-
-
Notifications
You must be signed in to change notification settings - Fork 95
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[Wallet] Add nostr dependency directly to repo (#346)
* adjust nostr imports * nostr receive split content by words
- Loading branch information
Showing
22 changed files
with
1,221 additions
and
25 deletions.
There are no files selected for viewing
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Submodule nostr
deleted from
880dd1
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
venv/ | ||
__pycache__/ | ||
nostr.egg-info/ | ||
dist/ | ||
nostr/_version.py | ||
.DS_Store |
Empty file.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,137 @@ | ||
# Copyright (c) 2017, 2020 Pieter Wuille | ||
# | ||
# Permission is hereby granted, free of charge, to any person obtaining a copy | ||
# of this software and associated documentation files (the "Software"), to deal | ||
# in the Software without restriction, including without limitation the rights | ||
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | ||
# copies of the Software, and to permit persons to whom the Software is | ||
# furnished to do so, subject to the following conditions: | ||
# | ||
# The above copyright notice and this permission notice shall be included in | ||
# all copies or substantial portions of the Software. | ||
# | ||
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | ||
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | ||
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE | ||
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | ||
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | ||
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN | ||
# THE SOFTWARE. | ||
|
||
"""Reference implementation for Bech32/Bech32m and segwit addresses.""" | ||
|
||
|
||
from enum import Enum | ||
|
||
class Encoding(Enum): | ||
"""Enumeration type to list the various supported encodings.""" | ||
BECH32 = 1 | ||
BECH32M = 2 | ||
|
||
CHARSET = "qpzry9x8gf2tvdw0s3jn54khce6mua7l" | ||
BECH32M_CONST = 0x2bc830a3 | ||
|
||
def bech32_polymod(values): | ||
"""Internal function that computes the Bech32 checksum.""" | ||
generator = [0x3b6a57b2, 0x26508e6d, 0x1ea119fa, 0x3d4233dd, 0x2a1462b3] | ||
chk = 1 | ||
for value in values: | ||
top = chk >> 25 | ||
chk = (chk & 0x1ffffff) << 5 ^ value | ||
for i in range(5): | ||
chk ^= generator[i] if ((top >> i) & 1) else 0 | ||
return chk | ||
|
||
|
||
def bech32_hrp_expand(hrp): | ||
"""Expand the HRP into values for checksum computation.""" | ||
return [ord(x) >> 5 for x in hrp] + [0] + [ord(x) & 31 for x in hrp] | ||
|
||
|
||
def bech32_verify_checksum(hrp, data): | ||
"""Verify a checksum given HRP and converted data characters.""" | ||
const = bech32_polymod(bech32_hrp_expand(hrp) + data) | ||
if const == 1: | ||
return Encoding.BECH32 | ||
if const == BECH32M_CONST: | ||
return Encoding.BECH32M | ||
return None | ||
|
||
def bech32_create_checksum(hrp, data, spec): | ||
"""Compute the checksum values given HRP and data.""" | ||
values = bech32_hrp_expand(hrp) + data | ||
const = BECH32M_CONST if spec == Encoding.BECH32M else 1 | ||
polymod = bech32_polymod(values + [0, 0, 0, 0, 0, 0]) ^ const | ||
return [(polymod >> 5 * (5 - i)) & 31 for i in range(6)] | ||
|
||
|
||
def bech32_encode(hrp, data, spec): | ||
