|
||||
const requiredFields = ['version', 'algorithm', 'encrypted_payload', 'encrypted_aes_key'];
|
||||
for (const field of requiredFields) {
|
||||
if (!(field in packageData)) {
|
||||
throw new Error(`Missing required field in encrypted package: ${field}`);
|
||||
}
|
||||
}
|
||||
|
||||
// Validate encrypted_payload structure
|
||||
const payloadRequired = ['ciphertext', 'nonce'];
|
||||
for (const field of payloadRequired) {
|
||||
if (!(field in packageData.encrypted_payload)) {
|
||||
throw new Error(`Missing field in encrypted_payload: ${field}`);
|
||||
}
|
||||
}
|
||||
|
||||
// Decrypt AES key with private key
|
||||
try {
|
||||
const encryptedAesKey = base64ToArrayBuffer(packageData.encrypted_aes_key);
|
||||
const privateKey = this.keyManager.getPrivateKey();
|
||||
const aesKeyBytes = await this.rsa.decryptKey(encryptedAesKey, privateKey);
|
||||
|
||||
// Use secure memory context for AES key
|
||||
const aesContext = new SecureByteContext(aesKeyBytes, this.secureMemory);
|
||||
const response = await aesContext.use(async (protectedAesKey) => {
|
||||
// Import AES key
|
||||
const aesKey = await this.aes.importKey(protectedAesKey);
|
||||
|
||||
// Decrypt payload with AES-GCM
|
||||
const ciphertext = base64ToArrayBuffer(packageData.encrypted_payload.ciphertext);
|
||||
const nonce = base64ToArrayBuffer(packageData.encrypted_payload.nonce);
|
||||
|
||||
const plaintext = await this.aes.decrypt(ciphertext, nonce, aesKey);
|
||||
|
||||
// Use secure memory for plaintext
|
||||
const plaintextContext = new SecureByteContext(plaintext, this.secureMemory);
|
||||
return await plaintextContext.use(async (protectedPlaintext) => {
|
||||
// Parse decrypted response
|
||||
const responseJson = arrayBufferToString(protectedPlaintext);
|
||||
return JSON.parse(responseJson);
|
||||
});
|
||||
});
|
||||
|
||||
// Add metadata
|
||||
if (!response._metadata) {
|
||||
response._metadata = {};
|
||||
}
|
||||
response._metadata = {
|
||||
...response._metadata,
|
||||
payload_id: payloadId,
|
||||
processed_at: packageData.processed_at,
|
||||
is_encrypted: true,
|
||||
encryption_algorithm: packageData.algorithm,
|
||||
};
|
||||
|
||||
console.log('Response decrypted successfully');
|
||||
return response;
|
||||
} catch (error) {
|
||||
// Don't leak specific decryption errors (timing attacks)
|
||||
throw new SecurityError('Decryption failed: integrity check or authentication failed');
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Send a secure chat completion request to the router
|
||||
*/
|
||||
async sendSecureRequest(
|
||||
payload: object,
|
||||
payloadId: string,
|
||||
apiKey?: string
|
||||
): Promise<object> {
|
||||
console.log('Sending secure chat completion request...');
|
||||
|
||||
// Ensure keys are loaded
|
||||
await this.ensureKeys();
|
||||
|
||||
// Step 1: Encrypt the payload
|
||||
const encryptedPayload = await this.encryptPayload(payload);
|
||||
|
||||
// Step 2: Prepare headers
|
||||
const publicKeyPem = await this.keyManager.getPublicKeyPEM();
|
||||
const headers: Record<string, string> = {
|
||||
'X-Payload-ID': payloadId,
|
||||
'X-Public-Key': encodeURIComponent(publicKeyPem),
|
||||
'Content-Type': 'application/octet-stream',
|
||||
};
|
||||
|
||||
// Add Authorization header if api_key is provided
|
||||
if (apiKey) {
|
||||
headers['Authorization'] = `Bearer ${apiKey}`;
|
||||
}
|
||||
|
||||
// Step 3: Send request to router
|
||||
const url = `${this.routerUrl}/v1/chat/secure_completion`;
|
||||
console.log(`Target URL: ${url}`);
|
||||
|
||||
try {
|
||||
const response = await this.httpClient.post(url, {
|
||||
headers,
|
||||
body: encryptedPayload,
|
||||
timeout: 60000,
|
||||
});
|
||||
|
||||
console.log(`HTTP Status: ${response.statusCode}`);
|
||||
|
||||
if (response.statusCode === 200) {
|
||||
// Step 4: Decrypt the response
|
||||
const decryptedResponse = await this.decryptResponse(response.body, payloadId);
|
||||
return decryptedResponse;
|
||||
} else {
|
||||
// Handle error responses
|
||||
const { handleErrorResponse } = await import('../errors');
|
||||
throw this.handleErrorResponse(response);
|
||||
}
|
||||
} catch (error) {
|
||||
if (error instanceof Error) {
|
||||
if (error.message === 'Request timeout') {
|
||||
throw new APIConnectionError('Connection to server timed out');
|
||||
}
|
||||
throw new APIConnectionError(`Failed to connect to router: ${error.message}`);
|
||||
}
|
||||
throw error;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Handle error HTTP responses
|
||||
*/
|
||||
private handleErrorResponse(response: { statusCode: number; body: ArrayBuffer }): Error {
|
||||
const {
|
||||
AuthenticationError,
|
||||
InvalidRequestError,
|
||||
RateLimitError,
|
||||
ServerError,
|
||||
APIError,
|
||||
} = require('../errors');
|
||||
|
||||
let errorData: any = {};
|
||||
try {
|
||||
const errorJson = arrayBufferToString(response.body);
|
||||
errorData = JSON.parse(errorJson);
|
||||
} catch (e) {
|
||||
// Ignore JSON parse errors
|
||||
}
|
||||
|
||||
const detail = errorData.detail || 'Unknown error';
|
||||
|
||||
switch (response.statusCode) {
|
||||
case 400:
|
||||
return new InvalidRequestError(`Bad request: ${detail}`, 400, errorData);
|
||||
case 401:
|
||||
return new AuthenticationError(`Invalid API key or authentication failed: ${detail}`, 401, errorData);
|
||||
case 404:
|
||||
return new APIError(`Endpoint not found: ${detail}`, 404, errorData);
|
||||
case 429:
|
||||
return new RateLimitError(`Rate limit exceeded: ${detail}`, 429, errorData);
|
||||
case 500:
|
||||
return new ServerError(`Server error: ${detail}`, 500, errorData);
|
||||
default:
|
||||
return new APIError(`Unexpected status code: ${response.statusCode}`, response.statusCode, errorData);
|
||||
}
|
||||
}
|
||||
}
|
||||
118
src/core/crypto/encryption.ts
Normal file
118
src/core/crypto/encryption.ts
Normal file
|
|
@ -0,0 +1,118 @@
|
|||
/**
|
||||
* AES-256-GCM encryption and decryption using Web Crypto API
|
||||
* Matches the Python implementation using AES-256-GCM with random nonces
|
||||
*/
|
||||
|
||||
import { getCrypto, arrayBufferToBase64, base64ToArrayBuffer, generateRandomBytes } from './utils';
|
||||
|
||||
export class AESEncryption {
