Update Python version requirements and fix compatibility issues

- Bump minimum Python version from 3.11 to 3.13 across all apps
- Add Python 3.11-3.13 test matrix to CLI workflow
- Document Python 3.11+ requirement in .env.example
- Fix Starlette Broadcast removal with in-process fallback implementation
- Add _InProcessBroadcast class for tests when Starlette Broadcast is unavailable
- Refactor API key validators to read live settings instead of cached values
- Update database models with explicit
This commit is contained in:
oib
2026-02-24 18:41:08 +01:00
parent 24b3a37733
commit 825f157749
270 changed files with 66674 additions and 2027 deletions

View File

@@ -199,7 +199,7 @@ export class AitbcClient {
await this.request<void>("POST", "/v1/users/logout", options);
}
private async request<T>(method: string, path: string, options: RequestOptions = {}): Promise<T> {
async request<T>(method: string, path: string, options: RequestOptions = {}): Promise<T> {
const response = await this.rawRequest(method, path, options);
const text = await response.text();
if (!response.ok) {
@@ -208,7 +208,7 @@ export class AitbcClient {
return text ? (JSON.parse(text) as T) : ({} as T);
}
private async rawRequest(method: string, path: string, options: RequestOptions = {}): Promise<Response> {
async rawRequest(method: string, path: string, options: RequestOptions = {}): Promise<Response> {
const url = this.buildUrl(path, options.query);
const headers = this.buildHeaders(options.headers);

View File

@@ -0,0 +1,77 @@
import { describe, expect, it } from "vitest";
import { generateKeyPairSync, sign } from "crypto";
import { ReceiptService } from "./receipts";
import type { ReceiptSummary } from "./types";
class ThrowingClient {
async request() {
throw new Error("offline");
}
}
describe("ReceiptService signature verification", () => {
const { publicKey, privateKey } = generateKeyPairSync("ed25519");
const publicKeyPem = publicKey.export({ type: "spki", format: "pem" }).toString();
const baseReceipt: ReceiptSummary = {
receiptId: "r1",
jobId: "job-123",
miner: "miner-1",
coordinator: "coord-1",
issuedAt: new Date().toISOString(),
status: "completed",
payload: {
job_id: "job-123",
provider: "miner-1",
client: "client-1",
},
};
const signPayload = (payload: Record<string, unknown>): string => {
const message = Buffer.from(JSON.stringify(payload));
return sign(null, message, privateKey).toString("base64");
};
it("validates with provided PEM keys", async () => {
const sig = signPayload(baseReceipt.payload!);
const receipt: ReceiptSummary = {
...baseReceipt,
payload: {
...baseReceipt.payload,
minerSignature: sig,
coordinatorSignature: sig,
},
};
const svc = new ReceiptService({
client: new ThrowingClient() as any,
minerPublicKeyPem: publicKeyPem,
coordinatorPublicKeyPem: publicKeyPem,
signatureAlgorithm: "ed25519",
});
const result = await svc.validateReceipt(receipt);
expect(result.valid).toBe(true);
});
it("fails with bad signature", async () => {
const receipt: ReceiptSummary = {
...baseReceipt,
payload: {
...baseReceipt.payload,
minerSignature: "bad",
coordinatorSignature: "bad",
},
};
const svc = new ReceiptService({
client: new ThrowingClient() as any,
minerPublicKeyPem: publicKeyPem,
coordinatorPublicKeyPem: publicKeyPem,
signatureAlgorithm: "ed25519",
});
const result = await svc.validateReceipt(receipt);
expect(result.valid).toBe(false);
});
});