"""Compute a Bech32 string given HRP and data values.""" | ||
combined = data + bech32_create_checksum(hrp, data, spec) | ||
return hrp + '1' + ''.join([CHARSET[d] for d in combined]) | ||
|
||
def bech32_decode(bech): | ||
"""Validate a Bech32/Bech32m string, and determine HRP and data.""" | ||
if ((any(ord(x) < 33 or ord(x) > 126 for x in bech)) or | ||
(bech.lower() != bech and bech.upper() != bech)): | ||
return (None, None, None) | ||
bech = bech.lower() | ||
pos = bech.rfind('1') | ||
if pos < 1 or pos + 7 > len(bech) or len(bech) > 90: | ||
return (None, None, None) | ||
if not all(x in CHARSET for x in bech[pos+1:]): | ||
return (None, None, None) | ||
hrp = bech[:pos] | ||
data = [CHARSET.find(x) for x in bech[pos+1:]] | ||
spec = bech32_verify_checksum(hrp, data) | ||
if spec is None: | ||
return (None, None, None) | ||
return (hrp, data[:-6], spec) | ||
|
||
def convertbits(data, frombits, tobits, pad=True): | ||
"""General power-of-2 base conversion.""" | ||
acc = 0 | ||
bits = 0 | ||
ret = [] | ||
maxv = (1 << tobits) - 1 | ||
max_acc = (1 << (frombits + tobits - 1)) - 1 | ||
for value in data: | ||
if value < 0 or (value >> frombits): | ||
return None | ||
acc = ((acc << frombits) | value) & max_acc | ||
bits += frombits | ||
while bits >= tobits: | ||
bits -= tobits | ||
ret.append((acc >> bits) & maxv) | ||
if pad: | ||
if bits: | ||
ret.append((acc << (tobits - bits)) & maxv) | ||
elif bits >= frombits or ((acc << (tobits - bits)) & maxv): | ||
return None | ||
return ret | ||
|
||
|
||
def decode(hrp, addr): | ||
"""Decode a segwit address.""" | ||
hrpgot, data, spec = bech32_decode(addr) | ||
if hrpgot != hrp: | ||
return (None, None) | ||
decoded = convertbits(data[1:], 5, 8, False) | ||
if decoded is None or len(decoded) < 2 or len(decoded) > 40: | ||
return (None, None) | ||
if data[0] > 16: | ||
return (None, None) | ||
if data[0] == 0 and len(decoded) != 20 and len(decoded) != 32: | ||
return (None, None) | ||
if data[0] == 0 and spec != Encoding.BECH32 or data[0] != 0 and spec != Encoding.BECH32M: | ||
return (None, None) | ||
return (data[0], decoded) | ||
|
||
|
||
def encode(hrp, witver, witprog): | ||
"""Encode a segwit address.""" | ||
spec = Encoding.BECH32 if witver == 0 else Encoding.BECH32M | ||
ret = bech32_encode(hrp, [witver] + convertbits(witprog, 8, 5), spec) | ||
if decode(hrp, ret) == (None, None): | ||
return None | ||
return ret |
Empty file.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,41 @@ | ||
|
||
from Cryptodome import Random | ||
from Cryptodome.Cipher import AES | ||
|
||
plain_text = "This is the text to encrypts" | ||
|
||
# encrypted = "7mH9jq3K9xNfWqIyu9gNpUz8qBvGwsrDJ+ACExdV1DvGgY8q39dkxVKeXD7LWCDrPnoD/ZFHJMRMis8v9lwHfNgJut8EVTMuJJi8oTgJevOBXl+E+bJPwej9hY3k20rgCQistNRtGHUzdWyOv7S1tg==".encode() | ||
# iv = "GzDzqOVShWu3Pl2313FBpQ==".encode() | ||
|
||
key = bytes.fromhex("3aa925cb69eb613e2928f8a18279c78b1dca04541dfd064df2eda66b59880795") | ||
|
||
BLOCK_SIZE = 16 | ||
|
||
class AESCipher(object): | ||
"""This class is compatible with crypto.createCipheriv('aes-256-cbc') | ||
""" | ||
def __init__(self, key=None): | ||
self.key = key | ||
|
||
def pad(self, data): | ||
length = BLOCK_SIZE - (len(data) % BLOCK_SIZE) | ||
return data + (chr(length) * length).encode() | ||
|
||
def unpad(self, data): | ||
