use super::TagV3;
use crate::types::{
EventDelegation, EventKind, EventReference, FileMetadata, Id, KeySigner, MilliSatoshi,
NostrBech32, NostrUrl, PrivateKey, PublicKey, RelayUrl, Signature, Signer, Unixtime, ZapData,
};
use crate::{Error, IntoVec};
use lightning_invoice::Bolt11Invoice;
#[cfg(feature = "speedy")]
use regex::Regex;
use serde::{Deserialize, Serialize};
#[cfg(feature = "speedy")]
use speedy::{Readable, Writable};
use std::cmp::Ordering;
use std::str::FromStr;
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
#[cfg_attr(feature = "speedy", derive(Readable, Writable))]
pub struct EventV3 {
pub id: Id,
pub pubkey: PublicKey,
pub created_at: Unixtime,
pub kind: EventKind,
pub sig: Signature,
pub content: String,
pub tags: Vec<TagV3>,
}
macro_rules! serialize_inner_event {
($pubkey:expr, $created_at:expr, $kind:expr, $tags:expr,
$content:expr) => {{
format!(
"[0,{},{},{},{},{}]",
serde_json::to_string($pubkey)?,
serde_json::to_string($created_at)?,
serde_json::to_string($kind)?,
serde_json::to_string($tags)?,
serde_json::to_string($content)?
)
}};
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
#[cfg_attr(feature = "speedy", derive(Readable, Writable))]
pub struct PreEventV3 {
pub pubkey: PublicKey,
pub created_at: Unixtime,
pub kind: EventKind,
pub tags: Vec<TagV3>,
pub content: String,
}
impl PreEventV3 {
pub fn hash(&self) -> Result<Id, Error> {
use secp256k1::hashes::Hash;
let serialized: String = serialize_inner_event!(
&self.pubkey,
&self.created_at,
&self.kind,
&self.tags,
&self.content
);
let hash = secp256k1::hashes::sha256::Hash::hash(serialized.as_bytes());
let id: [u8; 32] = hash.to_byte_array();
Ok(Id(id))
}
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
#[cfg_attr(feature = "speedy", derive(Readable, Writable))]
pub struct RumorV3 {
pub id: Id,
pub pubkey: PublicKey,
pub created_at: Unixtime,
pub kind: EventKind,
pub content: String,
pub tags: Vec<TagV3>,
}
impl RumorV3 {
pub fn new(input: PreEventV3) -> Result<RumorV3, Error> {
let id = input.hash()?;
Ok(RumorV3 {
id,
pubkey: input.pubkey,
created_at: input.created_at,
kind: input.kind,
tags: input.tags,
content: input.content,
})
}
pub fn into_event_with_bad_signature(self) -> EventV3 {
EventV3 {
id: self.id,
pubkey: self.pubkey,
created_at: self.created_at,
kind: self.kind,
sig: Signature::zeroes(),
content: self.content,
tags: self.tags,
}
}
}
impl EventV3 {
pub fn verify(&self, maxtime: Option<Unixtime>) -> Result<(), Error> {
use secp256k1::hashes::Hash;
let serialized: String = serialize_inner_event!(
&self.pubkey,
&self.created_at,
&self.kind,
&self.tags,
&self.content
);
self.pubkey.verify(serialized.as_bytes(), &self.sig)?;
let hash = secp256k1::hashes::sha256::Hash::hash(serialized.as_bytes());
let id: [u8; 32] = hash.to_byte_array();
if let Some(mt) = maxtime {
if self.created_at > mt {
return Err(Error::EventInFuture);
}
}
if id != self.id.0 {
Err(Error::HashMismatch)
} else {
Ok(())
}
}
#[allow(dead_code)]
pub(crate) fn mock() -> EventV3 {
let signer = {
let private_key = PrivateKey::mock();
KeySigner::from_private_key(private_key, "", 1).unwrap()
};
let public_key = signer.public_key();
let pre = PreEventV3 {
pubkey: public_key,
created_at: Unixtime::mock(),
kind: EventKind::mock(),
tags: vec![TagV3::mock(), TagV3::mock()],
content: "This is a test".to_string(),
};
let id = pre.hash().unwrap();
let sig = signer.sign_id(id).unwrap();
EventV3 {
id,
pubkey: pre.pubkey,
created_at: pre.created_at,
kind: pre.kind,
tags: pre.tags,
content: pre.content,
sig,
}
}
pub fn k_tag_kind(&self) -> Option<EventKind> {