|
||||
private subtle: SubtleCrypto;
|
||||
|
||||
constructor() {
|
||||
this.subtle = getCrypto();
|
||||
}
|
||||
|
||||
/**
|
||||
* Generate a random 256-bit AES key
|
||||
*/
|
||||
async generateKey(): Promise<CryptoKey> {
|
||||
return await this.subtle.generateKey(
|
||||
{
|
||||
name: 'AES-GCM',
|
||||
length: 256, // 256-bit key
|
||||
},
|
||||
true, // extractable
|
||||
['encrypt', 'decrypt']
|
||||
);
|
||||
}
|
||||
|
||||
/**
|
||||
* Encrypt data with AES-256-GCM
|
||||
* @param data Data to encrypt
|
||||
* @param key AES key
|
||||
* @returns Object containing ciphertext and nonce
|
||||
*/
|
||||
async encrypt(
|
||||
data: ArrayBuffer,
|
||||
key: CryptoKey
|
||||
): Promise<{ ciphertext: ArrayBuffer; nonce: ArrayBuffer }> {
|
||||
// Generate random 96-bit (12-byte) nonce
|
||||
const nonce = generateRandomBytes(12);
|
||||
|
||||
// Encrypt with AES-GCM
|
||||
const ciphertext = await this.subtle.encrypt(
|
||||
{
|
||||
name: 'AES-GCM',
|
||||
iv: nonce,
|
||||
tagLength: 128, // 128-bit authentication tag
|
||||
},
|
||||
key,
|
||||
data
|
||||
);
|
||||
|
||||
return {
|
||||
ciphertext,
|
||||
nonce: nonce.buffer,
|
||||
};
|
||||
}
|
||||
|
||||
/**
|
||||
* Decrypt data with AES-256-GCM
|
||||
* @param ciphertext Encrypted data
|
||||
* @param nonce Nonce/IV used for encryption
|
||||
* @param key AES key
|
||||
* @returns Decrypted plaintext
|
||||
*/
|
||||
async decrypt(
|
||||
ciphertext: ArrayBuffer,
|
||||
nonce: ArrayBuffer,
|
||||
key: CryptoKey
|
||||
): Promise<ArrayBuffer> {
|
||||
try {
|
||||
const plaintext = await this.subtle.decrypt(
|
||||
{
|
||||
name: 'AES-GCM',
|
||||
iv: nonce,
|
||||
tagLength: 128,
|
||||
},
|
||||
key,
|
||||
ciphertext
|
||||
);
|
||||
|
||||
return plaintext;
|
||||
} catch (error) {
|
||||
throw new Error(`AES-GCM decryption failed: ${error instanceof Error ? error.message : 'Unknown error'}`);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Export AES key as raw bytes
|
||||
* @param key CryptoKey to export
|
||||
* @returns Raw key bytes
|
||||
*/
|
||||
async exportKey(key: CryptoKey): Promise<ArrayBuffer> {
|
||||
return await this.subtle.exportKey('raw', key);
|
||||
}
|
||||
|
||||
/**
|
||||
* Import AES key from raw bytes
|
||||
* @param keyData Raw key bytes (must be 32 bytes for AES-256)
|
||||
* @returns Imported CryptoKey
|
||||
*/
|
||||
async importKey(keyData: ArrayBuffer): Promise<CryptoKey> {
|
||||
if (keyData.byteLength !== 32) {
|
||||
throw new Error(`Invalid AES key length: expected 32 bytes, got ${keyData.byteLength}`);
|
||||
}
|
||||
|
||||
return await this.subtle.importKey(
|
||||
'raw',
|
||||
keyData,
|
||||
{
|
||||
name: 'AES-GCM',
|
||||
length: 256,
|
||||
},
|
||||
true,
|
||||
['encrypt', 'decrypt']
|
||||
);
|
||||
}
|
||||
}
|
||||
189
src/core/crypto/keys.ts
Normal file
189
src/core/crypto/keys.ts
Normal file
|
|
@ -0,0 +1,189 @@
|
|||
/**
|
||||
* Key management for RSA key pairs
|
||||
* Handles key generation, loading, and persistence
|
||||
*
|
||||
* NOTE: Browser storage is NOT implemented in this version for security reasons.
|
||||
* Keys are kept in-memory only in browsers. For persistent keys, use Node.js.
|
||||
*/
|
||||
|
||||
import { RSAOperations } from './rsa';
|
||||
import { KeyGenOptions, KeyPaths } from '../../types/client';
|
||||
|
||||
export class KeyManager {
|
||||
private rsa: RSAOperations;
|
||||
private publicKey?: CryptoKey;
|
||||
private privateKey?: CryptoKey;
|
||||
private publicKeyPem?: string;
|
||||
|
||||
constructor() {
|
||||
this.rsa = new RSAOperations();
|
||||
}
|
||||
|
||||
/**
|
||||
* Generate new RSA key pair
|
||||
* @param options Key generation options
|
||||
*/
|
||||
async generateKeys(options: KeyGenOptions = {}): Promise<void> {
|
||||
const {
|
||||
keySize = 4096,
|
||||
saveToFile = false,
|
||||
keyDir = 'client_keys',
|
||||
password,
|
||||
} = options;
|
||||
|
||||
console.log(`Generating ${keySize}-bit RSA key pair...`);
|
||||
|
||||
// Generate key pair
|
||||
const keyPair = await this.rsa.generateKeyPair(keySize);
|
||||
this.publicKey = keyPair.publicKey;
|
||||
this.privateKey = keyPair.privateKey;
|
||||
|
||||
// Export public key to PEM
|
||||
this.publicKeyPem = await this.rsa.exportPublicKey(this.publicKey);
|
||||
|
||||
console.log(`Generated ${keySize}-bit RSA key pair`);
|
||||
|
||||
// Save to file if requested (Node.js only)
|
||||
if (saveToFile) {
|
||||
await this.saveKeys(keyDir, password);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Load keys from files (Node.js only)
|
||||
* @param paths Key file paths
|
||||
* @param password Optional password for encrypted private key
|
||||
*/
|
||||
async loadKeys(paths: KeyPaths, password?: string): Promise<void> {
|
||||
// Check if we're in Node.js
|
||||
if (typeof window !== 'undefined') {
|
||||
throw new Error('File-based key loading is not supported in browsers. Use in-memory keys only.');
|
||||
}
|
||||
|
||||
console.log('Loading keys from files...');
|
||||
|
||||
const fs = require('fs').promises;
|
||||
const path = require('path');
|
||||
|
||||
// Load private key
|
||||
const privateKeyPem = await fs.readFile(paths.privateKeyPath, 'utf-8');
|
||||
this.privateKey = await this.rsa.importPrivateKey(privateKeyPem, password);
|
||||
|
||||
// Load or derive public key
|
||||
if (paths.publicKeyPath) {
|
||||
this.publicKeyPem = await fs.readFile(paths.publicKeyPath, 'utf-8');
|
||||
this.publicKey = await this.rsa.importPublicKey(this.publicKeyPem);
|
||||
} else {
|
||||
// Derive public key from private key's public component
|
||||
// For now, we'll require the public key file
|
||||
const publicKeyPath = path.join(
|
||||
path.dirname(paths.privateKeyPath),
|
||||
'public_key.pem'
|
||||
);
|
||||
this.publicKeyPem = await fs.readFile(publicKeyPath, 'utf-8');
|
||||
this.publicKey = await this.rsa.importPublicKey(this.publicKeyPem);
|
||||
}
|
||||
|
||||
console.log('Keys loaded successfully');
|
||||
}
|
||||
|
||||
/**
|
||||
* Save keys to files (Node.js only)
|
||||
* @param directory Directory to save keys
|
||||
* @param password Optional password to encrypt private key
|
||||
*/
|
||||
async saveKeys(directory: string, password?: string): Promise<void> {
