Files
blastr/src/lib.rs
2023-06-16 12:13:51 -05:00

655 lines
30 KiB
Rust

use crate::nostr::get_nip11_response;
use crate::nostr::NOSTR_QUEUE_10;
use crate::nostr::NOSTR_QUEUE_7;
use crate::nostr::NOSTR_QUEUE_8;
use crate::nostr::NOSTR_QUEUE_9;
pub(crate) use crate::nostr::{
try_queue_event, NOSTR_QUEUE, NOSTR_QUEUE_2, NOSTR_QUEUE_3, NOSTR_QUEUE_4, NOSTR_QUEUE_5,
NOSTR_QUEUE_6,
};
use ::nostr::{
ClientMessage, Event, EventId, Filter, Kind, RelayMessage, SubscriptionId, Tag, TagKind,
};
use futures::StreamExt;
use serde::{Deserialize, Serialize};
use std::sync::Arc;
use worker::*;
mod error;
mod nostr;
mod utils;
fn log_request(req: &Request) {
console_log!(
"Incoming Request: {} - [{}]",
Date::now().to_string(),
req.path(),
);
}
#[derive(Serialize, Deserialize, Clone)]
pub struct PublishedNote {
date: String,
}
/// The list of event kinds that are disallowed for the Nostr relay
/// currently, this is just the NIP-95 event
const DISALLOWED_EVENT_KINDS: [u32; 1] = [1064];
/// Main function for the Cloudflare Worker that triggers off of a HTTP req
#[event(fetch)]
pub async fn main(req: Request, env: Env, _ctx: Context) -> Result<Response> {
log_request(&req);
// Optionally, get more helpful error messages written to the console in the case of a panic.
utils::set_panic_hook();
// Optionally, use the Router to handle matching endpoints, use ":name" placeholders, or "*name"
// catch-alls to match on specific patterns. Alternatively, use `Router::with_data(D)` to
// provide arbitrary data that will be accessible in each route via the `ctx.data()` method.
let router = Router::new();
// Add as many routes as your Worker needs! Each route will get a `Request` for handling HTTP
// functionality and a `RouteContext` which you can use to and get route parameters and
// Environment bindings like KV Stores, Durable Objects, Secrets, and Variables.
router
.post_async("/event", |mut req, ctx| async move {
// for any adhoc POST event
match req.text().await {
Ok(request_text) => {
if let Ok(client_msg) = ClientMessage::from_json(request_text) {
match client_msg {
ClientMessage::Event(event) => {
console_log!("got an event from client: {}", event.id);
// check if disallowed event kind
if DISALLOWED_EVENT_KINDS.contains(&event.kind.as_u32()) {
console_log!(
"invalid event kind {}: {}",
event.kind.as_u32(),
event.id
);
let relay_msg = RelayMessage::new_ok(
event.id,
false,
"disallowed event kind",
);
return relay_response(relay_msg);
};
// check if we've already published it before
let published_notes = ctx.kv("PUBLISHED_NOTES")?;
if published_notes
.get(event.id.to_string().as_str())
.json::<PublishedNote>()
.await
.ok()
.flatten()
.is_some()
{
console_log!("event already published: {}", event.id);
let relay_msg = RelayMessage::new_ok(
event.id,
false,
"event already published",
);
return relay_response(relay_msg);
};
// if the event is a nostr wallet connect event, we
// should save it and not send to other relays.
if let Some(relay_msg) =
handle_nwc_event(*event.clone(), &ctx).await?
