nostr_ruby 0.1.3 → 0.3.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/Gemfile.lock +11 -9
- data/README.md +286 -123
- data/lib/bech32.rb +84 -0
- data/lib/client.rb +184 -0
- data/lib/context.rb +48 -0
- data/lib/crypto_tools.rb +31 -0
- data/lib/event.rb +188 -0
- data/lib/event_wizard.rb +31 -0
- data/lib/filter.rb +57 -0
- data/lib/key.rb +15 -0
- data/lib/kind.rb +10 -0
- data/lib/message_handler.rb +107 -0
- data/lib/nostr_ruby.rb +14 -270
- data/lib/signer.rb +89 -0
- data/lib/version.rb +3 -0
- data/nostr_ruby-0.2.0.gem +0 -0
- data/nostr_ruby.gemspec +4 -4
- metadata +20 -9
- data/lib/custom_addr.rb +0 -59
- data/lib/nostr_ruby/version.rb +0 -3
data/lib/nostr_ruby.rb
CHANGED
@@ -1,4 +1,6 @@
|
|
1
|
-
|
1
|
+
require_relative 'version'
|
2
|
+
require_relative 'crypto_tools'
|
3
|
+
|
2
4
|
require 'ecdsa'
|
3
5
|
require 'schnorr'
|
4
6
|
require 'json'
|
@@ -7,274 +9,16 @@ require 'bech32'
|
|
7
9
|
require 'unicode/emoji'
|
8
10
|
require 'websocket-client-simple'
|
9
11
|
|
10
|
-
|
11
|
-
|
12
|
-
|
13
|
-
|
14
|
-
|
15
|
-
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
|
20
|
-
|
21
|
-
|
22
|
-
hex_public_key = if key[:public_key]&.include?('npub')
|
23
|
-
Nostr.to_hex(key[:public_key])
|
24
|
-
else
|
25
|
-
key[:public_key]
|
26
|
-
end
|
27
|
-
|
28
|
-
if hex_private_key
|
29
|
-
@private_key = hex_private_key
|
30
|
-
group = ECDSA::Group::Secp256k1
|
31
|
-
@public_key = group.generator.multiply_by_scalar(private_key.to_i(16)).x.to_s(16).rjust(64, '0')
|
32
|
-
elsif hex_public_key
|
33
|
-
@public_key = hex_public_key
|
34
|
-
else
|
35
|
-
raise 'Missing private or public key'
|
36
|
-
end
|
37
|
-
end
|
38
|
-
|
39
|
-
def keys
|
40
|
-
keys = { public_key: @public_key }
|
41
|
-
keys[:private_key] = @private_key if @private_key
|
42
|
-
keys
|
43
|
-
end
|
44
|
-
|
45
|
-
def bech32_keys
|
46
|
-
bech32_keys = { public_key: Nostr.to_bech32(@public_key, 'npub') }
|
47
|
-
bech32_keys[:private_key] = Nostr.to_bech32(@private_key, 'nsec') if @private_key
|
48
|
-
bech32_keys
|
49
|
-
end
|
50
|
-
|
51
|
-
def self.to_hex(bech32_key)
|
52
|
-
public_addr = CustomAddr.new(bech32_key)
|
53
|
-
public_addr.to_scriptpubkey
|
54
|
-
end
|
55
|
-
|
56
|
-
def self.to_bech32(hex_key, hrp)
|
57
|
-
custom_addr = CustomAddr.new
|
58
|
-
custom_addr.scriptpubkey = hex_key
|
59
|
-
custom_addr.hrp = hrp
|
60
|
-
custom_addr.addr
|
61
|
-
end
|
62
|
-
|
63
|
-
def calculate_shared_key(other_public_key)
|
64
|
-
ec = OpenSSL::PKey::EC.new('secp256k1')
|
65
|
-
ec.private_key = OpenSSL::BN.new(@private_key, 16)
|
66
|
-
recipient_key_hex = "02#{other_public_key}"
|
67
|
-
recipient_pub_bn = OpenSSL::BN.new(recipient_key_hex, 16)
