Tools for developing Nostr clients.
Go to file
Paul Miller 03cc18d53b
bring back @noble/curves instead of @noble/secp256k1.
fixes https://github.com/nbd-wtf/nostr-tools/issues/196#issuecomment-1537549606
2023-05-07 21:16:48 -03:00
.github/workflows update actions/checkout to v3 2023-03-02 09:38:10 -03:00
.editorconfig Add .editorconfig 2023-04-01 08:18:57 -03:00
.eslintrc.json Improve event types 2023-05-06 21:00:25 -03:00
.gitignore better publishing built files. 2022-12-20 16:56:05 -03:00
.prettierrc.yaml update secp256k1 library, add nip04.js 2021-12-10 21:41:05 -03:00
LICENSE Add Unlicense 2023-04-20 12:22:39 -03:00
README.md Fix subtle inconsistency with NIP-04 in the decryption example 2023-05-03 09:44:03 -03:00
build.js chore(dx): add format script 💅 (#128) 2023-02-28 12:19:10 -03:00
event.test.js test(event): add test for getBlankEvent 2023-05-01 17:02:14 -03:00
event.ts bring back @noble/curves instead of @noble/secp256k1. 2023-05-07 21:16:48 -03:00
fakejson.test.js fakejson match subscription id. 2023-02-08 14:15:54 -03:00
fakejson.ts fakejson match subscription id. 2023-02-08 14:15:54 -03:00
filter.test.js nip01: add support for filter prefix in authors and ids 2023-04-07 08:29:00 -03:00
filter.ts Improve types of filter.ts 2023-05-06 21:00:25 -03:00
index.ts bring back @noble/curves instead of @noble/secp256k1. 2023-05-07 21:16:48 -03:00
justfile cleanup lib/ so we can only publish the esm file under esm/ 2023-03-02 08:36:43 -03:00
keys.test.js better publishing built files. 2022-12-20 16:56:05 -03:00
keys.ts bring back @noble/curves instead of @noble/secp256k1. 2023-05-07 21:16:48 -03:00
nip04.test.js make crypto available as a global on nip04 test. 2022-12-21 17:12:50 -03:00
nip04.ts bring back @noble/curves instead of @noble/secp256k1. 2023-05-07 21:16:48 -03:00
nip05.test.js fix(nip05): allow dot in name 2023-04-09 19:32:58 -03:00
nip05.ts fix(nip05): allow dot in name 2023-04-09 19:32:58 -03:00
nip06.test.js chore(dx): add format script 💅 (#128) 2023-02-28 12:19:10 -03:00
nip06.ts bring back @noble/curves instead of @noble/secp256k1. 2023-05-07 21:16:48 -03:00
nip10.test.js Rename pubkeys to profiles (NIP-10) 2023-04-02 10:04:04 -03:00
nip10.ts Rename pubkeys to profiles (NIP-10) 2023-04-02 10:04:04 -03:00
nip13.test.js Add NIP-13 (proof-of-work) module 2023-04-11 18:21:40 -03:00
nip13.ts bring back @noble/curves instead of @noble/secp256k1. 2023-05-07 21:16:48 -03:00
nip18.test.js Fix reposts without `p` tag not parsed 2023-05-07 08:52:18 -03:00
nip18.ts Fix reposts without `p` tag not parsed 2023-05-07 08:52:18 -03:00
nip19.test.js NIP-19: Add nrelay encoding and decoding 2023-04-14 13:26:31 -03:00
nip19.ts bring back @noble/curves instead of @noble/secp256k1. 2023-05-07 21:16:48 -03:00
nip21.test.js yarn format 2023-04-22 18:33:09 -05:00
nip21.ts Move BECH32_REGEX to nip19.ts 2023-05-03 17:12:39 -03:00
nip25.test.js Add NIP-25 utils 2023-04-23 20:19:52 -03:00
nip25.ts Improve event types 2023-05-06 21:00:25 -03:00
nip26.test.js implement nip26 delegation. 2022-12-23 17:30:35 -03:00
nip26.ts bring back @noble/curves instead of @noble/secp256k1. 2023-05-07 21:16:48 -03:00
nip27.test.js nip27: make `matchAll` a generator function 2023-04-22 19:22:06 -05:00
nip27.ts nip27: make `matchAll` a generator function 2023-04-22 19:22:06 -05:00
nip39.test.js NIP-39: validate github 2023-03-11 08:33:36 -03:00
nip39.ts NIP-39: validate github 2023-03-11 08:33:36 -03:00
nip42.test.js relay: add support for NIP42 authentication 2023-04-18 15:16:40 -03:00
nip42.ts Improve event types 2023-05-06 21:00:25 -03:00
nip57.test.js add 17 test cases for nip57 (#166) 2023-03-26 19:38:33 -03:00
nip57.ts bring back @noble/curves instead of @noble/secp256k1. 2023-05-07 21:16:48 -03:00
package.json bring back @noble/curves instead of @noble/secp256k1. 2023-05-07 21:16:48 -03:00
pool.test.js Rename signEvent to getSignature 2023-04-23 11:13:15 -05:00
pool.ts Infer relay event types from filter 2023-05-06 20:59:39 -03:00
references.test.js add parseReferences() for NIP-10 and NIP-27. 2023-03-26 09:44:33 -03:00
references.ts fix: must be tag not ref. 2023-04-06 06:14:40 -03:00
relay.test.js Rename signEvent to getSignature 2023-04-23 11:13:15 -05:00
relay.ts Infer relay event types from filter 2023-05-06 20:59:39 -03:00
tsconfig.json add type definition 2023-02-27 19:51:19 -03:00
utils.test.js add fast insert-into-sorted-list utils. 2023-01-28 18:07:14 -03:00
utils.ts Improve event types 2023-05-06 21:00:25 -03:00
yarn.lock bring back @noble/curves instead of @noble/secp256k1. 2023-05-07 21:16:48 -03:00

README.md

nostr-tools

Tools for developing Nostr clients.

Only depends on @scure and @noble packages.

Installation

 npm install nostr-tools # or yarn add nostr-tools

Usage

Generating a private key and a public key

import {generatePrivateKey, getPublicKey} from 'nostr-tools'

let sk = generatePrivateKey() // `sk` is a hex string
let pk = getPublicKey(sk) // `pk` is a hex string

Creating, signing and verifying events

import {
  validateEvent,
  verifySignature,
  getSignature,
  getEventHash,
  getPublicKey
} from 'nostr-tools'

let event = {
  kind: 1,
  created_at: Math.floor(Date.now() / 1000),
  tags: [],
  content: 'hello',
  pubkey: getPublicKey(privateKey)
}

event.id = getEventHash(event)
event.sig = getSignature(event, privateKey)

let ok = validateEvent(event)
let veryOk = verifySignature(event)

Interacting with a relay

import {
  relayInit,
  generatePrivateKey,
  getPublicKey,
  getEventHash,
  getSignature
} from 'nostr-tools'

const relay = relayInit('wss://relay.example.com')
relay.on('connect', () => {
  console.log(`connected to ${relay.url}`)
})
relay.on('error', () => {
  console.log(`failed to connect to ${relay.url}`)
})

await relay.connect()

// let's query for an event that exists
let sub = relay.sub([
  {
    ids: ['d7dd5eb3ab747e16f8d0212d53032ea2a7cadef53837e5a6c66d42849fcb9027']
  }
])
sub.on('event', event => {
  console.log('we got the event we wanted:', event)
})
sub.on('eose', () => {
  sub.unsub()
})

// let's publish a new event while simultaneously monitoring the relay for it
let sk = generatePrivateKey()
let pk = getPublicKey(sk)

let sub = relay.sub([
  {
    kinds: [1],
    authors: [pk]
  }
])

sub.on('event', event => {
  console.log('got event:', event)
})

let event = {
  kind: 1,
  pubkey: pk,
  created_at: Math.floor(Date.now() / 1000),
  tags: [],
  content: 'hello world'
}
event.id = getEventHash(event)
event.sig = getSignature(event, sk)

let pub = relay.publish(event)
pub.on('ok', () => {
  console.log(`${relay.url} has accepted our event`)
})
pub.on('failed', reason => {
  console.log(`failed to publish to ${relay.url}: ${reason}`)
})

let events = await relay.list([{kinds: [0, 1]}])
let event = await relay.get({
  ids: ['44e1827635450ebb3c5a7d12c1f8e7b2b514439ac10a67eef3d9fd9c5c68e245']
})

relay.close()

To use this on Node.js you first must install websocket-polyfill and import it:

import 'websocket-polyfill'

Interacting with multiple relays

import {SimplePool} from 'nostr-tools'

const pool = new SimplePool()

let relays = ['wss://relay.example.com', 'wss://relay.example2.com']

let sub = pool.sub(
  [...relays, 'wss://relay.example3.com'],
  [
    {
      authors: [
        '32e1827635450ebb3c5a7d12c1f8e7b2b514439ac10a67eef3d9fd9c5c68e245'
      ]
    }
  ]
)

sub.on('event', event => {
  // this will only be called once the first time the event is received
  // ...
})

let pubs = pool.publish(relays, newEvent)
pubs.on('ok', () => {
  // this may be called multiple times, once for every relay that accepts the event
  // ...
})

let events = await pool.list(relays, [{kinds: [0, 1]}])
let event = await pool.get(relays, {
  ids: ['44e1827635450ebb3c5a7d12c1f8e7b2b514439ac10a67eef3d9fd9c5c68e245']
})

let relaysForEvent = pool.seenOn(
  '44e1827635450ebb3c5a7d12c1f8e7b2b514439ac10a67eef3d9fd9c5c68e245'
)
// relaysForEvent will be an array of URLs from relays a given event was seen on

Parsing references (mentions) from a content using NIP-10 and NIP-27

import {parseReferences} from 'nostr-tools'

let references = parseReferences(event)
let simpleAugmentedContent = event.content
for (let i = 0; i < references.length; i++) {
  let {text, profile, event, address} = references[i]
  let augmentedReference = profile
    ? `<strong>@${profilesCache[profile.pubkey].name}</strong>`
    : event
    ? `<em>${eventsCache[event.id].content.slice(0, 5)}</em>`
    : address
    ? `<a href="${text}">[link]</a>`
    : text
  simpleAugmentedContent.replaceAll(text, augmentedReference)
}

Querying profile data from a NIP-05 address

import {nip05} from 'nostr-tools'

let profile = await nip05.queryProfile('jb55.com')
console.log(profile.pubkey)
// prints: 32e1827635450ebb3c5a7d12c1f8e7b2b514439ac10a67eef3d9fd9c5c68e245
console.log(profile.relays)
// prints: [wss://relay.damus.io]

To use this on Node.js you first must install node-fetch@2 and call something like this:

nip05.useFetchImplementation(require('node-fetch'))

Encoding and decoding NIP-19 codes

import {nip19, generatePrivateKey, getPublicKey} from 'nostr-tools'

let sk = generatePrivateKey()
let nsec = nip19.nsecEncode(sk)
let {type, data} = nip19.decode(nsec)
assert(type === 'nsec')
assert(data === sk)

let pk = getPublicKey(generatePrivateKey())
let npub = nip19.npubEncode(pk)
let {type, data} = nip19.decode(npub)
assert(type === 'npub')
assert(data === pk)

let pk = getPublicKey(generatePrivateKey())
let relays = [
  'wss://relay.nostr.example.mydomain.example.com',
  'wss://nostr.banana.com'
]
let nprofile = nip19.nprofileEncode({pubkey: pk, relays})
let {type, data} = nip19.decode(nprofile)
assert(type === 'nprofile')
assert(data.pubkey === pk)
assert(data.relays.length === 2)

Encrypting and decrypting direct messages

import {nip04, getPublicKey, generatePrivateKey} from 'nostr-tools'

// sender
let sk1 = generatePrivateKey()
let pk1 = getPublicKey(sk1)

// receiver
let sk2 = generatePrivateKey()
let pk2 = getPublicKey(sk2)

// on the sender side
let message = 'hello'
let ciphertext = await nip04.encrypt(sk1, pk2, message)

let event = {
  kind: 4,
  pubkey: pk1,
  tags: [['p', pk2]],
  content: ciphertext,
  ...otherProperties
}

sendEvent(event)

// on the receiver side
sub.on('event', event => {
  let sender = event.pubkey
  pk1 === sender
  let plaintext = await nip04.decrypt(sk2, pk1, event.content)
})

Performing and checking for delegation

import {nip26, getPublicKey, generatePrivateKey} from 'nostr-tools'

// delegator
let sk1 = generatePrivateKey()
let pk1 = getPublicKey(sk1)

// delegatee
let sk2 = generatePrivateKey()
let pk2 = getPublicKey(sk2)

// generate delegation
let delegation = nip26.createDelegation(sk1, {
  pubkey: pk2,
  kind: 1,
  since: Math.round(Date.now() / 1000),
  until: Math.round(Date.now() / 1000) + 60 * 60 * 24 * 30 /* 30 days */
})

// the delegatee uses the delegation when building an event
let event = {
  pubkey: pk2,
  kind: 1,
  created_at: Math.round(Date.now() / 1000),
  content: 'hello from a delegated key',
  tags: [['delegation', delegation.from, delegation.cond, delegation.sig]]
}

// finally any receiver of this event can check for the presence of a valid delegation tag
let delegator = nip26.getDelegator(event)
assert(delegator === pk1) // will be null if there is no delegation tag or if it is invalid

Please consult the tests or the source code for more information that isn't available here.

Using from the browser (if you don't want to use a bundler)

<script src="https://unpkg.com/nostr-tools/lib/nostr.bundle.js"></script>
<script>
  window.NostrTools.generatePrivateKey('...') // and so on
</script>

Plumbing

  1. Install just
  2. just -l

License

This is free and unencumbered software released into the public domain. By submitting patches to this project, you agree to dedicate any and all copyright interest in this software to the public domain.