|
||||
// Check if we're in Node.js
|
||||
if (typeof window !== 'undefined') {
|
||||
throw new Error('File-based key saving is not supported in browsers');
|
||||
}
|
||||
|
||||
if (!this.privateKey || !this.publicKey) {
|
||||
throw new Error('No keys to save. Generate or load keys first.');
|
||||
}
|
||||
|
||||
const fs = require('fs').promises;
|
||||
const path = require('path');
|
||||
|
||||
console.log(`Saving keys to ${directory}/...`);
|
||||
|
||||
// Create directory if it doesn't exist
|
||||
await fs.mkdir(directory, { recursive: true });
|
||||
|
||||
// Export and save private key
|
||||
const privateKeyPem = await this.rsa.exportPrivateKey(this.privateKey, password);
|
||||
const privateKeyPath = path.join(directory, 'private_key.pem');
|
||||
await fs.writeFile(privateKeyPath, privateKeyPem, 'utf-8');
|
||||
|
||||
// Set restrictive permissions on private key (Unix-like systems)
|
||||
try {
|
||||
await fs.chmod(privateKeyPath, 0o600); // Owner read/write only
|
||||
console.log('Private key permissions set to 600 (owner-only access)');
|
||||
} catch (error) {
|
||||
console.warn('Could not set private key permissions:', error);
|
||||
}
|
||||
|
||||
// Save public key
|
||||
if (!this.publicKeyPem) {
|
||||
this.publicKeyPem = await this.rsa.exportPublicKey(this.publicKey);
|
||||
}
|
||||
const publicKeyPath = path.join(directory, 'public_key.pem');
|
||||
await fs.writeFile(publicKeyPath, this.publicKeyPem, 'utf-8');
|
||||
|
||||
// Set permissions on public key
|
||||
try {
|
||||
await fs.chmod(publicKeyPath, 0o644); // Owner read/write, others read
|
||||
console.log('Public key permissions set to 644');
|
||||
} catch (error) {
|
||||
console.warn('Could not set public key permissions:', error);
|
||||
}
|
||||
|
||||
if (password) {
|
||||
console.log('Private key encrypted with password');
|
||||
} else {
|
||||
console.warn('Private key saved UNENCRYPTED (not recommended for production)');
|
||||
}
|
||||
|
||||
console.log(`Keys saved to ${directory}/`);
|
||||
}
|
||||
|
||||
/**
|
||||
* Get public key in PEM format
|
||||
*/
|
||||
async getPublicKeyPEM(): Promise<string> {
|
||||
if (!this.publicKeyPem) {
|
||||
if (!this.publicKey) {
|
||||
throw new Error('No public key available. Generate or load keys first.');
|
||||
}
|
||||
this.publicKeyPem = await this.rsa.exportPublicKey(this.publicKey);
|
||||
}
|
||||
return this.publicKeyPem;
|
||||
}
|
||||
|
||||
/**
|
||||
* Get private key (for internal use)
|
||||
*/
|
||||
getPrivateKey(): CryptoKey {
|
||||
if (!this.privateKey) {
|
||||
throw new Error('No private key available. Generate or load keys first.');
|
||||
}
|
||||
return this.privateKey;
|
||||
}
|
||||
|
||||
/**
|
||||
* Get public key (for internal use)
|
||||
*/
|
||||
getPublicKey(): CryptoKey {
|
||||
if (!this.publicKey) {
|
||||
throw new Error('No public key available. Generate or load keys first.');
|
||||
}
|
||||
return this.publicKey;
|
||||
}
|
||||
|
||||
/**
|
||||
* Check if keys are loaded
|
||||
*/
|
||||
hasKeys(): boolean {
|
||||
return !!(this.privateKey && this.publicKey);
|
||||
}
|
||||
}
|
||||
245
src/core/crypto/rsa.ts
Normal file
245
src/core/crypto/rsa.ts
Normal file
|
|
@ -0,0 +1,245 @@
|
|||
/**
|
||||
* RSA-OAEP operations for key exchange
|
||||
* Matches the Python implementation using RSA-OAEP with SHA-256
|
||||
*/
|
||||
|
||||
import { getCrypto, pemToArrayBuffer, arrayBufferToPem, stringToArrayBuffer, arrayBufferToString } from './utils';
|
||||
|
||||
export class RSAOperations {
|
||||
private subtle: SubtleCrypto;
|
||||
|
||||
constructor() {
|
||||
this.subtle = getCrypto();
|
||||
}
|
||||
|
||||
/**
|
||||
* Generate RSA key pair (2048 or 4096 bit)
|
||||
* @param keySize Key size in bits (default: 4096)
|
||||
*/
|
||||
async generateKeyPair(keySize: 2048 | 4096 = 4096): Promise<CryptoKeyPair> {
|
||||
return await this.subtle.generateKey(
|
||||
{
|
||||
name: 'RSA-OAEP',
|
||||
modulusLength: keySize,
|
||||
publicExponent: new Uint8Array([1, 0, 1]), // 65537
|
||||
hash: 'SHA-256',
|
||||
},
|
||||
true, // extractable
|
||||
['encrypt', 'decrypt']
|
||||
);
|
||||
}
|
||||
|
||||
/**
|
||||
* Encrypt AES key with RSA public key
|
||||
* @param aesKey Raw AES key bytes
|
||||
* @param publicKey RSA public key
|
||||
* @returns Encrypted AES key
|
||||
*/
|
||||
async encryptKey(aesKey: ArrayBuffer, publicKey: CryptoKey): Promise<ArrayBuffer> {
|
||||
return await this.subtle.encrypt(
|
||||
{
|
||||
name: 'RSA-OAEP',
|
||||
},
|
||||
publicKey,
|
||||
aesKey
|
||||
);
|
||||
}
|
||||
|
||||
/**
|
||||
* Decrypt AES key with RSA private key
|
||||
* @param encryptedKey Encrypted AES key
|
||||
* @param privateKey RSA private key
|
||||
* @returns Decrypted AES key (raw bytes)
|
||||
*/
|
||||
async decryptKey(encryptedKey: ArrayBuffer, privateKey: CryptoKey): Promise<ArrayBuffer> {
|
||||
try {
|
||||
return await this.subtle.decrypt(
|
||||
{
|
||||
name: 'RSA-OAEP',
|
||||
},
|
||||
privateKey,
|
||||
encryptedKey
|
||||
);
|
||||
} catch (error) {
|
||||
throw new Error(`RSA-OAEP decryption failed: ${error instanceof Error ? error.message : 'Unknown error'}`);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Export public key to PEM format (SPKI)
|
||||
* @param publicKey RSA public key
|
||||
* @returns PEM-encoded public key
|
||||
*/
|
||||
async exportPublicKey(publicKey: CryptoKey): Promise<string> {
|
||||
const exported = await this.subtle.exportKey('spki', publicKey);
|
||||
return arrayBufferToPem(exported, 'PUBLIC');
|
||||
}
|
||||
|
||||
/**
|
||||
* Import public key from PEM format
|
||||
* @param pem PEM-encoded public key
|
||||
* @returns RSA public key
|
||||
*/
|
||||
async importPublicKey(pem: string): Promise<CryptoKey> {
|
||||
const keyData = pemToArrayBuffer(pem, 'PUBLIC');
|
||||
|
||||
return await this.subtle.importKey(
|
||||
'spki',
|
||||
keyData,
|
||||
{
|
||||
name: 'RSA-OAEP',
|
||||
hash: 'SHA-256',
|
||||
},
|
||||
true,
|
||||
['encrypt']
|
||||
);
|
||||
}
|
||||
|
||||
/**
|
||||
* Export private key to PEM format (PKCS8), optionally encrypted with password
|
||||
* @param privateKey RSA private key
|
||||
* @param password Optional password to encrypt the private key
