mirror of
https://github.com/aljazceru/nutshell.git
synced 2025-12-20 10:34:20 +01:00
* fix keys * fix tests * backwards compatible api upgrade * upgrade seems to work * fix tests * add deprecated api functions * add more tests of backwards compat * add test serialization for nut00 * remove a redundant test * move mint and melt to new api * mypy works * CI: mypy --check-untyped-defs * add deprecated router * add hints and remove logs * fix tests * cleanup * use new mint and melt endpoints * tests passing? * fix mypy * make format * make format * make format * commit * errors gone * save * adjust the API * store quotes in db * make mypy happy * add fakewallet settings * remove LIGHTNING=True and pass quote id for melt * format * tests passing * add CoreLightningRestWallet * add macaroon loader * add correct config * preimage -> proof * move wallet.status() to cli.helpers.print_status() * remove statuses from tests * remove * make format * Use httpx in deprecated wallet * fix cln interface * create invoice before quote * internal transactions and deprecated api testing * fix tests * add deprecated API tests * fastapi type hints break things * fix duplicate wallet error * make format * update poetry in CI to 1.7.1 * precommit restore * remove bolt11 * oops * default poetry * store fee reserve for melt quotes and refactor melt() * works? * make format * test * finally * fix deprecated models * rename v1 endpoints to bolt11 * raise restore and check to v1, bump version to 0.15.0 * add version byte to keyset id * remove redundant fields in json * checks * generate bip32 keyset wip * migrate old keysets * load duplicate keys * duplicate old keysets * revert router changes * add deprecated /check and /restore endpoints * try except invalidate * parse unit from derivation path, adjust keyset id calculation with bytes * remove keyest id from functions again and rely on self.keyset_id * mosts tests work * mint loads multiple derivation paths * make format * properly print units * fix tests * wallet works with multiple units * add strike wallet and choose backend dynamically * fix mypy * add get_payment_quote to lightning backends * make format * fix startup * fix lnbitswallet * fix tests * LightningWallet -> LightningBackend * remove comments * make format * remove msat conversion * add Amount type * fix regtest * use melt_quote as argument for pay_invoice * test old api * fees in sats * fix deprecated fees * fixes * print balance correctly * internally index keyset response by int * add pydantic validation to input models * add timestamps to mint db * store timestamps for invoices, promises, proofs_used * fix wallet migration * rotate keys correctly for testing * remove print * update latest keyset * fix tests * fix test * make format * make format with correct black version * remove nsat and cheese * test against deprecated mint * fix tests? * actually use env var * mint run with env vars * moar test * cleanup * simplify tests, load all keys * try out testing with internal invoices * fix internal melt test * fix test * deprecated checkfees expects appropriate fees * adjust comment * drop lightning table * split migration for testing for now, remove it later * remove unused lightning table * skip_private_key -> skip_db_read * throw error on migration error * reorder * fix migrations * fix lnbits fee return value negative * fix typo * comments * add type * make format * split must use correct amount * fix tests * test deprecated api with internal/external melts * do not split if not necessary * refactor * fix test * make format with new black * cleanup and add comments * add quote state check endpoints * fix deprecated wallet response * split -> swap endpoint * make format * add expiry to quotes, get quote endpoints, and adjust to nut review comments * allow overpayment of melt * add lightning wallet tests * commiting to save * fix tests a bit * make format * remove comments * get mint info * check_spendable default False, and return payment quote checking id * make format * bump version in pyproject * update to /v1/checkstate * make format * fix mint api checks * return witness on /v1/checkstate * no failfast * try fail-fast: false in ci.yaml * fix db lookup * clean up literals
150 lines
5.7 KiB
Python
150 lines
5.7 KiB
Python
from typing import Optional, List
|
|
import ssl
|
|
import time
|
|
import json
|
|
import os
|
|
import base64
|
|
|
|
from ..event import Event
|
|
from ..relay_manager import RelayManager
|
|
from ..message_type import ClientMessageType
|
|
from ..key import PrivateKey, PublicKey
|
|
|
|
from ..filter import Filter, Filters
|
|
from ..event import Event, EventKind, EncryptedDirectMessage
|
|
from ..relay_manager import RelayManager
