Compare commits

..

18 Commits

Author SHA1 Message Date
fiatjaf
5429142858 v2.3.2 2024-03-16 13:41:10 -03:00
fiatjaf
564c9bca17 don't try to send a ["CLOSE"] after the websocket is closed.
addresses https://github.com/nbd-wtf/nostr-tools/pull/387
2024-03-16 13:40:02 -03:00
fiatjaf
0190ae94a7 Revert "fix: error thrown on ws close"
This reverts commit e1bde08ff3.
2024-03-16 13:32:33 -03:00
Jeffrey Ko
e1bde08ff3 fix: error thrown on ws close 2024-03-16 13:29:24 -03:00
Alex Gleason
71456feb20 jsr: explicit exports 2024-03-13 00:17:07 -03:00
Alex Gleason
ca928c697b publish: --allow-slow-types for now 2024-03-11 15:15:41 -05:00
Alex Gleason
7b98cae7fa Merge pull request #382 from alexgleason/bundle-resolution
tsconfig: moduleResolution Bundler
2024-03-11 14:47:27 -05:00
Alex Gleason
db53f37161 tsconfig: moduleResolution Bundler 2024-03-11 14:22:11 -05:00
Alex Gleason
1691f0b51d Merge pull request #381 from nbd-wtf/alexgleason-patch-1
publish: bun i
2024-03-11 13:00:14 -05:00
Alex Gleason
3b582a0206 publish: bun i 2024-03-11 12:59:36 -05:00
Alex Gleason
8ed2c13c28 Publish to JSR with GitHub actions 2024-03-11 14:20:19 -03:00
Alex Gleason
27a536f41d NIP44: fix slow types 2024-03-11 14:18:51 -03:00
Alex Gleason
fbc82d0b73 Prepare for JSR publishing 2024-03-07 07:26:16 -03:00
Alex Gleason
9c0ade1329 Fix (most) slow types by adding explicit return types 2024-03-07 07:22:44 -03:00
fiatjaf
63ccc8b4c8 v2.3.1 2024-02-19 18:54:40 -03:00
fiatjaf
7cf7df88db nip46: skip duplicates on fetchBunkerProviders (prev fetchCustodialBunkers). 2024-02-19 18:54:18 -03:00
fiatjaf
bded539122 nip46: fix messages being ignored after auth_url. 2024-02-19 18:53:48 -03:00
fiatjaf
3647bbd68a get rid of the last vestiges of webcrypto dependencies. 2024-02-17 18:29:01 -03:00
21 changed files with 174 additions and 92 deletions

18
.github/workflows/publish.yml vendored Normal file
View File

@@ -0,0 +1,18 @@
name: Publish
on:
push:
branches:
- master
jobs:
publish:
runs-on: ubuntu-latest
permissions:
contents: read
id-token: write # The OIDC ID token is used for authentication with JSR.
steps:
- uses: actions/checkout@v4
- uses: oven-sh/setup-bun@v1
- run: bun i
- run: npx jsr publish --allow-slow-types

View File

@@ -266,4 +266,8 @@ This is free and unencumbered software released into the public domain. By submi
## Contributing to this repository ## Contributing to this repository
Use NIP-34 to send your patches to `naddr1qq9kummnw3ez6ar0dak8xqg5waehxw309aex2mrp0yhxummnw3ezucn8qyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqpzemhxue69uhhyetvv9ujuurjd9kkzmpwdejhgq3q80cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsxpqqqpmejdv00jq`. Use NIP-34 to send your patches to:
```
naddr1qq9kummnw3ez6ar0dak8xqg5waehxw309aex2mrp0yhxummnw3ezucn8qyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqpzemhxue69uhhyetvv9ujuurjd9kkzmpwdejhgq3q80cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsxpqqqpmejdv00jq
```