for tag in self.tags.iter() {
if let Ok(kind) = tag.parse_kind() {
return Some(kind);
}
}
None
}
pub fn people(&self) -> Vec<(PublicKey, Option<RelayUrl>, Option<String>)> {
let mut output: Vec<(PublicKey, Option<RelayUrl>, Option<String>)> = Vec::new();
for tag in self.tags.iter() {
if let Ok((pubkey, recommended_relay_url, petname)) = tag.parse_pubkey() {
output.push((
pubkey.to_owned(),
recommended_relay_url
.as_ref()
.and_then(|rru| RelayUrl::try_from_unchecked_url(rru).ok()),
petname.to_owned(),
));
}
}
output
}
pub fn is_tagged(&self, pk: &PublicKey) -> bool {
for tag in self.tags.iter() {
if let Ok((pubkey, _recommended_relay_url, _petname)) = tag.parse_pubkey() {
if pubkey == *pk {
return true;
}
}
}
false
}
pub fn people_referenced_in_content(&self) -> Vec<PublicKey> {
let mut output = Vec::new();
for nurl in NostrUrl::find_all_in_string(&self.content).drain(..) {
if let NostrBech32::Pubkey(pk) = nurl.0 {
output.push(pk);
}
if let NostrBech32::Profile(prof) = nurl.0 {
output.push(prof.pubkey);
}
}
output
}
pub fn referred_events(&self) -> Vec<EventReference> {
let mut output: Vec<EventReference> = Vec::new();
for tag in self.tags.iter() {
if let Ok((id, rurl, marker, optpk)) = tag.parse_event() {
output.push(EventReference::Id {
id,
author: optpk,
relays: rurl
.as_ref()
.and_then(|rru| RelayUrl::try_from_unchecked_url(rru).ok())
.into_vec(),
marker,
});
} else if let Ok((ea, _optmarker)) = tag.parse_address() {
output.push(EventReference::Addr(ea))
}
}
output
}
pub fn replies_to(&self) -> Option<EventReference> {
if !self.kind.is_feed_displayable() {
return None;
}
if self.kind == EventKind::Repost || self.kind == EventKind::GenericRepost {
return None;
}
if self.kind == EventKind::Comment {
let tags: Vec<&TagV3> = self.tags.iter().filter(|t| t.tagname() == "e").collect();
if !tags.is_empty() {
return tags[0].as_event_reference();
}
}
let reply_tags: Vec<&TagV3> = self
.tags
.iter()
.filter(|t| (t.tagname() == "e" || t.tagname() == "a") && t.marker() == "reply")
.collect();
if !reply_tags.is_empty() {
return reply_tags[0].as_event_reference();
}
let root_tags: Vec<&TagV3> = self
.tags
.iter()
.filter(|t| (t.tagname() == "e" || t.tagname() == "a") && t.marker() == "root")
.collect();
if !root_tags.is_empty() {
return root_tags[0].as_event_reference();
}
let a_tags: Vec<&TagV3> = self
.tags
.iter()
.rev()
.filter(|t| t.tagname() == "a" && t.marker() == "")
.collect();
if !a_tags.is_empty() {
return a_tags[0].as_event_reference();
}
let e_tags: Vec<&TagV3> = self
.tags
.iter()
.rev()
.filter(|t| t.tagname() == "e" && t.marker() == "")
.collect();
if !e_tags.is_empty() {
return e_tags[0].as_event_reference();
}
None
}
pub fn replies_to_root(&self) -> Option<EventReference> {
if !self.kind.is_feed_displayable() {
return None;
}
let root_referencing_tags: Vec<&TagV3> = self
.tags
.iter()
.filter(|t| t.tagname() == "E" || t.tagname() == "A" || t.marker() == "root")
.collect();
if !root_referencing_tags.is_empty() {
return root_referencing_tags[0].as_event_reference();
} else {
let e_tags: Vec<&TagV3> = self
.tags
.iter()
.filter(|t| t.tagname() == "e" && t.marker() == "")
.collect();
if e_tags.len() > 1 {
return e_tags[0].as_event_reference();
}
let a_tags: Vec<&TagV3> = self
.tags
.iter()
.filter(|t| t.tagname() == "a" && t.marker() == "")
.collect();
if a_tags.len() > 1 {
return a_tags[0].as_event_reference();
}
}
None
}
pub fn quotes(&self) -> Vec<EventReference> {
if self.kind != EventKind::TextNote && self.kind != EventKind::Comment {
return vec![];
}
