nip46: create_account

This commit is contained in:
fiatjaf
2024-02-29 20:29:08 -03:00
parent e0ba846a03
commit 6d5aef70c5
2 changed files with 115 additions and 21 deletions

View File

@@ -45,7 +45,7 @@ func ConnectBunker(
// assume it's a bunker url (will fail later if not) // assume it's a bunker url (will fail later if not)
secret := parsed.Query().Get("secret") secret := parsed.Query().Get("secret")
relays := parsed.Query()["relay"] relays := parsed.Query()["relay"]
target := parsed.Host targetPublicKey := parsed.Host
if parsed.Scheme == "" { if parsed.Scheme == "" {
// could be a NIP-05 // could be a NIP-05
@@ -53,7 +53,7 @@ func ConnectBunker(
if err != nil { if err != nil {
return nil, fmt.Errorf("failed to query nip05: %w", err) return nil, fmt.Errorf("failed to query nip05: %w", err)
} }
target = pubkey targetPublicKey = pubkey
relays = relays_ relays = relays_
} else if parsed.Scheme == "bunker" { } else if parsed.Scheme == "bunker" {
// this is what we were expecting, so just move on // this is what we were expecting, so just move on
@@ -61,26 +61,42 @@ func ConnectBunker(
// otherwise fail here // otherwise fail here
return nil, fmt.Errorf("wrong scheme '%s', must be bunker://", parsed.Scheme) return nil, fmt.Errorf("wrong scheme '%s', must be bunker://", parsed.Scheme)
} }
if !nostr.IsValidPublicKey(target) { if !nostr.IsValidPublicKey(targetPublicKey) {
return nil, fmt.Errorf("'%s' is not a valid public key hex", target) return nil, fmt.Errorf("'%s' is not a valid public key hex", targetPublicKey)
} }
bunker := NewBunker(
ctx,
clientSecretKey,
targetPublicKey,
relays,
pool,
)
clientPubKey, _ := nostr.GetPublicKey(clientSecretKey)
_, err = bunker.RPC(ctx, "connect", []string{clientPubKey, secret})
return bunker, err
}
func NewBunker(
ctx context.Context,
clientSecretKey string,
targetPublicKey string,
relays []string,
pool *nostr.SimplePool,
) *BunkerClient {
if pool == nil { if pool == nil {
pool = nostr.NewSimplePool(ctx) pool = nostr.NewSimplePool(ctx)
} }
shared, err := nip04.ComputeSharedSecret(target, clientSecretKey) clientPublicKey, _ := nostr.GetPublicKey(clientSecretKey)
if err != nil { sharedSecret, _ := nip04.ComputeSharedSecret(targetPublicKey, clientSecretKey)
return nil, fmt.Errorf("failed to compute shared secret: %w", err)
}
clientPubKey, _ := nostr.GetPublicKey(clientSecretKey)
bunker := &BunkerClient{ bunker := &BunkerClient{
clientSecretKey: clientSecretKey,
pool: pool, pool: pool,
target: target, target: targetPublicKey,
relays: relays, relays: relays,
sharedSecret: shared, sharedSecret: sharedSecret,
listeners: xsync.NewMapOf[string, chan Response](), listeners: xsync.NewMapOf[string, chan Response](),
idPrefix: "gn-" + strconv.Itoa(rand.Intn(65536)), idPrefix: "gn-" + strconv.Itoa(rand.Intn(65536)),
} }
@@ -88,7 +104,7 @@ func ConnectBunker(
go func() { go func() {
events := pool.SubMany(ctx, relays, nostr.Filters{ events := pool.SubMany(ctx, relays, nostr.Filters{
{ {
Tags: nostr.TagMap{"p": []string{clientPubKey}}, Tags: nostr.TagMap{"p": []string{clientPublicKey}},
Kinds: []int{nostr.KindNostrConnect}, Kinds: []int{nostr.KindNostrConnect},
}, },
}) })
@@ -98,7 +114,7 @@ func ConnectBunker(
} }
var resp Response var resp Response
plain, err := nip04.Decrypt(ie.Content, shared) plain, err := nip04.Decrypt(ie.Content, sharedSecret)
if err != nil { if err != nil {
continue continue
} }
@@ -114,9 +130,7 @@ func ConnectBunker(
} }
}() }()
ourPubkey, _ := nostr.GetPublicKey(clientSecretKey) return bunker
_, err = bunker.RPC(ctx, "connect", []string{ourPubkey, secret})
return bunker, err
} }
func (bunker *BunkerClient) Ping(ctx context.Context) error { func (bunker *BunkerClient) Ping(ctx context.Context) error {

80
nip46/create_account.go Normal file
View File

@@ -0,0 +1,80 @@
package nip46
import (
"context"
"fmt"
"github.com/nbd-wtf/go-nostr"
"github.com/nbd-wtf/go-nostr/nip04"
"github.com/nbd-wtf/go-nostr/nip05"
)
func CheckNameAvailability(ctx context.Context, name, domain string) bool {
result, _, err := nip05.Fetch(ctx, name+"@"+domain)
if err != nil {
return false
}
_, ok := result.Names[name]
return !ok
}
type CreateAccountOptions struct {
Email string
}
func CreateAccount(
ctx context.Context,
clientSecretKey string,
name string,
domain string,
pool *nostr.SimplePool,
extraOpts *CreateAccountOptions,
) (*BunkerClient, error) {
if pool == nil {
pool = nostr.NewSimplePool(ctx)
}
// create a bunker that targets the provider directly
providerPubkey, relays, err := queryWellKnownNostrJson(ctx, domain)
if err != nil {
return nil, err
}
bunker := NewBunker(
ctx,
clientSecretKey,
providerPubkey,
relays,
pool,
)
clientPubKey, _ := nostr.GetPublicKey(clientSecretKey)
_, err = bunker.RPC(ctx, "connect", []string{clientPubKey, ""})
if err != nil {
return nil, fmt.Errorf("initial connect error: %w", err)
}
// call create_account on it, it should return the value of the public key that will be created
email := ""
if extraOpts != nil {
email = extraOpts.Email
}
resp, err := bunker.RPC(ctx, "create_account", []string{name, domain, email})
if err != nil {
return nil, fmt.Errorf("error on create_account: %w", err)
}
newlyCreatedPublicKey := resp
// update this bunker instance so it targets the new key now instead of the provider
bunker.target = newlyCreatedPublicKey
bunker.sharedSecret, _ = nip04.ComputeSharedSecret(newlyCreatedPublicKey, clientSecretKey)
// finally try to connect again using the new key as the target
_, err = bunker.RPC(ctx, "connect", []string{newlyCreatedPublicKey, ""})
if err != nil {
return nil, fmt.Errorf("newly-created public key connect error: %w", err)
}
return bunker, err
}