|
||||
* @returns PEM-encoded private key
|
||||
*/
|
||||
async exportPrivateKey(privateKey: CryptoKey, password?: string): Promise<string> {
|
||||
const exported = await this.subtle.exportKey('pkcs8', privateKey);
|
||||
|
||||
if (password) {
|
||||
// Encrypt the private key with password using PBKDF2 + AES-256-CBC
|
||||
const encryptedKey = await this.encryptPrivateKeyWithPassword(exported, password);
|
||||
return encryptedKey;
|
||||
}
|
||||
|
||||
return arrayBufferToPem(exported, 'PRIVATE');
|
||||
}
|
||||
|
||||
/**
|
||||
* Import private key from PEM format, optionally decrypting with password
|
||||
* @param pem PEM-encoded private key
|
||||
* @param password Optional password if private key is encrypted
|
||||
* @returns RSA private key
|
||||
*/
|
||||
async importPrivateKey(pem: string, password?: string): Promise<CryptoKey> {
|
||||
let keyData: ArrayBuffer;
|
||||
|
||||
if (password) {
|
||||
// Decrypt the private key with password
|
||||
keyData = await this.decryptPrivateKeyWithPassword(pem, password);
|
||||
} else {
|
||||
keyData = pemToArrayBuffer(pem, 'PRIVATE');
|
||||
}
|
||||
|
||||
return await this.subtle.importKey(
|
||||
'pkcs8',
|
||||
keyData,
|
||||
{
|
||||
name: 'RSA-OAEP',
|
||||
hash: 'SHA-256',
|
||||
},
|
||||
true,
|
||||
['decrypt']
|
||||
);
|
||||
}
|
||||
|
||||
/**
|
||||
* Encrypt private key with password using PBKDF2 + AES-256-CBC
|
||||
* @param keyData Private key data (PKCS8)
|
||||
* @param password Password to encrypt with
|
||||
* @returns PEM-encoded encrypted private key
|
||||
*/
|
||||
private async encryptPrivateKeyWithPassword(keyData: ArrayBuffer, password: string): Promise<string> {
|
||||
// Derive encryption key from password using PBKDF2
|
||||
const passwordKey = await this.subtle.importKey(
|
||||
'raw',
|
||||
stringToArrayBuffer(password),
|
||||
'PBKDF2',
|
||||
false,
|
||||
['deriveKey']
|
||||
);
|
||||
|
||||
const salt = crypto.getRandomValues(new Uint8Array(16));
|
||||
const derivedKey = await this.subtle.deriveKey(
|
||||
{
|
||||
name: 'PBKDF2',
|
||||
salt: salt,
|
||||
iterations: 100000,
|
||||
hash: 'SHA-256',
|
||||
},
|
||||
passwordKey,
|
||||
{ name: 'AES-CBC', length: 256 },
|
||||
false,
|
||||
['encrypt']
|
||||
);
|
||||
|
||||
// Encrypt private key with AES-256-CBC
|
||||
const iv = crypto.getRandomValues(new Uint8Array(16));
|
||||
const encrypted = await this.subtle.encrypt(
|
||||
{
|
||||
name: 'AES-CBC',
|
||||
iv: iv,
|
||||
},
|
||||
derivedKey,
|
||||
keyData
|
||||
);
|
||||
|
||||
// Combine salt + iv + encrypted data
|
||||
const combined = new Uint8Array(salt.length + iv.length + encrypted.byteLength);
|
||||
combined.set(salt, 0);
|
||||
combined.set(iv, salt.length);
|
||||
combined.set(new Uint8Array(encrypted), salt.length + iv.length);
|
||||
|
||||
return arrayBufferToPem(combined.buffer, 'PRIVATE');
|
||||
}
|
||||
|
||||
/**
|
||||
* Decrypt private key with password
|
||||
* @param pem PEM-encoded encrypted private key
|
||||
* @param password Password to decrypt with
|
||||
* @returns Decrypted private key data (PKCS8)
|
||||
*/
|
||||
private async decryptPrivateKeyWithPassword(pem: string, password: string): Promise<ArrayBuffer> {
|
||||
const combined = pemToArrayBuffer(pem, 'PRIVATE');
|
||||
const combinedArray = new Uint8Array(combined);
|
||||
|
||||
// Extract salt, iv, and encrypted data
|
||||
const salt = combinedArray.slice(0, 16);
|
||||
const iv = combinedArray.slice(16, 32);
|
||||
const encrypted = combinedArray.slice(32);
|
||||
|
||||
// Derive decryption key from password
|
||||
const passwordKey = await this.subtle.importKey(
|
||||
'raw',
|
||||
stringToArrayBuffer(password),
|
||||
'PBKDF2',
|
||||
false,
|
||||
['deriveKey']
|
||||
);
|
||||
|
||||
const derivedKey = await this.subtle.deriveKey(
|
||||
{
|
||||
name: 'PBKDF2',
|
||||
salt: salt,
|
||||
iterations: 100000,
|
||||
hash: 'SHA-256',
|
||||
},
|
||||
passwordKey,
|
||||
{ name: 'AES-CBC', length: 256 },
|
||||
false,
|
||||
['decrypt']
|
||||
);
|
||||
|
||||
// Decrypt private key
|
||||
try {
|
||||
return await this.subtle.decrypt(
|
||||
{
|
||||
name: 'AES-CBC',
|
||||
iv: iv,
|
||||
},
|
||||
derivedKey,
|
||||
encrypted
|
||||
);
|
||||
} catch (error) {
|
||||
throw new Error('Failed to decrypt private key: invalid password or corrupted key');
|
||||
}
|
||||
}
|
||||
}
|
||||
123
src/core/crypto/utils.ts
Normal file
123
src/core/crypto/utils.ts
Normal file
|
|
@ -0,0 +1,123 @@
|
|||
/**
|
||||
* Cryptographic utility functions
|
||||
* Provides platform-agnostic implementations for Base64, PEM conversion, and random bytes
|
||||
*/
|
||||
|
||||
/**
|
||||
* Convert ArrayBuffer to Base64 string
|
||||
*/
|
||||
export function arrayBufferToBase64(buffer: ArrayBuffer): string {
|
||||
const bytes = new Uint8Array(buffer);
|
||||
let binary = '';
|
||||
for (let i = 0; i < bytes.byteLength; i++) {
|
||||
binary += String.fromCharCode(bytes[i]);
|
||||
}
|
||||
|
||||
// Use btoa if available (browser), otherwise use Buffer (Node.js)
|
||||
if (typeof btoa !== 'undefined') {
|
||||
return btoa(binary);
|
||||
} else {
|
||||
return Buffer.from(bytes).toString('base64');
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Convert Base64 string to ArrayBuffer
|
||||
*/
|
||||
export function base64ToArrayBuffer(base64: string): ArrayBuffer {
|
||||
// Use atob if available (browser), otherwise use Buffer (Node.js)
|
||||
let binary: string;
|
||||
if (typeof atob !== 'undefined') {
|
||||
binary = atob(base64);
|
||||
} else {
|
||||
binary = Buffer.from(base64, 'base64').toString('binary');
|
||||
}
|
||||
|
||||
const bytes = new Uint8Array(binary.length);
|
||||
for (let i = 0; i < binary.length; i++) {
|
||||
bytes[i] = binary.charCodeAt(i);
|
||||
}
|
||||
return bytes.buffer;
|
||||
}
|
||||
|
||||
/**
|
||||
* Generate cryptographically secure random bytes
|
||||
*/
|
||||
export function generateRandomBytes(length: number): Uint8Array {
|
||||
const bytes = new Uint8Array(length);
|
||||
|
||||
// Use crypto.getRandomValues if available (browser/Node.js), otherwise use crypto.randomBytes (Node.js)
|
||||
if (typeof crypto !== 'undefined' && crypto.getRandomValues) {
|
||||
crypto.getRandomValues(bytes);