let mut output: Vec<EventReference> = Vec::new();
for tag in self.tags.iter() {
if let Ok((id, rurl, optpk)) = tag.parse_quote() {
output.push(EventReference::Id {
id,
author: optpk,
relays: rurl
.as_ref()
.and_then(|rru| RelayUrl::try_from_unchecked_url(rru).ok())
.into_vec(),
marker: None,
});
}
}
output
}
pub fn mentions(&self) -> Vec<EventReference> {
if !self.kind.is_feed_displayable() {
return vec![];
}
let mut output: Vec<EventReference> = Vec::new();
if self.kind == EventKind::Repost || self.kind == EventKind::GenericRepost {
for tag in self.tags.iter() {
if let Ok((id, rurl, optmarker, optpk)) = tag.parse_event() {
output.push(EventReference::Id {
id,
author: optpk,
relays: rurl
.as_ref()
.and_then(|rru| RelayUrl::try_from_unchecked_url(rru).ok())
.into_vec(),
marker: optmarker,
});
} else if let Ok((ea, _optmarker)) = tag.parse_address() {
output.push(EventReference::Addr(ea));
}
}
return output;
}
for tag in self.tags.iter() {
if let Ok((id, rurl, optmarker, optpk)) = tag.parse_event() {
if optmarker.is_some() && optmarker.as_deref().unwrap() == "mention" {
output.push(EventReference::Id {
id,
author: optpk,
relays: rurl
.as_ref()
.and_then(|rru| RelayUrl::try_from_unchecked_url(rru).ok())
.into_vec(),
marker: optmarker,
});
}
}
}
let e_tags: Vec<&TagV3> = self
.tags
.iter()
.filter(|t| (t.tagname() == "e" || t.tagname() == "a") && t.marker() == "")
.collect();
if e_tags.len() > 2 {
for tag in &e_tags[1..e_tags.len() - 1] {
if let Ok((id, rurl, optmarker, optpk)) = tag.parse_event() {
output.push(EventReference::Id {
id,
author: optpk,
relays: rurl
.as_ref()
.and_then(|rru| RelayUrl::try_from_unchecked_url(rru).ok())
.into_vec(),
marker: optmarker,
});
} else if let Ok((ea, _optmarker)) = tag.parse_address() {
output.push(EventReference::Addr(ea));
}
}
}
output
}
pub fn reacts_to(&self) -> Option<(EventReference, String)> {
if self.kind != EventKind::Reaction {
return None;
}
for tag in self.tags.iter().rev() {
if let Ok((id, rurl, optmarker, optpk)) = tag.parse_event() {
return Some((
EventReference::Id {
id,
author: optpk,
relays: rurl
.as_ref()
.and_then(|rru| RelayUrl::try_from_unchecked_url(rru).ok())
.into_vec(),
marker: optmarker,
},
self.content.clone(),
));
}
}
None
}
pub fn deletes(&self) -> Option<(Vec<EventReference>, String)> {
if self.kind != EventKind::EventDeletion {
return None;
}
let mut erefs: Vec<EventReference> = Vec::new();
for tag in self.tags.iter() {
if let Ok((id, rurl, optmarker, optpk)) = tag.parse_event() {
erefs.push(EventReference::Id {
id,
author: optpk,
relays: rurl
.as_ref()
.and_then(|rru| RelayUrl::try_from_unchecked_url(rru).ok())
.into_vec(),
marker: optmarker,
});
} else if let Ok((ea, _optmarker)) = tag.parse_address() {
erefs.push(EventReference::Addr(ea));
}
}
if erefs.is_empty() {
None
} else {
Some((erefs, self.content.clone()))
}
}
pub fn delete_author_allowed(&self, by: PublicKey) -> bool {
if self.pubkey == by {
return true;
}
if self.kind == EventKind::GiftWrap {
for tag in self.tags.iter() {
if let Ok((pk, _, _)) = tag.parse_pubkey() {
return by == pk;
}
}
}
false
}
pub fn zaps(&self) -> Result<Option<ZapData>, Error> {
if self.kind != EventKind::Zap {
return Ok(None);
}
let (zap_request, bolt11invoice, payer_p_tag, target_event_from_tags): (
EventV3,
Bolt11Invoice,
Option<PublicKey>,
Option<EventReference>,
) = {
let mut zap_request: Option<EventV3> = None;
let mut bolt11invoice: Option<Bolt11Invoice> = None;
let mut payer_p_tag: Option<PublicKey> = None;
let mut target_event_from_tags: Option<EventReference> = None;