|
68
|
-
secret_point = OpenSSL::PKey::EC::Point.new(ec.group, recipient_pub_bn)
|
69
|
-
ec.dh_compute_key(secret_point)
|
70
|
-
end
|
71
|
-
|
72
|
-
def sign_event(event)
|
73
|
-
raise 'Invalid pubkey' unless event[:pubkey].is_a?(String) && event[:pubkey].size == 64
|
74
|
-
raise 'Invalid created_at' unless event[:created_at].is_a?(Integer)
|
75
|
-
raise 'Invalid kind' unless (0..29_999).include?(event[:kind])
|
76
|
-
raise 'Invalid tags' unless event[:tags].is_a?(Array)
|
77
|
-
raise 'Invalid content' unless event[:content].is_a?(String)
|
78
|
-
|
79
|
-
serialized_event = [
|
80
|
-
0,
|
81
|
-
event[:pubkey],
|
82
|
-
event[:created_at],
|
83
|
-
event[:kind],
|
84
|
-
event[:tags],
|
85
|
-
event[:content]
|
86
|
-
]
|
87
|
-
|
88
|
-
serialized_event_sha256 = nil
|
89
|
-
if @pow_difficulty_target
|
90
|
-
nonce = 1
|
91
|
-
loop do
|
92
|
-
nonce_tag = ['nonce', nonce.to_s, @pow_difficulty_target.to_s]
|
93
|
-
nonced_serialized_event = serialized_event.clone
|
94
|
-
nonced_serialized_event[4] = nonced_serialized_event[4] + [nonce_tag]
|
95
|
-
serialized_event_sha256 = Digest::SHA256.hexdigest(JSON.dump(nonced_serialized_event))
|
96
|
-
if match_pow_difficulty?(serialized_event_sha256)
|
97
|
-
event[:tags] << nonce_tag
|
98
|
-
break
|
99
|
-
end
|
100
|
-
nonce += 1
|
101
|
-
end
|
102
|
-
else
|
103
|
-
serialized_event_sha256 = Digest::SHA256.hexdigest(JSON.dump(serialized_event))
|
104
|
-
end
|
105
|
-
|
106
|
-
private_key = Array(@private_key).pack('H*')
|
107
|
-
message = Array(serialized_event_sha256).pack('H*')
|
108
|
-
event_signature = Schnorr.sign(message, private_key).encode.unpack('H*')[0]
|
109
|
-
|
110
|
-
event['id'] = serialized_event_sha256
|
111
|
-
event['sig'] = event_signature
|
112
|
-
event
|
113
|
-
end
|
114
|
-
|
115
|
-
def build_event(payload)
|
116
|
-
event = sign_event(payload)
|
117
|
-
['EVENT', event]
|
118
|
-
end
|
119
|
-
|
120
|
-
def build_metadata_event(name, about, picture, nip05)
|
121
|
-
data = {}
|
122
|
-
data[:name] = name if name
|
123
|
-
data[:about] = about if about
|
124
|
-
data[:picture] = picture if picture
|
125
|
-
data[:nip05] = nip05 if nip05
|
126
|
-
event = {
|
127
|
-
"pubkey": @public_key,
|
128
|
-
"created_at": Time.now.utc.to_i,
|
129
|
-
"kind": 0,
|
130
|
-
"tags": [],
|
131
|
-
"content": data.to_json
|
132
|
-
}
|
133
|
-
|
134
|
-
event = sign_event(event)
|
135
|
-
['EVENT', event]
|
136
|
-
end
|
137
|
-
|
138
|
-
def build_note_event(text, channel_key = nil)
|
139
|
-
event = {
|
140
|
-
"pubkey": @public_key,
|
141
|
-
"created_at": Time.now.utc.to_i,
|
142
|
-
"kind": channel_key ? 42 : 1,
|
143
|
-
"tags": channel_key ? [['e', channel_key]] : [],
