mirror of
https://github.com/fiatjaf/nak.git
synced 2024-10-30 09:09:08 -04:00
124 lines
3.2 KiB
Go
124 lines
3.2 KiB
Go
package main
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"net/url"
|
|
"os"
|
|
|
|
"github.com/bgentry/speakeasy"
|
|
"github.com/nbd-wtf/go-nostr"
|
|
"github.com/nbd-wtf/go-nostr/nip19"
|
|
"github.com/nbd-wtf/go-nostr/nip46"
|
|
"github.com/urfave/cli/v2"
|
|
)
|
|
|
|
var nsecbunker = &cli.Command{
|
|
Name: "nsecbunker",
|
|
Usage: "starts a NIP-46 signer daemon with the given --sec key",
|
|
ArgsUsage: "[relay...]",
|
|
Description: ``,
|
|
Flags: []cli.Flag{
|
|
&cli.StringFlag{
|
|
Name: "sec",
|
|
Usage: "secret key to sign the event, as hex or nsec",
|
|
DefaultText: "the key '1'",
|
|
Value: "0000000000000000000000000000000000000000000000000000000000000001",
|
|
},
|
|
&cli.BoolFlag{
|
|
Name: "prompt-sec",
|
|
Usage: "prompt the user to paste a hex or nsec with which to sign the event",
|
|
},
|
|
&cli.BoolFlag{
|
|
Name: "yes",
|
|
Aliases: []string{"y"},
|
|
Usage: "always respond to any NIP-46 requests from anyone",
|
|
},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
// try to connect to the relays here
|
|
qs := url.Values{}
|
|
relayURLs := make([]string, 0, c.Args().Len())
|
|
if relayUrls := c.Args().Slice(); len(relayUrls) > 0 {
|
|
_, relays := connectToAllRelays(c.Context, relayUrls)
|
|
if len(relays) == 0 {
|
|
log("failed to connect to any of the given relays.\n")
|
|
os.Exit(3)
|
|
}
|
|
for _, relay := range relays {
|
|
relayURLs = append(relayURLs, relay.URL)
|
|
qs.Add("relay", relay.URL)
|
|
}
|
|
}
|
|
if len(relayURLs) == 0 {
|
|
return fmt.Errorf("not connected to any relays: please specify at least one")
|
|
}
|
|
|
|
// gather the secret key
|
|
sec, err := gatherSecretKeyFromArguments(c)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
pubkey, err := nostr.GetPublicKey(sec)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
npub, _ := nip19.EncodePublicKey(pubkey)
|
|
log("listening at %s%v%s:\n %spubkey:%s %s\n %snpub:%s %s\n %sconnection code:%s %s\n %sbunker:%s %s\n\n",
|
|
BOLD_ON, relayURLs, BOLD_OFF,
|
|
BOLD_ON, BOLD_OFF, pubkey,
|
|
BOLD_ON, BOLD_OFF, npub,
|
|
BOLD_ON, BOLD_OFF, fmt.Sprintf("%s#secret?%s", npub, qs.Encode()),
|
|
BOLD_ON, BOLD_OFF, fmt.Sprintf("bunker://%s?%s", pubkey, qs.Encode()),
|
|
)
|
|
|
|
alwaysYes := c.Bool("yes")
|
|
|
|
// subscribe to relays
|
|
pool := nostr.NewSimplePool(c.Context)
|
|
events := pool.SubMany(c.Context, relayURLs, nostr.Filters{
|
|
{
|
|
Kinds: []int{24133},
|
|
Tags: nostr.TagMap{"p": []string{pubkey}},
|
|
},
|
|
})
|
|
|
|
signer := nip46.NewSigner(sec)
|
|
for ie := range events {
|
|
req, resp, eventResponse, harmless, err := signer.HandleRequest(ie.Event)
|
|
if err != nil {
|
|
log("< failed to handle request from %s: %w", ie.Event.PubKey, err)
|
|
continue
|
|
}
|
|
|
|
jreq, _ := json.MarshalIndent(req, " ", " ")
|
|
log("- got request from '%s': %s\n", ie.Event.PubKey, string(jreq))
|
|
jresp, _ := json.MarshalIndent(resp, " ", " ")
|
|
log("~ responding with %s\n", string(jresp))
|
|
|
|
if alwaysYes || harmless || askUserIfWeCanRespond() {
|
|
if err := ie.Relay.Publish(c.Context, eventResponse); err == nil {
|
|
log("* sent response!\n")
|
|
} else {
|
|
log("* failed to send response: %s\n", err)
|
|
}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
},
|
|
}
|
|
|
|
func askUserIfWeCanRespond() bool {
|
|
answer, err := speakeasy.FAsk(os.Stderr,
|
|
fmt.Sprintf("proceed? y/n"))
|
|
if err != nil {
|
|
return false
|
|
}
|
|
if answer == "y" || answer == "yes" {
|
|
return true
|
|
}
|
|
|
|
return askUserIfWeCanRespond()
|
|
}
|