for tag in self.tags.iter() {
if tag.tagname() == "description" {
let request_string = tag.value();
if let Ok(e) = serde_json::from_str::<EventV3>(request_string) {
zap_request = Some(e);
}
}
else if tag.tagname() == "P" {
if let Ok((pk, _, _)) = tag.parse_pubkey() {
payer_p_tag = Some(pk);
}
} else if tag.tagname() == "bolt11" {
if tag.value() == "" {
return Err(Error::ZapReceipt("missing bolt11 tag value".to_string()));
}
let invoice = match Bolt11Invoice::from_str(tag.value()) {
Ok(inv) => inv,
Err(e) => {
return Err(Error::ZapReceipt(format!("bolt11 failed to parse: {}", e)))
}
};
if let Err(e) = invoice.check_signature() {
return Err(Error::ZapReceipt(format!(
"bolt11 signature check failed: {}",
e
)));
}
bolt11invoice = Some(invoice);
}
}
let re = self.referred_events();
if re.len() == 1 {
target_event_from_tags = Some(re[0].clone());
}
if zap_request.is_none() {
return Ok(None);
}
let zap_request = zap_request.unwrap();
if bolt11invoice.is_none() {
return Ok(None);
}
let bolt11invoice = bolt11invoice.unwrap();
(
zap_request,
bolt11invoice,
payer_p_tag,
target_event_from_tags,
)
};
let (payee_from_invoice, amount_from_invoice): (PublicKey, MilliSatoshi) = {
let secpk = match bolt11invoice.payee_pub_key() {
Some(pubkey) => pubkey.to_owned(),
None => bolt11invoice.recover_payee_pub_key(),
};
let (xonlypk, _) = secpk.x_only_public_key();
let pubkeybytes = xonlypk.serialize();
let pubkey = match PublicKey::from_bytes(&pubkeybytes, false) {
Ok(pubkey) => pubkey,
Err(e) => return Err(Error::ZapReceipt(format!("payee public key error: {}", e))),
};
if let Some(u) = bolt11invoice.amount_milli_satoshis() {
(pubkey, MilliSatoshi(u))
} else {
return Err(Error::ZapReceipt(
"Amount missing from zap receipt".to_string(),
));
}
};
let (payer_from_request, amount_from_request, target_event_from_request): (
PublicKey,
MilliSatoshi,
EventReference,
) = {
let mut amount_from_request: Option<MilliSatoshi> = None;
let mut target_event_from_request: Option<EventReference> = None;
for tag in zap_request.tags.iter() {
if tag.tagname() == "amount" {
if let Ok(m) = tag.value().parse::<u64>() {
amount_from_request = Some(MilliSatoshi(m));
}
}
}
let re = zap_request.referred_events();
if re.len() == 1 {
target_event_from_request = Some(re[0].clone());
}
if amount_from_request.is_none() {
return Err(Error::ZapReceipt("zap request had no amount".to_owned()));
}
let amount_from_request = amount_from_request.unwrap();
if target_event_from_request.is_none() {
return Ok(None);
}
let target_event_from_request = target_event_from_request.unwrap();
(
zap_request.pubkey,
amount_from_request,
target_event_from_request,
)
};
if let Some(p) = payer_p_tag {
if p != payer_from_request {
return Err(Error::ZapReceipt(
"Payer Mismatch between receipt P-tag and invoice".to_owned(),
));
}
}
if amount_from_invoice != amount_from_request {
return Err(Error::ZapReceipt(
"Amount Mismatch between request and invoice".to_owned(),
));
}
if let Some(te) = target_event_from_tags {
if te != target_event_from_request {
return Err(Error::ZapReceipt(
"Zapped event Mismatch receipt and request".to_owned(),
));
}
}
Ok(Some(ZapData {
zapped_event: target_event_from_request,
amount: amount_from_invoice,
payee: payee_from_invoice,
payer: payer_from_request,
provider_pubkey: self.pubkey,
}))
}
pub fn client(&self) -> Option<String> {
for tag in self.tags.iter() {
if tag.tagname() == "client" && !tag.value().is_empty() {
return Some(tag.value().to_owned());
}
}
None
}
pub fn subject(&self) -> Option<String> {
for tag in self.tags.iter() {