|
|
from ..message_type import ClientMessageType
|
|
|
|
from . import cbc
|
|
|
|
|
|
class NostrClient:
|
|
relays = [
|
|
"wss://nostr-pub.wellorder.net",
|
|
"wss://relay.damus.io",
|
|
"wss://nostr.zebedee.cloud",
|
|
"wss://relay.snort.social",
|
|
"wss://nostr.fmt.wiz.biz",
|
|
"wss://nos.lol",
|
|
"wss://nostr.oxtr.dev",
|
|
"wss://relay.current.fyi",
|
|
"wss://relay.snort.social",
|
|
] # ["wss://nostr.oxtr.dev"] # ["wss://relay.nostr.info"] "wss://nostr-pub.wellorder.net" "ws://91.237.88.218:2700", "wss://nostrrr.bublina.eu.org", ""wss://nostr-relay.freeberty.net"", , "wss://nostr.oxtr.dev", "wss://relay.nostr.info", "wss://nostr-pub.wellorder.net" , "wss://relayer.fiatjaf.com", "wss://nodestr.fmt.wiz.biz/", "wss://no.str.cr"
|
|
relay_manager = RelayManager()
|
|
private_key: PrivateKey
|
|
public_key: PublicKey
|
|
|
|
def __init__(self, private_key: str = "", relays: List[str] = [], connect=True):
|
|
self.generate_keys(private_key)
|
|
|
|
if len(relays):
|
|
self.relays = relays
|
|
if connect:
|
|
self.connect()
|
|
|
|
def connect(self):
|
|
for relay in self.relays:
|
|
self.relay_manager.add_relay(relay)
|
|
self.relay_manager.open_connections({
|
|
"cert_reqs": ssl.CERT_NONE
|
|
}) # NOTE: This disables ssl certificate verification
|
|
|
|
def close(self):
|
|
self.relay_manager.close_connections()
|
|
|
|
def generate_keys(self, private_key: Optional[str] = None):
|
|
if private_key and private_key.startswith("nsec"):
|
|
self.private_key = PrivateKey.from_nsec(private_key)
|
|
elif private_key:
|
|
self.private_key = PrivateKey(bytes.fromhex(private_key))
|
|
else:
|
|
self.private_key = PrivateKey() # generate random key
|
|
self.public_key = self.private_key.public_key
|
|
|
|
def post(self, message: str):
|
|
event = Event(message, self.public_key.hex(), kind=EventKind.TEXT_NOTE)
|
|
self.private_key.sign_event(event)
|
|
event_json = event.to_message()
|
|
# print("Publishing message:")
|
|
# print(event_json)
|
|
self.relay_manager.publish_message(event_json)
|
|
|
|
def get_post(
|
|
self,
|
|
sender_publickey: Optional[PublicKey] = None,
|
|
callback_func=None,
|
|
filter_kwargs={},
|
|
):
|
|
authors = [sender_publickey.hex()] if sender_publickey else []
|
|
filter = Filter(
|
|
authors=authors,
|
|
kinds=[EventKind.TEXT_NOTE],
|
|
**filter_kwargs,
|
|
)
|
|
filters = Filters([filter])
|
|
subscription_id = os.urandom(4).hex()
|
|
self.relay_manager.add_subscription(subscription_id, filters)
|
|
|
|
request = [ClientMessageType.REQUEST, subscription_id]
|
|
request.extend(filters.to_json_array())
|
|
message = json.dumps(request)
|
|
self.relay_manager.publish_message(message)
|
|
|
|
while True:
|
|
while self.relay_manager.message_pool.has_events():
|
|
event_msg = self.relay_manager.message_pool.get_event()
|
|
if callback_func:
|
|
callback_func(event_msg.event)
|
|
time.sleep(0.1)
|
|
|
|
def dm(self, message: str, to_pubkey: PublicKey):
|
|
dm = EncryptedDirectMessage(
|
|
recipient_pubkey=to_pubkey.hex(), cleartext_content=message
|
|
)
|
|
self.private_key.sign_event(dm)
|
|
self.relay_manager.publish_event(dm)
|
|
|
|
def get_dm(self, sender_publickey: PublicKey, callback_func=None, filter_kwargs={}):
|
|
filters = Filters([
|
|
Filter(
|
|
kinds=[EventKind.ENCRYPTED_DIRECT_MESSAGE],
|
|
pubkey_refs=[sender_publickey.hex()],
|
|
**filter_kwargs,
|
|
)
|
|
])
|
|
subscription_id = os.urandom(4).hex()
|
|
self.relay_manager.add_subscription(subscription_id, filters)
|
|
|
|
request = [ClientMessageType.REQUEST, subscription_id]
|
|
request.extend(filters.to_json_array())
|
|
message = json.dumps(request)
|
|
self.relay_manager.publish_message(message)
|
|
|
|
while any([r.connected for r in self.relay_manager.relays.values()]):
|
|
while self.relay_manager.message_pool.has_events():
|
|
event_msg = self.relay_manager.message_pool.get_event()
|
|
if "?iv=" in event_msg.event.content:
|
|
try:
|
|
shared_secret = self.private_key.compute_shared_secret(
|
|
event_msg.event.public_key
|
|
)
|
|
aes = cbc.AESCipher(key=shared_secret)
|
|
enc_text_b64, iv_b64 = event_msg.event.content.split("?iv=")
|
|
iv = base64.decodebytes(iv_b64.encode("utf-8"))
|
|
enc_text = base64.decodebytes(enc_text_b64.encode("utf-8"))
|
|
dec_text = aes.decrypt(iv, enc_text)
|
|
if callback_func:
|
|
callback_func(event_msg.event, dec_text)
|
|
except:
|
|
pass
|
|
break
|
|
time.sleep(0.1)
|
|
|
|
def subscribe(self, callback_func=None):
|
|
while any([r.connected for r in self.relay_manager.relays.values()]):
|
|
while self.relay_manager.message_pool.has_events():
|
|
event_msg = self.relay_manager.message_pool.get_event()
|
|
if callback_func:
|
|
callback_func(event_msg.event)
|
|
time.sleep(0.1)
|