Completed event and key libraries.
This commit is contained in:
155
event.go
Normal file
155
event.go
Normal file
@@ -0,0 +1,155 @@
|
||||
package roots
|
||||
|
||||
import (
|
||||
"crypto/sha256"
|
||||
"encoding/hex"
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"regexp"
|
||||
|
||||
"github.com/btcsuite/btcd/btcec/v2"
|
||||
"github.com/btcsuite/btcd/btcec/v2/schnorr"
|
||||
)
|
||||
|
||||
type Event struct {
|
||||
ID string
|
||||
PubKey string
|
||||
CreatedAt int
|
||||
Kind int
|
||||
Tags [][]string
|
||||
Content string
|
||||
Sig string
|
||||
}
|
||||
|
||||
var (
|
||||
Hex64Pattern = regexp.MustCompile("^[a-f0-9]{64}$")
|
||||
Hex128Pattern = regexp.MustCompile("^[a-f0-9]{128}$")
|
||||
)
|
||||
|
||||
func (event Event) Serialize() ([]byte, error) {
|
||||
serialized := []interface{}{
|
||||
0,
|
||||
event.PubKey,
|
||||
event.CreatedAt,
|
||||
event.Kind,
|
||||
event.Tags,
|
||||
event.Content,
|
||||
}
|
||||
|
||||
bytes, err := json.Marshal(serialized)
|
||||
if err != nil {
|
||||
return []byte{}, err
|
||||
}
|
||||
return bytes, nil
|
||||
}
|
||||
|
||||
func (event Event) GetID() (string, error) {
|
||||
bytes, err := event.Serialize()
|
||||
if err != nil {
|
||||
return "", err
|
||||
}
|
||||
hash := sha256.Sum256(bytes)
|
||||
return hex.EncodeToString(hash[:]), nil
|
||||
}
|
||||
|
||||
func (event Event) Validate() error {
|
||||
if err := event.ValidateStructure(); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err := event.ValidateID(); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return ValidateSignature(event.ID, event.Sig, event.PubKey)
|
||||
}
|
||||
|
||||
func (event Event) ValidateStructure() error {
|
||||
if !Hex64Pattern.MatchString(event.PubKey) {
|
||||
return fmt.Errorf("pubkey must be 64 lowercase hex characters")
|
||||
}
|
||||
|
||||
if !Hex64Pattern.MatchString(event.ID) {
|
||||
return fmt.Errorf("id must be 64 hex characters")
|
||||
}
|
||||
|
||||
if !Hex128Pattern.MatchString(event.Sig) {
|
||||
return fmt.Errorf("signature must be 128 hex characters")
|
||||
}
|
||||
|
||||
for _, tag := range event.Tags {
|
||||
if len(tag) < 2 {
|
||||
return fmt.Errorf("tags must contain at least two elements")
|
||||
}
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func (event Event) ValidateID() error {
|
||||
computedID, err := event.GetID()
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to compute event id")
|
||||
}
|
||||
if event.ID == "" {
|
||||
return fmt.Errorf("event id is empty")
|
||||
}
|
||||
if computedID != event.ID {
|
||||
return fmt.Errorf("event id %q does not match computed id %q", event.ID, computedID)
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func SignEvent(eventID, privateKeyHex string) (string, error) {
|
||||
skBytes, err := hex.DecodeString(privateKeyHex)
|
||||
if err != nil {
|
||||
return "", fmt.Errorf("invalid private key hex: %w", err)
|
||||
}
|
||||
|
||||
idBytes, err := hex.DecodeString(eventID)
|
||||
if err != nil {
|
||||
return "", fmt.Errorf("invalid event id hex: %w", err)
|
||||
}
|
||||
|
||||
// discard public key return value
|
||||
sk, _ := btcec.PrivKeyFromBytes(skBytes)
|
||||
sig, err := schnorr.Sign(sk, idBytes)
|
||||
if err != nil {
|
||||
return "", fmt.Errorf("schnorr signature error: %w", err)
|
||||
}
|
||||
|
||||
return hex.EncodeToString(sig.Serialize()), nil
|
||||
}
|
||||
|
||||
func ValidateSignature(eventID, eventSig, publicKeyHex string) error {
|
||||
idBytes, err := hex.DecodeString(eventID)
|
||||
if err != nil {
|
||||
return fmt.Errorf("invalid event id hex: %w", err)
|
||||
}
|
||||
|
||||
sigBytes, err := hex.DecodeString(eventSig)
|
||||
if err != nil {
|
||||
return fmt.Errorf("invalid event signature hex: %w", err)
|
||||
}
|
||||
|
||||
pkBytes, err := hex.DecodeString(publicKeyHex)
|
||||
if err != nil {
|
||||
return fmt.Errorf("invalid public key hex: %w", err)
|
||||
}
|
||||
|
||||
signature, err := schnorr.ParseSignature(sigBytes)
|
||||
if err != nil {
|
||||
return fmt.Errorf("malformed signature: %w", err)
|
||||
}
|
||||
|
||||
publicKey, err := schnorr.ParsePubKey(pkBytes)
|
||||
if err != nil {
|
||||
return fmt.Errorf("malformed public key: %w", err)
|
||||
}
|
||||
|
||||
if signature.Verify(idBytes, publicKey) {
|
||||
return nil
|
||||
} else {
|
||||
return fmt.Errorf("event signature is invalid")
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user