UNPKG

@node-dlc/messaging

Version:
100 lines 4.02 kB
"use strict"; Object.defineProperty(exports, "__esModule", { value: true }); exports.OracleAttestationV0 = void 0; const bufio_1 = require("@node-dlc/bufio"); const bip_schnorr_1 = require("bip-schnorr"); const MessageType_1 = require("../MessageType"); /** * In order to make it possible to hold oracles accountable in cases where * they do not release a signature for an event outcome, there needs to be * a proof that an oracle has committed to a given outcome. This proof is * given in a so-called oracle announcement, which contains an oracle event * together with the oracle public key and a signature over its serialization, * which must be valid with respect to the specified public key. * * This also makes it possible for users to obtain oracle event information * from an un-trusted peer while being guaranteed that it originates from a * given oracle. */ class OracleAttestationV0 { constructor() { /** * The type for oracle_announcement_v0 message. oracle_announcement_v0 = 55332 */ this.type = OracleAttestationV0.type; this.signatures = []; this.outcomes = []; } /** * Deserializes an oracle_announcement_v0 message * @param buf */ static deserialize(buf) { const instance = new OracleAttestationV0(); const reader = new bufio_1.BufferReader(buf); reader.readBigSize(); // read type instance.length = reader.readBigSize(); const eventIdLength = reader.readBigSize(); const eventIdBuf = reader.readBytes(Number(eventIdLength)); instance.eventId = eventIdBuf.toString(); instance.oraclePubkey = reader.readBytes(32); const numSignatures = reader.readUInt16BE(); for (let i = 0; i < numSignatures; i++) { const signature = reader.readBytes(64); instance.signatures.push(signature); } while (!reader.eof) { const outcomeLen = reader.readBigSize(); const outcomeBuf = reader.readBytes(Number(outcomeLen)); instance.outcomes.push(outcomeBuf.toString()); } return instance; } validate() { if (this.signatures.length !== this.outcomes.length) { throw Error('signature and outcome length must be the same'); } // Verify attestation outcome signatures for (let i = 0; i < this.signatures.length; i++) { const msg = bip_schnorr_1.math.taggedHash('DLC/oracle/attestation/v0', this.outcomes[i]); (0, bip_schnorr_1.verify)(this.oraclePubkey, msg, this.signatures[i]); } } /** * Converts oracle_attestation_v0 to JSON */ toJSON() { return { type: this.type, eventId: this.eventId, oraclePubkey: this.oraclePubkey.toString('hex'), signatures: this.signatures.map((sig) => sig.toString('hex')), outcomes: this.outcomes, }; } /** * Serializes the oracle_announcement_v0 message into a Buffer */ serialize() { const writer = new bufio_1.BufferWriter(); writer.writeBigSize(this.type); const dataWriter = new bufio_1.BufferWriter(); dataWriter.writeBigSize(this.eventId.length); dataWriter.writeBytes(Buffer.from(this.eventId)); dataWriter.writeBytes(this.oraclePubkey); dataWriter.writeUInt16BE(this.signatures.length); for (const signature of this.signatures) { dataWriter.writeBytes(signature); } for (const outcome of this.outcomes) { dataWriter.writeBigSize(outcome.length); dataWriter.writeBytes(Buffer.from(outcome)); } writer.writeBigSize(dataWriter.size); writer.writeBytes(dataWriter.toBuffer()); return writer.toBuffer(); } } exports.OracleAttestationV0 = OracleAttestationV0; OracleAttestationV0.type = MessageType_1.MessageType.OracleAttestationV0; //# sourceMappingURL=OracleAttestationV0.js.map