{
if let Err(e) = delete_nwc_request(*event, &ctx).await {
console_log!("failed to delete nwc request: {e}");
}
return relay_response(relay_msg);
};
// broadcast it to all queues
let nostr_queues = vec![
ctx.env.queue(NOSTR_QUEUE).expect("get queue"),
ctx.env.queue(NOSTR_QUEUE_2).expect("get queue"),
ctx.env.queue(NOSTR_QUEUE_3).expect("get queue"),
ctx.env.queue(NOSTR_QUEUE_4).expect("get queue"),
ctx.env.queue(NOSTR_QUEUE_5).expect("get queue"),
ctx.env.queue(NOSTR_QUEUE_6).expect("get queue"),
ctx.env.queue(NOSTR_QUEUE_7).expect("get queue"),
ctx.env.queue(NOSTR_QUEUE_8).expect("get queue"),
ctx.env.queue(NOSTR_QUEUE_9).expect("get queue"),
ctx.env.queue(NOSTR_QUEUE_10).expect("get queue"),
];
try_queue_event(*event.clone(), nostr_queues).await;
console_log!("queued up nostr event: {}", event.id);
match published_notes
.put(
event.id.to_string().as_str(),
PublishedNote {
date: Date::now().to_string(),
},
)?
.execute()
.await
{
Ok(_) => {
console_log!("saved published note: {}", event.id);
let relay_msg = RelayMessage::new_ok(event.id, true, "");
relay_response(relay_msg)
}
Err(e) => {
console_log!(
"could not save published note: {} - {e:?}",
event.id
);
let relay_msg = RelayMessage::new_ok(
event.id,
false,
"error: could not save published note",
);
relay_response(relay_msg)
}
}
}
_ => {
console_log!("ignoring other nostr client message types");
Response::error("Only Event types allowed", 400)
}
}
} else {
Response::error("Could not parse Client Message", 400)
}
}
Err(e) => {
console_log!("could not get request text: {}", e);
Response::error("Could not get request text", 400)
}
}
})
.get("/", |req, ctx| {
// NIP 11
if req.headers().get("Accept").ok().flatten()
== Some("application/nostr+json".to_string())
{
return Response::from_json(&get_nip11_response())?.with_cors(&cors());
}
let ctx = Arc::new(ctx);
// For websocket compatibility
let pair = WebSocketPair::new()?;
let server = pair.server;
server.accept()?;
console_log!("accepted websocket, about to spawn event stream");
wasm_bindgen_futures::spawn_local(async move {
let mut event_stream = server.events().expect("stream error");
console_log!("spawned event stream, waiting for first message..");
while let Some(event) = event_stream.next().await {
if let Err(e) = event {
console_log!("error parsing some event: {e}");
continue;
}
match event.expect("received error in websocket") {
WebsocketEvent::Message(msg) => {
if msg.text().is_none() {
continue;
};
if let Ok(client_msg) = ClientMessage::from_json(msg.text().unwrap()) {
match client_msg {
ClientMessage::Event(event) => {
console_log!("got an event from client: {}", event.id);
// check if disallowed event kind
if DISALLOWED_EVENT_KINDS.contains(&event.kind.as_u32()) {
console_log!(
"invalid event kind {}: {}",
event.kind.as_u32(),
event.id
);
let relay_msg = RelayMessage::new_ok(
event.id,
false,
"disallowed event kind",
);
server
.send_with_str(&relay_msg.as_json())
.expect("failed to send response");
continue;
};
// check if we've already published it before
let published_notes =
ctx.kv("PUBLISHED_NOTES").expect("get kv");
if published_notes
.get(event.id.to_string().as_str())
.json::<PublishedNote>()
.await
.ok()
.flatten()
.is_some()
{
console_log!("event already published: {}", event.id);
let relay_msg = RelayMessage::new_ok(
event.id,
false,
"event already published",
);
server
.send_with_str(&relay_msg.as_json())
.expect("failed to send response");
continue;
};
// if the event is a nostr wallet connect event, we
// should save it and not send to other relays.
