Files
ark/server/internal/infrastructure/notifier/nostr/nostr.go
Louis Singer ff96524f22 Ark Notes (#379)
* ark credits

* rename "ecash" --> "ark credit"

* rework note_test.go

* NewFromString

* create several notes

* note repo: rename "push" to "add"

* RegisterInputsForNextRoundRequest: move "notes" to field #3

* use uint64 as note ID

* rename to voucher

* add nostr notification

* nostr notification test and fixes

* bump badger to 4.3

* allow npub to be registered

* rename poolTxID

* add default relays

* Update server/internal/config/config.go

Co-authored-by: Marco Argentieri <3596602+tiero@users.noreply.github.com>

* fix RedeemVouchers test

* notification = voucher

* WASM wrappers

* fix arkd voucher cmd

* test_utils.go ignore gosec rule G101

* fix permissions

* rename ALL to notes

* add URI prefix

* note.go : fix signature encoding

* fix decode note.Data

* Update server/internal/infrastructure/notifier/nostr/nostr.go

Co-authored-by: Pietralberto Mazza <18440657+altafan@users.noreply.github.com>

* Update pkg/client-sdk/wasm/browser/wrappers.go

Co-authored-by: Pietralberto Mazza <18440657+altafan@users.noreply.github.com>

* Update server/internal/infrastructure/notifier/nostr/nostr.go

Co-authored-by: Pietralberto Mazza <18440657+altafan@users.noreply.github.com>

* rework note and entity db + sqlite implementations

* NOTIFICATION_PREFIX -> NOTE_URI_PREFIX

* validate NOTE_URI_PREFIX

* Update defaults to convenant-less mainnet (#2)

* config: defaults to convenant-less tx builder

* Drop env var for blockchain scanner

---------

Co-authored-by: altafan <18440657+altafan@users.noreply.github.com>

* add // before URI prefix

* add URI prefix in admin CreateNote

* Fixes

* rework nonces encoding (#4)

* rework nonces encoding

* add a check in Musig2Nonce decode function

* musig2_test: increase number of signers to 20

* musig2.json: add a test case with a 35 leaves tree

* GetEventStream REST rework

* fix round phases time intervals

* [SDK] Use server-side streams in rest client

* Fix history

* make the URI optional

* Updates

* Fix settled txs in history

* fix e2e test

* go work sync in sdk unit test

* fix signMessage in btc and liquid sdk wallets

---------

Co-authored-by: Marco Argentieri <3596602+tiero@users.noreply.github.com>
Co-authored-by: Pietralberto Mazza <18440657+altafan@users.noreply.github.com>
2024-11-15 19:07:33 +01:00

127 lines
3.0 KiB
Go

package nostr_notifier
import (
"context"
"fmt"
"sync"
"sync/atomic"
"time"
"github.com/ark-network/ark/server/internal/core/ports"
"github.com/nbd-wtf/go-nostr"
"github.com/nbd-wtf/go-nostr/nip04"
"github.com/nbd-wtf/go-nostr/nip19"
"github.com/sirupsen/logrus"
)
type nostrNotifier struct{}
func New() ports.Notifier {
return &nostrNotifier{}
}
// Notify expects nprofile as recipient, it encrypts the message using NIP-04
func (n *nostrNotifier) Notify(ctx context.Context, to any, message string) error {
recipientProfile, ok := to.(string)
if !ok {
return fmt.Errorf("recipient must be a string (NIP-19 encoded nostr profile)")
}
prefix, result, err := nip19.Decode(recipientProfile)
if err != nil {
return fmt.Errorf("failed to decode NIP-19 string: %w", err)
}
if prefix != "nprofile" {
return fmt.Errorf("invalid NIP-19 prefix: %s", prefix)
}
recipient, ok := result.(nostr.ProfilePointer)
if !ok {
return fmt.Errorf("invalid NIP-19 result: %v", result)
}
// validate public key
if !nostr.IsValidPublicKey(recipient.PublicKey) {
return fmt.Errorf("invalid nostr public key: %s", recipient.PublicKey)
}
// validate relays
if len(recipient.Relays) == 0 {
return fmt.Errorf("invalid nostr profile: at least one relay is required")
}
for _, relay := range recipient.Relays {
if !nostr.IsValidRelayURL(relay) {
return fmt.Errorf("invalid relay URL: %s", relay)
}
}
// Generate ephemeral keypair for this notification
ephemeralSec := nostr.GeneratePrivateKey()
ephemeralPub, err := nostr.GetPublicKey(ephemeralSec)
if err != nil {
return fmt.Errorf("failed to generate ephemeral keypair: %w", err)
}
// encrypt message
sharedSecret, err := nip04.ComputeSharedSecret(recipient.PublicKey, ephemeralSec)
if err != nil {
return fmt.Errorf("failed to compute shared secret: %w", err)
}
encryptedMsg, err := nip04.Encrypt(message, sharedSecret)
if err != nil {
return fmt.Errorf("failed to encrypt message for recipient %s: %w", recipient.PublicKey, err)
}
// create NIP-04 event
ev := &nostr.Event{
PubKey: ephemeralPub,
CreatedAt: nostr.Timestamp(time.Now().Unix()),
Kind: nostr.KindEncryptedDirectMessage,
Tags: nostr.Tags{{"p", recipient.PublicKey}},
Content: encryptedMsg,
}
// sign event
err = ev.Sign(ephemeralSec)
if err != nil {
return fmt.Errorf("failed to sign event: %w", err)
}
// Connect to relays and publish
var wg sync.WaitGroup
atLeastOneSuccess := atomic.Bool{}
for _, url := range recipient.Relays {
wg.Add(1)
go func(relayURL string) {
defer wg.Done()
relay, err := nostr.RelayConnect(ctx, relayURL)
if err != nil {
logrus.WithError(err).Warnf("failed to connect to relay %s", relayURL)
return
}
defer relay.Close()
err = relay.Publish(ctx, *ev)
if err != nil {
logrus.WithError(err).Warnf("failed to publish to relay %s", relayURL)
return
}
atLeastOneSuccess.Store(true)
}(url)
}
wg.Wait()
if !atLeastOneSuccess.Load() {
return fmt.Errorf("failed to publish to any relay")
}
return nil
}