1use std::collections::{BTreeSet, HashMap, HashSet};
6use std::fmt;
7use std::str::FromStr;
8
9use bitcoin::base64::engine::{general_purpose, GeneralPurpose};
10use bitcoin::base64::{alphabet, Engine as _};
11use bitcoin::hashes::sha256;
12use serde::{Deserialize, Serialize};
13
14use super::{Error, Proof, ProofV3, ProofV4, Proofs};
15use crate::mint_url::MintUrl;
16use crate::nut02::ShortKeysetId;
17use crate::nuts::nut11::SpendingConditions;
18use crate::nuts::{CurrencyUnit, Id, Kind, PublicKey};
19use crate::{ensure_cdk, Amount, KeySetInfo};
20
21#[derive(Debug, Clone, PartialEq, Eq, Serialize, Deserialize)]
23#[serde(untagged)]
24pub enum Token {
25 TokenV3(TokenV3),
27 TokenV4(TokenV4),
29}
30
31impl fmt::Display for Token {
32 fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
33 let token = match self {
34 Self::TokenV3(token) => token.to_string(),
35 Self::TokenV4(token) => token.to_string(),
36 };
37
38 write!(f, "{token}")
39 }
40}
41
42impl Token {
43 pub fn new(
45 mint_url: MintUrl,
46 proofs: Proofs,
47 memo: Option<String>,
48 unit: CurrencyUnit,
49 ) -> Self {
50 let proofs = proofs
51 .into_iter()
52 .fold(HashMap::new(), |mut acc, val| {
53 acc.entry(val.keyset_id)
54 .and_modify(|p: &mut Vec<Proof>| p.push(val.clone()))
55 .or_insert(vec![val.clone()]);
56 acc
57 })
58 .into_iter()
59 .map(|(id, proofs)| TokenV4Token::new(id, proofs))
60 .collect();
61
62 Token::TokenV4(TokenV4 {
63 mint_url,
64 unit,
65 memo,
66 token: proofs,
67 })
68 }
69
70 pub fn proofs(&self, mint_keysets: &[KeySetInfo]) -> Result<Proofs, Error> {
72 match self {
73 Self::TokenV3(token) => token.proofs(mint_keysets),
74 Self::TokenV4(token) => token.proofs(mint_keysets),
75 }
76 }
77
78 pub fn value(&self) -> Result<Amount, Error> {
80 match self {
81 Self::TokenV3(token) => token.value(),
82 Self::TokenV4(token) => token.value(),
83 }
84 }
85
86 pub fn memo(&self) -> &Option<String> {
88 match self {
89 Self::TokenV3(token) => token.memo(),
90 Self::TokenV4(token) => token.memo(),
91 }
92 }
93
94 pub fn unit(&self) -> Option<CurrencyUnit> {
96 match self {
97 Self::TokenV3(token) => token.unit().clone(),
98 Self::TokenV4(token) => Some(token.unit().clone()),
99 }
100 }
101
102 pub fn mint_url(&self) -> Result<MintUrl, Error> {
104 match self {
105 Self::TokenV3(token) => {
106 let mint_urls = token.mint_urls();
107
108 ensure_cdk!(mint_urls.len() == 1, Error::UnsupportedToken);
109
110 mint_urls.first().ok_or(Error::UnsupportedToken).cloned()
111 }
112 Self::TokenV4(token) => Ok(token.mint_url.clone()),
113 }
114 }
115
116 pub fn to_v3_string(&self) -> String {
118 let v3_token = match self {
119 Self::TokenV3(token) => token.clone(),
120 Self::TokenV4(token) => token.clone().into(),
121 };
122
123 v3_token.to_string()
124 }
125
126 pub fn to_raw_bytes(&self) -> Result<Vec<u8>, Error> {
128 match self {
129 Self::TokenV3(_) => Err(Error::UnsupportedToken),
130 Self::TokenV4(token) => token.to_raw_bytes(),
131 }
132 }
133
134 pub fn token_secrets(&self) -> Vec<&crate::secret::Secret> {
137 match self {
138 Token::TokenV3(t) => t
139 .token
140 .iter()
141 .flat_map(|kt| kt.proofs.iter().map(|p| &p.secret))
142 .collect(),
143 Token::TokenV4(t) => t
144 .token
145 .iter()
146 .flat_map(|kt| kt.proofs.iter().map(|p| &p.secret))
147 .collect(),
148 }
149 }
150
151 pub fn spending_conditions(&self) -> Result<HashSet<SpendingConditions>, Error> {
153 let mut set = HashSet::new();
154 for secret in self.token_secrets().into_iter() {
155 if let Ok(cond) = SpendingConditions::try_from(secret) {
156 set.insert(cond);
157 }
158 }
159 Ok(set)
160 }
161
162 pub fn p2pk_pubkeys(&self) -> Result<HashSet<PublicKey>, Error> {
164 let mut keys: HashSet<PublicKey> = HashSet::new();
165 for secret in self.token_secrets().into_iter() {
166 if let Ok(cond) = SpendingConditions::try_from(secret) {
167 if cond.kind() == Kind::P2PK {
168 if let Some(ps) = cond.pubkeys() {
169 keys.extend(ps);
170 }
171 }
172 }
173 }
174 Ok(keys)
175 }
176
177 pub fn p2pk_refund_pubkeys(&self) -> Result<HashSet<PublicKey>, Error> {
179 let mut keys: HashSet<PublicKey> = HashSet::new();