View File

@@ -15,11 +15,11 @@ export type SubscribeManyParams = Omit<SubscriptionParams, 'onclose' | 'id'> & {
export class AbstractSimplePool { export class AbstractSimplePool {
private relays = new Map<string, AbstractRelay>() private relays = new Map<string, AbstractRelay>()
public seenOn = new Map<string, Set<AbstractRelay>>() public seenOn: Map<string, Set<AbstractRelay>> = new Map()
public trackRelays: boolean = false public trackRelays: boolean = false
public verifyEvent: Nostr['verifyEvent'] public verifyEvent: Nostr['verifyEvent']
public trustedRelayURLs = new Set<string>() public trustedRelayURLs: Set<string> = new Set()
constructor(opts: { verifyEvent: Nostr['verifyEvent'] }) { constructor(opts: { verifyEvent: Nostr['verifyEvent'] }) {
this.verifyEvent = opts.verifyEvent this.verifyEvent = opts.verifyEvent

View File

@@ -26,7 +26,7 @@ export class AbstractRelay {
public baseEoseTimeout: number = 4400 public baseEoseTimeout: number = 4400
public connectionTimeout: number = 4400 public connectionTimeout: number = 4400
public openSubs = new Map<string, Subscription>() public openSubs: Map<string, Subscription> = new Map()
private connectionTimeoutHandle: ReturnType<typeof setTimeout> | undefined private connectionTimeoutHandle: ReturnType<typeof setTimeout> | undefined
private connectionPromise: Promise<void> | undefined private connectionPromise: Promise<void> | undefined
@@ -44,7 +44,7 @@ export class AbstractRelay {
this.verifyEvent = opts.verifyEvent this.verifyEvent = opts.verifyEvent
} }
static async connect(url: string, opts: { verifyEvent: Nostr['verifyEvent'] }) { static async connect(url: string, opts: { verifyEvent: Nostr['verifyEvent'] }): Promise<AbstractRelay> {
const relay = new AbstractRelay(url, opts) const relay = new AbstractRelay(url, opts)
await relay.connect() await relay.connect()
return relay return relay
@@ -99,17 +99,20 @@ export class AbstractRelay {
this.ws.onerror = ev => { this.ws.onerror = ev => {
reject((ev as any).message) reject((ev as any).message)
if (this._connected) { if (this._connected) {
this._connected = false
this.connectionPromise = undefined
this.onclose?.() this.onclose?.()
this.closeAllSubscriptions('relay connection errored') this.closeAllSubscriptions('relay connection errored')
this._connected = false
} }
} }
this.ws.onclose = async () => { this.ws.onclose = async () => {
if (this._connected) {
this._connected = false
this.connectionPromise = undefined this.connectionPromise = undefined
this.onclose?.() this.onclose?.()
this.closeAllSubscriptions('relay connection closed') this.closeAllSubscriptions('relay connection closed')
this._connected = false }
} }
this.ws.onmessage = this._onmessage.bind(this) this.ws.onmessage = this._onmessage.bind(this)
@@ -228,7 +231,7 @@ export class AbstractRelay {
}) })
} }
public async auth(signAuthEvent: (evt: EventTemplate) => Promise<VerifiedEvent>) { public async auth(signAuthEvent: (evt: EventTemplate) => Promise<VerifiedEvent>): Promise<string> {
if (!this.challenge) throw new Error("can't perform auth, no challenge was received") if (!this.challenge) throw new Error("can't perform auth, no challenge was received")
const evt = await signAuthEvent(makeAuthEvent(this.url, this.challenge)) const evt = await signAuthEvent(makeAuthEvent(this.url, this.challenge))
const ret = new Promise<string>((resolve, reject) => { const ret = new Promise<string>((resolve, reject) => {
@@ -338,7 +341,7 @@ export class Subscription {
} }
public close(reason: string = 'closed by caller') { public close(reason: string = 'closed by caller') {
if (!this.closed) { if (!this.closed && this.relay.connected) {
// if the connection was closed by the user calling .close() we will send a CLOSE message // if the connection was closed by the user calling .close() we will send a CLOSE message
// otherwise this._open will be already set to false so we will skip this // otherwise this._open will be already set to false so we will skip this
this.relay.send('["CLOSE",' + JSON.stringify(this.id) + ']') this.relay.send('["CLOSE",' + JSON.stringify(this.id) + ']')

BIN
bun.lockb

Binary file not shown.

