go-nostr/keyer/plain.go

65 lines
2.0 KiB
Go
Raw Permalink Normal View History

package keyer
import (
"context"
"github.com/nbd-wtf/go-nostr"
"github.com/nbd-wtf/go-nostr/nip44"
"github.com/puzpuzpuz/xsync/v3"
)
2025-03-04 18:03:02 -03:00
// KeySigner is a signer that holds the private key in memory
type KeySigner struct {
sk string
pk string
conversationKeys *xsync.MapOf[string, [32]byte]
}
2025-03-04 11:08:31 -03:00
// NewPlainKeySigner creates a new KeySigner from a private key.
// Returns an error if the private key is invalid.
2024-09-19 17:47:18 +09:00
func NewPlainKeySigner(sec string) (KeySigner, error) {
pk, err := nostr.GetPublicKey(sec)
if err != nil {
return KeySigner{}, err
}
return KeySigner{sec, pk, xsync.NewMapOf[string, [32]byte]()}, nil
}
2025-03-04 11:08:31 -03:00
// SignEvent signs the provided event with the signer's private key.
// It sets the event's ID, PubKey, and Sig fields.
func (ks KeySigner) SignEvent(ctx context.Context, evt *nostr.Event) error { return evt.Sign(ks.sk) }
2025-03-04 11:08:31 -03:00
// GetPublicKey returns the public key associated with this signer.
2025-03-04 18:03:02 -03:00
func (ks KeySigner) GetPublicKey(ctx context.Context) (string, error) { return ks.pk, nil }
2025-03-04 11:08:31 -03:00
// Encrypt encrypts a plaintext message for a recipient using NIP-44.
// It caches conversation keys for efficiency in repeated operations.
func (ks KeySigner) Encrypt(ctx context.Context, plaintext string, recipient string) (string, error) {
ck, ok := ks.conversationKeys.Load(recipient)
if !ok {
var err error
ck, err = nip44.GenerateConversationKey(recipient, ks.sk)
if err != nil {
return "", err
}
ks.conversationKeys.Store(recipient, ck)
}
return nip44.Encrypt(plaintext, ck)
}
2025-03-04 11:08:31 -03:00
// Decrypt decrypts a base64-encoded ciphertext from a sender using NIP-44.
// It caches conversation keys for efficiency in repeated operations.
func (ks KeySigner) Decrypt(ctx context.Context, base64ciphertext string, sender string) (string, error) {
ck, ok := ks.conversationKeys.Load(sender)
if !ok {
var err error
ck, err = nip44.GenerateConversationKey(sender, ks.sk)
if err != nil {
return "", err
}
ks.conversationKeys.Store(sender, ck)
}
return nip44.Decrypt(base64ciphertext, ck)
}