180 for secret in self.token_secrets().into_iter() {
181 if let Ok(cond) = SpendingConditions::try_from(secret) {
182 if cond.kind() == Kind::P2PK {
183 if let Some(ps) = cond.refund_keys() {
184 keys.extend(ps);
185 }
186 }
187 }
188 }
189 Ok(keys)
190 }
191
192 pub fn htlc_hashes(&self) -> Result<HashSet<sha256::Hash>, Error> {
194 let mut hashes: HashSet<sha256::Hash> = HashSet::new();
195 for secret in self.token_secrets().into_iter() {
196 if let Ok(SpendingConditions::HTLCConditions { data, .. }) =
197 SpendingConditions::try_from(secret)
198 {
199 hashes.insert(data);
200 }
201 }
202 Ok(hashes)
203 }
204
205 pub fn locktimes(&self) -> Result<BTreeSet<u64>, Error> {
207 let mut set: BTreeSet<u64> = BTreeSet::new();
208 for secret in self.token_secrets().into_iter() {
209 if let Ok(cond) = SpendingConditions::try_from(secret) {
210 if let Some(lt) = cond.locktime() {
211 set.insert(lt);
212 }
213 }
214 }
215 Ok(set)
216 }
217}
218
219impl FromStr for Token {
220 type Err = Error;
221
222 fn from_str(s: &str) -> Result<Self, Self::Err> {
223 let (is_v3, s) = match (s.strip_prefix("cashuA"), s.strip_prefix("cashuB")) {
224 (Some(s), None) => (true, s),
225 (None, Some(s)) => (false, s),
226 _ => return Err(Error::UnsupportedToken),
227 };
228
229 let decode_config = general_purpose::GeneralPurposeConfig::new()
230 .with_decode_padding_mode(bitcoin::base64::engine::DecodePaddingMode::Indifferent);
231 let decoded = GeneralPurpose::new(&alphabet::URL_SAFE, decode_config).decode(s)?;
232
233 match is_v3 {
234 true => {
235 let decoded_str = String::from_utf8(decoded)?;
236 let token: TokenV3 = serde_json::from_str(&decoded_str)?;
237 Ok(Token::TokenV3(token))
238 }
239 false => {
240 let token: TokenV4 = ciborium::from_reader(&decoded[..])?;
241 Ok(Token::TokenV4(token))
242 }
243 }
244 }
245}
246
247impl TryFrom<&Vec<u8>> for Token {
248 type Error = Error;
249
250 fn try_from(bytes: &Vec<u8>) -> Result<Self, Self::Error> {
251 ensure_cdk!(bytes.len() >= 5, Error::UnsupportedToken);
252
253 let prefix = String::from_utf8(bytes[..5].to_vec())?;
254
255 match prefix.as_str() {
256 "crawB" => {
257 let token: TokenV4 = ciborium::from_reader(&bytes[5..])?;
258 Ok(Token::TokenV4(token))
259 }
260 _ => Err(Error::UnsupportedToken),
261 }
262 }
263}
264
265#[derive(Debug, Clone, PartialEq, Eq, Serialize, Deserialize)]
267pub struct TokenV3Token {
268 pub mint: MintUrl,
270 pub proofs: Vec<ProofV3>,
272}
273
274impl TokenV3Token {
275 pub fn new(mint_url: MintUrl, proofs: Proofs) -> Self {
277 Self {
278 mint: mint_url,
279 proofs: proofs.into_iter().map(ProofV3::from).collect(),
280 }
281 }
282}
283
284#[derive(Debug, Clone, PartialEq, Eq, Serialize, Deserialize)]
286pub struct TokenV3 {
287 pub token: Vec<TokenV3Token>,
289 #[serde(skip_serializing_if = "Option::is_none")]
291 pub memo: Option<String>,
292 #[serde(skip_serializing_if = "Option::is_none")]
294 pub unit: Option<CurrencyUnit>,
295}
296
297impl TokenV3 {
298 pub fn new(
300 mint_url: MintUrl,
301 proofs: Proofs,
302 memo: Option<String>,
303 unit: Option<CurrencyUnit>,
304 ) -> Result<Self, Error> {
305 ensure_cdk!(!proofs.is_empty(), Error::ProofsRequired);
306
307 Ok(Self {
308 token: vec![TokenV3Token::new(mint_url, proofs)],
309 memo,
310 unit,
311 })
312 }
313
314 pub fn proofs(&self, mint_keysets: &[KeySetInfo]) -> Result<Proofs, Error> {
316 let mut proofs: Proofs = vec![];
317 for t in self.token.iter() {
318 for p in t.proofs.iter() {
319 let long_id = Id::from_short_keyset_id(&p.keyset_id, mint_keysets)?;
320 proofs.push(p.into_proof(&long_id));
321 }
322 }
323 Ok(proofs)
324 }
325
326 #[inline]
328 pub fn value(&self) -> Result<Amount, Error> {
329 let proofs: Vec<ProofV3> = self.token.iter().flat_map(|t| t.proofs.clone()).collect();
330 let unique_count = proofs
331 .iter()
332 .collect::<std::collections::HashSet<_>>()
333 .len();
334
335 if unique_count != proofs.len() {
337 return Err(Error::DuplicateProofs);
338 }
339
340 Ok(Amount::try_sum(
341 self.token
342 .iter()
343 .map(|t| Amount::try_sum(t.proofs.iter().map(|p| p.amount)))
344 .collect::<Result<Vec<Amount>, _>>()?,
345 )?)
