mirror of
https://github.com/nbd-wtf/go-nostr.git
synced 2025-03-27 10:11:51 +01:00
179 lines
4.5 KiB
Go
179 lines
4.5 KiB
Go
package nostr
|
|
|
|
import (
|
|
"crypto/sha256"
|
|
"encoding/hex"
|
|
"fmt"
|
|
"time"
|
|
|
|
"github.com/btcsuite/btcd/btcec/v2"
|
|
"github.com/btcsuite/btcd/btcec/v2/schnorr"
|
|
)
|
|
|
|
type Event struct {
|
|
ID string
|
|
PubKey string
|
|
CreatedAt time.Time
|
|
Kind int
|
|
Tags Tags
|
|
Content string
|
|
Sig string
|
|
|
|
// anything here will be mashed together with the main event object when serializing
|
|
extra map[string]any
|
|
}
|
|
|
|
const (
|
|
KindSetMetadata int = 0
|
|
KindTextNote int = 1
|
|
KindRecommendServer int = 2
|
|
KindContactList int = 3
|
|
KindEncryptedDirectMessage int = 4
|
|
KindDeletion int = 5
|
|
KindBoost int = 6
|
|
KindReaction int = 7
|
|
KindChannelCreation int = 40
|
|
KindChannelMetadata int = 41
|
|
KindChannelMessage int = 42
|
|
KindChannelHideMessage int = 43
|
|
KindChannelMuteUser int = 44
|
|
)
|
|
|
|
// GetID serializes and returns the event ID as a string
|
|
func (evt *Event) GetID() string {
|
|
h := sha256.Sum256(evt.Serialize())
|
|
return hex.EncodeToString(h[:])
|
|
}
|
|
|
|
// Escaping strings for JSON encoding according to RFC4627.
|
|
// Also encloses result in quotation marks "".
|
|
func quoteEscapeString(dst []byte, s string) []byte {
|
|
dst = append(dst, '"')
|
|
for i := 0; i < len(s); i++ {
|
|
c := s[i]
|
|
switch {
|
|
case c == '"':
|
|
// quotation mark
|
|
dst = append(dst, []byte{'\\', '"'}...)
|
|
case c == '\\':
|
|
// reverse solidus
|
|
dst = append(dst, []byte{'\\', '\\'}...)
|
|
case c >= 0x20:
|
|
// default, rest below are control chars
|
|
dst = append(dst, c)
|
|
case c < 0x09:
|
|
dst = append(dst, []byte{'\\', 'u', '0', '0', '0', '0' + c}...)
|
|
case c == 0x09:
|
|
dst = append(dst, []byte{'\\', 't'}...)
|
|
case c == 0x0a:
|
|
dst = append(dst, []byte{'\\', 'n'}...)
|
|
case c == 0x0d:
|
|
dst = append(dst, []byte{'\\', 'r'}...)
|
|
case c < 0x10:
|
|
dst = append(dst, []byte{'\\', 'u', '0', '0', '0', 0x57 + c}...)
|
|
case c < 0x1a:
|
|
dst = append(dst, []byte{'\\', 'u', '0', '0', '1', 0x20 + c}...)
|
|
case c < 0x20:
|
|
dst = append(dst, []byte{'\\', 'u', '0', '0', '1', 0x47 + c}...)
|
|
}
|
|
}
|
|
dst = append(dst, '"')
|
|
return dst
|
|
}
|
|
|
|
// Serialize outputs a byte array that can be hashed/signed to identify/authenticate.
|
|
// JSON encoding as defined in RFC4627.
|
|
func (evt *Event) Serialize() []byte {
|
|
// the serialization process is just putting everything into a JSON array
|
|
// so the order is kept. See NIP-01
|
|
ser := make([]byte, 0)
|
|
|
|
// version: 0
|
|
ser = append(ser, []byte{'[', '0', ','}...)
|
|
|
|
// pubkey
|
|
ser = append(ser, '"')
|
|
ser = append(ser, []byte(evt.PubKey)...)
|
|
ser = append(ser, []byte{'"', ','}...)
|
|
|
|
// created_at
|
|
ser = append(ser, []byte(fmt.Sprintf("%d", int(evt.CreatedAt.Unix())))...)
|
|
ser = append(ser, ',')
|
|
|
|
// kind
|
|
ser = append(ser, []byte(fmt.Sprintf("%d,", int(evt.Kind)))...)
|
|
|
|
// tags
|
|
ser = append(ser, '[')
|
|
for i, tag := range evt.Tags {
|
|
if i > 0 {
|
|
ser = append(ser, ',')
|
|
}
|
|
ser = append(ser, '[')
|
|
for i, s := range tag {
|
|
if i > 0 {
|
|
ser = append(ser, ',')
|
|
}
|
|
ser = quoteEscapeString(ser, s)
|
|
}
|
|
ser = append(ser, ']')
|
|
}
|
|
ser = append(ser, []byte{']', ','}...)
|
|
|
|
// content
|
|
ser = quoteEscapeString(ser, evt.Content)
|
|
ser = append(ser, ']')
|
|
|
|
return ser
|
|
}
|
|
|
|
// CheckSignature checks if the signature is valid for the id
|
|
// (which is a hash of the serialized event content).
|
|
// returns an error if the signature itself is invalid.
|
|
func (evt Event) CheckSignature() (bool, error) {
|
|
// read and check pubkey
|
|
pk, err := hex.DecodeString(evt.PubKey)
|
|
if err != nil {
|
|
return false, fmt.Errorf("event pubkey '%s' is invalid hex: %w", evt.PubKey, err)
|
|
}
|
|
|
|
pubkey, err := schnorr.ParsePubKey(pk)
|
|
if err != nil {
|
|
return false, fmt.Errorf("event has invalid pubkey '%s': %w", evt.PubKey, err)
|
|
}
|
|
|
|
// read signature
|
|
s, err := hex.DecodeString(evt.Sig)
|
|
if err != nil {
|
|
return false, fmt.Errorf("signature '%s' is invalid hex: %w", evt.Sig, err)
|
|
}
|
|
sig, err := schnorr.ParseSignature(s)
|
|
if err != nil {
|
|
return false, fmt.Errorf("failed to parse signature: %w", err)
|
|
}
|
|
|
|
// check signature
|
|
hash := sha256.Sum256(evt.Serialize())
|
|
return sig.Verify(hash[:], pubkey), nil
|
|
}
|
|
|
|
// Sign signs an event with a given privateKey
|
|
func (evt *Event) Sign(privateKey string) error {
|
|
h := sha256.Sum256(evt.Serialize())
|
|
|
|
s, err := hex.DecodeString(privateKey)
|
|
if err != nil {
|
|
return fmt.Errorf("Sign called with invalid private key '%s': %w", privateKey, err)
|
|
}
|
|
sk, _ := btcec.PrivKeyFromBytes(s)
|
|
|
|
sig, err := schnorr.Sign(sk, h[:])
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
evt.ID = hex.EncodeToString(h[:])
|
|
evt.Sig = hex.EncodeToString(sig.Serialize())
|
|
return nil
|
|
}
|