mirror of
https://github.com/aljazceru/ark.git
synced 2025-12-17 12:14:21 +01:00
* [domain] add reverse boarding inputs in Payment struct * [tx-builder] support reverse boarding script * [wallet] add GetTransaction * [api-spec][application] add reverse boarding support in covenantless * [config] add reverse boarding config * [api-spec] add ReverseBoardingAddress RPC * [domain][application] support empty forfeits txs in EndFinalization events * [tx-builder] optional connector output in round tx * [btc-embedded] fix getTx and taproot finalizer * whitelist ReverseBoardingAddress RPC * [test] add reverse boarding integration test * [client] support reverse boarding * [sdk] support reverse boarding * [e2e] add sleep time after faucet * [test] run using bitcoin-core RPC * [tx-builder] fix GetSweepInput * [application][tx-builder] support reverse onboarding in covenant * [cli] support reverse onboarding in covenant CLI * [test] rework integration tests * [sdk] remove onchain wallet, replace by onboarding address * remove old onboarding protocols * [sdk] Fix RegisterPayment * [e2e] add more funds to covenant ASP * [e2e] add sleeping time * several fixes * descriptor boarding * remove boarding delay from info * [sdk] implement descriptor boarding * go mod tidy * fixes and revert error msgs * move descriptor pkg to common * add replace in go.mod * [sdk] fix unit tests * rename DescriptorInput --> BoardingInput * genrest in SDK * remove boarding input from domain * remove all "reverse boarding" * rename "onboarding" ==> "boarding" * remove outdate payment unit test * use tmpfs docker volument for compose testing files * several fixes
225 lines
4.1 KiB
Go
225 lines
4.1 KiB
Go
package descriptor
|
|
|
|
import (
|
|
"encoding/hex"
|
|
"errors"
|
|
"fmt"
|
|
"strconv"
|
|
"strings"
|
|
|
|
"github.com/ark-network/ark/common"
|
|
"github.com/btcsuite/btcd/txscript"
|
|
)
|
|
|
|
var (
|
|
ErrInvalidXOnlyKey = errors.New("invalid x only public key")
|
|
ErrInvalidPkPolicy = errors.New("invalid public key policy")
|
|
ErrInvalidOlderPolicy = errors.New("invalid older policy")
|
|
ErrInvalidAndPolicy = errors.New("invalid and() policy")
|
|
ErrNotExpectedPolicy = errors.New("not the expected policy")
|
|
)
|
|
|
|
type Expression interface {
|
|
Parse(policy string) error
|
|
Script(verify bool) (string, error)
|
|
String() string
|
|
}
|
|
|
|
type XOnlyKey struct {
|
|
Key
|
|
}
|
|
|
|
func (e *XOnlyKey) Parse(policy string) error {
|
|
if len(policy) != 64 {
|
|
fmt.Println(policy)
|
|
return ErrInvalidXOnlyKey
|
|
}
|
|
|
|
e.Hex = policy
|
|
return nil
|
|
}
|
|
|
|
func (e *XOnlyKey) Script() string {
|
|
return e.Hex
|
|
}
|
|
|
|
// pk(xonlypubkey)
|
|
type PK struct {
|
|
Key XOnlyKey
|
|
}
|
|
|
|
func (e *PK) String() string {
|
|
return fmt.Sprintf("pk(%s)", e.Key.Hex)
|
|
}
|
|
|
|
func (e *PK) Parse(policy string) error {
|
|
if !strings.HasPrefix(policy, "pk(") {
|
|
return ErrNotExpectedPolicy
|
|
}
|
|
if len(policy) != 3+64+1 {
|
|
return ErrInvalidPkPolicy
|
|
}
|
|
|
|
var key XOnlyKey
|
|
if err := key.Parse(policy[3 : 64+3]); err != nil {
|
|
return err
|
|
}
|
|
|
|
e.Key = key
|
|
return nil
|
|
}
|
|
|
|
func (e *PK) Script(verify bool) (string, error) {
|
|