44
jsr.json Normal file
View File

@@ -0,0 +1,44 @@
{
"name": "@nostr/tools",
"version": "2.3.1",
"exports": {
".": "./index.ts",
"./core": "./core.ts",
"./pure": "./pure.ts",
"./wasm": "./wasm.ts",
"./kinds": "./kinds.ts",
"./filter": "./filter.ts",
"./abstract-relay": "./abstract-relay.ts",
"./relay": "./relay.ts",
"./abstract-pool": "./abstract-pool.ts",
"./pool": "./pool.ts",
"./references": "./references.ts",
"./nip04": "./nip04.ts",
"./nip05": "./nip05.ts",
"./nip06": "./nip06.ts",
"./nip10": "./nip10.ts",
"./nip11": "./nip11.ts",
"./nip13": "./nip13.ts",
"./nip18": "./nip18.ts",
"./nip19": "./nip19.ts",
"./nip21": "./nip21.ts",
"./nip25": "./nip25.ts",
"./nip27": "./nip27.ts",
"./nip28": "./nip28.ts",
"./nip29": "./nip29.ts",
"./nip30": "./nip30.ts",
"./nip39": "./nip39.ts",
"./nip42": "./nip42.ts",
"./nip44": "./nip44.ts",
"./nip46": "./nip46.ts",
"./nip49": "./nip49.ts",
"./nip57": "./nip57.ts",
"./nip75": "./nip75.ts",
"./nip94": "./nip94.ts",
"./nip96": "./nip96.ts",
"./nip98": "./nip98.ts",
"./nip99": "./nip99.ts",
"./fakejson": "./fakejson.ts",
"./utils": "./utils.ts"
}
}

View File

@@ -1,20 +1,20 @@
/** Events are **regular**, which means they're all expected to be stored by relays. */ /** Events are **regular**, which means they're all expected to be stored by relays. */
export function isRegularKind(kind: number) { export function isRegularKind(kind: number): boolean {
return (1000 <= kind && kind < 10000) || [1, 2, 4, 5, 6, 7, 8, 16, 40, 41, 42, 43, 44].includes(kind) return (1000 <= kind && kind < 10000) || [1, 2, 4, 5, 6, 7, 8, 16, 40, 41, 42, 43, 44].includes(kind)
} }
/** Events are **replaceable**, which means that, for each combination of `pubkey` and `kind`, only the latest event is expected to (SHOULD) be stored by relays, older versions are expected to be discarded. */ /** Events are **replaceable**, which means that, for each combination of `pubkey` and `kind`, only the latest event is expected to (SHOULD) be stored by relays, older versions are expected to be discarded. */
export function isReplaceableKind(kind: number) { export function isReplaceableKind(kind: number): boolean {
return [0, 3].includes(kind) || (10000 <= kind && kind < 20000) return [0, 3].includes(kind) || (10000 <= kind && kind < 20000)
} }
/** Events are **ephemeral**, which means they are not expected to be stored by relays. */ /** Events are **ephemeral**, which means they are not expected to be stored by relays. */
export function isEphemeralKind(kind: number) { export function isEphemeralKind(kind: number): boolean {
return 20000 <= kind && kind < 30000 return 20000 <= kind && kind < 30000
} }
/** Events are **parameterized replaceable**, which means that, for each combination of `pubkey`, `kind` and the `d` tag, only the latest event is expected to be stored by relays, older versions are expected to be discarded. */ /** Events are **parameterized replaceable**, which means that, for each combination of `pubkey`, `kind` and the `d` tag, only the latest event is expected to be stored by relays, older versions are expected to be discarded. */
export function isParameterizedReplaceableKind(kind: number) { export function isParameterizedReplaceableKind(kind: number): boolean {
return 30000 <= kind && kind < 40000 return 30000 <= kind && kind < 40000
} }

View File

@@ -4,11 +4,11 @@ try {
_fetch = fetch _fetch = fetch
} catch {} } catch {}
export function useFetchImplementation(fetchImplementation: any) { export function useFetchImplementation(fetchImplementation: any): void {
_fetch = fetchImplementation _fetch = fetchImplementation
} }
export async function fetchRelayInformation(url: string) { export async function fetchRelayInformation(url: string): Promise<RelayInformation> {
return (await ( return (await (
await fetch(url.replace('ws://', 'http://').replace('wss://', 'https://'), { await fetch(url.replace('ws://', 'http://').replace('wss://', 'https://'), {
headers: { Accept: 'application/nostr+json' }, headers: { Accept: 'application/nostr+json' },

View File

@@ -1,7 +1,7 @@
import { BECH32_REGEX, decode, type DecodeResult } from './nip19.ts' import { BECH32_REGEX, decode, type DecodeResult } from './nip19.ts'
/** Nostr URI regex, eg `nostr:npub1...` */ /** Nostr URI regex, eg `nostr:npub1...` */
export const NOSTR_URI_REGEX = new RegExp(`nostr:(${BECH32_REGEX.source})`) export const NOSTR_URI_REGEX: RegExp = new RegExp(`nostr:(${BECH32_REGEX.source})`)
/** Test whether the value is a Nostr URI. */ /** Test whether the value is a Nostr URI. */
export function test(value: unknown): value is `nostr:${string}` { export function test(value: unknown): value is `nostr:${string}` {

View File

@@ -2,7 +2,7 @@ import { decode } from './nip19.ts'
import { NOSTR_URI_REGEX, type NostrURI } from './nip21.ts' import { NOSTR_URI_REGEX, type NostrURI } from './nip21.ts'
/** Regex to find NIP-21 URIs inside event content. */ /** Regex to find NIP-21 URIs inside event content. */
export const regex = () => new RegExp(`\\b${NOSTR_URI_REGEX.source}\\b`, 'g') export const regex = (): RegExp => new RegExp(`\\b${NOSTR_URI_REGEX.source}\\b`, 'g')
/** Match result for a Nostr URI in event content. */ /** Match result for a Nostr URI in event content. */
export interface NostrURIMatch extends NostrURI { export interface NostrURIMatch extends NostrURI {

View File

@@ -2,7 +2,7 @@
export const EMOJI_SHORTCODE_REGEX = /:(\w+):/ export const EMOJI_SHORTCODE_REGEX = /:(\w+):/
/** Regex to find emoji shortcodes in content. */ /** Regex to find emoji shortcodes in content. */
export const regex = () => new RegExp(`\\B${EMOJI_SHORTCODE_REGEX.source}\\B`, 'g') export const regex = (): RegExp => new RegExp(`\\B${EMOJI_SHORTCODE_REGEX.source}\\B`, 'g')
/** Represents a Nostr custom emoji. */ /** Represents a Nostr custom emoji. */
export interface CustomEmoji { export interface CustomEmoji {

View File

@@ -8,54 +8,59 @@ import { concatBytes, randomBytes, utf8ToBytes } from '@noble/hashes/utils'
import { base64 } from '@scure/base' import { base64 } from '@scure/base'
const decoder = new TextDecoder() const decoder = new TextDecoder()
const u = {
minPlaintextSize: 0x0001, // 1b msg => padded to 32b
maxPlaintextSize: 0xffff, // 65535 (64kb-1) => padded to 64kb
utf8Encode: utf8ToBytes, class u {
utf8Decode(bytes: Uint8Array) { static minPlaintextSize = 0x0001 // 1b msg => padded to 32b
static maxPlaintextSize = 0xffff // 65535 (64kb-1) => padded to 64kb
static utf8Encode = utf8ToBytes
static utf8Decode(bytes: Uint8Array): string {
return decoder.decode(bytes) return decoder.decode(bytes)
}, }
getConversationKey(privkeyA: string, pubkeyB: string): Uint8Array { static getConversationKey(privkeyA: string, pubkeyB: string): Uint8Array {
const sharedX = secp256k1.getSharedSecret(privkeyA, '02' + pubkeyB).subarray(1, 33) const sharedX = secp256k1.getSharedSecret(privkeyA, '02' + pubkeyB).subarray(1, 33)
return hkdf_extract(sha256, sharedX, 'nip44-v2') return hkdf_extract(sha256, sharedX, 'nip44-v2')
}, }
getMessageKeys(conversationKey: Uint8Array, nonce: Uint8Array) { static getMessageKeys(
conversationKey: Uint8Array,
nonce: Uint8Array,
): { chacha_key: Uint8Array; chacha_nonce: Uint8Array; hmac_key: Uint8Array } {
const keys = hkdf_expand(sha256, conversationKey, nonce, 76) const keys = hkdf_expand(sha256, conversationKey, nonce, 76)
return { return {
chacha_key: keys.subarray(0, 32), chacha_key: keys.subarray(0, 32),
chacha_nonce: keys.subarray(32, 44), chacha_nonce: keys.subarray(32, 44),
hmac_key: keys.subarray(44, 76), hmac_key: keys.subarray(44, 76),
} }
}, }
calcPaddedLen(len: number): number { static calcPaddedLen(len: number): number {
if (!Number.isSafeInteger(len) || len < 1) throw new Error('expected positive integer') if (!Number.isSafeInteger(len) || len < 1) throw new Error('expected positive integer')
if (len <= 32) return 32 if (len <= 32) return 32
const nextPower = 1 << (Math.floor(Math.log2(len - 1)) + 1) const nextPower = 1 << (Math.floor(Math.log2(len - 1)) + 1)
const chunk = nextPower <= 256 ? 32 : nextPower / 8 const chunk = nextPower <= 256 ? 32 : nextPower / 8
return chunk * (Math.floor((len - 1) / chunk) + 1) return chunk * (Math.floor((len - 1) / chunk) + 1)
}, }
writeU16BE(num: number) { static writeU16BE(num: number): Uint8Array {
if (!Number.isSafeInteger(num) || num < u.minPlaintextSize || num > u.maxPlaintextSize) if (!Number.isSafeInteger(num) || num < u.minPlaintextSize || num > u.maxPlaintextSize)
throw new Error('invalid plaintext size: must be between 1 and 65535 bytes') throw new Error('invalid plaintext size: must be between 1 and 65535 bytes')
const arr = new Uint8Array(2) const arr = new Uint8Array(2)
new DataView(arr.buffer).setUint16(0, num, false) new DataView(arr.buffer).setUint16(0, num, false)
return arr return arr
}, }
pad(plaintext: string): Uint8Array { static pad(plaintext: string): Uint8Array {
const unpadded = u.utf8Encode(plaintext) const unpadded = u.utf8Encode(plaintext)
const unpaddedLen = unpadded.length const unpaddedLen = unpadded.length
const prefix = u.writeU16BE(unpaddedLen) const prefix = u.writeU16BE(unpaddedLen)
const suffix = new Uint8Array(u.calcPaddedLen(unpaddedLen) - unpaddedLen) const suffix = new Uint8Array(u.calcPaddedLen(unpaddedLen) - unpaddedLen)
return concatBytes(prefix, unpadded, suffix) return concatBytes(prefix, unpadded, suffix)
}, }
unpad(padded: Uint8Array): string { static unpad(padded: Uint8Array): string {
const unpaddedLen = new DataView(padded.buffer).getUint16(0) const unpaddedLen = new DataView(padded.buffer).getUint16(0)
const unpadded = padded.subarray(2, 2 + unpaddedLen) const unpadded = padded.subarray(2, 2 + unpaddedLen)
if ( if (
@@ -66,13 +71,13 @@ const u = {
) )
throw new Error('invalid padding') throw new Error('invalid padding')
return u.utf8Decode(unpadded) return u.utf8Decode(unpadded)
}, }
hmacAad(key: Uint8Array, message: Uint8Array, aad: Uint8Array) { static hmacAad(key: Uint8Array, message: Uint8Array, aad: Uint8Array): Uint8Array {
if (aad.length !== 32) throw new Error('AAD associated data must be 32 bytes') if (aad.length !== 32) throw new Error('AAD associated data must be 32 bytes')
const combined = concatBytes(aad, message) const combined = concatBytes(aad, message)
return hmac(sha256, key, combined) return hmac(sha256, key, combined)
}, }
// metadata: always 65b (version: 1b, nonce: 32b, max: 32b) // metadata: always 65b (version: 1b, nonce: 32b, max: 32b)
// plaintext: 1b to 0xffff // plaintext: 1b to 0xffff
@@ -80,7 +85,7 @@ const u = {
// ciphertext: 32b+2 to 0xffff+2 // ciphertext: 32b+2 to 0xffff+2
// raw payload: 99 (65+32+2) to 65603 (65+0xffff+2) // raw payload: 99 (65+32+2) to 65603 (65+0xffff+2)
// compressed payload (base64): 132b to 87472b // compressed payload (base64): 132b to 87472b
decodePayload(payload: string) { static decodePayload(payload: string): { nonce: Uint8Array; ciphertext: Uint8Array; mac: Uint8Array } {
if (typeof payload !== 'string') throw new Error('payload must be a valid string') if (typeof payload !== 'string') throw new Error('payload must be a valid string')
const plen = payload.length const plen = payload.length
if (plen < 132 || plen > 87472) throw new Error('invalid payload length: ' + plen) if (plen < 132 || plen > 87472) throw new Error('invalid payload length: ' + plen)
@@ -100,10 +105,13 @@ const u = {
ciphertext: data.subarray(33, -32), ciphertext: data.subarray(33, -32),
mac: data.subarray(-32), mac: data.subarray(-32),
} }
}, }
} }
function encrypt(plaintext: string, conversationKey: Uint8Array, nonce = randomBytes(32)): string { export class v2 {
static utils = u
static encrypt(plaintext: string, conversationKey: Uint8Array, nonce: Uint8Array = randomBytes(32)): string {
const { chacha_key, chacha_nonce, hmac_key } = u.getMessageKeys(conversationKey, nonce) const { chacha_key, chacha_nonce, hmac_key } = u.getMessageKeys(conversationKey, nonce)
const padded = u.pad(plaintext) const padded = u.pad(plaintext)
const ciphertext = chacha20(chacha_key, chacha_nonce, padded) const ciphertext = chacha20(chacha_key, chacha_nonce, padded)
@@ -111,7 +119,7 @@ function encrypt(plaintext: string, conversationKey: Uint8Array, nonce = randomB
return base64.encode(concatBytes(new Uint8Array([2]), nonce, ciphertext, mac)) return base64.encode(concatBytes(new Uint8Array([2]), nonce, ciphertext, mac))
} }
function decrypt(payload: string, conversationKey: Uint8Array): string { static decrypt(payload: string, conversationKey: Uint8Array): string {
const { nonce, ciphertext, mac } = u.decodePayload(payload) const { nonce, ciphertext, mac } = u.decodePayload(payload)
const { chacha_key, chacha_nonce, hmac_key } = u.getMessageKeys(conversationKey, nonce) const { chacha_key, chacha_nonce, hmac_key } = u.getMessageKeys(conversationKey, nonce)
const calculatedMac = u.hmacAad(hmac_key, ciphertext, nonce) const calculatedMac = u.hmacAad(hmac_key, ciphertext, nonce)
@@ -119,11 +127,6 @@ function decrypt(payload: string, conversationKey: Uint8Array): string {
const padded = chacha20(chacha_key, chacha_nonce, ciphertext) const padded = chacha20(chacha_key, chacha_nonce, ciphertext)
return u.unpad(padded) return u.unpad(padded)
} }
export const v2 = {
utils: u,
encrypt,
decrypt,
} }
export default { v2 } export default { v2 }

View File

@@ -118,7 +118,7 @@ export class BunkerSigner {
const { id, result, error } = JSON.parse(await decrypt(clientSecretKey, event.pubkey, event.content)) const { id, result, error } = JSON.parse(await decrypt(clientSecretKey, event.pubkey, event.content))
if (result === 'auth_url' && waitingForAuth[id]) { if (result === 'auth_url' && waitingForAuth[id]) {
delete listeners[id] delete waitingForAuth[id]
if (params.onauth) { if (params.onauth) {
params.onauth(error) params.onauth(error)
@@ -279,22 +279,35 @@ export async function createAccount(
return rpc return rpc
} }
// @deprecated use fetchBunkerProviders instead
export const fetchCustodialBunkers = fetchBunkerProviders
/** /**
* Fetches info on available providers that announce themselves using NIP-89 events. * Fetches info on available providers that announce themselves using NIP-89 events.
* @returns A promise that resolves to an array of available bunker objects. * @returns A promise that resolves to an array of available bunker objects.
*/ */
export async function fetchCustodialBunkers(pool: AbstractSimplePool, relays: string[]): Promise<BunkerProfile[]> { export async function fetchBunkerProviders(pool: AbstractSimplePool, relays: string[]): Promise<BunkerProfile[]> {
const events = await pool.querySync(relays, { const events = await pool.querySync(relays, {
kinds: [Handlerinformation], kinds: [Handlerinformation],
'#k': [NostrConnect.toString()], '#k': [NostrConnect.toString()],
}) })
events.sort((a, b) => b.created_at - a.created_at)
// validate bunkers by checking their NIP-05 and pubkey // validate bunkers by checking their NIP-05 and pubkey
// map to a more useful object // map to a more useful object
const validatedBunkers = await Promise.all( const validatedBunkers = await Promise.all(
events.map(async event => { events.map(async (event, i) => {
try { try {
const content = JSON.parse(event.content) const content = JSON.parse(event.content)
// skip duplicates
try {
if (events.findIndex(ev => JSON.parse(ev.content).nip05 === content.nip05) !== i) return undefined
} catch (err) {
/***/
}
const bp = await queryBunkerProfile(content.nip05) const bp = await queryBunkerProfile(content.nip05)
if (bp && bp.pubkey === event.pubkey && bp.relays.length) { if (bp && bp.pubkey === event.pubkey && bp.relays.length) {
return { return {

View File

@@ -1,14 +1,9 @@
import crypto from 'node:crypto'
import { describe, test, expect } from 'bun:test' import { describe, test, expect } from 'bun:test'
import { hexToBytes } from '@noble/hashes/utils' import { hexToBytes } from '@noble/hashes/utils'
import { makeNwcRequestEvent, parseConnectionString } from './nip47' import { makeNwcRequestEvent, parseConnectionString } from './nip47'
import { decrypt } from './nip04.ts' import { decrypt } from './nip04.ts'
import { NWCWalletRequest } from './kinds.ts' import { NWCWalletRequest } from './kinds.ts'
// @ts-ignore
// eslint-disable-next-line no-undef
globalThis.crypto = crypto
describe('parseConnectionString', () => { describe('parseConnectionString', () => {
test('returns pubkey, relay, and secret if connection string is valid', () => { test('returns pubkey, relay, and secret if connection string is valid', () => {
const connectionString = const connectionString =

View File

@@ -1,8 +1,14 @@
import { finalizeEvent } from './pure.ts' import { type VerifiedEvent, finalizeEvent } from './pure.ts'
import { NWCWalletRequest } from './kinds.ts' import { NWCWalletRequest } from './kinds.ts'
import { encrypt } from './nip04.ts' import { encrypt } from './nip04.ts'
export function parseConnectionString(connectionString: string) { interface NWCConnection {
pubkey: string
relay: string
secret: string
}
export function parseConnectionString(connectionString: string): NWCConnection {
const { pathname, searchParams } = new URL(connectionString) const { pathname, searchParams } = new URL(connectionString)
const pubkey = pathname const pubkey = pathname
const relay = searchParams.get('relay') const relay = searchParams.get('relay')
@@ -15,7 +21,11 @@ export function parseConnectionString(connectionString: string) {
return { pubkey, relay, secret } return { pubkey, relay, secret }
} }
export async function makeNwcRequestEvent(pubkey: string, secretKey: Uint8Array, invoice: string) { export async function makeNwcRequestEvent(
pubkey: string,
secretKey: Uint8Array,
invoice: string,
): Promise<VerifiedEvent> {
const content = { const content = {
method: 'pay_invoice', method: 'pay_invoice',
params: { params: {

View File

@@ -1,5 +1,7 @@
import { sha256 } from '@noble/hashes/sha256'
import { EventTemplate } from './core' import { EventTemplate } from './core'
import { FileServerPreference } from './kinds' import { FileServerPreference } from './kinds'
import { bytesToHex } from '@noble/hashes/utils'
/** /**
* Represents the configuration for a server compliant with NIP-96. * Represents the configuration for a server compliant with NIP-96.
@@ -576,15 +578,5 @@ export function generateFSPEventTemplate(serverUrls: string[]): EventTemplate {
* @returns A promise that resolves to the SHA-256 hash of the file. * @returns A promise that resolves to the SHA-256 hash of the file.
*/ */
export async function calculateFileHash(file: Blob): Promise<string> { export async function calculateFileHash(file: Blob): Promise<string> {
// Read the file as an ArrayBuffer return bytesToHex(sha256(new Uint8Array(await file.arrayBuffer())))
const buffer = await file.arrayBuffer()
// Calculate the SHA-256 hash of the file
const hashBuffer = await crypto.subtle.digest('SHA-256', buffer)
// Convert the hash to a hexadecimal string
const hashArray = Array.from(new Uint8Array(hashBuffer))
const hashHex = hashArray.map(b => b.toString(16).padStart(2, '0')).join('')
return hashHex
} }

View File

@@ -1,7 +1,7 @@
{ {
"type": "module", "type": "module",
"name": "nostr-tools", "name": "nostr-tools",
"version": "2.3.0", "version": "2.3.2",
"description": "Tools for making a Nostr client.", "description": "Tools for making a Nostr client.",
"repository": { "repository": {
"type": "git", "type": "git",

View File

@@ -50,7 +50,7 @@ export function getEventHash(event: UnsignedEvent): string {
return bytesToHex(eventHash) return bytesToHex(eventHash)
} }
const i = new JS() const i: JS = new JS()
export const generateSecretKey = i.generateSecretKey export const generateSecretKey = i.generateSecretKey
export const getPublicKey = i.getPublicKey export const getPublicKey = i.getPublicKey

View File

@@ -13,7 +13,7 @@ export class Relay extends AbstractRelay {
super(url, { verifyEvent }) super(url, { verifyEvent })
} }
static async connect(url: string) { static async connect(url: string): Promise<Relay> {
const relay = new Relay(url) const relay = new Relay(url)
await relay.connect() await relay.connect()
return relay return relay

View File

@@ -5,7 +5,7 @@
"lib": ["dom", "dom.iterable", "esnext"], "lib": ["dom", "dom.iterable", "esnext"],
"declaration": true, "declaration": true,
"strict": true, "strict": true,
"moduleResolution": "node", "moduleResolution": "Bundler",
"skipLibCheck": true, "skipLibCheck": true,
"esModuleInterop": true, "esModuleInterop": true,
"emitDeclarationOnly": true, "emitDeclarationOnly": true,

View File

@@ -1,7 +1,7 @@
import type { Event } from './core.ts' import type { Event } from './core.ts'
export const utf8Decoder = new TextDecoder('utf-8') export const utf8Decoder: TextDecoder = new TextDecoder('utf-8')
export const utf8Encoder = new TextEncoder() export const utf8Encoder: TextEncoder = new TextEncoder()
export function normalizeURL(url: string): string { export function normalizeURL(url: string): string {
if (url.indexOf('://') === -1) url = 'wss://' + url if (url.indexOf('://') === -1) url = 'wss://' + url
@@ -14,7 +14,7 @@ export function normalizeURL(url: string): string {
return p.toString() return p.toString()
} }
export function insertEventIntoDescendingList(sortedArray: Event[], event: Event) { export function insertEventIntoDescendingList(sortedArray: Event[], event: Event): Event[] {
const [idx, found] = binarySearch(sortedArray, b => { const [idx, found] = binarySearch(sortedArray, b => {
if (event.id === b.id) return 0 if (event.id === b.id) return 0
if (event.created_at === b.created_at) return -1 if (event.created_at === b.created_at) return -1
@@ -26,7 +26,7 @@ export function insertEventIntoDescendingList(sortedArray: Event[], event: Event
return sortedArray return sortedArray
} }
export function insertEventIntoAscendingList(sortedArray: Event[], event: Event) { export function insertEventIntoAscendingList(sortedArray: Event[], event: Event): Event[] {
const [idx, found] = binarySearch(sortedArray, b => { const [idx, found] = binarySearch(sortedArray, b => {
if (event.id === b.id) return 0 if (event.id === b.id) return 0
if (event.created_at === b.created_at) return -1 if (event.created_at === b.created_at) return -1