#![deny(missing_docs)]
#![deny(non_upper_case_globals)]
#![deny(non_camel_case_types)]
#![deny(non_snake_case)]
#![deny(unused_mut)]
#![cfg_attr(feature = "strict", deny(warnings))]
extern crate bech32;
extern crate bitcoin_hashes;
extern crate num_traits;
extern crate secp256k1;
use bech32::u5;
use bitcoin_hashes::Hash;
use bitcoin_hashes::sha256;
use secp256k1::key::PublicKey;
use secp256k1::{Message, Secp256k1};
use secp256k1::recovery::RecoverableSignature;
use std::ops::Deref;
use std::iter::FilterMap;
use std::slice::Iter;
use std::time::{SystemTime, Duration, UNIX_EPOCH};
use std::fmt::{Display, Formatter, self};
mod de;
mod ser;
mod tb;
pub use de::{ParseError, ParseOrSemanticError};
const SYSTEM_TIME_MAX_UNIX_TIMESTAMP: u64 = std::i32::MAX as u64;
const MAX_EXPIRY_TIME: u64 = 60 * 60 * 24 * 356;
fn __system_time_size_check() {
unsafe { std::mem::transmute::<SystemTime, [u8; 16]>(UNIX_EPOCH); }
}
pub fn check_platform() {
let fail_date = UNIX_EPOCH + Duration::from_secs(SYSTEM_TIME_MAX_UNIX_TIMESTAMP);
let year = Duration::from_secs(60 * 60 * 24 * 365);
assert!(fail_date.duration_since(SystemTime::now()).unwrap() > year);
let max_ts = PositiveTimestamp::from_unix_timestamp(
SYSTEM_TIME_MAX_UNIX_TIMESTAMP - MAX_EXPIRY_TIME
).unwrap();
let max_exp = ::ExpiryTime::from_seconds(MAX_EXPIRY_TIME).unwrap();
assert_eq!(
(*max_ts.as_time() + *max_exp.as_duration()).duration_since(UNIX_EPOCH).unwrap().as_secs(),
SYSTEM_TIME_MAX_UNIX_TIMESTAMP
);
}
#[derive(Eq, PartialEq, Debug, Clone)]
pub struct InvoiceBuilder<D: tb::Bool, H: tb::Bool, T: tb::Bool> {
currency: Currency,
amount: Option<u64>,
si_prefix: Option<SiPrefix>,
timestamp: Option<PositiveTimestamp>,
tagged_fields: Vec<TaggedField>,
error: Option<CreationError>,
phantom_d: std::marker::PhantomData<D>,
phantom_h: std::marker::PhantomData<H>,
phantom_t: std::marker::PhantomData<T>,
}
#[derive(Eq, PartialEq, Debug, Clone)]
pub struct Invoice {
signed_invoice: SignedRawInvoice,
}
#[derive(Eq, PartialEq, Debug, Clone)]
pub enum InvoiceDescription<'f> {
Direct(&'f Description),
Hash(&'f Sha256),
}
#[derive(Eq, PartialEq, Debug, Clone)]
pub struct SignedRawInvoice {
raw_invoice: RawInvoice,
hash: [u8; 32],
signature: Signature,
}
#[derive(Eq, PartialEq, Debug, Clone)]
pub struct RawInvoice {
pub hrp: RawHrp,
pub data: RawDataPart,
}
#[derive(Eq, PartialEq, Debug, Clone)]
pub struct RawHrp {
pub currency: Currency,
pub raw_amount: Option<u64>,
pub si_prefix: Option<SiPrefix>,
}
#[derive(Eq, PartialEq, Debug, Clone)]
pub struct RawDataPart {
pub timestamp: PositiveTimestamp,
pub tagged_fields: Vec<RawTaggedField>,
}
#[derive(Eq, PartialEq, Debug, Clone)]
pub struct PositiveTimestamp(SystemTime);
#[derive(Eq, PartialEq, Debug, Clone, Copy)]
pub enum SiPrefix {
Milli,
Micro,
Nano,
Pico,
}
impl SiPrefix {
pub fn multiplier(&self) -> u64 {
match *self {
SiPrefix::Milli => 1_000_000_000,
SiPrefix::Micro => 1_000_000,
SiPrefix::Nano => 1_000,
SiPrefix::Pico => 1,
}
}
pub fn values_desc() -> &'static [SiPrefix] {
use SiPrefix::*;
static VALUES: [SiPrefix; 4] = [Milli, Micro, Nano, Pico];
&VALUES
}
}
#[derive(Eq, PartialEq, Debug, Clone)]
pub enum Currency {
Bitcoin,
BitcoinTestnet,
Regtest,
Simnet,
}
#[derive(Eq, PartialEq, Debug, Clone)]
pub enum RawTaggedField {
KnownSemantics(TaggedField),
UnknownSemantics(Vec<u5>),
}
#[allow(missing_docs)]
#[derive(Eq, PartialEq, Debug, Clone)]
pub enum TaggedField {
PaymentHash(Sha256),
Description(Description),
PayeePubKey(PayeePubKey),
DescriptionHash(Sha256),
ExpiryTime(ExpiryTime),
MinFinalCltvExpiry(MinFinalCltvExpiry),
Fallback(Fallback),
Route(Route),
}
#[derive(Eq, PartialEq, Debug, Clone)]
pub struct Sha256(pub sha256::Hash);
#[derive(Eq, PartialEq, Debug, Clone)]
pub struct Description(String);
#[derive(Eq, PartialEq, Debug, Clone)]
pub struct PayeePubKey(pub PublicKey);
#[derive(Eq, PartialEq, Debug, Clone)]
pub struct ExpiryTime(Duration);
#[derive(Eq, PartialEq, Debug, Clone)]
pub struct MinFinalCltvExpiry(pub u64);
#[allow(missing_docs)]
#[derive(Eq, PartialEq, Debug, Clone)]
pub enum Fallback {
SegWitProgram {
version: u5,
program: Vec<u8>,
},
PubKeyHash([u8; 20]),
ScriptHash([u8; 20]),
}
#[derive(Eq, PartialEq, Debug, Clone)]
pub struct Signature(pub RecoverableSignature);
#[derive(Eq, PartialEq, Debug, Clone)]
pub struct Route(Vec<RouteHop>);
#[derive(Eq, PartialEq, Debug, Clone)]
pub struct RouteHop {
pub pubkey: PublicKey,
pub short_channel_id: [u8; 8],
pub fee_base_msat: u32,
pub fee_proportional_millionths: u32,
pub cltv_expiry_delta: u16,
}
#[allow(missing_docs)]
pub mod constants {
pub const TAG_PAYMENT_HASH: u8 = 1;
pub const TAG_DESCRIPTION: u8 = 13;
pub const TAG_PAYEE_PUB_KEY: u8 = 19;
pub const TAG_DESCRIPTION_HASH: u8 = 23;
pub const TAG_EXPIRY_TIME: u8 = 6;
pub const TAG_MIN_FINAL_CLTV_EXPIRY: u8 = 24;
pub const TAG_FALLBACK: u8 = 9;
pub const TAG_ROUTE: u8 = 3;
}
impl InvoiceBuilder<tb::False, tb::False, tb::False> {
pub fn new(currrency: Currency) -> Self {
InvoiceBuilder {
currency: currrency,
amount: None,
si_prefix: None,
timestamp: None,
tagged_fields: Vec::new(),
error: None,
phantom_d: std::marker::PhantomData,
phantom_h: std::marker::PhantomData,
phantom_t: std::marker::PhantomData,
}
}
}
impl<D: tb::Bool, H: tb::Bool, T: tb::Bool> InvoiceBuilder<D, H, T> {
fn set_flags<DN: tb::Bool, HN: tb::Bool, TN: tb::Bool>(self) -> InvoiceBuilder<DN, HN, TN> {
InvoiceBuilder::<DN, HN, TN> {
currency: self.currency,
amount: self.amount,
si_prefix: self.si_prefix,
timestamp: self.timestamp,
tagged_fields: self.tagged_fields,
error: self.error,
phantom_d: std::marker::PhantomData,
phantom_h: std::marker::PhantomData,
phantom_t: std::marker::PhantomData,
}
}
pub fn amount_pico_btc(mut self, amount: u64) -> Self {
let biggest_possible_si_prefix = SiPrefix::values_desc()
.iter()
.find(|prefix| amount % prefix.multiplier() == 0)
.expect("Pico should always match");
self.amount = Some(amount / biggest_possible_si_prefix.multiplier());
self.si_prefix = Some(*biggest_possible_si_prefix);
self
}
pub fn payee_pub_key(mut self, pub_key: PublicKey) -> Self {
self.tagged_fields.push(TaggedField::PayeePubKey(PayeePubKey(pub_key)));
self
}
pub fn expiry_time(mut self, expiry_time: Duration) -> Self {
match ExpiryTime::from_duration(expiry_time) {
Ok(t) => self.tagged_fields.push(TaggedField::ExpiryTime(t)),
Err(e) => self.error = Some(e),
};
self
}
pub fn min_final_cltv_expiry(mut self, min_final_cltv_expiry: u64) -> Self {
self.tagged_fields.push(TaggedField::MinFinalCltvExpiry(MinFinalCltvExpiry(min_final_cltv_expiry)));
self
}
pub fn fallback(mut self, fallback: Fallback) -> Self {
self.tagged_fields.push(TaggedField::Fallback(fallback));
self
}
pub fn route(mut self, route: Vec<RouteHop>) -> Self {
match Route::new(route) {
Ok(r) => self.tagged_fields.push(TaggedField::Route(r)),
Err(e) => self.error = Some(e),
}
self
}
}
impl<D: tb::Bool, H: tb::Bool> InvoiceBuilder<D, H, tb::True> {
pub fn build_raw(self) -> Result<RawInvoice, CreationError> {
if let Some(e) = self.error {
return Err(e);
}
let hrp = RawHrp {
currency: self.currency,
raw_amount: self.amount,
si_prefix: self.si_prefix,
};
let timestamp = self.timestamp.expect("ensured to be Some(t) by type T");
let tagged_fields = self.tagged_fields.into_iter().map(|tf| {
RawTaggedField::KnownSemantics(tf)
}).collect::<Vec<_>>();
let data = RawDataPart {
timestamp: timestamp,
tagged_fields: tagged_fields,
};
Ok(RawInvoice {
hrp: hrp,
data: data,
})
}
}
impl<H: tb::Bool, T: tb::Bool> InvoiceBuilder<tb::False, H, T> {
pub fn description(mut self, description: String) -> InvoiceBuilder<tb::True, H, T> {
match Description::new(description) {
Ok(d) => self.tagged_fields.push(TaggedField::Description(d)),
Err(e) => self.error = Some(e),
}
self.set_flags()
}
pub fn description_hash(mut self, description_hash: sha256::Hash) -> InvoiceBuilder<tb::True, H, T> {
self.tagged_fields.push(TaggedField::DescriptionHash(Sha256(description_hash)));
self.set_flags()
}
}
impl<D: tb::Bool, T: tb::Bool> InvoiceBuilder<D, tb::False, T> {
pub fn payment_hash(mut self, hash: sha256::Hash) -> InvoiceBuilder<D, tb::True, T> {
self.tagged_fields.push(TaggedField::PaymentHash(Sha256(hash)));
self.set_flags()
}
}
impl<D: tb::Bool, H: tb::Bool> InvoiceBuilder<D, H, tb::False> {
pub fn timestamp(mut self, time: SystemTime) -> InvoiceBuilder<D, H, tb::True> {
match PositiveTimestamp::from_system_time(time) {
Ok(t) => self.timestamp = Some(t),
Err(e) => self.error = Some(e),
}
self.set_flags()
}
pub fn current_timestamp(mut self) -> InvoiceBuilder<D, H, tb::True> {
let now = PositiveTimestamp::from_system_time(SystemTime::now());
self.timestamp = Some(now.expect("for the foreseeable future this shouldn't happen"));
self.set_flags()
}
}
impl InvoiceBuilder<tb::True, tb::True, tb::True> {
pub fn build_signed<F>(self, sign_function: F) -> Result<Invoice, CreationError>
where F: FnOnce(&Message) -> RecoverableSignature
{
let invoice = self.try_build_signed::<_, ()>(|hash| {
Ok(sign_function(hash))
});
match invoice {
Ok(i) => Ok(i),
Err(SignOrCreationError::CreationError(e)) => Err(e),
Err(SignOrCreationError::SignError(())) => unreachable!(),
}
}
pub fn try_build_signed<F, E>(self, sign_function: F) -> Result<Invoice, SignOrCreationError<E>>
where F: FnOnce(&Message) -> Result<RecoverableSignature, E>
{
let raw = match self.build_raw() {
Ok(r) => r,
Err(e) => return Err(SignOrCreationError::CreationError(e)),
};
let signed = match raw.sign(sign_function) {
Ok(s) => s,
Err(e) => return Err(SignOrCreationError::SignError(e)),
};
let invoice = Invoice {
signed_invoice: signed,
};
invoice.check_field_counts().expect("should be ensured by type signature of builder");
Ok(invoice)
}
}
impl SignedRawInvoice {
pub fn into_parts(self) -> (RawInvoice, [u8; 32], Signature) {
(self.raw_invoice, self.hash, self.signature)
}
pub fn raw_invoice(&self) -> &RawInvoice {
&self.raw_invoice
}
pub fn hash(&self) -> &[u8; 32] {
&self.hash
}
pub fn signature(&self) -> &Signature {
&self.signature
}
pub fn recover_payee_pub_key(&self) -> Result<PayeePubKey, secp256k1::Error> {
let hash = Message::from_slice(&self.hash[..])
.expect("Hash is 32 bytes long, same as MESSAGE_SIZE");
Ok(PayeePubKey(Secp256k1::new().recover(
&hash,
&self.signature
)?))
}
pub fn check_signature(&self) -> bool {
let included_pub_key = self.raw_invoice.payee_pub_key();
let mut recovered_pub_key = Option::None;
if recovered_pub_key.is_none() {
let recovered = match self.recover_payee_pub_key() {
Ok(pk) => pk,
Err(_) => return false,
};
recovered_pub_key = Some(recovered);
}
let pub_key = included_pub_key.or_else(|| recovered_pub_key.as_ref())
.expect("One is always present");
let hash = Message::from_slice(&self.hash[..])
.expect("Hash is 32 bytes long, same as MESSAGE_SIZE");
let secp_context = Secp256k1::new();
let verification_result = secp_context.verify(
&hash,
&self.signature.to_standard(),
pub_key
);
match verification_result {
Ok(()) => true,
Err(_) => false,
}
}
}
macro_rules! find_extract {
($iter:expr, $enm:pat, $enm_var:ident) => {
$iter.filter_map(|tf| match *tf {
$enm => Some($enm_var),
_ => None,
}).next()
};
}
#[allow(missing_docs)]
impl RawInvoice {
fn hash_from_parts(hrp_bytes: &[u8], data_without_signature: &[u5]) -> [u8; 32] {
use bech32::FromBase32;
let mut preimage = Vec::<u8>::from(hrp_bytes);
let mut data_part = Vec::from(data_without_signature);
let overhang = (data_part.len() * 5) % 8;
if overhang > 0 {
data_part.push(u5::try_from_u8(0).unwrap());
if overhang < 3 {
data_part.push(u5::try_from_u8(0).unwrap());
}
}
preimage.extend_from_slice(&Vec::<u8>::from_base32(&data_part)
.expect("No padding error may occur due to appended zero above."));
let mut hash: [u8; 32] = Default::default();
hash.copy_from_slice(&sha256::Hash::hash(&preimage)[..]);
hash
}
pub fn hash(&self) -> [u8; 32] {
use bech32::ToBase32;
RawInvoice::hash_from_parts(
self.hrp.to_string().as_bytes(),
&self.data.to_base32()
)
}
pub fn sign<F, E>(self, sign_method: F) -> Result<SignedRawInvoice, E>
where F: FnOnce(&Message) -> Result<RecoverableSignature, E>
{
let raw_hash = self.hash();
let hash = Message::from_slice(&raw_hash[..])
.expect("Hash is 32 bytes long, same as MESSAGE_SIZE");
let signature = sign_method(&hash)?;
Ok(SignedRawInvoice {
raw_invoice: self,
hash: raw_hash,
signature: Signature(signature),
})
}
pub fn known_tagged_fields(&self)
-> FilterMap<Iter<RawTaggedField>, fn(&RawTaggedField) -> Option<&TaggedField>>
{
fn match_raw(raw: &RawTaggedField) -> Option<&TaggedField> {
match *raw {
RawTaggedField::KnownSemantics(ref tf) => Some(tf),
_ => None,
}
}
self.data.tagged_fields.iter().filter_map(match_raw )
}
pub fn payment_hash(&self) -> Option<&Sha256> {
find_extract!(self.known_tagged_fields(), TaggedField::PaymentHash(ref x), x)
}
pub fn description(&self) -> Option<&Description> {
find_extract!(self.known_tagged_fields(), TaggedField::Description(ref x), x)
}
pub fn payee_pub_key(&self) -> Option<&PayeePubKey> {
find_extract!(self.known_tagged_fields(), TaggedField::PayeePubKey(ref x), x)
}
pub fn description_hash(&self) -> Option<&Sha256> {
find_extract!(self.known_tagged_fields(), TaggedField::DescriptionHash(ref x), x)
}
pub fn expiry_time(&self) -> Option<&ExpiryTime> {
find_extract!(self.known_tagged_fields(), TaggedField::ExpiryTime(ref x), x)
}
pub fn min_final_cltv_expiry(&self) -> Option<&MinFinalCltvExpiry> {
find_extract!(self.known_tagged_fields(), TaggedField::MinFinalCltvExpiry(ref x), x)
}
pub fn fallbacks(&self) -> Vec<&Fallback> {
self.known_tagged_fields().filter_map(|tf| match tf {
&TaggedField::Fallback(ref f) => Some(f),
_ => None,
}).collect::<Vec<&Fallback>>()
}
pub fn routes(&self) -> Vec<&Route> {
self.known_tagged_fields().filter_map(|tf| match tf {
&TaggedField::Route(ref r) => Some(r),
_ => None,
}).collect::<Vec<&Route>>()
}
pub fn amount_pico_btc(&self) -> Option<u64> {
self.hrp.raw_amount.map(|v| {
v * self.hrp.si_prefix.as_ref().map_or(1_000_000_000_000, |si| { si.multiplier() })
})
}
pub fn currency(&self) -> Currency {
self.hrp.currency.clone()
}
}
impl PositiveTimestamp {
pub fn from_unix_timestamp(unix_seconds: u64) -> Result<Self, CreationError> {
if unix_seconds > SYSTEM_TIME_MAX_UNIX_TIMESTAMP - MAX_EXPIRY_TIME {
Err(CreationError::TimestampOutOfBounds)
} else {
Ok(PositiveTimestamp(UNIX_EPOCH + Duration::from_secs(unix_seconds)))
}
}
pub fn from_system_time(time: SystemTime) -> Result<Self, CreationError> {
if time
.duration_since(UNIX_EPOCH)
.map(|t| t.as_secs() <= SYSTEM_TIME_MAX_UNIX_TIMESTAMP - MAX_EXPIRY_TIME)
.unwrap_or(true)
{
Ok(PositiveTimestamp(time))
} else {
Err(CreationError::TimestampOutOfBounds)
}
}
pub fn as_unix_timestamp(&self) -> u64 {
self.0.duration_since(UNIX_EPOCH)
.expect("ensured by type contract/constructors")
.as_secs()
}
pub fn as_time(&self) -> &SystemTime {
&self.0
}
}
impl Into<SystemTime> for PositiveTimestamp {
fn into(self) -> SystemTime {
self.0
}
}
impl Deref for PositiveTimestamp {
type Target = SystemTime;
fn deref(&self) -> &Self::Target {
&self.0
}
}
impl Invoice {
pub fn into_signed_raw(self) -> SignedRawInvoice {
self.signed_invoice
}
fn check_field_counts(&self) -> Result<(), SemanticError> {
let payment_hash_cnt = self.tagged_fields().filter(|&tf| match *tf {
TaggedField::PaymentHash(_) => true,
_ => false,
}).count();
if payment_hash_cnt < 1 {
return Err(SemanticError::NoPaymentHash);
} else if payment_hash_cnt > 1 {
return Err(SemanticError::MultiplePaymentHashes);
}
let description_cnt = self.tagged_fields().filter(|&tf| match *tf {
TaggedField::Description(_) | TaggedField::DescriptionHash(_) => true,
_ => false,
}).count();
if description_cnt < 1 {
return Err(SemanticError::NoDescription);
} else if description_cnt > 1 {
return Err(SemanticError::MultipleDescriptions);
}
Ok(())
}
pub fn check_signature(&self) -> Result<(), SemanticError> {
match self.signed_invoice.recover_payee_pub_key() {
Err(secp256k1::Error::InvalidRecoveryId) =>
return Err(SemanticError::InvalidRecoveryId),
Err(_) => panic!("no other error may occur"),
Ok(_) => {},
}
if !self.signed_invoice.check_signature() {
return Err(SemanticError::InvalidSignature);
}
Ok(())
}
pub fn from_signed(signed_invoice: SignedRawInvoice) -> Result<Self, SemanticError> {
let invoice = Invoice {
signed_invoice: signed_invoice,
};
invoice.check_field_counts()?;
invoice.check_signature()?;
Ok(invoice)
}
pub fn timestamp(&self) -> &SystemTime {
self.signed_invoice.raw_invoice().data.timestamp.as_time()
}
pub fn tagged_fields(&self)
-> FilterMap<Iter<RawTaggedField>, fn(&RawTaggedField) -> Option<&TaggedField>> {
self.signed_invoice.raw_invoice().known_tagged_fields()
}
pub fn payment_hash(&self) -> &sha256::Hash {
&self.signed_invoice.payment_hash().expect("checked by constructor").0
}
pub fn description(&self) -> InvoiceDescription {
if let Some(ref direct) = self.signed_invoice.description() {
return InvoiceDescription::Direct(direct);
} else if let Some(ref hash) = self.signed_invoice.description_hash() {
return InvoiceDescription::Hash(hash);
}
unreachable!("ensured by constructor");
}
pub fn payee_pub_key(&self) -> Option<&PublicKey> {
self.signed_invoice.payee_pub_key().map(|x| &x.0)
}
pub fn recover_payee_pub_key(&self) -> PublicKey {
self.signed_invoice.recover_payee_pub_key().expect("was checked by constructor").0
}
pub fn expiry_time(&self) -> Duration {
self.signed_invoice.expiry_time()
.map(|x| x.0)
.unwrap_or(Duration::from_secs(3600))
}
pub fn min_final_cltv_expiry(&self) -> Option<&u64> {
self.signed_invoice.min_final_cltv_expiry().map(|x| &x.0)
}
pub fn fallbacks(&self) -> Vec<&Fallback> {
self.signed_invoice.fallbacks()
}
pub fn routes(&self) -> Vec<&Route> {
self.signed_invoice.routes()
}
pub fn currency(&self) -> Currency {
self.signed_invoice.currency()
}
pub fn amount_pico_btc(&self) -> Option<u64> {
self.signed_invoice.amount_pico_btc()
}
}
impl From<TaggedField> for RawTaggedField {
fn from(tf: TaggedField) -> Self {
RawTaggedField::KnownSemantics(tf)
}
}
impl TaggedField {
pub fn tag(&self) -> u5 {
let tag = match *self {
TaggedField::PaymentHash(_) => constants::TAG_PAYMENT_HASH,
TaggedField::Description(_) => constants::TAG_DESCRIPTION,
TaggedField::PayeePubKey(_) => constants::TAG_PAYEE_PUB_KEY,
TaggedField::DescriptionHash(_) => constants::TAG_DESCRIPTION_HASH,
TaggedField::ExpiryTime(_) => constants::TAG_EXPIRY_TIME,
TaggedField::MinFinalCltvExpiry(_) => constants::TAG_MIN_FINAL_CLTV_EXPIRY,
TaggedField::Fallback(_) => constants::TAG_FALLBACK,
TaggedField::Route(_) => constants::TAG_ROUTE,
};
u5::try_from_u8(tag).expect("all tags defined are <32")
}
}
impl Description {
pub fn new(description: String) -> Result<Description, CreationError> {
if description.len() > 639 {
Err(CreationError::DescriptionTooLong)
} else {
Ok(Description(description))
}
}
pub fn into_inner(self) -> String {
self.0
}
}
impl Into<String> for Description {
fn into(self) -> String {
self.into_inner()
}
}
impl Deref for Description {
type Target = str;
fn deref(&self) -> &str {
&self.0
}
}
impl From<PublicKey> for PayeePubKey {
fn from(pk: PublicKey) -> Self {
PayeePubKey(pk)
}
}
impl Deref for PayeePubKey {
type Target = PublicKey;
fn deref(&self) -> &PublicKey {
&self.0
}
}
impl ExpiryTime {
pub fn from_seconds(seconds: u64) -> Result<ExpiryTime, CreationError> {
if seconds <= MAX_EXPIRY_TIME {
Ok(ExpiryTime(Duration::from_secs(seconds)))
} else {
Err(CreationError::ExpiryTimeOutOfBounds)
}
}
pub fn from_duration(duration: Duration) -> Result<ExpiryTime, CreationError> {
if duration.as_secs() <= MAX_EXPIRY_TIME {
Ok(ExpiryTime(duration))
} else {
Err(CreationError::ExpiryTimeOutOfBounds)
}
}
pub fn as_seconds(&self) -> u64 {
self.0.as_secs()
}
pub fn as_duration(&self) -> &Duration {
&self.0
}
}
impl Route {
pub fn new(hops: Vec<RouteHop>) -> Result<Route, CreationError> {
if hops.len() <= 12 {
Ok(Route(hops))
} else {
Err(CreationError::RouteTooLong)
}
}
pub fn into_inner(self) -> Vec<RouteHop> {
self.0
}
}
impl Into<Vec<RouteHop>> for Route {
fn into(self) -> Vec<RouteHop> {
self.into_inner()
}
}
impl Deref for Route {
type Target = Vec<RouteHop>;
fn deref(&self) -> &Vec<RouteHop> {
&self.0
}
}
impl Deref for Signature {
type Target = RecoverableSignature;
fn deref(&self) -> &RecoverableSignature {
&self.0
}
}
impl Deref for SignedRawInvoice {
type Target = RawInvoice;
fn deref(&self) -> &RawInvoice {
&self.raw_invoice
}
}
#[derive(Eq, PartialEq, Debug, Clone)]
pub enum CreationError {
DescriptionTooLong,
RouteTooLong,
TimestampOutOfBounds,
ExpiryTimeOutOfBounds,
}
impl Display for CreationError {
fn fmt(&self, f: &mut Formatter<'_>) -> fmt::Result {
match self {
CreationError::DescriptionTooLong => f.write_str("The supplied description string was longer than 639 bytes"),
CreationError::RouteTooLong => f.write_str("The specified route has too many hops and can't be encoded"),
CreationError::TimestampOutOfBounds => f.write_str("The unix timestamp of the supplied date is <0 or can't be represented as `SystemTime`"),
CreationError::ExpiryTimeOutOfBounds => f.write_str("The supplied expiry time could cause an overflow if added to a `PositiveTimestamp`"),
}
}
}
impl std::error::Error for CreationError { }
#[derive(Eq, PartialEq, Debug, Clone)]
pub enum SemanticError {
NoPaymentHash,
MultiplePaymentHashes,
NoDescription,
MultipleDescriptions,
InvalidRecoveryId,
InvalidSignature,
}
impl Display for SemanticError {
fn fmt(&self, f: &mut Formatter<'_>) -> fmt::Result {
match self {
SemanticError::NoPaymentHash => f.write_str("The invoice is missing the mandatory payment hash"),
SemanticError::MultiplePaymentHashes => f.write_str("The invoice has multiple payment hashes which isn't allowed"),
SemanticError::NoDescription => f.write_str("No description or description hash are part of the invoice"),
SemanticError::MultipleDescriptions => f.write_str("The invoice contains multiple descriptions and/or description hashes which isn't allowed"),
SemanticError::InvalidRecoveryId => f.write_str("The recovery id doesn't fit the signature/pub key"),
SemanticError::InvalidSignature => f.write_str("The invoice's signature is invalid"),
}
}
}
impl std::error::Error for SemanticError { }
#[derive(Eq, PartialEq, Debug, Clone)]
pub enum SignOrCreationError<S> {
SignError(S),
CreationError(CreationError),
}
impl<S> Display for SignOrCreationError<S> {
fn fmt(&self, f: &mut Formatter<'_>) -> fmt::Result {
match self {
SignOrCreationError::SignError(_) => f.write_str("An error occurred during signing"),
SignOrCreationError::CreationError(err) => err.fmt(f),
}
}
}
#[cfg(test)]
mod test {
use bitcoin_hashes::hex::FromHex;
use bitcoin_hashes::{Hash, sha256};
#[test]
fn test_system_time_bounds_assumptions() {
::check_platform();
assert_eq!(
::PositiveTimestamp::from_unix_timestamp(::SYSTEM_TIME_MAX_UNIX_TIMESTAMP + 1),
Err(::CreationError::TimestampOutOfBounds)
);
assert_eq!(
::ExpiryTime::from_seconds(::MAX_EXPIRY_TIME + 1),
Err(::CreationError::ExpiryTimeOutOfBounds)
);
}
#[test]
fn test_calc_invoice_hash() {
use ::{RawInvoice, RawHrp, RawDataPart, Currency, PositiveTimestamp};
use ::TaggedField::*;
let invoice = RawInvoice {
hrp: RawHrp {
currency: Currency::Bitcoin,
raw_amount: None,
si_prefix: None,
},
data: RawDataPart {
timestamp: PositiveTimestamp::from_unix_timestamp(1496314658).unwrap(),
tagged_fields: vec![
PaymentHash(::Sha256(sha256::Hash::from_hex(
"0001020304050607080900010203040506070809000102030405060708090102"
).unwrap())).into(),
Description(::Description::new(
"Please consider supporting this project".to_owned()
).unwrap()).into(),
],
},
};
let expected_hash = [
0xc3, 0xd4, 0xe8, 0x3f, 0x64, 0x6f, 0xa7, 0x9a, 0x39, 0x3d, 0x75, 0x27, 0x7b, 0x1d,
0x85, 0x8d, 0xb1, 0xd1, 0xf7, 0xab, 0x71, 0x37, 0xdc, 0xb7, 0x83, 0x5d, 0xb2, 0xec,
0xd5, 0x18, 0xe1, 0xc9
];
assert_eq!(invoice.hash(), expected_hash)
}
#[test]
fn test_check_signature() {
use TaggedField::*;
use secp256k1::Secp256k1;
use secp256k1::recovery::{RecoveryId, RecoverableSignature};
use secp256k1::key::{SecretKey, PublicKey};
use {SignedRawInvoice, Signature, RawInvoice, RawHrp, RawDataPart, Currency, Sha256,
PositiveTimestamp};
let invoice = SignedRawInvoice {
raw_invoice: RawInvoice {
hrp: RawHrp {
currency: Currency::Bitcoin,
raw_amount: None,
si_prefix: None,
},
data: RawDataPart {
timestamp: PositiveTimestamp::from_unix_timestamp(1496314658).unwrap(),
tagged_fields: vec ! [
PaymentHash(Sha256(sha256::Hash::from_hex(
"0001020304050607080900010203040506070809000102030405060708090102"
).unwrap())).into(),
Description(
::Description::new(
"Please consider supporting this project".to_owned()
).unwrap()
).into(),
],
},
},
hash: [
0xc3, 0xd4, 0xe8, 0x3f, 0x64, 0x6f, 0xa7, 0x9a, 0x39, 0x3d, 0x75, 0x27,
0x7b, 0x1d, 0x85, 0x8d, 0xb1, 0xd1, 0xf7, 0xab, 0x71, 0x37, 0xdc, 0xb7,
0x83, 0x5d, 0xb2, 0xec, 0xd5, 0x18, 0xe1, 0xc9
],
signature: Signature(RecoverableSignature::from_compact(
& [
0x38u8, 0xec, 0x68, 0x91, 0x34, 0x5e, 0x20, 0x41, 0x45, 0xbe, 0x8a,
0x3a, 0x99, 0xde, 0x38, 0xe9, 0x8a, 0x39, 0xd6, 0xa5, 0x69, 0x43,
0x4e, 0x18, 0x45, 0xc8, 0xaf, 0x72, 0x05, 0xaf, 0xcf, 0xcc, 0x7f,
0x42, 0x5f, 0xcd, 0x14, 0x63, 0xe9, 0x3c, 0x32, 0x88, 0x1e, 0xad,
0x0d, 0x6e, 0x35, 0x6d, 0x46, 0x7e, 0xc8, 0xc0, 0x25, 0x53, 0xf9,
0xaa, 0xb1, 0x5e, 0x57, 0x38, 0xb1, 0x1f, 0x12, 0x7f
],
RecoveryId::from_i32(0).unwrap()
).unwrap()),
};
assert!(invoice.check_signature());
let private_key = SecretKey::from_slice(
&[
0xe1, 0x26, 0xf6, 0x8f, 0x7e, 0xaf, 0xcc, 0x8b, 0x74, 0xf5, 0x4d, 0x26, 0x9f, 0xe2,
0x06, 0xbe, 0x71, 0x50, 0x00, 0xf9, 0x4d, 0xac, 0x06, 0x7d, 0x1c, 0x04, 0xa8, 0xca,
0x3b, 0x2d, 0xb7, 0x34
][..]
).unwrap();
let public_key = PublicKey::from_secret_key(&Secp256k1::new(), &private_key);
assert_eq!(invoice.recover_payee_pub_key(), Ok(::PayeePubKey(public_key)));
let (raw_invoice, _, _) = invoice.into_parts();
let new_signed = raw_invoice.sign::<_, ()>(|hash| {
Ok(Secp256k1::new().sign_recoverable(hash, &private_key))
}).unwrap();
assert!(new_signed.check_signature());
}
#[test]
fn test_builder_amount() {
use ::*;
let builder = InvoiceBuilder::new(Currency::Bitcoin)
.description("Test".into())
.payment_hash(sha256::Hash::from_slice(&[0;32][..]).unwrap())
.current_timestamp();
let invoice = builder.clone()
.amount_pico_btc(15000)
.build_raw()
.unwrap();
assert_eq!(invoice.hrp.si_prefix, Some(SiPrefix::Nano));
assert_eq!(invoice.hrp.raw_amount, Some(15));
let invoice = builder.clone()
.amount_pico_btc(1500)
.build_raw()
.unwrap();
assert_eq!(invoice.hrp.si_prefix, Some(SiPrefix::Pico));
assert_eq!(invoice.hrp.raw_amount, Some(1500));
}
#[test]
fn test_builder_fail() {
use ::*;
use std::iter::FromIterator;
use secp256k1::key::PublicKey;
let builder = InvoiceBuilder::new(Currency::Bitcoin)
.payment_hash(sha256::Hash::from_slice(&[0;32][..]).unwrap())
.current_timestamp();
let too_long_string = String::from_iter(
(0..1024).map(|_| '?')
);
let long_desc_res = builder.clone()
.description(too_long_string)
.build_raw();
assert_eq!(long_desc_res, Err(CreationError::DescriptionTooLong));
let route_hop = RouteHop {
pubkey: PublicKey::from_slice(
&[
0x03, 0x9e, 0x03, 0xa9, 0x01, 0xb8, 0x55, 0x34, 0xff, 0x1e, 0x92, 0xc4,
0x3c, 0x74, 0x43, 0x1f, 0x7c, 0xe7, 0x20, 0x46, 0x06, 0x0f, 0xcf, 0x7a,
0x95, 0xc3, 0x7e, 0x14, 0x8f, 0x78, 0xc7, 0x72, 0x55
][..]
).unwrap(),
short_channel_id: [0; 8],
fee_base_msat: 0,
fee_proportional_millionths: 0,
cltv_expiry_delta: 0,
};
let too_long_route = vec![route_hop; 13];
let long_route_res = builder.clone()
.description("Test".into())
.route(too_long_route)
.build_raw();
assert_eq!(long_route_res, Err(CreationError::RouteTooLong));
let sign_error_res = builder.clone()
.description("Test".into())
.try_build_signed(|_| {
Err("ImaginaryError")
});
assert_eq!(sign_error_res, Err(SignOrCreationError::SignError("ImaginaryError")));
}
#[test]
fn test_builder_ok() {
use ::*;
use secp256k1::Secp256k1;
use secp256k1::key::{SecretKey, PublicKey};
use std::time::{UNIX_EPOCH, Duration};
let secp_ctx = Secp256k1::new();
let private_key = SecretKey::from_slice(
&[
0xe1, 0x26, 0xf6, 0x8f, 0x7e, 0xaf, 0xcc, 0x8b, 0x74, 0xf5, 0x4d, 0x26, 0x9f, 0xe2,
0x06, 0xbe, 0x71, 0x50, 0x00, 0xf9, 0x4d, 0xac, 0x06, 0x7d, 0x1c, 0x04, 0xa8, 0xca,
0x3b, 0x2d, 0xb7, 0x34
][..]
).unwrap();
let public_key = PublicKey::from_secret_key(&secp_ctx, &private_key);
let route_1 = vec![
RouteHop {
pubkey: public_key.clone(),
short_channel_id: [123; 8],
fee_base_msat: 2,
fee_proportional_millionths: 1,
cltv_expiry_delta: 145,
},
RouteHop {
pubkey: public_key.clone(),
short_channel_id: [42; 8],
fee_base_msat: 3,
fee_proportional_millionths: 2,
cltv_expiry_delta: 146,
}
];
let route_2 = vec![
RouteHop {
pubkey: public_key.clone(),
short_channel_id: [0; 8],
fee_base_msat: 4,
fee_proportional_millionths: 3,
cltv_expiry_delta: 147,
},
RouteHop {
pubkey: public_key.clone(),
short_channel_id: [1; 8],
fee_base_msat: 5,
fee_proportional_millionths: 4,
cltv_expiry_delta: 148,
}
];
let builder = InvoiceBuilder::new(Currency::BitcoinTestnet)
.amount_pico_btc(123)
.timestamp(UNIX_EPOCH + Duration::from_secs(1234567))
.payee_pub_key(public_key.clone())
.expiry_time(Duration::from_secs(54321))
.min_final_cltv_expiry(144)
.min_final_cltv_expiry(143)
.fallback(Fallback::PubKeyHash([0;20]))
.route(route_1.clone())
.route(route_2.clone())
.description_hash(sha256::Hash::from_slice(&[3;32][..]).unwrap())
.payment_hash(sha256::Hash::from_slice(&[21;32][..]).unwrap());
let invoice = builder.clone().build_signed(|hash| {
secp_ctx.sign_recoverable(hash, &private_key)
}).unwrap();
assert!(invoice.check_signature().is_ok());
assert_eq!(invoice.tagged_fields().count(), 9);
assert_eq!(invoice.amount_pico_btc(), Some(123));
assert_eq!(invoice.currency(), Currency::BitcoinTestnet);
assert_eq!(
invoice.timestamp().duration_since(UNIX_EPOCH).unwrap().as_secs(),
1234567
);
assert_eq!(invoice.payee_pub_key(), Some(&public_key));
assert_eq!(invoice.expiry_time(), Duration::from_secs(54321));
assert_eq!(invoice.min_final_cltv_expiry(), Some(&144));
assert_eq!(invoice.fallbacks(), vec![&Fallback::PubKeyHash([0;20])]);
assert_eq!(invoice.routes(), vec![&Route(route_1), &Route(route_2)]);
assert_eq!(
invoice.description(),
InvoiceDescription::Hash(&Sha256(sha256::Hash::from_slice(&[3;32][..]).unwrap()))
);
assert_eq!(invoice.payment_hash(), &sha256::Hash::from_slice(&[21;32][..]).unwrap());
let raw_invoice = builder.build_raw().unwrap();
assert_eq!(raw_invoice, *invoice.into_signed_raw().raw_invoice())
}
}