nostr_ruby 0.1.3 → 0.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
data/lib/nostr_ruby.rb CHANGED
@@ -1,4 +1,6 @@
1
- require 'custom_addr'
1
+ require_relative 'version'
2
+ require_relative 'crypto_tools'
3
+
2
4
  require 'ecdsa'
3
5
  require 'schnorr'
4
6
  require 'json'
@@ -7,274 +9,16 @@ require 'bech32'
7
9
  require 'unicode/emoji'
8
10
  require 'websocket-client-simple'
9
11
 
10
- # * Ruby library to interact with the Nostr protocol
11
-
12
- class Nostr
13
- attr_reader :private_key, :public_key, :pow_difficulty_target
14
-
15
- def initialize(key)
16
- hex_private_key = if key[:private_key]&.include?('nsec')
17
- Nostr.to_hex(key[:private_key])
18
- else
19
- key[:private_key]
20
- end
21
-
22
- hex_public_key = if key[:public_key]&.include?('npub')
23
- Nostr.to_hex(key[:public_key])
24
- else
25
- key[:public_key]
26
- end
27
-
28
- if hex_private_key
29
- @private_key = hex_private_key
30
- group = ECDSA::Group::Secp256k1
31
- @public_key = group.generator.multiply_by_scalar(private_key.to_i(16)).x.to_s(16).rjust(64, '0')
32
- elsif hex_public_key
33
- @public_key = hex_public_key
34
- else
35
- raise 'Missing private or public key'
36
- end
37
- end
38
-
39
- def keys
40
- keys = { public_key: @public_key }
41
- keys[:private_key] = @private_key if @private_key
42
- keys
43
- end
44
-
45
- def bech32_keys
46
- bech32_keys = { public_key: Nostr.to_bech32(@public_key, 'npub') }
47
- bech32_keys[:private_key] = Nostr.to_bech32(@private_key, 'nsec') if @private_key
48
- bech32_keys
49
- end
50
-
51
- def self.to_hex(bech32_key)
52
- public_addr = CustomAddr.new(bech32_key)
53
- public_addr.to_scriptpubkey
54
- end
55
-
56
- def self.to_bech32(hex_key, hrp)
57
- custom_addr = CustomAddr.new
58
- custom_addr.scriptpubkey = hex_key
59
- custom_addr.hrp = hrp
60
- custom_addr.addr
61
- end
62
-
63
- def calculate_shared_key(other_public_key)
64
- ec = OpenSSL::PKey::EC.new('secp256k1')
65
- ec.private_key = OpenSSL::BN.new(@private_key, 16)
66
- recipient_key_hex = "02#{other_public_key}"
67
- recipient_pub_bn = OpenSSL::BN.new(recipient_key_hex, 16)
68
- secret_point = OpenSSL::PKey::EC::Point.new(ec.group, recipient_pub_bn)
69
- ec.dh_compute_key(secret_point)
70
- end
71
-
72
- def sign_event(event)
73
- raise 'Invalid pubkey' unless event[:pubkey].is_a?(String) && event[:pubkey].size == 64
74
- raise 'Invalid created_at' unless event[:created_at].is_a?(Integer)
75
- raise 'Invalid kind' unless (0..29_999).include?(event[:kind])
76
- raise 'Invalid tags' unless event[:tags].is_a?(Array)
77
- raise 'Invalid content' unless event[:content].is_a?(String)
78
-
79
- serialized_event = [
80
- 0,
81
- event[:pubkey],
82
- event[:created_at],
83
- event[:kind],
84
- event[:tags],
85
- event[:content]
86
- ]
87
-
88
- serialized_event_sha256 = nil
89
- if @pow_difficulty_target
90
- nonce = 1
91
- loop do
92
- nonce_tag = ['nonce', nonce.to_s, @pow_difficulty_target.to_s]
93
- nonced_serialized_event = serialized_event.clone
94
- nonced_serialized_event[4] = nonced_serialized_event[4] + [nonce_tag]
95