if let Some(response) =
handle_nwc_event(*event.clone(), &ctx)
.await
.expect("failed to handle nwc event")
{
server
.send_with_str(&response.as_json())
.expect("failed to send response");
if let Err(e) = delete_nwc_request(*event, &ctx).await {
console_log!("failed to delete nwc request: {e}");
}
continue;
};
// broadcast it to all queues
let nostr_queues = vec![
ctx.env.queue(NOSTR_QUEUE).expect("get queue"),
ctx.env.queue(NOSTR_QUEUE_2).expect("get queue"),
ctx.env.queue(NOSTR_QUEUE_3).expect("get queue"),
ctx.env.queue(NOSTR_QUEUE_4).expect("get queue"),
ctx.env.queue(NOSTR_QUEUE_5).expect("get queue"),
ctx.env.queue(NOSTR_QUEUE_6).expect("get queue"),
ctx.env.queue(NOSTR_QUEUE_7).expect("get queue"),
ctx.env.queue(NOSTR_QUEUE_8).expect("get queue"),
ctx.env.queue(NOSTR_QUEUE_9).expect("get queue"),
ctx.env.queue(NOSTR_QUEUE_10).expect("get queue"),
];
try_queue_event(*event.clone(), nostr_queues).await;
console_log!("queued up nostr event: {}", event.id);
match published_notes
.put(
event.id.to_string().as_str(),
PublishedNote {
date: Date::now().to_string(),
},
)
.expect("saved note")
.execute()
.await
{
Ok(_) => {
console_log!("saved published note: {}", event.id);
}
Err(e) => {
console_log!(
"could not save published note: {} - {e:?}",
event.id
);
}
}
let relay_msg = RelayMessage::new_ok(event.id, true, "");
server
.send_with_str(&relay_msg.as_json())
.expect("failed to send response");
}
ClientMessage::Req {
subscription_id,
filters,
} => {
// for each filter we handle it every 10 seconds
// by reading storage and sending any new events
// one caveat is that this will send events multiple
// times if they are in multiple filters
for filter in filters {
let valid_nwc = {
// has correct kinds
let kinds = filter.kinds.as_ref();
(
kinds
.unwrap_or(&vec![])
.contains(&Kind::WalletConnectResponse)
|| kinds.unwrap_or(&vec![])
.contains(&Kind::WalletConnectRequest)
) &&
// has authors and pubkeys
!filter.authors.as_ref().unwrap_or(&vec![]).is_empty() &&
!filter.pubkeys.as_ref().unwrap_or(&vec![]).is_empty()
};
if valid_nwc {
let ctx_clone = ctx.clone();
let sub_id = subscription_id.clone();
let server_clone = server.clone();
wasm_bindgen_futures::spawn_local(async move {
console_log!("Got NWC filter!");
let mut sent_events = vec![];
loop {
match handle_filter(
&sent_events,
sub_id.clone(),
filter.clone(),
&server_clone,
&ctx_clone,
)
.await
{
Ok(new_event_ids) => {
// add new events to sent events
sent_events.extend(new_event_ids);
}
Err(e) => console_log!(
"error handling filter: {e}"
),
}
utils::delay(10_000).await;
}
});
}
} {
// if not a nwc filter, we just send EOSE
let relay_msg = RelayMessage::new_eose(subscription_id);
server
.send_with_str(relay_msg.as_json())
.expect("failed to send response");
}
}
_ => {
console_log!("ignoring other nostr client message types");
}
}
}
}
WebsocketEvent::Close(_) => {
console_log!("closing");
break;
}
}
}
});
Response::from_websocket(pair.client)
})
.get("/favicon.ico", |_, _| {
let bytes: Vec<u8> = include_bytes!("../static/favicon.ico").to_vec();
Response::from_bytes(bytes)?.with_cors(&cors())
})
.options("/*catchall", |_, _| empty_response())
.run(req, env)
.await
}
/// Main function for the Cloudflare Worker that triggers off the nostr event queue
#[event(queue)]