|
||||
} else {
|
||||
// Node.js fallback
|
||||
const nodeCrypto = require('crypto');
|
||||
const randomBytes = nodeCrypto.randomBytes(length);
|
||||
bytes.set(randomBytes);
|
||||
}
|
||||
|
||||
return bytes;
|
||||
}
|
||||
|
||||
/**
|
||||
* Convert string to ArrayBuffer (UTF-8 encoding)
|
||||
*/
|
||||
export function stringToArrayBuffer(str: string): ArrayBuffer {
|
||||
const encoder = new TextEncoder();
|
||||
return encoder.encode(str).buffer;
|
||||
}
|
||||
|
||||
/**
|
||||
* Convert ArrayBuffer to string (UTF-8 decoding)
|
||||
*/
|
||||
export function arrayBufferToString(buffer: ArrayBuffer): string {
|
||||
const decoder = new TextDecoder();
|
||||
return decoder.decode(buffer);
|
||||
}
|
||||
|
||||
/**
|
||||
* Convert PEM format to ArrayBuffer
|
||||
* @param pem PEM-encoded key (with header/footer)
|
||||
* @param type Key type ('PUBLIC' or 'PRIVATE')
|
||||
*/
|
||||
export function pemToArrayBuffer(pem: string, type: 'PUBLIC' | 'PRIVATE'): ArrayBuffer {
|
||||
// Remove header, footer, and whitespace
|
||||
const header = `-----BEGIN ${type === 'PUBLIC' ? 'PUBLIC' : 'PRIVATE'} KEY-----`;
|
||||
const footer = `-----END ${type === 'PUBLIC' ? 'PUBLIC' : 'PRIVATE'} KEY-----`;
|
||||
|
||||
const pemContents = pem
|
||||
.replace(header, '')
|
||||
.replace(footer, '')
|
||||
.replace(/\s/g, '');
|
||||
|
||||
return base64ToArrayBuffer(pemContents);
|
||||
}
|
||||
|
||||
/**
|
||||
* Convert ArrayBuffer to PEM format
|
||||
* @param buffer Key data as ArrayBuffer
|
||||
* @param type Key type ('PUBLIC' or 'PRIVATE')
|
||||
*/
|
||||
export function arrayBufferToPem(buffer: ArrayBuffer, type: 'PUBLIC' | 'PRIVATE'): string {
|
||||
const base64 = arrayBufferToBase64(buffer);
|
||||
const header = `-----BEGIN ${type === 'PUBLIC' ? 'PUBLIC' : 'PRIVATE'} KEY-----`;
|
||||
const footer = `-----END ${type === 'PUBLIC' ? 'PUBLIC' : 'PRIVATE'} KEY-----`;
|
||||
|
||||
// Format with line breaks every 64 characters
|
||||
const formatted = base64.match(/.{1,64}/g)?.join('\n') || base64;
|
||||
|
||||
return `${header}\n${formatted}\n${footer}`;
|
||||
}
|
||||
|
||||
/**
|
||||
* Get the Web Crypto API (works in both browser and Node.js)
|
||||
*/
|
||||
export function getCrypto(): SubtleCrypto {
|
||||
if (typeof crypto !== 'undefined' && crypto.subtle) {
|
||||
return crypto.subtle;
|
||||
} else {
|
||||
// Node.js
|
||||
const nodeCrypto = require('crypto');
|
||||
return nodeCrypto.webcrypto.subtle;
|
||||
}
|
||||
}
|
||||
94
src/core/http/browser.ts
Normal file
94
src/core/http/browser.ts
Normal file
|
|
@ -0,0 +1,94 @@
|
|||
/**
|
||||
* Browser HTTP client using Fetch API
|
||||
*/
|
||||
|
||||
import { HttpClient, HttpResponse, HttpRequestOptions } from './client';
|
||||
|
||||
export class BrowserHttpClient implements HttpClient {
|
||||
/**
|
||||
* Send POST request
|
||||
*/
|
||||
async post(url: string, options: HttpRequestOptions): Promise<HttpResponse> {
|
||||
const { headers = {}, body, timeout = 60000 } = options;
|
||||
|
||||
// Create AbortController for timeout
|
||||
const controller = new AbortController();
|
||||
const timeoutId = setTimeout(() => controller.abort(), timeout);
|
||||
|
||||
try {
|
||||
const response = await fetch(url, {
|
||||
method: 'POST',
|
||||
headers: headers,
|
||||
body: body,
|
||||
signal: controller.signal,
|
||||
});
|
||||
|
||||
clearTimeout(timeoutId);
|
||||
|
||||
// Read response body as ArrayBuffer
|
||||
const responseBody = await response.arrayBuffer();
|
||||
|
||||
// Convert headers to plain object
|
||||
const responseHeaders: Record<string, string> = {};
|
||||
response.headers.forEach((value, key) => {
|
||||
responseHeaders[key] = value;
|
||||
});
|
||||
|
||||
return {
|
||||
statusCode: response.status,
|
||||
headers: responseHeaders,
|
||||
body: responseBody,
|
||||
};
|
||||
} catch (error) {
|
||||
clearTimeout(timeoutId);
|
||||
|
||||
if (error instanceof Error && error.name === 'AbortError') {
|
||||
throw new Error('Request timeout');
|
||||
}
|
||||
throw error;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Send GET request
|
||||
*/
|
||||
async get(url: string, options: Omit<HttpRequestOptions, 'body'> = {}): Promise<HttpResponse> {
|
||||
const { headers = {}, timeout = 60000 } = options;
|
||||
|
||||
// Create AbortController for timeout
|
||||
const controller = new AbortController();
|
||||
const timeoutId = setTimeout(() => controller.abort(), timeout);
|
||||
|
||||
try {
|
||||
const response = await fetch(url, {
|
||||
method: 'GET',
|
||||
headers: headers,
|
||||
signal: controller.signal,
|
||||
});
|
||||
|
||||
clearTimeout(timeoutId);
|
||||
|
||||
// Read response body as ArrayBuffer
|
||||
const responseBody = await response.arrayBuffer();
|
||||
|
||||
// Convert headers to plain object
|
||||
const responseHeaders: Record<string, string> = {};
|
||||
response.headers.forEach((value, key) => {
|
||||
responseHeaders[key] = value;
|
||||
});
|
||||
|
||||
return {
|
||||
statusCode: response.status,
|
||||
headers: responseHeaders,
|
||||
body: responseBody,
|
||||
};
|
||||
} catch (error) {
|
||||
clearTimeout(timeoutId);
|
||||
|
||||
if (error instanceof Error && error.name === 'AbortError') {
|
||||
throw new Error('Request timeout');
|
||||
}
|
||||
throw error;
|
||||
}
|
||||
}
|
||||
}
|
||||
36
src/core/http/client.ts
Normal file
36
src/core/http/client.ts
Normal file
|
|
@ -0,0 +1,36 @@
|
|||
/**
|
||||
* HTTP client abstraction
|
||||
* Provides a platform-agnostic interface for making HTTP requests
|
||||
*/
|
||||
|
||||
export interface HttpResponse {
|
||||
statusCode: number;
|
||||
headers: Record<string, string>;
|
||||
body: ArrayBuffer;
|
||||
}
|
||||
|
||||
export interface HttpRequestOptions {
|
||||
headers?: Record<string, string>;
|
||||
body: ArrayBuffer | string;
|
||||
timeout?: number;
|
||||
}
|
||||
|
||||
export interface HttpClient {
|
||||
post(url: string, options: HttpRequestOptions): Promise<HttpResponse>;
|
||||
get(url: string, options?: Omit<HttpRequestOptions, 'body'>): Promise<HttpResponse>;
|
||||
}
|
||||
|
||||
/**
|
||||
* Create an HTTP client for the current platform
|
||||
*/
|
||||
export function createHttpClient(): HttpClient {
|
||||
