A JavaScript implementation of the Waku v2 protocol.
In the section below you can find explanations for the main API.
We also have guides available and code examples.
You can read the latest main
branch documentation at https://status-im.github.io/js-waku/docs/.
Docs can also be generated locally using:
npm install
npm run doc
Install js-waku
package:
npm install js-waku
To use js-waku in your application, you can:
use import
:
import { Waku } from 'js-waku';
const waku = await Waku.create();
use require
:
const jsWaku = require('js-waku');
jsWaku.Waku.create().then(waku => {
// ...
});
Or directly import it in a <script>
tag:
<script src='https://unpkg.com/[email protected]/build/umd/js-waku.min.bundle.js'></script>
<script>
jswaku.Waku.create().then(waku => {
// ...
}
</script>
const waku = await Waku.create({ bootstrap: true });
The contentTopic
is a metadata string
that allows categorization of messages on the waku network.
Depending on your use case, you can either create one (or several) new contentTopic
(s) or look at the RFCs and use an existing contentTopic
.
See How to Choose a Content Topic for more details.
For example, if you were to use a new contentTopic
such as /my-cool-app/1/my-use-case/proto
,
here is how to listen to new messages received via Waku v2 Relay:
waku.relay.addObserver((msg) => {
console.log("Message received:", msg.payloadAsUtf8)
}, ["/my-cool-app/1/my-use-case/proto"]);
The examples chat apps currently use content topic "/toy-chat/2/huilong/proto"
.
There are two ways to send messages:
Waku Relay is the most decentralized option, peer receiving your messages are unlikely to know whether you are the originator or simply forwarding them. However, it does not give you any delivery information.
import { WakuMessage } from 'js-waku';
const msg = await WakuMessage.fromUtf8String("Here is a message!", "/my-cool-app/1/my-use-case/proto")
await waku.relay.send(msg);
Waku Light Push gives you confirmation that the light push server node has received your message. However, it means that said node knows you are the originator of the message. It cannot guarantee that the node will forward the message.
const ack = await waku.lightPush.push(message);
if (!ack?.isSuccess) {
// Message was not sent
}
The Waku v2 Store protocol enables more permanent nodes to store messages received via relay and ephemeral clients to retrieve them (e.g. mobile phone resuming connectivity). The protocol implements pagination meaning that it may take several queries to retrieve all messages.
Query a waku store peer to check historical messages:
// Process messages once they are all retrieved
const messages = await waku.store.queryHistory(['/my-cool-app/1/my-use-case/proto']);
messages.forEach((msg) => {
console.log('Message retrieved:', msg.payloadAsUtf8);
});
// Or, pass a callback function to be executed as pages are received:
waku.store.queryHistory(['/my-cool-app/1/my-use-case/proto'], {
callback: (messages) => {
messages.forEach((msg) => {
console.log('Message retrieved:', msg.payloadAsUtf8);
});
}
});
With js-waku, you can:
- Encrypt messages over the wire using public/private key pair (asymmetric encryption),
- Encrypt messages over the wire using a unique key to both encrypt and decrypt (symmetric encryption),
- Sign and verify your waku messages (must use encryption, compatible with both symmetric and asymmetric).
A quick note on the cryptographic libraries used as it is a not a straightforward affair:
- Asymmetric encryption: Uses ecies-geth which in turns uses SubtleCrypto Web API (browser), secp256k1 (native binding for node) or elliptic (pure JS if none of the other libraries are available).
- Symmetric encryption: Uses SubtleCrypto Web API (browser) or NodeJS' crypto module.