pub async fn main(message_batch: MessageBatch<Event>, _env: Env, _ctx: Context) -> Result<()> {
// Deserialize the message batch
let messages: Vec<Message<Event>> = message_batch.messages()?;
let mut events: Vec<Event> = messages.iter().map(|m| m.body.clone()).collect();
events.sort();
events.dedup();
let part = queue_number(message_batch.queue().as_str())?;
match nostr::send_nostr_events(events, part).await {
Ok(event_ids) => {
for event_id in event_ids {
console_log!("Sent nostr event: {}", event_id)
}
}
Err(error::Error::WorkerError(e)) => {
console_log!("worker error: {e}");
}
}
Ok(())
}
pub fn queue_number(batch_name: &str) -> Result<u32> {
match batch_name {
NOSTR_QUEUE => Ok(0),
NOSTR_QUEUE_2 => Ok(1),
NOSTR_QUEUE_3 => Ok(2),
NOSTR_QUEUE_4 => Ok(3),
NOSTR_QUEUE_5 => Ok(4),
NOSTR_QUEUE_6 => Ok(5),
NOSTR_QUEUE_7 => Ok(6),
NOSTR_QUEUE_8 => Ok(7),
NOSTR_QUEUE_9 => Ok(8),
NOSTR_QUEUE_10 => Ok(9),
_ => Err("unexpected queue".into()),
}
}
/// if the user requests a NWC event, we have those stored,
/// we should send them to the user
pub async fn handle_filter(
sent_events: &[EventId],
subscription_id: SubscriptionId,
filter: Filter,
server: &WebSocket,
ctx: &RouteContext<()>,
) -> Result<Vec<EventId>> {
let mut events = vec![];
// get all authors and pubkeys
let mut keys = filter.authors.unwrap_or_default();
keys.extend(
filter
.pubkeys
.unwrap_or_default()
.into_iter()
.map(|p| p.to_string()),
);
if filter
.kinds
.clone()
.unwrap_or_default()
.contains(&Kind::WalletConnectRequest)
{
let mut found_events = get_nwc_events(&keys, Kind::WalletConnectRequest, ctx)
.await
.unwrap_or_default();
// filter out events that have already been sent
found_events.retain(|e| !sent_events.contains(&e.id));
events.extend(found_events);
}
if filter
.kinds
.unwrap_or_default()
.contains(&Kind::WalletConnectResponse)
{
let mut found_events = get_nwc_events(&keys, Kind::WalletConnectResponse, ctx)
.await
.unwrap_or_default();
// filter out events that have already been sent
found_events.retain(|e| !sent_events.contains(&e.id));
events.extend(found_events);
}
if events.is_empty() {
return Ok(vec![]);
}
if !events.is_empty() {
// sort and dedup events
events.sort_by(|a, b| a.created_at.cmp(&b.created_at));
events.dedup();
// send all found events to the user
for event in events.clone() {
console_log!("sending event to client: {}", &event.id);
let relay_msg = RelayMessage::new_event(subscription_id.clone(), event);
server
.send_with_str(&relay_msg.as_json())
.expect("failed to send response");
}
}
console_log!("end of subscription request");
let relay_msg = RelayMessage::new_eose(subscription_id);
server
.send_with_str(relay_msg.as_json())
.expect("failed to send response");
let sent_event_ids: Vec<EventId> = events.into_iter().map(|e| e.id).collect();
Ok(sent_event_ids)
}
pub async fn get_nwc_events(
keys: &[String],
kind: Kind,
ctx: &RouteContext<()>,
) -> Result<Vec<Event>> {
let kv_store = match kind {
Kind::WalletConnectResponse => ctx.kv("NWC_RESPONSES")?,
Kind::WalletConnectRequest => ctx.kv("NWC_REQUESTS")?,
_ => return Ok(vec![]), // skip other event types, todo, we may want to store info events as well
};
let mut events = vec![];
for key in keys {
let nwc_events = kv_store
.get(key)
.json::<Vec<Event>>()
.await?