if (typeof window !== 'undefined') {
|
||||
// Browser environment
|
||||
const BrowserHttpClient = require('./browser').BrowserHttpClient;
|
||||
return new BrowserHttpClient();
|
||||
} else {
|
||||
// Node.js environment
|
||||
const NodeHttpClient = require('./node').NodeHttpClient;
|
||||
return new NodeHttpClient();
|
||||
}
|
||||
}
|
||||
143
src/core/http/node.ts
Normal file
143
src/core/http/node.ts
Normal file
|
|
@ -0,0 +1,143 @@
|
|||
/**
|
||||
* Node.js HTTP client using native https module
|
||||
*/
|
||||
|
||||
import { HttpClient, HttpResponse, HttpRequestOptions } from './client';
|
||||
import * as https from 'https';
|
||||
import * as http from 'http';
|
||||
import { URL } from 'url';
|
||||
|
||||
export class NodeHttpClient implements HttpClient {
|
||||
/**
|
||||
* Send POST request
|
||||
*/
|
||||
async post(url: string, options: HttpRequestOptions): Promise<HttpResponse> {
|
||||
const { headers = {}, body, timeout = 60000 } = options;
|
||||
|
||||
return new Promise((resolve, reject) => {
|
||||
const parsedUrl = new URL(url);
|
||||
const isHttps = parsedUrl.protocol === 'https:';
|
||||
const httpModule = isHttps ? https : http;
|
||||
|
||||
// Convert body to Buffer
|
||||
const bodyBuffer = body instanceof ArrayBuffer
|
||||
? Buffer.from(body)
|
||||
: Buffer.from(body, 'utf-8');
|
||||
|
||||
const requestOptions = {
|
||||
hostname: parsedUrl.hostname,
|
||||
port: parsedUrl.port || (isHttps ? 443 : 80),
|
||||
path: parsedUrl.pathname + parsedUrl.search,
|
||||
method: 'POST',
|
||||
headers: {
|
||||
...headers,
|
||||
'Content-Length': bodyBuffer.length,
|
||||
},
|
||||
timeout: timeout,
|
||||
};
|
||||
|
||||
const req = httpModule.request(requestOptions, (res) => {
|
||||
const chunks: Buffer[] = [];
|
||||
|
||||
res.on('data', (chunk) => {
|
||||
chunks.push(chunk);
|
||||
});
|
||||
|
||||
res.on('end', () => {
|
||||
const responseBody = Buffer.concat(chunks);
|
||||
|
||||
// Convert headers to plain object
|
||||
const responseHeaders: Record<string, string> = {};
|
||||
Object.entries(res.headers).forEach(([key, value]) => {
|
||||
if (value) {
|
||||
responseHeaders[key] = Array.isArray(value) ? value[0] : value;
|
||||
}
|
||||
});
|
||||
|
||||
resolve({
|
||||
statusCode: res.statusCode || 0,
|
||||
headers: responseHeaders,
|
||||
body: responseBody.buffer.slice(
|
||||
responseBody.byteOffset,
|
||||
responseBody.byteOffset + responseBody.byteLength
|
||||
),
|
||||
});
|
||||
});
|
||||
});
|
||||
|
||||
req.on('error', (error) => {
|
||||
reject(error);
|
||||
});
|
||||
|
||||
req.on('timeout', () => {
|
||||
req.destroy();
|
||||
reject(new Error('Request timeout'));
|
||||
});
|
||||
|
||||
req.write(bodyBuffer);
|
||||
req.end();
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* Send GET request
|
||||
*/
|
||||
async get(url: string, options: Omit<HttpRequestOptions, 'body'> = {}): Promise<HttpResponse> {
|
||||
const { headers = {}, timeout = 60000 } = options;
|
||||
|
||||
return new Promise((resolve, reject) => {
|
||||
const parsedUrl = new URL(url);
|
||||
const isHttps = parsedUrl.protocol === 'https:';
|
||||
const httpModule = isHttps ? https : http;
|
||||
|
||||
const requestOptions = {
|
||||
hostname: parsedUrl.hostname,
|
||||
port: parsedUrl.port || (isHttps ? 443 : 80),
|
||||
path: parsedUrl.pathname + parsedUrl.search,
|
||||
method: 'GET',
|
||||
headers: headers,
|
||||
timeout: timeout,
|
||||
};
|
||||
|
||||
const req = httpModule.request(requestOptions, (res) => {
|
||||
const chunks: Buffer[] = [];
|
||||
|
||||
res.on('data', (chunk) => {
|
||||
chunks.push(chunk);
|
||||
});
|
||||
|
||||
res.on('end', () => {
|
||||
const responseBody = Buffer.concat(chunks);
|
||||
|
||||
// Convert headers to plain object
|
||||
const responseHeaders: Record<string, string> = {};
|
||||
Object.entries(res.headers).forEach(([key, value]) => {
|
||||
if (value) {
|
||||
responseHeaders[key] = Array.isArray(value) ? value[0] : value;
|
||||
}
|
||||
});
|
||||
|
||||
resolve({
|
||||
statusCode: res.statusCode || 0,
|
||||
headers: responseHeaders,
|
||||
body: responseBody.buffer.slice(
|
||||
responseBody.byteOffset,
|
||||
responseBody.byteOffset + responseBody.byteLength
|
||||
),
|
||||
});
|
||||
});
|
||||
});
|
||||
|
||||
req.on('error', (error) => {
|
||||
reject(error);
|
||||
});
|
||||
|
||||
req.on('timeout', () => {
|
||||
req.destroy();
|
||||
reject(new Error('Request timeout'));
|
||||
});
|
||||
|
||||
req.end();
|
||||
});
|
||||
}
|
||||
}
|
||||
33
src/core/memory/browser.ts
Normal file
33
src/core/memory/browser.ts
Normal file
|
|
@ -0,0 +1,33 @@
|
|||
/**
|
||||
* Browser secure memory implementation
|
||||
*
|
||||
* LIMITATIONS:
|
||||
* - Cannot lock memory (no OS-level mlock in browsers)
|
||||
* - JavaScript GC controls memory lifecycle
|
||||
* - Best effort: immediate zeroing to minimize exposure time
|
||||
*/
|
||||
|
||||
import { SecureMemory, ProtectionInfo } from '../../types/crypto';
|
||||
|
||||
export class BrowserSecureMemory implements SecureMemory {
|
||||
/**
|
||||
* Zero memory immediately
|
||||
* Note: This doesn't prevent JavaScript GC from moving/copying the data
|
||||
*/
|
||||
zeroMemory(data: ArrayBuffer): void {
|
||||
const view = new Uint8Array(data);
|
||||
view.fill(0);
|
||||
}
|
||||
|
||||
/**
|
||||
* Get protection information
|
||||
*/
|
||||
getProtectionInfo(): ProtectionInfo {
|
||||
return {
|
||||
canLock: false,
|
||||
isPlatformSecure: false,
|
||||
method: 'zero-only',
|
||||
details: 'Browser environment: memory locking not available. Using immediate zeroing only.',
|
||||
};
|
||||
}
|
||||
}
|
||||
41
src/core/memory/node.ts
Normal file
41
src/core/memory/node.ts
Normal file
|
|
@ -0,0 +1,41 @@
|
|||
/**
|
||||
* Node.js secure memory implementation (pure JavaScript)
|
||||
*
|
||||
* LIMITATIONS:
|
||||
* - This is a pure JavaScript implementation without native addons
|
||||
* - Cannot lock memory (no mlock support without native addon)
|
||||
* - JavaScript GC controls memory lifecycle
|
||||
* - Best effort: immediate zeroing to minimize exposure time
|
||||
*
|
||||
* FUTURE ENHANCEMENT:
|
||||
* A native addon can be implemented separately to provide true mlock support.