- serialized_event_sha256 = Digest::SHA256.hexdigest(JSON.dump(nonced_serialized_event))
96
- if match_pow_difficulty?(serialized_event_sha256)
97
- event[:tags] << nonce_tag
98
- break
99
- end
100
- nonce += 1
101
- end
102
- else
103
- serialized_event_sha256 = Digest::SHA256.hexdigest(JSON.dump(serialized_event))
104
- end
105
-
106
- private_key = Array(@private_key).pack('H*')
107
- message = Array(serialized_event_sha256).pack('H*')
108
- event_signature = Schnorr.sign(message, private_key).encode.unpack('H*')[0]
109
-
110
- event['id'] = serialized_event_sha256
111
- event['sig'] = event_signature
112
- event
113
- end
114
-
115
- def build_event(payload)
116
- event = sign_event(payload)
117
- ['EVENT', event]
118
- end
119
-
120
- def build_metadata_event(name, about, picture, nip05)
121
- data = {}
122
- data[:name] = name if name
123
- data[:about] = about if about
124
- data[:picture] = picture if picture
125
- data[:nip05] = nip05 if nip05
126
- event = {
127
- "pubkey": @public_key,
128
- "created_at": Time.now.utc.to_i,
129
- "kind": 0,
130
- "tags": [],
131
- "content": data.to_json
132
- }
133
-
134
- event = sign_event(event)
135
- ['EVENT', event]
136
- end
137
-
138
- def build_note_event(text, channel_key = nil)
139
- event = {
140
- "pubkey": @public_key,
141
- "created_at": Time.now.utc.to_i,
142
- "kind": channel_key ? 42 : 1,
143
- "tags": channel_key ? [['e', channel_key]] : [],
144
- "content": text
145
- }
146
-
147
- event = sign_event(event)
148
- ['EVENT', event]
149
- end
150
-
151
- def build_recommended_relay_event(relay)
152
- raise 'Invalid relay' unless relay.start_with?('wss://') || relay.start_with?('ws://')
153
-
154
- event = {
155
- "pubkey": @public_key,
156
- "created_at": Time.now.utc.to_i,
157
- "kind": 2,
158
- "tags": [],
159
- "content": relay
160
- }
161
-
162
- event = sign_event(event)
163
- ['EVENT', event]
164
- end
165
-
166
- def build_contact_list_event(contacts)
167
- event = {
168
- "pubkey": @public_key,
169
- "created_at": Time.now.utc.to_i,
170
- "kind": 3,
171
- "tags": contacts.map { |c| ['p'] + c },
172
- "content": ''
173
- }
174
-
175
- event = sign_event(event)
176
- ['EVENT', event]
177
- end
178
-
179
- def build_dm_event(text, recipient_public_key)
180
- cipher = OpenSSL::Cipher::Cipher.new('aes-256-cbc')
181
- cipher.encrypt
182
- cipher.iv = iv = cipher.random_iv
183
- cipher.key = calculate_shared_key(recipient_public_key)
184
- encrypted_text = cipher.update(text)
185
- encrypted_text << cipher.final
186
- encrypted_text = "#{Base64.encode64(encrypted_text)}?iv=#{Base64.encode64(iv)}"
187
- encrypted_text = encrypted_text.gsub("\n", '')
188
-
189
- event = {
190
- "pubkey": @public_key,
191
- "created_at": Time.now.utc.to_i,
192
- "kind": 4,
193
- "tags": [['p', recipient_public_key]],
194
- "content": encrypted_text
195
- }
196
-
197
- event = sign_event(event)
198
- ['EVENT', event]
199
- end
200
-
201
- def build_deletion_event(events, reason = '')
202
- event = {
203
- "pubkey": @public_key,
204
- "created_at": Time.now.utc.to_i,
205
- "kind": 5,
206
- "tags": events.map{ |e| ['e', e] },
207
- "content": reason
208
- }
209
-
210
- event = sign_event(event)
211
- ['EVENT', event]
212
- end
213
-
214
- def build_reaction_event(reaction, event, author)
215
- raise 'Invalid reaction' unless ['+', '-'].include?(reaction) || reaction.match?(Unicode::Emoji::REGEX)
216
- raise 'Invalid author' unless event.is_a?(String) && event.size == 64
217
- raise 'Invalid event' unless author.is_a?(String) && author.size == 64
218
-
219
- event = {
220
- "pubkey": @public_key,
221
- "created_at": Time.now.utc.to_i,
222
- "kind": 7,
223
- "tags": [['e', event], ['p', author]],
224
- "content": reaction
225
- }
226
-
227
- event = sign_event(event)
228
- ['EVENT', event]
229
- end
230
-
231
- def decrypt_dm(event)
232
- data = event[1]
233
- sender_public_key = data[:pubkey] != @public_key ? data[:pubkey] : data[:tags][0][1]
234
- encrypted = data[:content].split('?iv=')[0]
235
- iv = data[:content].split('?iv=')[1]
236
- cipher = OpenSSL::Cipher::Cipher.new('aes-256-cbc')
237
- cipher.decrypt
238
- cipher.iv = Base64.decode64(iv)
239
- cipher.key = calculate_shared_key(sender_public_key)
240
- (cipher.update(Base64.decode64(encrypted)) + cipher.final).force_encoding('UTF-8')
241
- end
242
-
243
- def build_req_event(filters)
244
- ['REQ', SecureRandom.random_number.to_s, filters]
245
- end
246
-
247
- def build_close_event(subscription_id)
248
- ['CLOSE', subscription_id]
249
- end
250
-
251
- def build_notice_event(message)
252
- ['NOTICE', message]
253
- end
254
-
255
- def match_pow_difficulty?(event_id)
256
- @pow_difficulty_target.nil? || @pow_difficulty_target == [event_id].pack("H*").unpack("B*")[0].index('1')
257
- end
258
-
259
- def set_pow_difficulty_target(n)
260
- @pow_difficulty_target = n
261
- end
262
-
263
- def test_post_event(event, relay)
264
- response = nil
265
- ws = WebSocket::Client::Simple.connect relay
266
- ws.on :message do |msg|
267
- puts msg
268
- response = JSON.parse(msg.data)
269
- ws.close
270
- end
271
- ws.on :open do
272
- ws.send event.to_json
273
- end
274
- while response.nil? do
275
- sleep 0.1
276
- end
277
- response[0] == 'OK'
278
- end
12
+ require_relative 'bech32'
13
+ require_relative 'context'
14
+ require_relative 'kind'
15
+ require_relative 'key'
16
+ require_relative 'event'
17
+ require_relative 'filter'
18
+ require_relative 'signer'
19
+ require_relative 'client'
20
+ require_relative 'message_handler'
21
+
22
+ module Nostr
279
23
 
280
24
  end
data/lib/signer.rb ADDED
@@ -0,0 +1,89 @@
1
+ module Nostr
2
+ class Signer
3
+
4
+ attr_reader :private_key
5
+ attr_reader :public_key
6
+
7
+ def initialize(private_key:)
8
+ @private_key = private_key
9
+ unless @public_key
10
+ @public_key = Nostr::Key::get_public_key(@private_key)
11
+ end
12
+ end
13
+
14
+ def nsec
15
+ Nostr::Bech32.encode_nsec(@private_key)
16
+ end
17
+
18
+ def npub
19
+ Nostr::Bech32.encode_npub(@public_key)
20
+ end
21
+
22
+ def sign(event)
23
+
24
+ raise ArgumentError, "Event is not signable" unless event.signable?
25
+
26
+ event.pubkey = @public_key if event.pubkey.nil? || event.pubkey.empty?
27
+
28
+ raise ArgumentError, "Pubkey doesn't match the private key" unless event.pubkey == @public_key
29
+
30
+ if event.kind == Nostr::Kind::DIRECT_MESSAGE
31
+ dm_recipient = event.tags.select{|t| t[0] == "p"}.first[1]
32
+ event.content = CryptoTools.aes_256_cbc_encrypt(@private_key, dm_recipient, event.content)
33
+ end
34
+
35
+ if event.delegation
36
+ event.tags << event.delegation
37
+ end
38
+
39
+ event_sha256_digest = nil
40
+ if event.pow
41
+ nonce = 1
42
+ loop do
43
+ nonce_tag = ['nonce', nonce.to_s, event.pow.to_s]
44
+ nonced_serialized_event = event.serialize.clone
45
+ nonced_serialized_event[4] = nonced_serialized_event[4] + [nonce_tag]
46
+ event_sha256_digest = Digest::SHA256.hexdigest(JSON.dump(nonced_serialized_event))
47
+ if Nostr::Event.match_pow_difficulty?(event_sha256_digest, event.pow)
48
+ event.tags << nonce_tag
49
+ break
50
+ end
51
+ nonce += 1
52
+ end
53
+ else
54
+ event_sha256_digest = Digest::SHA256.hexdigest(JSON.dump(event.serialize))
55
+ end
56
+
57
+ event.id = event_sha256_digest
58
+ binary_private_key = Array(@private_key).pack('H*')
59
+ binary_message = Array(event.id).pack('H*')
60
+ event.sig = Schnorr.sign(binary_message, binary_private_key).encode.unpack('H*')[0]
61
+ event
62
+ end
63
+
64
+ def decrypt(event)
65
+ case event.kind
66
+ when Nostr::Kind::DIRECT_MESSAGE
67
+ data = event.content.split('?iv=')[0]
68
+ iv = event.content.split('?iv=')[1]
69
+ dm_recipient = event.tags.select{|t| t[0] == "p"}.first[1]
70
+ event.content = CryptoTools.aes_256_cbc_decrypt(@private_key, dm_recipient, data, iv)
71
+ event
72
+ else
73
+ raise "Unable to decrypt a kind #{event.kind} event"
74
+ end
75
+ end
76
+
77
+ def generate_delegation_tag(to:, conditions:)
78
+ delegation_message_sha256 = Digest::SHA256.hexdigest("nostr:delegation:#{to}:#{conditions}")
79
+ signature = Schnorr.sign(Array(delegation_message_sha256).pack('H*'), Array(@private_key).pack('H*')).encode.unpack('H*')[0]
80
+ [
81
+ "delegation",
82
+ @public_key,
83
+ conditions,
84
+ signature
85
+ ]
86
+ end
87
+
88
+ end
89
+ end
data/lib/version.rb ADDED
@@ -0,0 +1,3 @@
1
+ module Nostr
2
+ VERSION = '0.3.0'
3
+ end
Binary file
data/nostr_ruby.gemspec CHANGED
@@ -1,9 +1,9 @@
1
1
  $:.unshift File.expand_path('../lib', __FILE__)
2
- require 'nostr_ruby/version'
2
+ require 'version'
3
3
 
4
4
  Gem::Specification.new do |s|
5
5
  s.name = 'nostr_ruby'
6
- s.version = NostrRuby::VERSION
6
+ s.version = Nostr::VERSION
7
7
  s.summary = 'A Ruby library to interact with the Nostr protocol'
8
8
  s.description = 'NostrRuby is a Ruby library to interact with the Nostr protocol. At this stage the focus is the creation of public events and private encrypted messages.'
9
9
  s.authors = ['Daniele Tonon']
@@ -14,9 +14,9 @@ Gem::Specification.new do |s|
14
14
  s.require_paths = ['lib']
15
15
 
16
16
  s.add_dependency 'base64', '~> 0.1.1'
17
- s.add_dependency 'bech32', '~> 1.3.0'
17
+ s.add_dependency 'bech32', '~> 1.4.0'
18
18
  s.add_dependency 'bip-schnorr', '~> 0.4.0'
19
19
  s.add_dependency 'json', '~> 2.6.2'
20
20
  s.add_dependency 'unicode-emoji', '~> 3.3.1'
21
- s.add_dependency 'websocket-client-simple', '~> 0.6.0'
21
+ s.add_dependency 'faye-websocket', '~> 0.11'
22
22
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: nostr_ruby
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.3
4
+ version: 0.3.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Daniele Tonon
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-03-10 00:00:00.000000000 Z
11
+ date: 2025-02-09 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: base64
@@ -30,14 +30,14 @@ dependencies:
30
30
  requirements:
31
31
  - - "~>"
32
32
  - !ruby/object:Gem::Version
33
- version: 1.3.0
33
+ version: 1.4.0
34
34
  type: :runtime
35
35
  prerelease: false
36
36
  version_requirements: !ruby/object:Gem::Requirement
37
37
  requirements:
38
38
  - - "~>"
39
39
  - !ruby/object:Gem::Version
40
- version: 1.3.0
40
+ version: 1.4.0
41
41
  - !ruby/object:Gem::Dependency
42
42
  name: bip-schnorr
43
43
  requirement: !ruby/object:Gem::Requirement
@@ -81,19 +81,19 @@ dependencies:
81
81
  - !ruby/object:Gem::Version
82
82
  version: 3.3.1
83
83
  - !ruby/object:Gem::Dependency
84
- name: websocket-client-simple
84
+ name: faye-websocket
85
85
  requirement: !ruby/object:Gem::Requirement
86
86
  requirements:
87
87
  - - "~>"
88
88
  - !ruby/object:Gem::Version
89
- version: 0.6.0
89
+ version: '0.11'
90
90
  type: :runtime
91
91
  prerelease: false
92
92
  version_requirements: !ruby/object:Gem::Requirement
93
93
  requirements:
94
94
  - - "~>"
95
95
  - !ruby/object:Gem::Version
96
- version: 0.6.0
96
+ version: '0.11'
97
97
  description: NostrRuby is a Ruby library to interact with the Nostr protocol. At this
98
98
  stage the focus is the creation of public events and private encrypted messages.
99
99
  email:
@@ -105,9 +105,20 @@ files:
105
105
  - Gemfile.lock
106
106
  - LICENSE.md
107
107
  - README.md
108
- - lib/custom_addr.rb
108
+ - lib/bech32.rb
109
+ - lib/client.rb
110
+ - lib/context.rb
111
+ - lib/crypto_tools.rb
112
+ - lib/event.rb
113
+ - lib/event_wizard.rb
114
+ - lib/filter.rb
115
+ - lib/key.rb
116
+ - lib/kind.rb
117
+ - lib/message_handler.rb
109
118
  - lib/nostr_ruby.rb
110
- - lib/nostr_ruby/version.rb
119
+ - lib/signer.rb
120
+ - lib/version.rb
121
+ - nostr_ruby-0.2.0.gem
111
122
  - nostr_ruby.gemspec
112
123
  homepage: https://github.com/dtonon/nostr-ruby
113
124
  licenses:
data/lib/custom_addr.rb DELETED
@@ -1,59 +0,0 @@
1
- class CustomAddr
2
-
3
- attr_accessor :hrp # human-readable part
4
- attr_accessor :prog # witness program
5
-
6
- def initialize(addr = nil)
7
- @hrp, @prog = parse_addr(addr) if addr
8
- end
9
-
10
- def to_scriptpubkey
11
- prog.map{|p|[p].pack("C")}.join.unpack('H*').first
12
- end
13
-
14
- def scriptpubkey=(script)
15
- values = [script].pack('H*').unpack("C*")
16
- @prog = values
17
- end
18
-
19
- def addr
20
- spec = Bech32::Encoding::BECH32
21
- Bech32.encode(hrp, convert_bits(prog, 8, 5), spec)
22
- end
23
-
24
- private
25
-
26
- def parse_addr(addr)
27
- hrp, data, spec = Bech32.decode(addr)
28
- raise 'Invalid address.' if hrp.nil? || data[0].nil?
29
- # raise 'Invalid witness version' if ver > 16
30
- prog = convert_bits(data, 5, 8, false)
31
- # raise 'Invalid witness program' if prog.nil? || prog.length < 2 || prog.length > 40
32
- # raise 'Invalid witness program with version 0' if ver == 0 && (prog.length != 20 && prog.length != 32)
33
- [hrp, prog]
34
- end
35
-
36
- def convert_bits(data, from, to, padding=true)
37
- acc = 0
38
- bits = 0
39
- ret = []
40
- maxv = (1 << to) - 1
41
- max_acc = (1 << (from + to - 1)) - 1
42
- data.each do |v|
43
- return nil if v < 0 || (v >> from) != 0
44
- acc = ((acc << from) | v) & max_acc
45
- bits += from
46
- while bits >= to
47
- bits -= to
48
- ret << ((acc >> bits) & maxv)
49
- end
50
- end
51
- if padding
52
- ret << ((acc << (to - bits)) & maxv) unless bits == 0
53
- elsif bits >= from || ((acc << (to - bits)) & maxv) != 0
54
- return nil
55
- end
56
- ret
57
- end
58
-
59
- end
@@ -1,3 +0,0 @@
1
- module NostrRuby
2
- VERSION = '0.1.3'
3
- end