if let Ok(subject) = tag.parse_subject() {
return Some(subject);
}
}
None
}
pub fn title(&self) -> Option<String> {
for tag in self.tags.iter() {
if let Ok(title) = tag.parse_title() {
return Some(title);
}
}
None
}
pub fn summary(&self) -> Option<String> {
for tag in self.tags.iter() {
if let Ok(summary) = tag.parse_summary() {
return Some(summary);
}
}
None
}
pub fn is_annotation(&self) -> bool {
for tag in self.tags.iter() {
if tag.get_index(0) == "annotation" {
return true;
}
}
false
}
pub fn content_warning(&self) -> Option<Option<String>> {
for tag in self.tags.iter() {
if let Ok(optcontentwarning) = tag.parse_content_warning() {
return Some(optcontentwarning);
}
}
None
}
pub fn parameter(&self) -> Option<String> {
if self.kind.is_parameterized_replaceable() {
for tag in self.tags.iter() {
if let Ok(ident) = tag.parse_identifier() {
return Some(ident);
}
}
Some("".to_owned()) } else {
None
}
}
pub fn hashtags(&self) -> Vec<String> {
if !self.kind.is_feed_displayable() {
return vec![];
}
let mut output: Vec<String> = Vec::new();
for tag in self.tags.iter() {
if let Ok(hashtag) = tag.parse_hashtag() {
output.push(hashtag);
}
}
output
}
pub fn file_metadata(&self) -> Vec<FileMetadata> {
let mut output: Vec<FileMetadata> = Vec::new();
for tag in self.tags.iter() {
if tag.tagname() == "imeta" {
if let Some(fm) = FileMetadata::from_imeta_tag(tag) {
output.push(fm);
}
}
}
output
}
pub fn urls(&self) -> Vec<RelayUrl> {
if !self.kind.is_feed_displayable() {
return vec![];
}
let mut output: Vec<RelayUrl> = Vec::new();
for tag in self.tags.iter() {
if let Ok((url, _optusage)) = tag.parse_relay() {
if let Ok(relay_url) = RelayUrl::try_from_unchecked_url(&url) {
output.push(relay_url);
}
}
}
output
}
pub fn pow(&self) -> u8 {
let zeroes: u8 = crate::get_leading_zero_bits(&self.id.0);
for tag in self.tags.iter() {
if let Ok((_nonce, Some(target))) = tag.parse_nonce() {
let target_zeroes = target as u8;
return zeroes.min(target_zeroes);
}
}
0
}
pub fn delegation(&self) -> EventDelegation {
for tag in self.tags.iter() {
if let Ok((pk, conditions, sig)) = tag.parse_delegation() {
match conditions.verify_signature(&pk, &self.pubkey, &sig) {
Ok(_) => {
if let Some(kind) = conditions.kind {
if self.kind != kind {
return EventDelegation::InvalidDelegation(
"Event Kind not delegated".to_owned(),
);
}
}
if let Some(created_after) = conditions.created_after {
if self.created_at < created_after {
return EventDelegation::InvalidDelegation(
"Event created before delegation started".to_owned(),
);
}
}
if let Some(created_before) = conditions.created_before {
if self.created_at > created_before {
return EventDelegation::InvalidDelegation(
"Event created after delegation ended".to_owned(),
);
}
}
return EventDelegation::DelegatedBy(pk);
}
Err(e) => {
return EventDelegation::InvalidDelegation(format!("{e}"));
}
}
}
}
EventDelegation::NotDelegated
}
pub fn proxy(&self) -> Option<(String, String)> {
for tag in self.tags.iter() {
if let Ok((protocol, id)) = tag.parse_proxy() {
return Some((protocol, id));
}
}
None
}
}
impl Ord for EventV3 {
fn cmp(&self, other: &Self) -> Ordering {
self.created_at
.cmp(&other.created_at)
.then(self.id.cmp(&other.id))
}
}
impl PartialOrd for EventV3 {
fn partial_cmp(&self, other: &Self) -> Option<Ordering> {
Some(self.cmp(other))
}
}
#[cfg(feature = "speedy")]
impl EventV3 {
pub fn get_id_from_speedy_bytes(bytes: &[u8]) -> Option<Id> {
if bytes.len() < 32 {
None
} else if let Ok(arr) = <[u8; 32]>::try_from(&bytes[0..32]) {
Some(unsafe { std::mem::transmute(arr) })
} else {
None
}
}