.unwrap_or_default();
for nwc_event in nwc_events {
// delete responses since we don't care after sending
if kind == Kind::WalletConnectResponse {
if let Err(e) = delete_nwc_response(&nwc_event, ctx).await {
console_log!("failed to delete nwc response: {e}");
}
}
events.push(nwc_event);
}
}
Ok(events)
}
pub async fn handle_nwc_event(
event: Event,
ctx: &RouteContext<()>,
) -> Result<Option<RelayMessage>> {
let kv_store = match event.kind {
Kind::WalletConnectResponse => ctx.kv("NWC_RESPONSES")?,
Kind::WalletConnectRequest => ctx.kv("NWC_REQUESTS")?,
_ => return Ok(None), // skip other event types, todo, we may want to store info events as well
};
console_log!("got a wallet connect event: {}", event.id);
let key = &event.pubkey.to_string();
let new_nwc_responses = match kv_store.get(key).json::<Vec<Event>>().await {
Ok(Some(mut current)) => {
current.push(event.clone());
current
}
Ok(None) => vec![event.clone()],
Err(e) => {
console_log!("error getting nwc events from KV: {e}");
let relay_msg =
RelayMessage::new_ok(event.id, false, "error: could not save published note");
return Ok(Some(relay_msg));
}
};
// save new vector of events
if let Err(e) = kv_store.put(key, new_nwc_responses)?.execute().await {
console_log!("error saving nwc: {e}");
let relay_msg =
RelayMessage::new_ok(event.id, false, "error: could not save published note");
return Ok(Some(relay_msg));
}
console_log!("saved nwc event: {}", event.id);
let relay_msg = RelayMessage::new_ok(event.id, true, "");
Ok(Some(relay_msg))
}
/// When a NWC request has been fulfilled, delete the request from KV
pub async fn delete_nwc_request(event: Event, ctx: &RouteContext<()>) -> Result<()> {
let kv_store = match event.kind {
Kind::WalletConnectResponse => ctx.kv("NWC_REQUESTS")?,
_ => return Ok(()), // skip other event types
};
let p_tag = event.tags.iter().find(|t| t.kind() == TagKind::P).cloned();
let e_tag = event.tags.iter().find(|t| t.kind() == TagKind::E).cloned();
if let Some(Tag::PubKey(pubkey, ..)) = p_tag {
if let Some(Tag::Event(event_id, ..)) = e_tag {
let key = &pubkey.to_string();
match kv_store.get(key).json::<Vec<Event>>().await {
Ok(Some(current)) => {
let new_events: Vec<Event> =
current.into_iter().filter(|e| e.id != event_id).collect();
// save new vector of events
kv_store.put(key, new_events)?.execute().await?;
console_log!("deleted nwc request event: {}", event_id);
}
Ok(None) => return Ok(()),
Err(e) => {
console_log!("error getting nwc events from KV: {e}");
return Ok(());
}
};
};
};
Ok(())
}
pub async fn delete_nwc_response(event: &Event, ctx: &RouteContext<()>) -> Result<()> {
let kv_store = match event.kind {
Kind::WalletConnectResponse => ctx.kv("NWC_RESPONSES")?,
_ => return Ok(()), // skip other event types
};
let key = &event.pubkey.to_string();
match kv_store.get(key).json::<Vec<Event>>().await {
Ok(Some(current)) => {
let new_events: Vec<Event> = current.into_iter().filter(|e| e.id != event.id).collect();
// save new vector of events
kv_store.put(key, new_events)?.execute().await?;
console_log!("deleted nwc response event: {}", event.id);
}
Ok(None) => return Ok(()),
Err(e) => {
console_log!("error getting nwc events from KV: {e}");
return Ok(());
}
};
Ok(())
}
fn relay_response(msg: RelayMessage) -> worker::Result<Response> {
Response::from_json(&msg)?.with_cors(&cors())
}
fn empty_response() -> worker::Result<Response> {
Response::empty()?.with_cors(&cors())
}
fn cors() -> Cors {
Cors::new()
.with_credentials(true)
.with_origins(vec!["*"])
.with_allowed_headers(vec!["Content-Type"])
.with_methods(Method::all())
}