Asymmetric private keys and symmetric keys are expected to be 32 bytes arrays.
import { generatePrivateKey, generateSymmetricKey, getPublicKey } from 'js-waku';
// Asymmetric
const privateKey = generatePrivateKey();
const publicKey = getPublicKey(privateKey);
// Symmetric
const symKey = generateSymmetricKey();
To encrypt your waku messages, simply pass the encryption key when creating it:
import { WakuMessage } from "js-waku";
// Asymmetric
const message1 = await WakuMessage.fromBytes(payload, myAppContentTopic, {
encPublicKey: publicKey,
});
// Symmetric
const message2 = await WakuMessage.fromBytes(payload, myAppContentTopic, {
symKey: symKey,
});
If you expect to receive encrypted messages then simply add private decryption key(s) to WakuRelay
.
Waku Relay will attempt to decrypt incoming messages with each keys, both for symmetric and asymmetric encryption.
Messages that are successfully decrypted (or received in clear) will be passed to the observers, other messages will be omitted.
// Asymmetric
waku.relay.addDecryptionKey(privateKey);
// Symmetric
waku.relay.addDecryptionKey(symKey);
// Then add the observer
waku.relay.addObserver(callback, [contentTopic]);
Keys can be removed using WakuMessage.deleteDecryptionKey
.
const messages = await waku.store.queryHistory([], {
decryptionKeys: [privateKey, symKey]
});
Similarly to relay, only decrypted or clear messages will be returned.
As per version 1`s specs, signatures are only included in encrypted messages. In the case where your app does not need encryption then you could use symmetric encryption with a trivial key, I intend to dig more on the subject and come back with recommendation and examples.
Signature keys can be generated the same way asymmetric keys for encryption are:
import { generatePrivateKey, getPublicKey, WakuMessage } from 'js-waku';
const signPrivateKey = generatePrivateKey();
// Asymmetric Encryption
const message1 = await WakuMessage.fromBytes(payload, myAppContentTopic, {
encPublicKey: recipientPublicKey,
sigPrivKey: signPrivateKey
});
// Symmetric Encryption
const message2 = await WakuMessage.fromBytes(payload, myAppContentTopic, {
encPublicKey: symKey,
sigPrivKey: signPrivateKey
});
Two fields are available on WakuMessage
regarding signatures:
signaturePublicKey
: If the message is signed, it holds the public key of the signature,signature
: If the message is signed, it holds the actual signature.
Thus, if you expect messages to be signed by Alice,
you can simply compare WakuMessage.signaturePublicKey
with Alice's public key.
As comparing hex string can lead to issues (is the 0x
prefix present?),
simply use helper function equalByteArrays
.
import { equalByteArrays } from 'js-waku/lib/utils';
const sigPubKey = wakuMessage.signaturePublicKey;
const isSignedByAlice = sigPubKey && equalByteArrays(sigPubKey, alicePublicKey);
Release changelog can be found here.
If you encounter any bug or would like to propose new features, feel free to open an issue.
To get help, join #dappconnect-support on Vac Discord or Telegram.
For more general discussion and latest news, join #dappconnect on Vac Discord or Telegram.
You can track progress on the project board.
- ✔: Supported
- 🚧: Implementation in progress
- ⛔: Support is not planned
Spec | Implementation Status |
---|---|
6/WAKU1 | ⛔ |
7/WAKU-DATA | ⛔ |
8/WAKU-MAIL | ⛔ |
9/WAKU-RPC | ⛔ |
10/WAKU2 | 🚧 |
11/WAKU2-RELAY | ✔ |
12/WAKU2-FILTER | |
13/WAKU2-STORE | ✔ (querying node only) |
14/WAKU2-MESSAGE | ✔ |
15/WAKU2-BRIDGE | |
16/WAKU2-RPC | ⛔ |
17/WAKU2-RLNRELAY | |
18/WAKU2-SWAP | |
19/WAKU2-LIGHTPUSH | ✔ |
See CONTRIBUTING.md.
Licensed and distributed under either of
- MIT license: LICENSE-MIT or http://opensource.org/licenses/MIT
or
- Apache License, Version 2.0, (LICENSE-APACHE-v2 or http://www.apache.org/licenses/LICENSE-2.0)
at your option. These files may not be copied, modified, or distributed except according to those terms.