pub fn get_pubkey_from_speedy_bytes(bytes: &[u8]) -> Option<PublicKey> {
if bytes.len() < 64 {
None
} else {
PublicKey::from_bytes(&bytes[32..64], false).ok()
}
}
pub fn get_created_at_from_speedy_bytes(bytes: &[u8]) -> Option<Unixtime> {
if bytes.len() < 72 {
None
} else if let Ok(i) = i64::read_from_buffer(&bytes[64..72]) {
Some(Unixtime(i))
} else {
None
}
}
pub fn get_kind_from_speedy_bytes(bytes: &[u8]) -> Option<EventKind> {
if bytes.len() < 76 {
None
} else if let Ok(u) = u32::read_from_buffer(&bytes[72..76]) {
Some(u.into())
} else {
None
}
}
pub fn get_content_from_speedy_bytes(bytes: &[u8]) -> Option<&str> {
let len = u32::from_ne_bytes(bytes[140..140 + 4].try_into().unwrap());
unsafe {
Some(std::str::from_utf8_unchecked(
&bytes[140 + 4..140 + 4 + len as usize],
))
}
}
pub fn tag_search_in_speedy_bytes(bytes: &[u8], re: &Regex) -> Result<bool, Error> {
if bytes.len() < 140 {
return Ok(false);
}
let len = u32::from_ne_bytes(bytes[140..140 + 4].try_into().unwrap());
let offset = 140 + 4 + len as usize;
let tags: Vec<TagV3> = Vec::<TagV3>::read_from_buffer(&bytes[offset..])?;
for tag in &tags {
match tag.tagname() {
"content-warning" => {
if let Ok(Some(warning)) = tag.parse_content_warning() {
if re.is_match(warning.as_ref()) {
return Ok(true);
}
}
}
"t" => {
if let Ok(hashtag) = tag.parse_hashtag() {
if re.is_match(hashtag.as_ref()) {
return Ok(true);
}
}
}
"subject" => {
if let Ok(subject) = tag.parse_subject() {
if re.is_match(subject.as_ref()) {
return Ok(true);
}
}
}
"title" => {
if let Ok(title) = tag.parse_title() {
if re.is_match(title.as_ref()) {
return Ok(true);
}
}
}
_ => {
if tag.tagname() == "summary" && re.is_match(tag.value()) {
return Ok(true);
}
}
}
}
Ok(false)
}
}
impl From<EventV3> for RumorV3 {
fn from(e: EventV3) -> RumorV3 {
RumorV3 {
id: e.id,
pubkey: e.pubkey,
created_at: e.created_at,
kind: e.kind,
content: e.content,
tags: e.tags,
}
}
}
impl From<RumorV3> for PreEventV3 {
fn from(r: RumorV3) -> PreEventV3 {
PreEventV3 {
pubkey: r.pubkey,
created_at: r.created_at,
kind: r.kind,
content: r.content,
tags: r.tags,
}
}
}
impl TryFrom<PreEventV3> for RumorV3 {
type Error = Error;
fn try_from(e: PreEventV3) -> Result<RumorV3, Error> {
RumorV3::new(e)
}
}
#[cfg(test)]
mod test {
use super::*;
use crate::types::{DelegationConditions, Signer, UncheckedUrl};
test_serde! {EventV3, test_event_serde}
#[test]
fn test_event_new_and_verify() {
let signer = {
let privkey = PrivateKey::mock();
KeySigner::from_private_key(privkey, "", 1).unwrap()
};
let pubkey = signer.public_key();
let preevent = PreEventV3 {
pubkey,
created_at: Unixtime::mock(),
kind: EventKind::TextNote,
tags: vec![TagV3::new_event(
Id::mock(),
Some(UncheckedUrl::mock()),
None,
None,
)],
content: "Hello World!".to_string(),
};
let id = preevent.hash().unwrap();
let sig = signer.sign_id(id).unwrap();
let mut event = EventV3 {
id,
pubkey: preevent.pubkey,
created_at: preevent.created_at,
kind: preevent.kind,
tags: preevent.tags,
content: preevent.content,
sig,
};
assert!(event.verify(None).is_ok());
event.content = "I'm changing this message".to_string();
let result = event.verify(None);
assert!(result.is_err());
event.content = "Hello World!".to_string();
let result = event.verify(None);
assert!(result.is_ok());
event.id = Id([
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23,
24, 25, 26, 27, 28, 29, 30, 31,
]);
let result = event.verify(None);
assert!(result.is_err());
}
fn create_event_with_delegation<S>(created_at: Unixtime, real_signer: &S) -> EventV3
where
S: Signer,
{
let delegated_signer = {