|
||||
* See the native/ directory for an optional native implementation.
|
||||
*/
|
||||
|
||||
import { SecureMemory, ProtectionInfo } from '../../types/crypto';
|
||||
|
||||
export class NodeSecureMemory implements SecureMemory {
|
||||
/**
|
||||
* Zero memory immediately
|
||||
* Note: This doesn't prevent JavaScript GC from moving/copying the data
|
||||
*/
|
||||
zeroMemory(data: ArrayBuffer): void {
|
||||
const view = new Uint8Array(data);
|
||||
view.fill(0);
|
||||
}
|
||||
|
||||
/**
|
||||
* Get protection information
|
||||
*/
|
||||
getProtectionInfo(): ProtectionInfo {
|
||||
return {
|
||||
canLock: false,
|
||||
isPlatformSecure: false,
|
||||
method: 'zero-only',
|
||||
details:
|
||||
'Node.js environment (pure JS): memory locking not available without native addon. ' +
|
||||
'Using immediate zeroing only. ' +
|
||||
'For enhanced security, consider implementing the optional native addon (see native/ directory).',
|
||||
};
|
||||
}
|
||||
}
|
||||
70
src/core/memory/secure.ts
Normal file
70
src/core/memory/secure.ts
Normal file
|
|
@ -0,0 +1,70 @@
|
|||
/**
|
||||
* Secure memory interface and context manager
|
||||
*
|
||||
* IMPORTANT: This is a pure JavaScript implementation that provides memory zeroing only.
|
||||
* OS-level memory locking (mlock) is NOT implemented in this version.
|
||||
*
|
||||
* For production use, consider implementing a native addon for true memory locking.
|
||||
* See SECURITY.md for details on memory protection limitations.
|
||||
*/
|
||||
|
||||
import { ProtectionInfo } from '../../types/crypto';
|
||||
|
||||
export interface SecureMemory {
|
||||
/**
|
||||
* Zero memory (fill with zeros)
|
||||
* Note: This is best-effort. JavaScript GC controls actual memory lifecycle.
|
||||
*/
|
||||
zeroMemory(data: ArrayBuffer): void;
|
||||
|
||||
/**
|
||||
* Get memory protection information
|
||||
*/
|
||||
getProtectionInfo(): ProtectionInfo;
|
||||
}
|
||||
|
||||
/**
|
||||
* Secure byte context manager
|
||||
* Ensures memory is zeroed even if an exception occurs (similar to Python's context manager)
|
||||
*/
|
||||
export class SecureByteContext {
|
||||
private data: ArrayBuffer;
|
||||
private secureMemory: SecureMemory;
|
||||
private useSecure: boolean;
|
||||
|
||||
constructor(data: ArrayBuffer, useSecure: boolean = true) {
|
||||
this.data = data;
|
||||
this.useSecure = useSecure;
|
||||
this.secureMemory = createSecureMemory();
|
||||
}
|
||||
|
||||
/**
|
||||
* Use the secure data within a function
|
||||
* Ensures memory is zeroed after use, even if an exception occurs
|
||||
*/
|
||||
async use<T>(fn: (data: ArrayBuffer) => Promise<T>): Promise<T> {
|
||||
try {
|
||||
return await fn(this.data);
|
||||
} finally {
|
||||
// Always zero memory, even if exception occurred
|
||||
if (this.useSecure) {
|
||||
this.secureMemory.zeroMemory(this.data);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Create a secure memory implementation for the current platform
|
||||
*/
|
||||
export function createSecureMemory(): SecureMemory {
|
||||
if (typeof window !== 'undefined') {
|
||||
// Browser environment
|
||||
const BrowserSecureMemory = require('./browser').BrowserSecureMemory;
|
||||
return new BrowserSecureMemory();
|
||||
} else {
|
||||
// Node.js environment
|
||||
const NodeSecureMemory = require('./node').NodeSecureMemory;
|
||||
return new NodeSecureMemory();
|
||||
}
|
||||
}
|
||||
70
src/errors/index.ts
Normal file
70
src/errors/index.ts
Normal file
|
|
@ -0,0 +1,70 @@
|
|||
/**
|
||||
* Error classes matching OpenAI's error structure
|
||||
*/
|
||||
|
||||
export class APIError extends Error {
|
||||
statusCode?: number;
|
||||
errorDetails?: object;
|
||||
|
||||
constructor(message: string, statusCode?: number, errorDetails?: object) {
|
||||
super(message);
|
||||
this.name = 'APIError';
|
||||
this.statusCode = statusCode;
|
||||
this.errorDetails = errorDetails;
|
||||
|
||||
// Maintains proper stack trace for where our error was thrown (only available on V8)
|
||||
if (Error.captureStackTrace) {
|
||||
Error.captureStackTrace(this, this.constructor);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
export class AuthenticationError extends APIError {
|
||||
constructor(message: string, statusCode?: number, errorDetails?: object) {
|
||||
super(message, statusCode, errorDetails);
|
||||
this.name = 'AuthenticationError';
|
||||
}
|
||||
}
|
||||
|
||||
export class InvalidRequestError extends APIError {
|
||||
constructor(message: string, statusCode?: number, errorDetails?: object) {
|
||||
super(message, statusCode, errorDetails);
|
||||
this.name = 'InvalidRequestError';
|
||||
}
|
||||
}
|
||||
|
||||
export class RateLimitError extends APIError {
|
||||
constructor(message: string, statusCode?: number, errorDetails?: object) {
|
||||
super(message, statusCode, errorDetails);
|
||||
this.name = 'RateLimitError';
|
||||
}
|
||||
}
|
||||
|
||||
export class ServerError extends APIError {
|
||||
constructor(message: string, statusCode?: number, errorDetails?: object) {
|
||||
super(message, statusCode, errorDetails);
|
||||
this.name = 'ServerError';
|
||||
}
|
||||
}
|
||||
|
||||
export class APIConnectionError extends Error {
|
||||
constructor(message: string) {
|
||||
super(message);
|
||||
this.name = 'APIConnectionError';
|
||||
|
||||
if (Error.captureStackTrace) {
|
||||
Error.captureStackTrace(this, this.constructor);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
export class SecurityError extends Error {
|
||||
constructor(message: string) {
|
||||
super(message);
|
||||
this.name = 'SecurityError';
|
||||
|
||||
if (Error.captureStackTrace) {
|
||||
Error.captureStackTrace(this, this.constructor);
|
||||
}
|
||||
}
|
||||
}
|
||||
15
src/index.ts
Normal file
15
src/index.ts
Normal file
|
|
@ -0,0 +1,15 @@
|
|||
/**
|
||||
* Main entry point for nomyo-js
|
||||
* Universal exports for both Node.js and browser environments
|
||||
*/
|
||||
|
||||
export { SecureChatCompletion } from './api/SecureChatCompletion';
|
||||
export { SecureCompletionClient } from './core/SecureCompletionClient';
|
||||
|
||||
// Export types
|
||||
export * from './types/api';
|
||||
export * from './types/client';
|
||||
export * from './types/crypto';