346 }
347
348 #[inline]
350 pub fn memo(&self) -> &Option<String> {
351 &self.memo
352 }
353
354 #[inline]
356 pub fn unit(&self) -> &Option<CurrencyUnit> {
357 &self.unit
358 }
359
360 pub fn mint_urls(&self) -> Vec<MintUrl> {
362 let mut mint_urls = Vec::new();
363
364 for token in self.token.iter() {
365 mint_urls.push(token.mint.clone());
366 }
367
368 mint_urls
369 }
370
371 pub fn is_multi_mint(&self) -> bool {
375 self.token.len() > 1
376 }
377}
378
379impl FromStr for TokenV3 {
380 type Err = Error;
381
382 fn from_str(s: &str) -> Result<Self, Self::Err> {
383 let s = s.strip_prefix("cashuA").ok_or(Error::UnsupportedToken)?;
384
385 let decode_config = general_purpose::GeneralPurposeConfig::new()
386 .with_decode_padding_mode(bitcoin::base64::engine::DecodePaddingMode::Indifferent);
387 let decoded = GeneralPurpose::new(&alphabet::URL_SAFE, decode_config).decode(s)?;
388 let decoded_str = String::from_utf8(decoded)?;
389 let token: TokenV3 = serde_json::from_str(&decoded_str)?;
390 Ok(token)
391 }
392}
393
394impl fmt::Display for TokenV3 {
395 fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
396 let json_string = serde_json::to_string(self).map_err(|_| fmt::Error)?;
397 let encoded = general_purpose::URL_SAFE.encode(json_string);
398 write!(f, "cashuA{encoded}")
399 }
400}
401
402impl From<TokenV4> for TokenV3 {
403 fn from(token: TokenV4) -> Self {
404 let proofs: Vec<ProofV3> = token
405 .token
406 .into_iter()
407 .flat_map(|token| {
408 token.proofs.into_iter().map(move |p| ProofV3 {
409 amount: p.amount,
410 keyset_id: token.keyset_id.clone(),
411 secret: p.secret,
412 c: p.c,
413 witness: p.witness,
414 dleq: p.dleq,
415 })
416 })
417 .collect();
418
419 let token_v3_token = TokenV3Token {
420 mint: token.mint_url,
421 proofs,
422 };
423 TokenV3 {
424 token: vec![token_v3_token],
425 memo: token.memo,
426 unit: Some(token.unit),
427 }
428 }
429}
430
431#[derive(Debug, Clone, PartialEq, Eq, Serialize, Deserialize)]
433pub struct TokenV4 {
434 #[serde(rename = "m")]
436 pub mint_url: MintUrl,
437 #[serde(rename = "u")]
439 pub unit: CurrencyUnit,
440 #[serde(rename = "d", skip_serializing_if = "Option::is_none")]
442 pub memo: Option<String>,
443 #[serde(rename = "t")]
445 pub token: Vec<TokenV4Token>,
446}
447
448impl TokenV4 {
449 pub fn proofs(&self, mint_keysets: &[KeySetInfo]) -> Result<Proofs, Error> {
451 let mut proofs: Proofs = vec![];
452 for t in self.token.iter() {
453 let long_id = Id::from_short_keyset_id(&t.keyset_id, mint_keysets)?;
454 proofs.extend(t.proofs.iter().map(|p| p.into_proof(&long_id)));
455 }
456 Ok(proofs)
457 }
458
459 #[inline]
461 pub fn value(&self) -> Result<Amount, Error> {
462 let proofs: Vec<ProofV4> = self.token.iter().flat_map(|t| t.proofs.clone()).collect();
463 let unique_count = proofs
464 .iter()
465 .collect::<std::collections::HashSet<_>>()
466 .len();
467
468 if unique_count != proofs.len() {
470 return Err(Error::DuplicateProofs);
471 }
472
473 Ok(Amount::try_sum(
474 self.token
475 .iter()
476 .map(|t| Amount::try_sum(t.proofs.iter().map(|p| p.amount)))
477 .collect::<Result<Vec<Amount>, _>>()?,
478 )?)