let privkey = PrivateKey::mock();
KeySigner::from_private_key(privkey, "", 1).unwrap()
};
let conditions = DelegationConditions::try_from_str(
"kind=1&created_at>1680000000&created_at<1680050000",
)
.unwrap();
let sig = real_signer
.generate_delegation_signature(delegated_signer.public_key(), &conditions)
.unwrap();
let preevent = PreEventV3 {
pubkey: delegated_signer.public_key(),
created_at,
kind: EventKind::TextNote,
tags: vec![
TagV3::new_event(Id::mock(), Some(UncheckedUrl::mock()), None, None),
TagV3::new_delegation(real_signer.public_key(), conditions, sig),
],
content: "Hello World!".to_string(),
};
let id = preevent.hash().unwrap();
let sig = delegated_signer.sign_id(id).unwrap();
EventV3 {
id,
pubkey: preevent.pubkey,
created_at: preevent.created_at,
kind: preevent.kind,
tags: preevent.tags,
content: preevent.content,
sig,
}
}
#[test]
fn test_event_with_delegation_ok() {
let delegator_signer = {
let delegator_privkey = PrivateKey::mock();
KeySigner::from_private_key(delegator_privkey, "", 1).unwrap()
};
let delegator_pubkey = delegator_signer.public_key();
let event = create_event_with_delegation(Unixtime(1680000012), &delegator_signer);
assert!(event.verify(None).is_ok());
if let EventDelegation::DelegatedBy(pk) = event.delegation() {
assert_eq!(pk, delegator_pubkey);
} else {
panic!("Expected DelegatedBy result, got {:?}", event.delegation());
}
}
#[test]
fn test_event_with_delegation_invalid_created_after() {
let delegator_privkey = PrivateKey::mock();
let signer = KeySigner::from_private_key(delegator_privkey, "", 1).unwrap();
let event = create_event_with_delegation(Unixtime(1690000000), &signer);
assert!(event.verify(None).is_ok());
if let EventDelegation::InvalidDelegation(reason) = event.delegation() {
assert_eq!(reason, "Event created after delegation ended");
} else {
panic!(
"Expected InvalidDelegation result, got {:?}",
event.delegation()
);
}
}
#[test]
fn test_event_with_delegation_invalid_created_before() {
let signer = {
let delegator_privkey = PrivateKey::mock();
KeySigner::from_private_key(delegator_privkey, "", 1).unwrap()
};
let event = create_event_with_delegation(Unixtime(1610000000), &signer);
assert!(event.verify(None).is_ok());
if let EventDelegation::InvalidDelegation(reason) = event.delegation() {
assert_eq!(reason, "Event created before delegation started");
} else {
panic!(
"Expected InvalidDelegation result, got {:?}",
event.delegation()
);
}
}
#[test]
fn test_realworld_event_with_naddr_tag() {
let raw = r##"{"id":"7760408f6459b9546c3a4e70e3e56756421fba34526b7d460db3fcfd2f8817db","pubkey":"460c25e682fda7832b52d1f22d3d22b3176d972f60dcdc3212ed8c92ef85065c","created_at":1687616920,"kind":1,"tags":[["p","1bc70a0148b3f316da33fe3c89f23e3e71ac4ff998027ec712b905cd24f6a411","","mention"],["a","30311:1bc70a0148b3f316da33fe3c89f23e3e71ac4ff998027ec712b905cd24f6a411:1687612774","","mention"]],"content":"Watching Karnage's stream to see if I learn something about design. \n\nnostr:naddr1qq9rzd3cxumrzv3hxu6qygqmcu9qzj9n7vtd5vl78jyly037wxkyl7vcqflvwy4eqhxjfa4yzypsgqqqwens0qfplk","sig":"dbc5d05a24bfe990a1faaedfcb81a98940d86a105711dbdad9145d05b0ad0f46e3e24eaa3fc283818f27e057fe836a029fd9a68e7f1de06ff477493199d64064"}"##;
let _: EventV3 = serde_json::from_str(&raw).unwrap();
}
#[cfg(feature = "speedy")]
#[test]
fn test_speedy_encoded_direct_field_access() {
use speedy::Writable;
let signer = {
let privkey = PrivateKey::mock();
KeySigner::from_private_key(privkey, "", 1).unwrap()
};
let preevent = PreEventV3 {
pubkey: signer.public_key(),
created_at: Unixtime(1680000012),