|
||||
|
||||
// Export errors
|
||||
export * from './errors';
|
||||
6
src/node.ts
Normal file
6
src/node.ts
Normal file
|
|
@ -0,0 +1,6 @@
|
|||
/**
|
||||
* Node.js-specific entry point
|
||||
* Ensures Node.js-specific implementations are used
|
||||
*/
|
||||
|
||||
export * from './index';
|
||||
105
src/types/api.ts
Normal file
105
src/types/api.ts
Normal file
|
|
@ -0,0 +1,105 @@
|
|||
/**
|
||||
* OpenAI-compatible API type definitions
|
||||
* These types match the OpenAI Chat Completion API for full compatibility
|
||||
*/
|
||||
|
||||
export interface Message {
|
||||
role: 'system' | 'user' | 'assistant' | 'tool';
|
||||
content?: string;
|
||||
name?: string;
|
||||
tool_calls?: ToolCall[];
|
||||
tool_call_id?: string;
|
||||
}
|
||||
|
||||
export interface ToolCall {
|
||||
id: string;
|
||||
type: 'function';
|
||||
function: {
|
||||
name: string;
|
||||
arguments: string;
|
||||
};
|
||||
}
|
||||
|
||||
export interface FunctionDefinition {
|
||||
name: string;
|
||||
description?: string;
|
||||
parameters?: object;
|
||||
}
|
||||
|
||||
export interface Tool {
|
||||
type: 'function';
|
||||
function: FunctionDefinition;
|
||||
}
|
||||
|
||||
export type ToolChoice = 'none' | 'auto' | 'required' | { type: 'function'; function: { name: string } };
|
||||
|
||||
export interface ChatCompletionRequest {
|
||||
model: string;
|
||||
messages: Message[];
|
||||
|
||||
// Optional parameters (matching OpenAI API)
|
||||
temperature?: number;
|
||||
top_p?: number;
|
||||
n?: number;
|
||||
stream?: boolean;
|
||||
stop?: string | string[];
|
||||
max_tokens?: number;
|
||||
presence_penalty?: number;
|
||||
frequency_penalty?: number;
|
||||
logit_bias?: Record<string, number>;
|
||||
user?: string;
|
||||
|
||||
// Tool/Function calling
|
||||
tools?: Tool[];
|
||||
tool_choice?: ToolChoice;
|
||||
|
||||
// Additional parameters
|
||||
[key: string]: unknown;
|
||||
}
|
||||
|
||||
export interface Usage {
|
||||
prompt_tokens: number;
|
||||
completion_tokens: number;
|
||||
total_tokens: number;
|
||||
}
|
||||
|
||||
export interface Choice {
|
||||
index: number;
|
||||
message: Message;
|
||||
finish_reason: 'stop' | 'length' | 'tool_calls' | 'content_filter' | null;
|
||||
logprobs?: unknown;
|
||||
}
|
||||
|
||||
export interface ResponseMetadata {
|
||||
payload_id: string;
|
||||
processed_at: number;
|
||||
is_encrypted: boolean;
|
||||
encryption_algorithm: string;
|
||||
response_status: string;
|
||||
}
|
||||
|
||||
export interface ChatCompletionResponse {
|
||||
id: string;
|
||||
object: 'chat.completion';
|
||||
created: number;
|
||||
model: string;
|
||||
choices: Choice[];
|
||||
usage?: Usage;
|
||||
system_fingerprint?: string;
|
||||
|
||||
// NOMYO-specific metadata
|
||||
_metadata?: ResponseMetadata;
|
||||
}
|
||||
|
||||
// Streaming types (for future implementation)
|
||||
export interface ChatCompletionChunk {
|
||||
id: string;
|
||||
object: 'chat.completion.chunk';
|
||||
created: number;
|
||||
model: string;
|
||||
choices: {
|
||||
index: number;
|
||||
delta: Partial<Message>;
|
||||
finish_reason: string | null;
|
||||
}[];
|
||||
}
|
||||
56
src/types/client.ts
Normal file
56
src/types/client.ts
Normal file
|
|
@ -0,0 +1,56 @@
|
|||
/**
|
||||
* Client configuration types
|
||||
*/
|
||||
|
||||
export interface ClientConfig {
|
||||
/** Base URL of the NOMYO router (e.g., https://api.nomyo.ai:12434) */
|
||||
routerUrl: string;
|
||||
|
||||
/** Allow HTTP connections (ONLY for local development, never in production) */
|
||||
allowHttp?: boolean;
|
||||
|
||||
/** Enable secure memory protection (zeroing) */
|
||||
secureMemory?: boolean;
|
||||
|
||||
/** RSA key size in bits (2048 or 4096) */
|
||||
keySize?: 2048 | 4096;
|
||||
|
||||
/** Optional API key for authentication */
|
||||
apiKey?: string;
|
||||
}
|
||||
|
||||
export interface KeyGenOptions {
|
||||
/** RSA key size in bits */
|
||||
keySize?: 2048 | 4096;
|
||||
|
||||
/** Save keys to file system (Node.js only) */
|
||||
saveToFile?: boolean;
|
||||
|
||||
/** Directory to save keys (default: 'client_keys') */
|
||||
keyDir?: string;
|
||||
|
||||
/** Password to encrypt private key (recommended for production) */
|
||||
password?: string;
|
||||
}
|
||||
|
||||
export interface KeyPaths {
|
||||
/** Path to private key file */
|
||||
privateKeyPath: string;
|
||||
|
||||
/** Path to public key file (optional, will derive from private key path) */
|
||||
publicKeyPath?: string;
|
||||
}
|
||||
|
||||
export interface ChatCompletionConfig {
|
||||
/** Base URL of the NOMYO router */
|
||||
baseUrl?: string;
|
||||
|
||||
/** Allow HTTP connections */
|
||||
allowHttp?: boolean;
|
||||
|
||||
/** API key for authentication */
|
||||
apiKey?: string;
|
||||
|
||||
/** Enable secure memory protection */
|
||||
secureMemory?: boolean;
|
||||
}
|
||||
42
src/types/crypto.ts
Normal file
42
src/types/crypto.ts
Normal file
|
|
@ -0,0 +1,42 @@
|
|||
/**
|
||||
* Cryptography-related types
|
||||
*/
|
||||
|
||||
export interface EncryptedPackage {
|
||||
/** Encrypted payload data */
|
||||
encrypted_payload: string;
|
||||
|
||||
/** Encrypted AES key (encrypted with server's RSA public key) */
|
||||
encrypted_aes_key: string;
|
||||
|
||||
/** Client's public key in PEM format */
|
||||
client_public_key: string;
|
||||
|
||||
/** Unique identifier for this encrypted package */
|
||||
payload_id: string;
|
||||
|
||||
/** Nonce/IV used for AES encryption (base64 encoded) */
|
||||
nonce: string;
|
||||
}
|
||||
|
||||
export interface ProtectionInfo {
|
||||
/** Whether memory can be locked (mlock) */
|
||||
canLock: boolean;
|
||||
|
||||
/** Whether the platform provides secure memory protection */
|
||||
isPlatformSecure: boolean;
|
||||
|
||||
/** Method used for memory protection */
|
||||
method: 'mlock' | 'zero-only' | 'none';
|
||||
|
||||
/** Additional information about protection status */
|
||||
details?: string;
|
||||
}
|
||||
|
||||
export interface SecureMemoryConfig {
|
||||
/** Enable secure memory protection */
|
||||
enabled: boolean;
|
||||
|
||||
/** Prefer native addon if available (Node.js only) */
|
||||
preferNative?: boolean;
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue