nak/bunker.go

235 lines
6.5 KiB
Go
Raw Normal View History

2023-12-02 10:18:55 -05:00
package main
import (
"context"
2023-12-02 10:18:55 -05:00
"encoding/json"
"fmt"
"net/url"
"os"
"strings"
"sync"
"time"
2023-12-02 10:18:55 -05:00
2024-02-12 13:39:13 -05:00
"github.com/fatih/color"
2024-07-30 10:43:14 -04:00
"github.com/fiatjaf/cli/v3"
2023-12-02 10:18:55 -05:00
"github.com/nbd-wtf/go-nostr"
"github.com/nbd-wtf/go-nostr/nip19"
"github.com/nbd-wtf/go-nostr/nip46"
2023-12-09 15:42:01 -05:00
"golang.org/x/exp/slices"
2023-12-02 10:18:55 -05:00
)
2023-12-09 14:37:47 -05:00
var bunker = &cli.Command{
Name: "bunker",
Usage: "starts a NIP-46 signer daemon with the given --sec key",
ArgsUsage: "[relay...]",
Description: ``,
DisableSliceFlagSeparator: true,
2023-12-02 10:18:55 -05:00
Flags: []cli.Flag{
&cli.StringFlag{
Name: "sec",
Usage: "secret key to sign the event, as hex or nsec",
DefaultText: "the key '1'",
},
&cli.BoolFlag{
Name: "prompt-sec",
Usage: "prompt the user to paste a hex or nsec with which to sign the event",
},
&cli.StringSliceFlag{
Name: "authorized-secrets",
Aliases: []string{"s"},
Usage: "secrets for which we will always respond",
},
&cli.StringSliceFlag{
Name: "authorized-keys",
Aliases: []string{"k"},
Usage: "pubkeys for which we will always respond",
2023-12-02 10:18:55 -05:00
},
},
2024-06-25 21:18:26 -04:00
Action: func(ctx context.Context, c *cli.Command) error {
2023-12-02 10:18:55 -05:00
// try to connect to the relays here
qs := url.Values{}
relayURLs := make([]string, 0, c.Args().Len())
if relayUrls := c.Args().Slice(); len(relayUrls) > 0 {
2024-07-10 13:48:02 -04:00
_, relays := connectToAllRelays(ctx, relayUrls, false)
2023-12-02 10:18:55 -05:00
if len(relays) == 0 {
log("failed to connect to any of the given relays.\n")
os.Exit(3)
}
for _, relay := range relays {
relayURLs = append(relayURLs, relay.URL)
qs.Add("relay", relay.URL)
}
}
if len(relayURLs) == 0 {
return fmt.Errorf("not connected to any relays: please specify at least one")
}
// gather the secret key
2024-06-25 21:18:26 -04:00
sec, _, err := gatherSecretKeyOrBunkerFromArguments(ctx, c)
2023-12-02 10:18:55 -05:00
if err != nil {
return err
}
// other arguments
authorizedKeys := c.StringSlice("authorized-keys")
authorizedSecrets := c.StringSlice("authorized-secrets")
// this will be used to auto-authorize the next person who connects who isn't pre-authorized
// it will be stored
newSecret := randString(12)
// static information
2023-12-02 10:18:55 -05:00
pubkey, err := nostr.GetPublicKey(sec)
if err != nil {
return err
}
npub, _ := nip19.EncodePublicKey(pubkey)
2024-08-19 11:43:22 -04:00
bold := color.New(color.Bold).Sprintf
italic := color.New(color.Italic).Sprintf
// this function will be called every now and then
printBunkerInfo := func() {
qs.Set("secret", newSecret)
bunkerURI := fmt.Sprintf("bunker://%s?%s", pubkey, qs.Encode())
authorizedKeysStr := ""
if len(authorizedKeys) != 0 {
authorizedKeysStr = "\n authorized keys:\n - " + italic(strings.Join(authorizedKeys, "\n - "))
}
authorizedSecretsStr := ""
if len(authorizedSecrets) != 0 {
authorizedSecretsStr = "\n authorized secrets:\n - " + italic(strings.Join(authorizedSecrets, "\n - "))
}
preauthorizedFlags := ""
for _, k := range authorizedKeys {
preauthorizedFlags += " -k " + k
}
for _, s := range authorizedSecrets {
preauthorizedFlags += " -s " + s
}
secretKeyFlag := ""
if sec := c.String("sec"); sec != "" {
secretKeyFlag = "--sec " + sec
}
relayURLsPossiblyWithoutSchema := make([]string, len(relayURLs))
for i, url := range relayURLs {
if strings.HasPrefix(url, "wss://") {
relayURLsPossiblyWithoutSchema[i] = url[6:]
} else {
relayURLsPossiblyWithoutSchema[i] = url
}
}
restartCommand := fmt.Sprintf("nak bunker %s%s %s",
secretKeyFlag,
preauthorizedFlags,
strings.Join(relayURLsPossiblyWithoutSchema, " "),
)
log("listening at %v:\n pubkey: %s \n npub: %s%s%s\n to restart: %s\n bunker: %s\n\n",
2024-08-19 11:43:22 -04:00
bold("%v", relayURLs),
bold(pubkey),
bold(npub),
authorizedKeysStr,
authorizedSecretsStr,
color.CyanString(restartCommand),
bold(bunkerURI),
)
}
printBunkerInfo()
2023-12-02 10:18:55 -05:00
// subscribe to relays
2024-06-25 21:18:26 -04:00
pool := nostr.NewSimplePool(ctx)
now := nostr.Now()
2024-06-25 21:18:26 -04:00
events := pool.SubMany(ctx, relayURLs, nostr.Filters{
2023-12-02 10:18:55 -05:00
{
Kinds: []int{nostr.KindNostrConnect},
Tags: nostr.TagMap{"p": []string{pubkey}},
Since: &now,
LimitZero: true,
2023-12-02 10:18:55 -05:00
},
})
signer := nip46.NewStaticKeySigner(sec)
handlerWg := sync.WaitGroup{}
printLock := sync.Mutex{}
// just a gimmick
var cancelPreviousBunkerInfoPrint context.CancelFunc
2024-06-25 21:18:26 -04:00
_, cancel := context.WithCancel(ctx)
cancelPreviousBunkerInfoPrint = cancel
2024-03-02 06:18:40 -05:00
// asking user for authorization
signer.AuthorizeRequest = func(harmless bool, from string, secret string) bool {
if secret == newSecret {
// store this key
authorizedKeys = append(authorizedKeys, from)
// discard this and generate a new secret
newSecret = randString(12)
// print bunker info again after this
go func() {
time.Sleep(3 * time.Second)
printBunkerInfo()
}()
}
return slices.Contains(authorizedKeys, from) || slices.Contains(authorizedSecrets, secret)
2024-03-02 06:18:40 -05:00
}
2023-12-02 10:18:55 -05:00
for ie := range events {
cancelPreviousBunkerInfoPrint() // this prevents us from printing a million bunker info blocks
// handle the NIP-46 request event
2024-03-02 06:18:40 -05:00
req, resp, eventResponse, err := signer.HandleRequest(ie.Event)
2023-12-02 10:18:55 -05:00
if err != nil {
log("< failed to handle request from %s: %s\n", ie.Event.PubKey, err.Error())
2023-12-02 10:18:55 -05:00
continue
}
jreq, _ := json.MarshalIndent(req, " ", " ")
2024-02-12 13:39:13 -05:00
log("- got request from '%s': %s\n", color.New(color.Bold, color.FgBlue).Sprint(ie.Event.PubKey), string(jreq))
2023-12-02 10:18:55 -05:00
jresp, _ := json.MarshalIndent(resp, " ", " ")
log("~ responding with %s\n", string(jresp))
2024-03-02 06:18:40 -05:00
handlerWg.Add(len(relayURLs))
for _, relayURL := range relayURLs {
go func(relayURL string) {
if relay, _ := pool.EnsureRelay(relayURL); relay != nil {
2024-06-25 21:18:26 -04:00
err := relay.Publish(ctx, eventResponse)
2024-03-02 06:18:40 -05:00
printLock.Lock()
if err == nil {
log("* sent response through %s\n", relay.URL)
} else {
log("* failed to send response: %s\n", err)
2024-02-12 13:39:13 -05:00
}
2024-03-02 06:18:40 -05:00
printLock.Unlock()
handlerWg.Done()
}
}(relayURL)
2023-12-02 10:18:55 -05:00
}
2024-03-02 06:18:40 -05:00
handlerWg.Wait()
// just after handling one request we trigger this
go func() {
2024-06-25 21:18:26 -04:00
ctx, cancel := context.WithCancel(ctx)
defer cancel()
cancelPreviousBunkerInfoPrint = cancel
// the idea is that we will print the bunker URL again so it is easier to copy-paste by users
// but we will only do if the bunker is inactive for more than 5 minutes
select {
case <-ctx.Done():
case <-time.After(time.Minute * 5):
fmt.Fprintf(os.Stderr, "\n")
printBunkerInfo()
}
}()
2023-12-02 10:18:55 -05:00
}
return nil
},
}