|
144
|
-
"content": text
|
145
|
-
}
|
146
|
-
|
147
|
-
event = sign_event(event)
|
148
|
-
['EVENT', event]
|
149
|
-
end
|
150
|
-
|
151
|
-
def build_recommended_relay_event(relay)
|
152
|
-
raise 'Invalid relay' unless relay.start_with?('wss://') || relay.start_with?('ws://')
|
153
|
-
|
154
|
-
event = {
|
155
|
-
"pubkey": @public_key,
|
156
|
-
"created_at": Time.now.utc.to_i,
|
157
|
-
"kind": 2,
|
158
|
-
"tags": [],
|
159
|
-
"content": relay
|
160
|
-
}
|
161
|
-
|
162
|
-
event = sign_event(event)
|
163
|
-
['EVENT', event]
|
164
|
-
end
|
165
|
-
|
166
|
-
def build_contact_list_event(contacts)
|
167
|
-
event = {
|
168
|
-
"pubkey": @public_key,
|
169
|
-
"created_at": Time.now.utc.to_i,
|
170
|
-
"kind": 3,
|
171
|
-
"tags": contacts.map { |c| ['p'] + c },
|
172
|
-
"content": ''
|
173
|
-
}
|
174
|
-
|
175
|
-
event = sign_event(event)
|
176
|
-
['EVENT', event]
|
177
|
-
end
|
178
|
-
|
179
|
-
def build_dm_event(text, recipient_public_key)
|
180
|
-
cipher = OpenSSL::Cipher::Cipher.new('aes-256-cbc')
|
181
|
-
cipher.encrypt
|
182
|
-
cipher.iv = iv = cipher.random_iv
|
183
|
-
cipher.key = calculate_shared_key(recipient_public_key)
|
184
|
-
encrypted_text = cipher.update(text)
|
185
|
-
encrypted_text << cipher.final
|
186
|
-
encrypted_text = "#{Base64.encode64(encrypted_text)}?iv=#{Base64.encode64(iv)}"
|
187
|
-
encrypted_text = encrypted_text.gsub("\n", '')
|
188
|
-
|
189
|
-
event = {
|
190
|
-
"pubkey": @public_key,
|
191
|
-
"created_at": Time.now.utc.to_i,
|
192
|
-
"kind": 4,
|
193
|
-
"tags": [['p', recipient_public_key]],
|
194
|
-
"content": encrypted_text
|
195
|
-
}
|
196
|
-
|
197
|
-
event = sign_event(event)
|
198
|
-
['EVENT', event]
|
199
|
-
end
|
200
|
-
|
201
|
-
def build_deletion_event(events, reason = '')
|
202
|
-
event = {
|
203
|
-
"pubkey": @public_key,
|
204
|
-
"created_at": Time.now.utc.to_i,
|
205
|
-
"kind": 5,
|
206
|
-
"tags": events.map{ |e| ['e', e] },
|
207
|
-
"content": reason
|
208
|
-
}
|
209
|
-
|
210
|
-
event = sign_event(event)
|
211
|
-
['EVENT', event]
|
212
|
-
end
|
213
|
-
|
214
|
-
def build_reaction_event(reaction, event, author)
|
215
|
-
raise 'Invalid reaction' unless ['+', '-'].include?(reaction) || reaction.match?(Unicode::Emoji::REGEX)
|
216
|
-
raise 'Invalid author' unless event.is_a?(String) && event.size == 64
|
217
|
-
raise 'Invalid event' unless author.is_a?(String) && author.size == 64
|
218
|
-
|
219
|
-
event = {
|
220
|
-
"pubkey": @public_key,
|
221
|
-
"created_at": Time.now.utc.to_i,
|
222
|
-
"kind": 7,
|
223
|
-
"tags": [['e', event], ['p', author]],
|
224
|
-
"content": reaction
|
225
|
-
}
|
226
|
-
|
227
|
-
event = sign_event(event)
|
