Files
nostrlib/nip46/bunker_session.go

78 lines
1.5 KiB
Go

package nip46
import (
"errors"
"fmt"
"slices"
"fiatjaf.com/nostr"
"fiatjaf.com/nostr/nip44"
)
type Session struct {
PublicKey nostr.PubKey
ConversationKey [32]byte
duplicatesBuf [6]string
serial int
}
type RelayReadWrite struct {
Read bool `json:"read"`
Write bool `json:"write"`
}
var AlreadyHandled = errors.New("already handled this request")
func (s *Session) ParseRequest(event nostr.Event) (Request, error) {
var req Request
plain, err := nip44.Decrypt(event.Content, s.ConversationKey)
if err != nil {
return req, fmt.Errorf("failed to decrypt event from %s: (nip44: %w)", event.PubKey, err)
}
err = json.Unmarshal([]byte(plain), &req)
// discard duplicates
if slices.Contains(s.duplicatesBuf[:], req.ID) {
return req, AlreadyHandled
}
s.duplicatesBuf[s.serial%len(s.duplicatesBuf)] = req.ID
s.serial++
return req, err
}
func (s Session) MakeResponse(
id string,
requester nostr.PubKey,
result string,
err error,
) (resp Response, evt nostr.Event, error error) {
if err != nil {
resp = Response{
ID: id,
Error: err.Error(),
}
} else if result != "" {
resp = Response{
ID: id,
Result: result,
}
}
jresp, _ := json.Marshal(resp)
ciphertext, err := nip44.Encrypt(string(jresp), s.ConversationKey)
if err != nil {
return resp, evt, fmt.Errorf("failed to encrypt result: %w", err)
}
evt.Content = ciphertext
evt.CreatedAt = nostr.Now()
evt.Kind = nostr.KindNostrConnect
evt.Tags = nostr.Tags{nostr.Tag{"p", requester.Hex()}}
return resp, evt, nil
}