pubkeyBytes, err := hex.DecodeString(e.Key.Hex)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
checksig := txscript.OP_CHECKSIG
|
|
if verify {
|
|
checksig = txscript.OP_CHECKSIGVERIFY
|
|
}
|
|
|
|
script, err := txscript.NewScriptBuilder().AddData(
|
|
pubkeyBytes,
|
|
).AddOp(
|
|
byte(checksig),
|
|
).Script()
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return hex.EncodeToString(script), nil
|
|
}
|
|
|
|
type Older struct {
|
|
Timeout uint
|
|
}
|
|
|
|
func (e *Older) String() string {
|
|
return fmt.Sprintf("older(%d)", e.Timeout)
|
|
}
|
|
|
|
func (e *Older) Parse(policy string) error {
|
|
if !strings.HasPrefix(policy, "older(") {
|
|
return ErrNotExpectedPolicy
|
|
}
|
|
|
|
index := strings.IndexRune(policy, ')')
|
|
if index == -1 {
|
|
return ErrInvalidOlderPolicy
|
|
}
|
|
|
|
number := policy[6:index]
|
|
if len(number) == 0 {
|
|
return ErrInvalidOlderPolicy
|
|
}
|
|
|
|
timeout, err := strconv.Atoi(number)
|
|
if err != nil {
|
|
return ErrInvalidOlderPolicy
|
|
}
|
|
|
|
e.Timeout = uint(timeout)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (e *Older) Script(bool) (string, error) {
|
|
sequence, err := common.BIP68Encode(e.Timeout)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
script, err := txscript.NewScriptBuilder().AddData(sequence).AddOps([]byte{
|
|
txscript.OP_CHECKSEQUENCEVERIFY,
|
|
txscript.OP_DROP,
|
|
}).Script()
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return hex.EncodeToString(script), nil
|
|
}
|
|
|
|
type And struct {
|
|
First Expression
|
|
Second Expression
|
|
}
|
|
|
|
func (e *And) String() string {
|
|
return fmt.Sprintf("and(%s,%s)", e.First.String(), e.Second.String())
|
|
}
|
|
|
|
func (e *And) Parse(policy string) error {
|
|
if !strings.HasPrefix(policy, "and(") {
|
|
return ErrNotExpectedPolicy
|
|
}
|
|
|
|
index := strings.LastIndexByte(policy, ')')
|
|
if index == -1 {
|
|
return ErrInvalidAndPolicy
|
|
}
|
|
|
|
childrenPolicy := policy[4:index]
|
|
if len(childrenPolicy) == 0 {
|
|
return ErrInvalidAndPolicy
|
|
}
|
|
|
|
children := strings.Split(childrenPolicy, ",")
|
|
if len(children) != 2 {
|
|
fmt.Println(children)
|
|
return ErrInvalidAndPolicy
|
|
}
|
|
|
|
first, err := parseExpression(children[0])
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
second, err := parseExpression(children[1])
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
e.First = first
|
|
e.Second = second
|
|
|
|
return nil
|
|
}
|
|
|
|
func (e *And) Script(verify bool) (string, error) {
|
|
firstScript, err := e.First.Script(true)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
secondScript, err := e.Second.Script(verify)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return firstScript + secondScript, nil
|
|
}
|
|
|
|
func parseExpression(policy string) (Expression, error) {
|
|
policy = strings.TrimSpace(policy)
|
|
expressions := make([]Expression, 0)
|
|
expressions = append(expressions, &PK{})
|
|
expressions = append(expressions, &Older{})
|
|
expressions = append(expressions, &And{})
|
|
|
|
for _, e := range expressions {
|
|
if err := e.Parse(policy); err != nil {
|
|
if err != ErrNotExpectedPolicy {
|
|
return nil, err
|
|
}
|
|
continue
|
|
}
|
|
|
|
return e, nil
|
|
}
|
|
|
|
return nil, fmt.Errorf("unable to parse expression '%s'", policy)
|
|
}
|