return data[: -(data[-1] if type(data[-1]) == int else ord(data[-1]))] | ||
|
||
def encrypt(self, plain_text): | ||
cipher = AES.new(self.key, AES.MODE_CBC) | ||
b = plain_text.encode("UTF-8") | ||
return cipher.iv, cipher.encrypt(self.pad(b)) | ||
|
||
def decrypt(self, iv, enc_text): | ||
cipher = AES.new(self.key, AES.MODE_CBC, iv=iv) | ||
return self.unpad(cipher.decrypt(enc_text).decode("UTF-8")) | ||
|
||
if __name__ == "__main__": | ||
aes = AESCipher(key=key) | ||
iv, enc_text = aes.encrypt(plain_text) | ||
dec_text = aes.decrypt(iv, enc_text) | ||
print(dec_text) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,151 @@ | ||
from typing import Optional, List | ||
import ssl | ||
import time | ||
import json | ||
import os | ||
import base64 | ||
|
||
from ..event import Event | ||
from ..relay_manager import RelayManager | ||
from ..message_type import ClientMessageType | ||
from ..key import PrivateKey, PublicKey | ||
|
||
from ..filter import Filter, Filters | ||
from ..event import Event, EventKind, EncryptedDirectMessage | ||
from ..relay_manager import RelayManager | ||
from ..message_type import ClientMessageType | ||
|
||
from . import cbc | ||
|
||
|
||
class NostrClient: | ||
relays = [ | ||
"wss://nostr-pub.wellorder.net", | ||
"wss://relay.damus.io", | ||
"wss://nostr.zebedee.cloud", | ||
"wss://relay.snort.social", | ||
"wss://nostr.fmt.wiz.biz", | ||
"wss://nos.lol", | ||
"wss://nostr.oxtr.dev", | ||
"wss://relay.current.fyi", | ||
"wss://relay.snort.social", | ||
] # ["wss://nostr.oxtr.dev"] # ["wss://relay.nostr.info"] "wss://nostr-pub.wellorder.net" "ws://91.237.88.218:2700", "wss://nostrrr.bublina.eu.org", ""wss://nostr-relay.freeberty.net"", , "wss://nostr.oxtr.dev", "wss://relay.nostr.info", "wss://nostr-pub.wellorder.net" , "wss://relayer.fiatjaf.com", "wss://nodestr.fmt.wiz.biz/", "wss://no.str.cr" | ||
relay_manager = RelayManager() | ||
private_key: PrivateKey | ||
public_key: PublicKey | ||
|
||
def __init__(self, private_key: str = "", relays: List[str] = [], connect=True): | ||
self.generate_keys(private_key) | ||
|
||
if len(relays): | ||
self.relays = relays | ||
if connect: | ||
self.connect() | ||
|
||
def connect(self): | ||
for relay in self.relays: | ||
self.relay_manager.add_relay(relay) | ||
self.relay_manager.open_connections( | ||
{"cert_reqs": ssl.CERT_NONE} | ||
) # NOTE: This disables ssl certificate verification | ||
|
||
def close(self): | ||
self.relay_manager.close_connections() | ||
|
||
def generate_keys(self, private_key: Optional[str] = None): | ||
if private_key and private_key.startswith("nsec"): | ||
self.private_key = PrivateKey.from_nsec(private_key) | ||
elif private_key: | ||
self.private_key = PrivateKey(bytes.fromhex(private_key)) | ||
else: | ||
self.private_key = PrivateKey() # generate random key | ||
self.public_key = self.private_key.public_key | ||
|
||
def post(self, message: str): | ||
event = Event(message, self.public_key.hex(), kind=EventKind.TEXT_NOTE) | ||
self.private_key.sign_event(event) | ||
event_json = event.to_message() | ||
# print("Publishing message:") | ||
# print(event_json) | ||
self.relay_manager.publish_message(event_json) | ||
|
||
def get_post( | ||
self, | ||
sender_publickey: Optional[PublicKey] = None, | ||
callback_func=None, | ||
filter_kwargs={}, | ||
): | ||
authors = [sender_publickey.hex()] if sender_publickey else [] | ||
