NOVA SDK for Rust
A Rust SDK for interacting with NOVA secure file-sharing on NEAR blockchain. NOVA hybridizes IPFS storage with Shade Agents and TEEs (via Phala) for verifiable privacy, using ephemeral nonce-based tokens for key access. Files are encrypted client-side and stored off-chain, with on-chain metadata ensuring auditable, group-based controls. In the current SDK, users authenticate with JWT session tokens obtained from nova-sdk.com.
Features
🔐 AES-256-CBC Encryption - Client-side encryption for data privacy
🌐 IPFS Storage - Decentralized file storage via Pinata
⛓️ NEAR Blockchain - Immutable transaction records and access control
🛡️ TEE-Verified Keys - Off-chain keys stored encrypted in Shade Agents (Phala TEEs); no on-chain exposure
🔑 Ephemeral Token Auth - Ed25519-signed payloads with nonces/timestamps for replay-proof, time-bound key access
👥 Group Management - Fine-grained access control with event-driven key generation/rotation
🔄 Key Rotation - Automatic TEE-side rotation on revocation, with on-chain checksum verification
🚀 Composite Operations - End-to-end workflows: Encrypt → Upload → Authenticate → Retrieve
Installation
Add to your Cargo.toml:
[dependencies]
nova-sdk-rs = "0.4.1"
tokio = { version = "1", features = ["full"] }Quick Start
Getting Your Session Token
Before using the SDK, obtain a session token from nova-sdk.com:
The session token is valid for 24 hours. Store it securely and refresh before expiry.
Core Concepts
Groups
Groups manage shared access to encrypted files. Each group has:
A unique identifier (
group_id)An owner who manages membership
A shared encryption key stored off-chain in Shade Agent/TEE (never stored publicly).
A list of authorized members
Access Control (Ephemeral Tokens)
NOVA uses signed tokens for key access:
Generate payload (group_id/user_id/nonce/timestamp/signing_pk_b58).
Sign with ed25519 (from account keypair).
Claim on-chain (claim_token): Verifies sig/membership/nonce (5min window), returns token.
Present to Shade: TEE decrypts key, verifies checksum, responds transiently.
Encryption
All data is encrypted client-side using AES-256-CBC:
256-bit symmetric keys
Random IV per encryption
PKCS7 padding
SHA256 hashing for integrity
Transaction Recording
File metadata (CID/hash) is recorded on-chain automatically during composite_upload.
API Overview
Initialization
NovaSdk::new(account_id, session_token)- Create SDK instance
Group Management
register_group(group_id)- Create new group (triggers TEE key gen via events).add_group_member(group_id, user_id)- Grant access to user.revoke_group_member(group_id, user_id)- Revoke access and auto-rotate key in TEE.is_authorized(group_id, user_id)- Check user authorization.
File Operations
composite_upload(group_id, user_id, data: &[u8], filename)- Encrypt, upload to IPFS, record transaction (uses TEE key).composite_retrieve(group_id, cid)- Fetch from IPFS, decrypt (uses TEE key).record_transaction()- Log metadata (group-member callable).get_transactions_for_group()- Query transaction history
Utilities
get_balance(account_id)- Check NEAR account balancetransfer_tokens(to_account, amount_yocto)- Transfer NEAR tokens
Environment Setup
For testing and development, set these environment variables in a .env file:
Testing
Error Handling
The SDK uses a custom NovaError enum:
Security Considerations
⚠️ Important Security Notes:
No On-Chain Keys - Keys encrypted in TEEs (Phala Shade); only checksums public—RPC scans reveal nothing decryptable.
Ephemeral Tokens - Ed25519-signed (nonce/timestamp); 5min expiry, replay-proof (used_nonces map).
TEE Verification - Shade workers attested (code hash); multi-instance sync via shared TEE_SECRET.
Layered Auth - On-chain membership + token sig + TEE decrypt/checksum—defense against key theft.
Private Keys - Never commit; use for signing only (ed25519 seed extraction secure).
IPFS: Public CIDs; rely on encryption—avoid unencrypted uploads.
⚠️ General: Validate checksums in prod; monitor Shade attestations.
Examples
See the examples directory for complete working examples:
simple_upload.rs- Basic file uploadgroup_management.rs- Managing groups and members
Contributing
Contributions are welcome! Please:
Fork the repository
Create a feature branch
Add tests for new functionality
Ensure all tests pass (
cargo test)Submit a pull request
License
This project is licensed under the MIT License - see LICENSE file for details.
Resources
Support
Issues: GitHub Issues
Discussions: GitHub Discussions
Last updated