View File

@@ -0,0 +1,209 @@
import { verify as verifySignature, createPublicKey } from "crypto";
import type { ReceiptListResponse, ReceiptSummary, RequestOptions } from "./types";
import { AitbcClient } from "./client";
export interface PaginatedReceipts {
items: ReceiptSummary[];
nextCursor?: string | null;
}
export interface ReceiptValidationResult {
valid: boolean;
reason?: string;
}
export interface ReceiptValidationOptions extends RequestOptions {
minerVerifier?: (receipt: ReceiptSummary) => Promise<boolean> | boolean;
coordinatorVerifier?: (receipt: ReceiptSummary) => Promise<boolean> | boolean;
minerPublicKeyPem?: string;
coordinatorPublicKeyPem?: string;
signatureAlgorithm?: "ed25519" | "secp256k1" | "rsa" | string;
}
export interface ReceiptServiceOptions {
client: AitbcClient;
maxRetries?: number;
retryDelayMs?: number;
minerPublicKeyPem?: string;
coordinatorPublicKeyPem?: string;
signatureAlgorithm?: "ed25519" | "secp256k1" | "rsa" | string;
}
export class ReceiptService {
private client: AitbcClient;
private maxRetries: number;
private retryDelayMs: number;
private minerPublicKeyPem?: string;
private coordinatorPublicKeyPem?: string;
private signatureAlgorithm?: string;
constructor(opts: ReceiptServiceOptions) {
this.client = opts.client;
this.maxRetries = opts.maxRetries ?? 3;
this.retryDelayMs = opts.retryDelayMs ?? 250;
this.minerPublicKeyPem = opts.minerPublicKeyPem;
this.coordinatorPublicKeyPem = opts.coordinatorPublicKeyPem;
this.signatureAlgorithm = opts.signatureAlgorithm ?? "ed25519";
}
async getJobReceipts(
jobId: string,
cursor?: string,
limit: number = 50,
options?: RequestOptions,
): Promise<PaginatedReceipts> {
let attempt = 0;
let lastError: unknown;
while (attempt <= this.maxRetries) {
try {
const data = await this.client.request<ReceiptListResponse & { next_cursor?: string }>(
"GET",
`/v1/jobs/${jobId}/receipts`,
{
...options,
query: {
cursor,
limit,
},
}
);
return {
items: (data.items ?? []).filter((r) => !r.jobId || r.jobId === jobId),
nextCursor: data.next_cursor ?? (data as any).nextCursor ?? null,
};
} catch (err) {
lastError = err;
attempt += 1;
if (attempt > this.maxRetries) break;
await this.delay(this.retryDelayMs * attempt);
}
}
throw lastError ?? new Error("Failed to fetch receipts");
}
async validateReceipt(receipt: ReceiptSummary, options?: ReceiptValidationOptions): Promise<ReceiptValidationResult> {
// Placeholder for full cryptographic verification: delegate to coordinator API
const {
minerVerifier,
coordinatorVerifier,
minerPublicKeyPem,
coordinatorPublicKeyPem,
signatureAlgorithm,
...requestOptions
} = options ?? {};
try {
const data = await this.client.request<{ valid: boolean; reason?: string }>(
"POST",
"/v1/receipts/verify",
{
...requestOptions,
body: JSON.stringify(this.buildVerificationPayload(receipt)),
}
);
return { valid: !!data.valid, reason: data.reason };
} catch (err) {
// Fallback to local checks if API unavailable
const local = await this.validateLocally(
receipt,
minerVerifier,
coordinatorVerifier,
minerPublicKeyPem ?? this.minerPublicKeyPem,
coordinatorPublicKeyPem ?? this.coordinatorPublicKeyPem,
signatureAlgorithm ?? this.signatureAlgorithm ?? "ed25519"
);
return local.valid ? local : { valid: false, reason: (err as Error).message };
}
}
buildVerificationPayload(receipt: ReceiptSummary) {
return {
receipt_id: receipt.receiptId,
job_id: receipt.jobId,
miner: receipt.miner,
coordinator: receipt.coordinator,
issued_at: receipt.issuedAt,
status: receipt.status,
payload: receipt.payload,
};
}
async validateLocally(
receipt: ReceiptSummary,
minerVerifier?: (receipt: ReceiptSummary) => Promise<boolean> | boolean,
coordinatorVerifier?: (receipt: ReceiptSummary) => Promise<boolean> | boolean,
minerPublicKeyPem?: string,
coordinatorPublicKeyPem?: string,
signatureAlgorithm: string = "ed25519",
): Promise<ReceiptValidationResult> {
const payload = receipt.payload ?? {};
const sig = payload.signature ?? {};
const minerSig = payload.minerSignature ?? sig.sig;
const coordinatorSig = payload.coordinatorSignature ?? sig.sig;
if (!minerSig) {
return { valid: false, reason: "missing miner signature" };
}
if (!coordinatorSig) {
return { valid: false, reason: "missing coordinator signature" };
}
if (!payload.job_id && receipt.jobId) {
return { valid: false, reason: "missing job_id in payload" };
}
const payloadForSig = this.sanitizePayload(payload);
if (minerVerifier) {
const ok = await minerVerifier(receipt);
if (!ok) return { valid: false, reason: "miner signature invalid" };
} else if (minerPublicKeyPem) {
const ok = this.verifyWithCrypto(minerSig, minerPublicKeyPem, payloadForSig, signatureAlgorithm);
if (!ok) return { valid: false, reason: "miner signature invalid" };
}
if (coordinatorVerifier) {
const ok = await coordinatorVerifier(receipt);
if (!ok) return { valid: false, reason: "coordinator signature invalid" };
} else if (coordinatorPublicKeyPem) {
const ok = this.verifyWithCrypto(coordinatorSig, coordinatorPublicKeyPem, payloadForSig, signatureAlgorithm);
if (!ok) return { valid: false, reason: "coordinator signature invalid" };
}
return { valid: true };
}
private sanitizePayload(payload: Record<string, unknown>): Record<string, unknown> {
const { signature, minerSignature, coordinatorSignature, ...rest } = payload ?? {};
return rest;
}
private verifyWithCrypto(
signatureBase64: string,
publicKeyPem: string,
payload: Record<string, unknown>,
alg: string,
): boolean {
try {
const key = createPublicKey(publicKeyPem);
const message = Buffer.from(JSON.stringify(payload ?? {}));
const sig = Buffer.from(signatureBase64, "base64");
if (alg.toLowerCase() === "ed25519") {
return verifySignature(null, message, key, sig);
}
if (alg.toLowerCase() === "secp256k1") {
return verifySignature("sha256", message, { key, dsaEncoding: "ieee-p1363" }, sig);
}
if (alg.toLowerCase().startsWith("rsa")) {
return verifySignature("sha256", message, key, sig);
}
// Unknown alg: fail closed
return false;
} catch (e) {
return false;
}
}
private async delay(ms: number): Promise<void> {
return new Promise((resolve) => setTimeout(resolve, ms));
}
}