479 }
480
481 #[inline]
483 pub fn memo(&self) -> &Option<String> {
484 &self.memo
485 }
486
487 #[inline]
489 pub fn unit(&self) -> &CurrencyUnit {
490 &self.unit
491 }
492
493 pub fn to_raw_bytes(&self) -> Result<Vec<u8>, Error> {
495 let mut prefix = b"crawB".to_vec();
496 let mut data = Vec::new();
497 ciborium::into_writer(self, &mut data).map_err(Error::CiboriumSerError)?;
498 prefix.extend(data);
499 Ok(prefix)
500 }
501}
502
503impl fmt::Display for TokenV4 {
504 fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
505 use serde::ser::Error;
506 let mut data = Vec::new();
507 ciborium::into_writer(self, &mut data).map_err(|e| fmt::Error::custom(e.to_string()))?;
508 let encoded = general_purpose::URL_SAFE.encode(data);
509 write!(f, "cashuB{encoded}")
510 }
511}
512
513impl FromStr for TokenV4 {
514 type Err = Error;
515
516 fn from_str(s: &str) -> Result<Self, Self::Err> {
517 let s = s.strip_prefix("cashuB").ok_or(Error::UnsupportedToken)?;
518
519 let decode_config = general_purpose::GeneralPurposeConfig::new()
520 .with_decode_padding_mode(bitcoin::base64::engine::DecodePaddingMode::Indifferent);
521 let decoded = GeneralPurpose::new(&alphabet::URL_SAFE, decode_config).decode(s)?;
522 let token: TokenV4 = ciborium::from_reader(&decoded[..])?;
523 Ok(token)
524 }
525}
526
527impl TryFrom<&Vec<u8>> for TokenV4 {
528 type Error = Error;
529
530 fn try_from(bytes: &Vec<u8>) -> Result<Self, Self::Error> {
531 ensure_cdk!(bytes.len() >= 5, Error::UnsupportedToken);
532
533 let prefix = String::from_utf8(bytes[..5].to_vec())?;
534 ensure_cdk!(prefix.as_str() == "crawB", Error::UnsupportedToken);
535
536 Ok(ciborium::from_reader(&bytes[5..])?)
537 }
538}
539
540impl TryFrom<TokenV3> for TokenV4 {
541 type Error = Error;
542 fn try_from(token: TokenV3) -> Result<Self, Self::Error> {
543 let mint_urls = token.mint_urls();
544 let proofs: Vec<ProofV3> = token.token.into_iter().flat_map(|t| t.proofs).collect();
545
546 ensure_cdk!(mint_urls.len() == 1, Error::UnsupportedToken);
547
548 let mint_url = mint_urls.first().ok_or(Error::UnsupportedToken)?;
549
550 let proofs = proofs
551 .into_iter()
552 .fold(
553 HashMap::<ShortKeysetId, Vec<ProofV4>>::new(),
554 |mut acc, val| {
555 acc.entry(val.keyset_id.clone())
556 .and_modify(|p: &mut Vec<ProofV4>| p.push(val.clone().into()))
557 .or_insert(vec![val.clone().into()]);
558 acc
559 },
560 )
561 .into_iter()
562 .map(|(id, proofs)| TokenV4Token {
563 keyset_id: id,
564 proofs,
565 })
566 .collect();
567
568 Ok(TokenV4 {
569 mint_url: mint_url.clone(),
570 token: proofs,
571 memo: token.memo,
572 unit: token.unit.ok_or(Error::UnsupportedUnit)?,
573 })
574 }
575}
576
577#[derive(Debug, Clone, PartialEq, Eq, Serialize, Deserialize)]
579pub struct TokenV4Token {
580 #[serde(
582 rename = "i",
583 serialize_with = "serialize_v4_keyset_id",
584 deserialize_with = "deserialize_v4_keyset_id"
585 )]
586 pub keyset_id: ShortKeysetId,
587 #[serde(rename = "p")]
589 pub proofs: Vec<ProofV4>,
590}
591
592fn serialize_v4_keyset_id<S>(keyset_id: &ShortKeysetId, serializer: S) -> Result<S::Ok, S::Error>
593where
594 S: serde::Serializer,
595{
596 serializer.serialize_bytes(&keyset_id.to_bytes())
597}
598
599fn deserialize_v4_keyset_id<'de, D>(deserializer: D) -> Result<ShortKeysetId, D::Error>
600where
601 D: serde::Deserializer<'de>,
602{
603 let bytes = Vec::<u8>::deserialize(deserializer)?;
604 ShortKeysetId::from_bytes(&bytes).map_err(serde::de::Error::custom)
605}
606
607impl TokenV4Token {
608 pub fn new(keyset_id: Id, proofs: Proofs) -> Self {
610 let short_id = ShortKeysetId::from(keyset_id);
612 Self {
613 keyset_id: short_id,
614 proofs: proofs.into_iter().map(Into::into).collect(),
615 }
616 }
617}
618
619#[cfg(test)]
620mod tests {
621 use std::str::FromStr;
622
623 use bip39::rand::{self, RngCore};
624 use bitcoin::hashes::sha256::Hash as Sha256Hash;
625 use bitcoin::hashes::Hash;
626
627 use super::*;
628 use crate::dhke::hash_to_curve;
629 use crate::mint_url::MintUrl;
630 use crate::nuts::nut11::{Conditions, SigFlag, SpendingConditions};
631 use crate::secret::Secret;
632 use crate::util::hex;
633
634 #[test]
635 fn test_token_padding() {
636 let token_str_with_padding = "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";
637
638 let token = TokenV3::from_str(token_str_with_padding).unwrap();
639
640 let token_str_without_padding = "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";
641
642 let token_without = TokenV3::from_str(token_str_without_padding).unwrap();
643
644 assert_eq!(token, token_without);
645 }
646
647 #[test]
648 fn test_token_v4_str_round_trip() {
649 let token_str = "cashuBpGF0gaJhaUgArSaMTR9YJmFwgaNhYQFhc3hAOWE2ZGJiODQ3YmQyMzJiYTc2ZGIwZGYxOTcyMTZiMjlkM2I4Y2MxNDU1M2NkMjc4MjdmYzFjYzk0MmZlZGI0ZWFjWCEDhhhUP_trhpXfStS6vN6So0qWvc2X3O4NfM-Y1HISZ5JhZGlUaGFuayB5b3VhbXVodHRwOi8vbG9jYWxob3N0OjMzMzhhdWNzYXQ=";
650 let token = TokenV4::from_str(token_str).unwrap();
651
652 assert_eq!(
653 token.mint_url,
654 MintUrl::from_str("http://localhost:3338").unwrap()
655 );
656 assert_eq!(
657 token.token[0].keyset_id,
658 ShortKeysetId::from_str("00ad268c4d1f5826").unwrap()
659 );
660
661 let encoded = &token.to_string();
662
663 let token_data = TokenV4::from_str(encoded).unwrap();
664
665 assert_eq!(token_data, token);
666 }
667
668 #[test]
669 fn test_token_v4_multi_keyset() {
670 let token_str_multi_keysets = "cashuBo2F0gqJhaUgA_9SLj17PgGFwgaNhYQFhc3hAYWNjMTI0MzVlN2I4NDg0YzNjZjE4NTAxNDkyMThhZjkwZjcxNmE1MmJmNGE1ZWQzNDdlNDhlY2MxM2Y3NzM4OGFjWCECRFODGd5IXVW-07KaZCvuWHk3WrnnpiDhHki6SCQh88-iYWlIAK0mjE0fWCZhcIKjYWECYXN4QDEzMjNkM2Q0NzA3YTU4YWQyZTIzYWRhNGU5ZjFmNDlmNWE1YjRhYzdiNzA4ZWIwZDYxZjczOGY0ODMwN2U4ZWVhY1ghAjRWqhENhLSsdHrr2Cw7AFrKUL9Ffr1XN6RBT6w659lNo2FhAWFzeEA1NmJjYmNiYjdjYzY0MDZiM2ZhNWQ1N2QyMTc0ZjRlZmY4YjQ0MDJiMTc2OTI2ZDNhNTdkM2MzZGNiYjU5ZDU3YWNYIQJzEpxXGeWZN5qXSmJjY8MzxWyvwObQGr5G1YCCgHicY2FtdWh0dHA6Ly9sb2NhbGhvc3Q6MzMzOGF1Y3NhdA==";
671
672 let token = Token::from_str(token_str_multi_keysets).unwrap();
673 let amount = token.value().expect("valid amount");
674
675 assert_eq!(amount, Amount::from(4));
676
677 let unit = token.unit().unwrap();
678 assert_eq!(CurrencyUnit::Sat, unit);
679
680 match token {
681 Token::TokenV4(token) => {
682 let tokens: Vec<ShortKeysetId> =
683 token.token.iter().map(|t| t.keyset_id.clone()).collect();
684
685 assert_eq!(tokens.len(), 2);
686
687 assert!(tokens.contains(&ShortKeysetId::from_str("00ffd48b8f5ecf80").unwrap()));
688 assert!(tokens.contains(&ShortKeysetId::from_str("00ad268c4d1f5826").unwrap()));
689
690 let mint_url = token.mint_url;
691
692 assert_eq!("http://localhost:3338", &mint_url.to_string());
693 }
694 _ => {
695 panic!("Token should be a v4 token")
696 }
697 }
698 }
699
700 #[test]
701 fn test_tokenv4_from_tokenv3() {
702 let token_v3_str = "cashuAeyJ0b2tlbiI6W3sibWludCI6Imh0dHBzOi8vODMzMy5zcGFjZTozMzM4IiwicHJvb2ZzIjpbeyJhbW91bnQiOjIsImlkIjoiMDA5YTFmMjkzMjUzZTQxZSIsInNlY3JldCI6IjQwNzkxNWJjMjEyYmU2MWE3N2UzZTZkMmFlYjRjNzI3OTgwYmRhNTFjZDA2YTZhZmMyOWUyODYxNzY4YTc4MzciLCJDIjoiMDJiYzkwOTc5OTdkODFhZmIyY2M3MzQ2YjVlNDM0NWE5MzQ2YmQyYTUwNmViNzk1ODU5OGE3MmYwY2Y4NTE2M2VhIn0seyJhbW91bnQiOjgsImlkIjoiMDA5YTFmMjkzMjUzZTQxZSIsInNlY3JldCI6ImZlMTUxMDkzMTRlNjFkNzc1NmIwZjhlZTBmMjNhNjI0YWNhYTNmNGUwNDJmNjE0MzNjNzI4YzcwNTdiOTMxYmUiLCJDIjoiMDI5ZThlNTA1MGI4OTBhN2Q2YzA5NjhkYjE2YmMxZDVkNWZhMDQwZWExZGUyODRmNmVjNjlkNjEyOTlmNjcxMDU5In1dfV0sInVuaXQiOiJzYXQiLCJtZW1vIjoiVGhhbmsgeW91LiJ9";
703 let token_v3 =
704 TokenV3::from_str(token_v3_str).expect("TokenV3 should be created from string");
705 let token_v4 = TokenV4::try_from(token_v3).expect("TokenV3 should be converted to TokenV4");
706 let token_v4_expected = "cashuBpGFtd2h0dHBzOi8vODMzMy5zcGFjZTozMzM4YXVjc2F0YWRqVGhhbmsgeW91LmF0gaJhaUgAmh8pMlPkHmFwgqRhYQJhc3hANDA3OTE1YmMyMTJiZTYxYTc3ZTNlNmQyYWViNGM3Mjc5ODBiZGE1MWNkMDZhNmFmYzI5ZTI4NjE3NjhhNzgzN2FjWCECvJCXmX2Br7LMc0a15DRak0a9KlBut5WFmKcvDPhRY-phZPakYWEIYXN4QGZlMTUxMDkzMTRlNjFkNzc1NmIwZjhlZTBmMjNhNjI0YWNhYTNmNGUwNDJmNjE0MzNjNzI4YzcwNTdiOTMxYmVhY1ghAp6OUFC4kKfWwJaNsWvB1dX6BA6h3ihPbsadYSmfZxBZYWT2";
707 assert_eq!(token_v4.to_string(), token_v4_expected);
708 }
709
710 #[test]
711 fn test_token_str_round_trip() {
712 let token_str = "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";
713
714 let token = TokenV3::from_str(token_str).unwrap();
715 assert_eq!(
716 token.token[0].mint,
717 MintUrl::from_str("https://8333.space:3338").unwrap()
718 );
719 assert_eq!(
720 token.token[0].proofs[0].clone().keyset_id,
721 ShortKeysetId::from_str("009a1f293253e41e").unwrap()
722 );
723 assert_eq!(token.unit.clone().unwrap(), CurrencyUnit::Sat);
724
725 let encoded = &token.to_string();
726
727 let token_data = TokenV3::from_str(encoded).unwrap();
728
729 assert_eq!(token_data, token);
730 }
731
732 #[test]
733 fn incorrect_tokens() {
734 let incorrect_prefix = "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";
735
736 let incorrect_prefix_token = TokenV3::from_str(incorrect_prefix);
737
738 assert!(incorrect_prefix_token.is_err());
739
740 let no_prefix = "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";
741
742 let no_prefix_token = TokenV3::from_str(no_prefix);
743
744 assert!(no_prefix_token.is_err());
745
746 let correct_token = "cashuAeyJ0b2tlbiI6W3sibWludCI6Imh0dHBzOi8vODMzMy5zcGFjZTozMzM4IiwicHJvb2ZzIjpbeyJhbW91bnQiOjIsImlkIjoiMDA5YTFmMjkzMjUzZTQxZSIsInNlY3JldCI6IjQwNzkxNWJjMjEyYmU2MWE3N2UzZTZkMmFlYjRjNzI3OTgwYmRhNTFjZDA2YTZhZmMyOWUyODYxNzY4YTc4MzciLCJDIjoiMDJiYzkwOTc5OTdkODFhZmIyY2M3MzQ2YjVlNDM0NWE5MzQ2YmQyYTUwNmViNzk1ODU5OGE3MmYwY2Y4NTE2M2VhIn0seyJhbW91bnQiOjgsImlkIjoiMDA5YTFmMjkzMjUzZTQxZSIsInNlY3JldCI6ImZlMTUxMDkzMTRlNjFkNzc1NmIwZjhlZTBmMjNhNjI0YWNhYTNmNGUwNDJmNjE0MzNjNzI4YzcwNTdiOTMxYmUiLCJDIjoiMDI5ZThlNTA1MGI4OTBhN2Q2YzA5NjhkYjE2YmMxZDVkNWZhMDQwZWExZGUyODRmNmVjNjlkNjEyOTlmNjcxMDU5In1dfV0sInVuaXQiOiJzYXQiLCJtZW1vIjoiVGhhbmsgeW91LiJ9";
747
748 let correct_token = TokenV3::from_str(correct_token);
749
750 assert!(correct_token.is_ok());
751 }
752
753 #[test]
754 fn test_token_v4_raw_roundtrip() {
755 let token_raw = hex::decode("6372617742a4617481a261694800ad268c4d1f5826617081a3616101617378403961366462623834376264323332626137366462306466313937323136623239643362386363313435353363643237383237666331636339343266656462346561635821038618543ffb6b8695df4ad4babcde92a34a96bdcd97dcee0d7ccf98d4721267926164695468616e6b20796f75616d75687474703a2f2f6c6f63616c686f73743a33333338617563736174").unwrap();
756 let token = TokenV4::try_from(&token_raw).expect("Token deserialization error");
757 let token_raw_ = token.to_raw_bytes().expect("Token serialization error");
758 let token_ = TokenV4::try_from(&token_raw_).expect("Token deserialization error");
759 assert!(token_ == token)
760 }
761
762 #[test]
763 fn test_token_generic_raw_roundtrip() {
764 let tokenv4_raw = hex::decode("6372617742a4617481a261694800ad268c4d1f5826617081a3616101617378403961366462623834376264323332626137366462306466313937323136623239643362386363313435353363643237383237666331636339343266656462346561635821038618543ffb6b8695df4ad4babcde92a34a96bdcd97dcee0d7ccf98d4721267926164695468616e6b20796f75616d75687474703a2f2f6c6f63616c686f73743a33333338617563736174").unwrap();
765 let tokenv4 = Token::try_from(&tokenv4_raw).expect("Token deserialization error");
766 let tokenv4_ = TokenV4::try_from(&tokenv4_raw).expect("Token deserialization error");
767 let tokenv4_bytes = tokenv4.to_raw_bytes().expect("Serialization error");
768 let tokenv4_bytes_ = tokenv4_.to_raw_bytes().expect("Serialization error");
769 assert!(tokenv4_bytes_ == tokenv4_bytes);
770 }
771
772 #[test]
773 fn test_token_with_duplicate_proofs() {
774 let mint_url = MintUrl::from_str("https://example.com").unwrap();
776 let keyset_id = Id::from_str("009a1f293253e41e").unwrap();
777
778 let secret = Secret::generate();
779 let proof1 = Proof {
781 amount: Amount::from(10),
782 keyset_id,
783 secret: secret.clone(),
784 c: "02bc9097997d81afb2cc7346b5e4345a9346bd2a506eb7958598a72f0cf85163ea"
785 .parse()
786 .unwrap(),
787 witness: None,
788 dleq: None,
789 };
790
791 let proof2 = proof1.clone(); let proofs = vec![proof1.clone(), proof2].into_iter().collect();
795 let token = Token::new(mint_url.clone(), proofs, None, CurrencyUnit::Sat);
796
797 let result = token.value();
799 assert!(result.is_err());
800
801 let proof3 = Proof {
803 amount: Amount::from(10),
804 keyset_id,
805 secret: Secret::generate(),
806 c: "03bc9097997d81afb2cc7346b5e4345a9346bd2a506eb7958598a72f0cf85163ea"
807 .parse()
808 .unwrap(), witness: None,
810 dleq: None,
811 };
812
813 let proofs = vec![proof1, proof3].into_iter().collect();
814 let token = Token::new(mint_url, proofs, None, CurrencyUnit::Sat);
815
816 let result = token.value();
818 assert!(result.is_ok());
819 assert_eq!(result.unwrap(), Amount::from(20));
820 }
821
822 #[test]
823 fn test_token_from_proofs_with_idv2_round_trip() {
824 let mint_url = MintUrl::from_str("https://example.com").unwrap();
825
826 let keysets_info: Vec<KeySetInfo> = (0..10)
827 .map(|_| {
828 let mut bytes: [u8; 33] = [0u8; 33];
829 bytes[0] = 1u8;
830 rand::thread_rng().fill_bytes(&mut bytes[1..]);
831 let id = Id::from_bytes(&bytes).unwrap();
832 KeySetInfo {
833 id,
834 unit: CurrencyUnit::Sat,
835 active: true,
836 input_fee_ppk: 0,
837 final_expiry: None,
838 }
839 })
840 .collect();
841
842 let chosen_keyset_id = keysets_info[0].id;
843 let proofs = (0..5)
845 .map(|_| {
846 let mut c_preimage: [u8; 33] = [0u8; 33];
847 c_preimage[0] = 1u8;
848 rand::thread_rng().fill_bytes(&mut c_preimage[1..]);
849 Proof::new(
850 Amount::from(1),
851 chosen_keyset_id,
852 Secret::generate(),
853 hash_to_curve(&c_preimage).unwrap(),
854 )
855 })
856 .collect();
857
858 let token = Token::new(mint_url.clone(), proofs, None, CurrencyUnit::Sat);
859 let token_str = token.to_string();
860
861 let token1 = Token::from_str(&token_str);
862 assert!(token1.is_ok());
863
864 let proofs1 = token1.unwrap().proofs(&keysets_info);
865 assert!(proofs1.is_ok());
866
867 }
869
870 #[test]
871 fn test_token_proofs_with_unknown_short_keyset_id() {
872 let mint_url = MintUrl::from_str("https://example.com").unwrap();
873
874 let keysets_info: Vec<KeySetInfo> = (0..10)
875 .map(|_| {
876 let mut bytes: [u8; 33] = [0u8; 33];
877 bytes[0] = 1u8;
878 rand::thread_rng().fill_bytes(&mut bytes[1..]);
879 let id = Id::from_bytes(&bytes).unwrap();
880 KeySetInfo {
881 id,
882 unit: CurrencyUnit::Sat,
883 active: true,
884 input_fee_ppk: 0,
885 final_expiry: None,
886 }
887 })
888 .collect();
889
890 let chosen_keyset_id =
891 Id::from_str("01c352c0b47d42edb764bddf8c53d77b85f057157d92084d9d05e876251ecd8422")
892 .unwrap();
893
894 let proofs = (0..5)
896 .map(|_| {
897 let mut c_preimage: [u8; 33] = [0u8; 33];
898 c_preimage[0] = 1u8;
899 rand::thread_rng().fill_bytes(&mut c_preimage[1..]);
900 Proof::new(
901 Amount::from(1),
902 chosen_keyset_id,
903 Secret::generate(),
904 hash_to_curve(&c_preimage).unwrap(),
905 )
906 })
907 .collect();
908
909 let token = Token::new(mint_url.clone(), proofs, None, CurrencyUnit::Sat);
910 let token_str = token.to_string();
911
912 let token1 = Token::from_str(&token_str);
913 assert!(token1.is_ok());
914
915 let proofs1 = token1.unwrap().proofs(&keysets_info);
916 assert!(proofs1.is_err());
917 }
918 #[test]
919 fn test_token_spending_condition_helpers_p2pk_htlc_v4() {
920 let mint_url = MintUrl::from_str("https://example.com").unwrap();
921 let keyset_id = Id::from_str("009a1f293253e41e").unwrap();
922
923 let sk1 = crate::nuts::SecretKey::generate();
925 let pk1 = sk1.public_key();
926 let sk2 = crate::nuts::SecretKey::generate();
927 let pk2 = sk2.public_key();
928 let refund_sk = crate::nuts::SecretKey::generate();
929 let refund_pk = refund_sk.public_key();
930
931 let cond_p2pk = Conditions {
932 locktime: Some(1_700_000_000),
933 pubkeys: Some(vec![pk2]),
934 refund_keys: Some(vec![refund_pk]),
935 num_sigs: Some(1),
936 sig_flag: SigFlag::SigInputs,
937 num_sigs_refund: None,
938 };
939
940 let nut10_p2pk = crate::nuts::Nut10Secret::new(
941 crate::nuts::Kind::P2PK,
942 pk1.to_string(),
943 Some(cond_p2pk.clone()),
944 );
945 let secret_p2pk: Secret = nut10_p2pk.try_into().unwrap();
946
947 let preimage = b"cdk-test-preimage";
949 let htlc_hash = Sha256Hash::hash(preimage);
950 let cond_htlc = Conditions {
951 locktime: Some(1_800_000_000),
952 ..Default::default()
953 };
954 let nut10_htlc = crate::nuts::Nut10Secret::new(
955 crate::nuts::Kind::HTLC,
956 htlc_hash.to_string(),
957 Some(cond_htlc.clone()),
958 );
959 let secret_htlc: Secret = nut10_htlc.try_into().unwrap();
960
961 let proof_p2pk = Proof::new(Amount::from(1), keyset_id, secret_p2pk.clone(), pk1);
963 let proof_htlc = Proof::new(Amount::from(2), keyset_id, secret_htlc.clone(), pk2);
964 let token = Token::new(
965 mint_url,
966 vec![proof_p2pk, proof_htlc].into_iter().collect(),
967 None,
968 CurrencyUnit::Sat,
969 );
970
971 assert_eq!(token.token_secrets().len(), 2);
973
974 let sc = token.spending_conditions().unwrap();
976 assert!(sc.contains(&SpendingConditions::P2PKConditions {
977 data: pk1,
978 conditions: Some(cond_p2pk.clone())
979 }));
980 assert!(sc.contains(&SpendingConditions::HTLCConditions {
981 data: htlc_hash,
982 conditions: Some(cond_htlc.clone())
983 }));
984
985 let pks = token.p2pk_pubkeys().unwrap();
987 assert!(pks.contains(&pk1));
988 assert!(pks.contains(&pk2));
989 assert_eq!(pks.len(), 2);
990
991 let refund = token.p2pk_refund_pubkeys().unwrap();
993 assert!(refund.contains(&refund_pk));
994 assert_eq!(refund.len(), 1);
995
996 let hashes = token.htlc_hashes().unwrap();
998 assert!(hashes.contains(&htlc_hash));
999 assert_eq!(hashes.len(), 1);
1000
1001 let lts = token.locktimes().unwrap();
1003 assert!(lts.contains(&1_700_000_000));
1004 assert!(lts.contains(&1_800_000_000));
1005 assert_eq!(lts.len(), 2);
1006 }
1007
1008 #[test]
1009 fn test_token_spending_condition_helpers_dedup_and_v3() {
1010 let mint_url = MintUrl::from_str("https://example.org").unwrap();
1011 let id = Id::from_str("00ad268c4d1f5826").unwrap();
1012
1013 let sk = crate::nuts::SecretKey::generate();
1015 let pk = sk.public_key();
1016
1017 let cond = Conditions {
1018 locktime: Some(1_650_000_000),
1019 pubkeys: Some(vec![pk]), refund_keys: Some(vec![pk]), num_sigs: Some(1),
1022 sig_flag: SigFlag::SigInputs,
1023 num_sigs_refund: None,
1024 };
1025
1026 let nut10 = crate::nuts::Nut10Secret::new(
1027 crate::nuts::Kind::P2PK,
1028 pk.to_string(),
1029 Some(cond.clone()),
1030 );
1031 let secret: Secret = nut10.try_into().unwrap();
1032
1033 let p1 = Proof::new(Amount::from(1), id, secret.clone(), pk);
1034 let p2 = Proof::new(Amount::from(2), id, secret.clone(), pk);
1035
1036 let token_v3 = TokenV3::new(
1038 mint_url,
1039 vec![p1, p2].into_iter().collect(),
1040 None,
1041 Some(CurrencyUnit::Sat),
1042 )
1043 .unwrap();
1044 let token = Token::TokenV3(token_v3);
1045
1046 let sc = token.spending_conditions().unwrap();
1048 assert_eq!(sc.len(), 1); let pks = token.p2pk_pubkeys().unwrap();
1051 assert!(pks.contains(&pk));
1052 assert_eq!(pks.len(), 1); let refunds = token.p2pk_refund_pubkeys().unwrap();
1055 assert!(refunds.contains(&pk));
1056 assert_eq!(refunds.len(), 1);
1057
1058 let lts = token.locktimes().unwrap();
1059 assert!(lts.contains(&1_650_000_000));
1060 assert_eq!(lts.len(), 1);
1061
1062 let hashes = token.htlc_hashes().unwrap();
1064 assert!(hashes.is_empty());
1065
1066 assert_eq!(token.token_secrets().len(), 2);
1068 }
1069}