kind: EventKind::TextNote,
tags: vec![
TagV3::new_event(Id::mock(), Some(UncheckedUrl::mock()), None),
TagV3::new_hashtag("foodstr".to_string()),
],
content: "Hello World!".to_string(),
};
let event = signer.sign_event(preevent).unwrap();
let bytes = event.write_to_vec().unwrap();
let id = EventV3::get_id_from_speedy_bytes(&bytes).unwrap();
assert_eq!(id, event.id);
let pubkey = EventV3::get_pubkey_from_speedy_bytes(&bytes).unwrap();
assert_eq!(pubkey, event.pubkey);
let created_at = EventV3::get_created_at_from_speedy_bytes(&bytes).unwrap();
assert_eq!(created_at, Unixtime(1680000012));
let kind = EventV3::get_kind_from_speedy_bytes(&bytes).unwrap();
assert_eq!(kind, event.kind);
let content = EventV3::get_content_from_speedy_bytes(&bytes);
assert_eq!(content, Some(&*event.content));
let re = regex::Regex::new("foodstr").unwrap();
let found_foodstr = EventV3::tag_search_in_speedy_bytes(&bytes, &re).unwrap();
assert!(found_foodstr);
println!("EVENT BYTES: {:?}", bytes);
println!("ID: {:?}", event.id.0);
println!("PUBKEY: {:?}", event.pubkey.as_slice());
println!("CREATED AT: {:?}", event.created_at.0.to_ne_bytes());
let kind32: u32 = event.kind.into();
println!("KIND: {:?}", kind32.to_ne_bytes());
println!("SIG: {:?}", event.sig.0.as_ref());
println!(
"CONTENT: [len={:?}] {:?}",
(event.content.as_bytes().len() as u32).to_ne_bytes(),
event.content.as_bytes()
);
println!("TAGS: [len={:?}]", (event.tags.len() as u32).to_ne_bytes());
}
#[test]
fn test_event_gift_wrap() {
let signer1 = {
let sec1 = PrivateKey::try_from_hex_string(
"0000000000000000000000000000000000000000000000000000000000000001",
)
.unwrap();
KeySigner::from_private_key(sec1, "", 1).unwrap()
};
let signer2 = {
let sec2 = PrivateKey::try_from_hex_string(
"0000000000000000000000000000000000000000000000000000000000000002",
)
.unwrap();
KeySigner::from_private_key(sec2, "", 1).unwrap()
};
let pre = PreEventV3 {
pubkey: signer1.public_key(),
created_at: Unixtime(1692_000_000),
kind: EventKind::TextNote,
content: "Hey man, this rocks! Please reply for a test.".to_string(),
tags: vec![],
};
let gift_wrap = signer1.giftwrap(pre.clone(), signer2.public_key()).unwrap();
let rumor = signer2.unwrap_giftwrap(&gift_wrap).unwrap();
let output_pre: PreEventV3 = rumor.into();
assert_eq!(pre, output_pre);
}
#[test]
fn test_a_tags_as_replies() {
let raw = r#"{"id":"d4fb3aeae033baa4a9504027bff8fd065ba1bbd635c501a5e4f8c7ab0bd37c34","pubkey":"7bdef7be22dd8e59f4600e044aa53a1cf975a9dc7d27df5833bc77db784a5805","created_at":1716980987,"kind":1,"sig":"903ae95893082835a42706eda1328ea85a8bf6fbb172bb2f8696b66fccfebfae8756992894a0fb7bb592cb3f78939bdd5fac4cd1eb49138cbf3ea8069574a1dc","content":"The article is interesting, but why compiling everything when configuring meta tags in dist/index.html is sufficient? (like you did in the first version, if I'm not wrong)\nOne main selling point of Oracolo is that it does not require complex server side setup.\n\n> Every time you access the web page, the web page is compiled\n\nThis is not technically correct :)\nJavaScript code is not compiled, it is simply executed; it fetches Nostr data and so builds the page.","tags":[["p","b12b632c887f0c871d140d37bcb6e7c1e1a80264d0b7de8255aa1951d9e1ff79"],["a","30023:b12b632c887f0c871d140d37bcb6e7c1e1a80264d0b7de8255aa1951d9e1ff79:1716928135712","","root"],["r","index.html"]]}"#;
let event: EventV3 = serde_json::from_str(&raw).unwrap();
if let Some(parent) = event.replies_to() {
assert!(matches!(parent, EventReference::Addr(_)));
} else {
panic!("a tag reply not recognized");
}
}
}