filter = Filter( | ||
authors=authors, | ||
kinds=[EventKind.TEXT_NOTE], | ||
**filter_kwargs, | ||
) | ||
filters = Filters([filter]) | ||
subscription_id = os.urandom(4).hex() | ||
self.relay_manager.add_subscription(subscription_id, filters) | ||
|
||
request = [ClientMessageType.REQUEST, subscription_id] | ||
request.extend(filters.to_json_array()) | ||
message = json.dumps(request) | ||
self.relay_manager.publish_message(message) | ||
|
||
while True: | ||
while self.relay_manager.message_pool.has_events(): | ||
event_msg = self.relay_manager.message_pool.get_event() | ||
if callback_func: | ||
callback_func(event_msg.event) | ||
time.sleep(0.1) | ||
|
||
def dm(self, message: str, to_pubkey: PublicKey): | ||
dm = EncryptedDirectMessage( | ||
recipient_pubkey=to_pubkey.hex(), cleartext_content=message | ||
) | ||
self.private_key.sign_event(dm) | ||
self.relay_manager.publish_event(dm) | ||
|
||
def get_dm(self, sender_publickey: PublicKey, callback_func=None, filter_kwargs={}): | ||
filters = Filters( | ||
[ | ||
Filter( | ||
kinds=[EventKind.ENCRYPTED_DIRECT_MESSAGE], | ||
pubkey_refs=[sender_publickey.hex()], | ||
**filter_kwargs, | ||
) | ||
] | ||
) | ||
subscription_id = os.urandom(4).hex() | ||
self.relay_manager.add_subscription(subscription_id, filters) | ||
|
||
request = [ClientMessageType.REQUEST, subscription_id] | ||
request.extend(filters.to_json_array()) | ||
message = json.dumps(request) | ||
self.relay_manager.publish_message(message) | ||
|
||
while True: | ||
while self.relay_manager.message_pool.has_events(): | ||
event_msg = self.relay_manager.message_pool.get_event() | ||
if "?iv=" in event_msg.event.content: | ||
try: | ||
shared_secret = self.private_key.compute_shared_secret( | ||
event_msg.event.public_key | ||
) | ||
aes = cbc.AESCipher(key=shared_secret) | ||
enc_text_b64, iv_b64 = event_msg.event.content.split("?iv=") | ||
iv = base64.decodebytes(iv_b64.encode("utf-8")) | ||
enc_text = base64.decodebytes(enc_text_b64.encode("utf-8")) | ||
dec_text = aes.decrypt(iv, enc_text) | ||
if callback_func: | ||
callback_func(event_msg.event, dec_text) | ||
except: | ||
pass | ||
break | ||
time.sleep(0.1) | ||
|
||
def subscribe(self, callback_func=None): | ||
while True: | ||
while self.relay_manager.message_pool.has_events(): | ||
event_msg = self.relay_manager.message_pool.get_event() | ||
if callback_func: | ||
callback_func(event_msg.event) | ||
time.sleep(0.1) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
import time | ||
from dataclasses import dataclass | ||
|
||
|
||
@dataclass | ||
class Delegation: | ||
delegator_pubkey: str | ||
delegatee_pubkey: str | ||
event_kind: int | ||
duration_secs: int = 30*24*60 # default to 30 days | ||
signature: str = None # set in PrivateKey.sign_delegation | ||
|
||
@property | ||
def expires(self) -> int: | ||
return int(time.time()) + self.duration_secs | ||
|
||
@property | ||
def conditions(self) -> str: | ||
return f"kind={self.event_kind}&created_at<{self.expires}" | ||
|
||
@property | ||
def delegation_token(self) -> str: | ||
return f"nostr:delegation:{self.delegatee_pubkey}:{self.conditions}" | ||
|
||
def get_tag(self) -> list[str]: | ||
""" Called by Event """ | ||
return [ | ||
"delegation", | ||
self.delegator_pubkey, | ||
self.conditions, | ||
self.signature, | ||
] |
Oops, something went wrong.