228
|
-
['EVENT', event]
|
229
|
-
end
|
230
|
-
|
231
|
-
def decrypt_dm(event)
|
232
|
-
data = event[1]
|
233
|
-
sender_public_key = data[:pubkey] != @public_key ? data[:pubkey] : data[:tags][0][1]
|
234
|
-
encrypted = data[:content].split('?iv=')[0]
|
235
|
-
iv = data[:content].split('?iv=')[1]
|
236
|
-
cipher = OpenSSL::Cipher::Cipher.new('aes-256-cbc')
|
237
|
-
cipher.decrypt
|
238
|
-
cipher.iv = Base64.decode64(iv)
|
239
|
-
cipher.key = calculate_shared_key(sender_public_key)
|
240
|
-
(cipher.update(Base64.decode64(encrypted)) + cipher.final).force_encoding('UTF-8')
|
241
|
-
end
|
242
|
-
|
243
|
-
def build_req_event(filters)
|
244
|
-
['REQ', SecureRandom.random_number.to_s, filters]
|
245
|
-
end
|
246
|
-
|
247
|
-
def build_close_event(subscription_id)
|
248
|
-
['CLOSE', subscription_id]
|
249
|
-
end
|
250
|
-
|
251
|
-
def build_notice_event(message)
|
252
|
-
['NOTICE', message]
|
253
|
-
end
|
254
|
-
|
255
|
-
def match_pow_difficulty?(event_id)
|
256
|
-
@pow_difficulty_target.nil? || @pow_difficulty_target == [event_id].pack("H*").unpack("B*")[0].index('1')
|
257
|
-
end
|
258
|
-
|
259
|
-
def set_pow_difficulty_target(n)
|
260
|
-
@pow_difficulty_target = n
|
261
|
-
end
|
262
|
-
|
263
|
-
def test_post_event(event, relay)
|
264
|
-
response = nil
|
265
|
-
ws = WebSocket::Client::Simple.connect relay
|
266
|
-
ws.on :message do |msg|
|
267
|
-
puts msg
|
268
|
-
response = JSON.parse(msg.data)
|
269
|
-
ws.close
|
270
|
-
end
|
271
|
-
ws.on :open do
|
272
|
-
ws.send event.to_json
|
273
|
-
end
|
274
|
-
while response.nil? do
|
275
|
-
sleep 0.1
|
276
|
-
end
|
277
|
-
response[0] == 'OK'
|
278
|
-
end
|
12
|
+
require_relative 'bech32'
|
13
|
+
require_relative 'context'
|
14
|
+
require_relative 'kind'
|
15
|
+
require_relative 'key'
|
16
|
+
require_relative 'event'
|
17
|
+
require_relative 'filter'
|
18
|
+
require_relative 'signer'
|
19
|
+
require_relative 'client'
|
20
|
+
require_relative 'message_handler'
|
21
|
+
|
22
|
+
module Nostr
|
279
23
|
|
280
24
|
end
|
data/lib/signer.rb
ADDED
@@ -0,0 +1,89 @@
|
|
1
|
+
module Nostr
|
2
|
+
class Signer
|
3
|
+
|
4
|
+
attr_reader :private_key
|
5
|
+
attr_reader :public_key
|
6
|
+
|
7
|
+
def initialize(private_key:)
|
8
|
+
@private_key = private_key
|
9
|
+
unless @public_key
|
10
|
+
@public_key = Nostr::Key::get_public_key(@private_key)
|
11
|
+
end
|
12
|
+
end
|
13
|
+
|
14
|
+
def nsec
|
15
|
+
Nostr::Bech32.encode_nsec(@private_key)
|
16
|
+
end
|
17
|
+
|
18
|
+
def npub
|
19
|
+
Nostr::Bech32.encode_npub(@public_key)
|
20
|
+
end
|
21
|
+
|
22
|
+
def sign(event)
|
23
|
+
|
24
|
+
raise ArgumentError, "Event is not signable" unless event.signable?
|
25
|
+
|
26
|
+
event.pubkey = @public_key if event.pubkey.nil? || event.pubkey.empty?
|
27
|
+
|
28
|
+
raise ArgumentError, "Pubkey doesn't match the private key" unless event.pubkey == @public_key
|
29
|
+
|
30
|
+
if event.kind == Nostr::Kind::DIRECT_MESSAGE
|
31
|
+
dm_recipient = event.tags.select{|t| t[0] == "p"}.first[1]
|
32
|
+
event.content = CryptoTools.aes_256_cbc_encrypt(@private_key, dm_recipient, event.content)
|
33
|
+
end
|
34
|
+
|
35
|
+
if event.delegation
|
36
|
+
event.tags << event.delegation
|
37
|
+
end
|
38
|
+
|
39
|
+
event_sha256_digest = nil
|
40
|
+
if event.pow
|
41
|
+
nonce = 1
|
42
|
+
loop do
|
43
|
+
nonce_tag = ['nonce', nonce.to_s, event.pow.to_s]
|
44
|
+
nonced_serialized_event = event.serialize.clone
|
45
|
+
nonced_serialized_event[4] = nonced_serialized_event[4] + [nonce_tag]
|
46
|
+
event_sha256_digest = Digest::SHA256.hexdigest(JSON.dump(nonced_serialized_event))
|
47
|
+
if Nostr::Event.match_pow_difficulty?(event_sha256_digest, event.pow)
|
48
|
+
event.tags << nonce_tag
|
49
|
+
break
|
50
|
+
end
|
51
|
+
nonce += 1
|
52
|
+
end
|
53
|
+
else
|
54
|
+
event_sha256_digest = Digest::SHA256.hexdigest(JSON.dump(event.serialize))
|
55
|
+
end
|
56
|
+
|
57
|
+
event.id = event_sha256_digest
|
58
|
+
binary_private_key = Array(@private_key).pack('H*')
|
59
|
+
binary_message = Array(event.id).pack('H*')
|
60
|
+
event.sig = Schnorr.sign(binary_message, binary_private_key).encode.unpack('H*')[0]
|
61
|
+
event
|
62
|
+
end
|
63
|
+
|
64
|
+
def decrypt(event)
|
65
|
+
case event.kind
|
66
|
+
when Nostr::Kind::DIRECT_MESSAGE
|
67
|
+
data = event.content.split('?iv=')[0]
|
68
|
+
iv = event.content.split('?iv=')[1]
|
69
|
+
dm_recipient = event.tags.select{|t| t[0] == "p"}.first[1]
|
70
|
+
event.content = CryptoTools.aes_256_cbc_decrypt(@private_key, dm_recipient, data, iv)
|
71
|
+
event
|
72
|
+
else
|
73
|
+
raise "Unable to decrypt a kind #{event.kind} event"
|
74
|
+
end
|
75
|
+
end
|
76
|
+
|
77
|
+
def generate_delegation_tag(to:, conditions:)
|
78
|
+
delegation_message_sha256 = Digest::SHA256.hexdigest("nostr:delegation:#{to}:#{conditions}")
|
79
|
+
signature = Schnorr.sign(Array(delegation_message_sha256).pack('H*'), Array(@private_key).pack('H*')).encode.unpack('H*')[0]
|
80
|
+
[
|
81
|
+
"delegation",
|
82
|
+
@public_key,
|
83
|
+
conditions,
|
84
|
+
signature
|
85
|
+
]
|
86
|
+
end
|
87
|
+
|
88
|
+
end
|
89
|
+
end
|
data/lib/version.rb
ADDED
Binary file
|
data/nostr_ruby.gemspec
CHANGED
@@ -1,9 +1,9 @@
|
|
1
1
|
$:.unshift File.expand_path('../lib', __FILE__)
|
2
|
-
require '
|
2
|
+
require 'version'
|
3
3
|
|
4
4
|
Gem::Specification.new do |s|
|
5
5
|
s.name = 'nostr_ruby'
|
6
|
-
s.version =
|
6
|
+
s.version = Nostr::VERSION
|
7
7
|
s.summary = 'A Ruby library to interact with the Nostr protocol'
|
8
8
|
s.description = 'NostrRuby is a Ruby library to interact with the Nostr protocol. At this stage the focus is the creation of public events and private encrypted messages.'
|
9
9
|
s.authors = ['Daniele Tonon']
|
@@ -14,9 +14,9 @@ Gem::Specification.new do |s|
|
|
14
14
|
s.require_paths = ['lib']
|
15
15
|
|
16
16
|
s.add_dependency 'base64', '~> 0.1.1'
|
17
|
-
s.add_dependency 'bech32', '~> 1.
|
17
|
+
s.add_dependency 'bech32', '~> 1.4.0'
|
18
18
|
s.add_dependency 'bip-schnorr', '~> 0.4.0'
|
19
19
|
s.add_dependency 'json', '~> 2.6.2'
|
20
20
|
s.add_dependency 'unicode-emoji', '~> 3.3.1'
|
21
|
-
s.add_dependency 'websocket
|
21
|
+
s.add_dependency 'faye-websocket', '~> 0.11'
|
22
22
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: nostr_ruby
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.3.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Daniele Tonon
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2025-02-09 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: base64
|
@@ -30,14 +30,14 @@ dependencies:
|
|
30
30
|
requirements:
|
31
31
|
- - "~>"
|
32
32
|
- !ruby/object:Gem::Version
|
33
|
-
version: 1.
|
33
|
+
version: 1.4.0
|
34
34
|
type: :runtime
|
35
35
|
prerelease: false
|
36
36
|
version_requirements: !ruby/object:Gem::Requirement
|
37
37
|
requirements:
|
38
38
|
- - "~>"
|
39
39
|
- !ruby/object:Gem::Version
|
40
|
-
version: 1.
|
40
|
+
version: 1.4.0
|
41
41
|
- !ruby/object:Gem::Dependency
|
42
42
|
name: bip-schnorr
|
43
43
|
requirement: !ruby/object:Gem::Requirement
|
@@ -81,19 +81,19 @@ dependencies:
|
|
81
81
|
- !ruby/object:Gem::Version
|
82
82
|
version: 3.3.1
|
83
83
|
- !ruby/object:Gem::Dependency
|
84
|
-
name: websocket
|
84
|
+
name: faye-websocket
|
85
85
|
requirement: !ruby/object:Gem::Requirement
|
86
86
|
requirements:
|
87
87
|
- - "~>"
|
88
88
|
- !ruby/object:Gem::Version
|
89
|
-
version: 0.
|
89
|
+
version: '0.11'
|
90
90
|
type: :runtime
|
91
91
|
prerelease: false
|
92
92
|
version_requirements: !ruby/object:Gem::Requirement
|
93
93
|
requirements:
|
94
94
|
- - "~>"
|
95
95
|
- !ruby/object:Gem::Version
|
96
|
-
version: 0.
|
96
|
+
version: '0.11'
|
97
97
|
description: NostrRuby is a Ruby library to interact with the Nostr protocol. At this
|
98
98
|
stage the focus is the creation of public events and private encrypted messages.
|
99
99
|
email:
|
@@ -105,9 +105,20 @@ files:
|
|
105
105
|
- Gemfile.lock
|
106
106
|
- LICENSE.md
|
107
107
|
- README.md
|
108
|
-
- lib/
|
108
|
+
- lib/bech32.rb
|
109
|
+
- lib/client.rb
|
110
|
+
- lib/context.rb
|
111
|
+
- lib/crypto_tools.rb
|
112
|
+
- lib/event.rb
|
113
|
+
- lib/event_wizard.rb
|
114
|
+
- lib/filter.rb
|
115
|
+
- lib/key.rb
|
116
|
+
- lib/kind.rb
|
117
|
+
- lib/message_handler.rb
|
109
118
|
- lib/nostr_ruby.rb
|
110
|
-
- lib/
|
119
|
+
- lib/signer.rb
|
120
|
+
- lib/version.rb
|
121
|
+
- nostr_ruby-0.2.0.gem
|
111
122
|
- nostr_ruby.gemspec
|
112
123
|
homepage: https://github.com/dtonon/nostr-ruby
|
113
124
|
licenses:
|
data/lib/custom_addr.rb
DELETED
@@ -1,59 +0,0 @@
|
|
1
|
-
class CustomAddr
|
2
|
-
|
3
|
-
attr_accessor :hrp # human-readable part
|
4
|
-
attr_accessor :prog # witness program
|
5
|
-
|
6
|
-
def initialize(addr = nil)
|
7
|
-
@hrp, @prog = parse_addr(addr) if addr
|
8
|
-
end
|
9
|
-
|
10
|
-
def to_scriptpubkey
|
11
|
-
prog.map{|p|[p].pack("C")}.join.unpack('H*').first
|
12
|
-
end
|
13
|
-
|
14
|
-
def scriptpubkey=(script)
|
15
|
-
values = [script].pack('H*').unpack("C*")
|
16
|
-
@prog = values
|
17
|
-
end
|
18
|
-
|
19
|
-
def addr
|
20
|
-
spec = Bech32::Encoding::BECH32
|
21
|
-
Bech32.encode(hrp, convert_bits(prog, 8, 5), spec)
|
22
|
-
end
|
23
|
-
|
24
|
-
private
|
25
|
-
|
26
|
-
def parse_addr(addr)
|
27
|
-
hrp, data, spec = Bech32.decode(addr)
|
28
|
-
raise 'Invalid address.' if hrp.nil? || data[0].nil?
|
29
|
-
# raise 'Invalid witness version' if ver > 16
|
30
|
-
prog = convert_bits(data, 5, 8, false)
|
31
|
-
# raise 'Invalid witness program' if prog.nil? || prog.length < 2 || prog.length > 40
|
32
|
-
# raise 'Invalid witness program with version 0' if ver == 0 && (prog.length != 20 && prog.length != 32)
|
33
|
-
[hrp, prog]
|
34
|
-
end
|
35
|
-
|
36
|
-
def convert_bits(data, from, to, padding=true)
|
37
|
-
acc = 0
|
38
|
-
bits = 0
|
39
|
-
ret = []
|
40
|
-
maxv = (1 << to) - 1
|
41
|
-
max_acc = (1 << (from + to - 1)) - 1
|
42
|
-
data.each do |v|
|
43
|
-
return nil if v < 0 || (v >> from) != 0
|
44
|
-
acc = ((acc << from) | v) & max_acc
|
45
|
-
bits += from
|
46
|
-
while bits >= to
|
47
|
-
bits -= to
|
48
|
-
ret << ((acc >> bits) & maxv)
|
49
|
-
end
|
50
|
-
end
|
51
|
-
if padding
|
52
|
-
ret << ((acc << (to - bits)) & maxv) unless bits == 0
|
53
|
-
elsif bits >= from || ((acc << (to - bits)) & maxv) != 0
|
54
|
-
return nil
|
55
|
-
end
|
56
|
-
ret
|
57
|
-
end
|
58
|
-
|
59
|
-
end
|
data/lib/nostr_ruby/version.rb
DELETED