|
4 | 4 | //! The server maintains the thread pool for P2P Connection, Watchtower, Bitcoin Backend, and RPC Client Request. |
5 | 5 | //! The server listens at two ports: 6102 for P2P, and 6103 for RPC Client requests. |
6 | 6 |
|
7 | | -use crate::protocol::messages::FidelityProof; |
| 7 | +use crate::{ |
| 8 | + protocol::messages::FidelityProof, |
| 9 | + utill::{COINSWAP_KIND, NOSTR_RELAYS}, |
| 10 | +}; |
8 | 11 | use bitcoin::{absolute::LockTime, Amount}; |
9 | 12 | use bitcoind::bitcoincore_rpc::RpcApi; |
| 13 | +use nostr::{ |
| 14 | + event::{EventBuilder, Kind}, |
| 15 | + key::{Keys, SecretKey}, |
| 16 | + message::{ClientMessage, RelayMessage}, |
| 17 | + util::JsonUtil, |
| 18 | +}; |
| 19 | +use tungstenite::Message; |
10 | 20 |
|
11 | 21 | use std::{ |
12 | 22 | io::ErrorKind, |
@@ -75,10 +85,102 @@ fn network_bootstrap(maker: Arc<Maker>) -> Result<String, MakerError> { |
75 | 85 | /// 2. Creates a new fidelity bond if no valid bonds remain after redemption. |
76 | 86 | fn manage_fidelity_bonds(maker: &Maker, maker_addr: &str) -> Result<(), MakerError> { |
77 | 87 | maker.wallet.write()?.redeem_expired_fidelity_bonds()?; |
78 | | - setup_fidelity_bond(maker, maker_addr)?; |
| 88 | + let fidelity = setup_fidelity_bond(maker, maker_addr)?; |
| 89 | + broadcast_bond_on_nostr(fidelity)?; |
79 | 90 | Ok(()) |
80 | 91 | } |
81 | 92 |
|
| 93 | +// ##TODO: Make this part of nostr module and improve error handing |
| 94 | +// ##TODO: Try retry in case relay doesn't accept the event |
| 95 | +fn broadcast_bond_on_nostr(fidelity: FidelityProof) -> Result<(), MakerError> { |
| 96 | + let outpoint = fidelity.bond.outpoint; |
| 97 | + let content = format!("{}:{}", outpoint.txid, outpoint.vout); |
| 98 | + |
| 99 | + // ##TODO: Don't use ephemeral keys |
| 100 | + let secret_key = SecretKey::generate(); |
| 101 | + let keys = Keys::new(secret_key); |
| 102 | + |
| 103 | + let event = EventBuilder::new(Kind::Custom(COINSWAP_KIND), content) |
| 104 | + .build(keys.public_key) |
| 105 | + .sign_with_keys(&keys) |
| 106 | + .expect("Event should be signed"); |
| 107 | + |
| 108 | + let msg = ClientMessage::Event(std::borrow::Cow::Owned(event)); |
| 109 | + |
| 110 | + log::debug!("nostr wire msg: {}", msg.as_json()); |
| 111 | + |
| 112 | + let mut success = false; |
| 113 | + |
| 114 | + for relay in NOSTR_RELAYS { |
| 115 | + match broadcast_to_relay(relay, &msg) { |
| 116 | + Ok(()) => { |
| 117 | + success = true; |
| 118 | + } |
| 119 | + Err(e) => { |
| 120 | + log::warn!("failed to broadcast to {}: {:?}", relay, e); |
| 121 | + } |
| 122 | + } |
| 123 | + } |
| 124 | + |
| 125 | + if !success { |
| 126 | + log::warn!("nostr event was not accepted by any relay"); |
| 127 | + } |
| 128 | + |
| 129 | + Ok(()) |
| 130 | +} |
| 131 | + |
| 132 | +fn broadcast_to_relay(relay: &str, msg: &ClientMessage) -> Result<(), MakerError> { |
| 133 | + let (mut socket, _) = tungstenite::connect(relay).map_err(|e| { |
| 134 | + log::warn!("failed to connect to nostr relay {}: {}", relay, e); |
| 135 | + MakerError::General("failed to connect to nostr relay") |
| 136 | + })?; |
| 137 | + |
| 138 | + socket |
| 139 | + .write(Message::Text(msg.as_json().into())) |
| 140 | + .map_err(|e| { |
| 141 | + log::warn!("nostr relay write failed: {}", e); |
| 142 | + MakerError::General("failed to write to nostr relay") |
| 143 | + })?; |
| 144 | + socket.flush().ok(); |
| 145 | + |
| 146 | + match socket.read() { |
| 147 | + Ok(Message::Text(text)) => { |
| 148 | + if let Ok(relay_msg) = RelayMessage::from_json(&text) { |
| 149 | + match relay_msg { |
| 150 | + RelayMessage::Ok { |
| 151 | + event_id, |
| 152 | + status: true, |
| 153 | + .. |
| 154 | + } => { |
| 155 | + log::info!("nostr relay {} accepted event {}", relay, event_id); |
| 156 | + return Ok(()); |
| 157 | + } |
| 158 | + RelayMessage::Ok { |
| 159 | + event_id, |
| 160 | + status: false, |
| 161 | + message, |
| 162 | + } => { |
| 163 | + log::warn!( |
| 164 | + "nostr relay {} rejected event {}: {}", |
| 165 | + relay, |
| 166 | + event_id, |
| 167 | + message |
| 168 | + ); |
| 169 | + } |
| 170 | + _ => {} |
| 171 | + } |
| 172 | + } |
| 173 | + } |
| 174 | + Ok(_) => {} |
| 175 | + Err(e) => { |
| 176 | + log::warn!("nostr relay {} read error: {}", relay, e); |
| 177 | + } |
| 178 | + } |
| 179 | + log::warn!("nostr relay {} did not confirm event", relay); |
| 180 | + |
| 181 | + Err(MakerError::General("nostr relay did not confirm event")) |
| 182 | +} |
| 183 | + |
82 | 184 | /// Ensures the wallet has a valid fidelity bond. If no active bond exists, it creates a new one. |
83 | 185 | /// |
84 | 186 | /// ### NOTE ON VALID FIDELITY BOND: |
@@ -152,7 +254,7 @@ fn setup_fidelity_bond(maker: &Maker, maker_address: &str) -> Result<FidelityPro |
152 | 254 | let fidelity_result = maker.get_wallet().write()?.create_fidelity( |
153 | 255 | amount, |
154 | 256 | locktime, |
155 | | - Some(maker_address.as_bytes()), |
| 257 | + Some(maker_address), |
156 | 258 | MIN_FEE_RATE, |
157 | 259 | ); |
158 | 260 |
|
|
0 commit comments