Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit a1f5467

Browse files
committedNov 9, 2024
Adding taptree_of_horror example.
Adding bitcoin_hashes as dev dependency.
1 parent acbd120 commit a1f5467

File tree

6 files changed

+2969
-0
lines changed

6 files changed

+2969
-0
lines changed
 

‎Cargo.toml

+5
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,11 @@ required-features = ["std", "base64"]
6666
name = "big"
6767
required-features = ["std", "base64", "compiler"]
6868

69+
[[example]]
70+
name = "taptree_of_horror"
71+
path = "examples/taptree_of_horror/taptree_of_horror.rs"
72+
required-features = ["compiler"]
73+
6974
[workspace]
7075
members = ["fuzz"]
7176
exclude = ["embedded", "bitcoind-tests"]

‎examples/taptree_of_horror/README.md

+20
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
# Taptree of Horror Example
2+
3+
### Running this example:
4+
- `cargo run --example taptree_of_horror --features "compiler"`
5+
6+
### Originally based on the TABConf 6, CTB.
7+
The challenge can be found here:
8+
- https://tabctb.com/six
9+
- https://tabctb.com/six/thebeginning/thetree/grim/iacceptyourterms.html
10+
11+
### This example demonstrates:
12+
- Providing multiple extended private key (xpriv) descriptors for sample personas.
13+
- Creating a policy using logical 'and/or' conditions with preimages and signatures and timelocks.
14+
- Structuring a Taproot tree (taptree) with an internal key into logical branches and leaves based on the policy.
15+
- Implementing nine complex tapleaves within the taptree.
16+
- Building a spending transaction that signs and satisfies one of the tapleaves using signatures, preimages and a timelock.
17+
18+
### Helpful Graphic to visualize using Excalidraw
19+
![taptree_of_horror](./taptree_of_horror.png)
20+
+59
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
use std::str::FromStr;
2+
3+
use bitcoin::bip32::{DerivationPath, Xpriv};
4+
use bitcoin::hashes::{ripemd160, sha256, Hash};
5+
use miniscript::descriptor::DescriptorSecretKey;
6+
use miniscript::ToPublicKey;
7+
use secp256k1::Secp256k1;
8+
9+
use crate::KEYS_PER_PERSONA;
10+
11+
pub fn produce_grim_hash(secret: &str) -> (sha256::Hash, ripemd160::Hash) {
12+
let mut hash_holder = sha256::Hash::hash(secret.as_bytes());
13+
for _i in 0..5 {
14+
hash_holder = sha256::Hash::hash(hash_holder.as_byte_array());
15+
//println!("{} hash: {}", i, hash_holder);
16+
}
17+
18+
let ripemd_160_final = ripemd160::Hash::hash(hash_holder.as_byte_array());
19+
(hash_holder, ripemd_160_final)
20+
}
21+
22+
pub fn produce_kelly_hash(secret: &str) -> (sha256::Hash, sha256::Hash) {
23+
let prepreimage = secret.as_bytes();
24+
let preimage_256_hash = sha256::Hash::hash(&prepreimage);
25+
let result256_final = sha256::Hash::hash(&preimage_256_hash.to_byte_array());
26+
(preimage_256_hash, result256_final)
27+
}
28+
29+
pub fn produce_key_pairs(
30+
desc: DescriptorSecretKey,
31+
secp: &Secp256k1<secp256k1::All>,
32+
derivation_without_index: &str,
33+
_alias: &str,
34+
) -> (Vec<bitcoin::PublicKey>, Vec<Xpriv>) {
35+
let mut pks = Vec::new();
36+
let mut prvs = Vec::new();
37+
38+
let xprv = match &desc {
39+
DescriptorSecretKey::XPrv(xpriv) => xpriv,
40+
_ => panic!("not an xpriv"),
41+
};
42+
43+
for i in 0..KEYS_PER_PERSONA {
44+
let pk = desc
45+
.to_public(secp)
46+
.unwrap()
47+
.at_derivation_index(i.try_into().unwrap())
48+
.unwrap()
49+
.to_public_key();
50+
51+
let derivation_with_index = format!("{}/{}", derivation_without_index, i);
52+
let derivation_path = DerivationPath::from_str(&derivation_with_index).unwrap();
53+
let derived_xpriv: Xpriv = xprv.xkey.derive_priv(secp, &derivation_path).unwrap();
54+
55+
pks.push(pk);
56+
prvs.push(derived_xpriv);
57+
}
58+
(pks, prvs)
59+
}

‎examples/taptree_of_horror/taptree_of_horror.excalidraw

+2,602
Large diffs are not rendered by default.
Loading
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,283 @@
1+
use std::str::FromStr;
2+
3+
use bitcoin::absolute::LockTime;
4+
use bitcoin::consensus::encode::serialize;
5+
use bitcoin::hashes::Hash;
6+
use bitcoin::hex::{Case, DisplayHex};
7+
use bitcoin::transaction::Version;
8+
use bitcoin::{Address, Amount, Network, Psbt, PublicKey, Sequence, TxIn, TxOut};
9+
use helper_fns::{produce_grim_hash, produce_kelly_hash, produce_key_pairs};
10+
use miniscript::descriptor::DescriptorSecretKey;
11+
use miniscript::policy::Concrete;
12+
use miniscript::psbt::PsbtExt;
13+
use miniscript::{Descriptor, DescriptorPublicKey};
14+
mod helper_fns;
15+
16+
pub const KEYS_PER_PERSONA: usize = 9;
17+
18+
fn main() {
19+
let secp: &secp256k1::Secp256k1<secp256k1::All> = &secp256k1::Secp256k1::new();
20+
21+
// ====== 1. Setup Hardcoded values for all of the personas ======
22+
23+
// Define derivation paths that will be used
24+
let normal_path = "86'/1'/0'/0";
25+
let unhardened_path = "86/1/0/0";
26+
let weird_path = "69'/420'/999999999'/8008135'";
27+
28+
// Hard coded regtest tprvs that will be used.
29+
let internal = format!("tprv8ZgxMBicQKsPfBJTWzMTQfRzcE3HCNKg6TUBpGBfigcFbqTXNBw6SuGPqBpD6D9pjLLASwq8bE7oZXCtMFPDKRizLy14xNqw4uz1zwrfo2c/{normal_path}/*");
30+
let alice = format!("tprv8ZgxMBicQKsPeZjVFDhZR5wjfCvFNev9qKGPDPC77p5cAEgEMUCR8Cecaf8pYfY7NTz8QcjVnP8uR8NedPz8o7iG7qWgnFMyQy9BAhMVZgb/{normal_path}/*");
31+
let bob = format!("tprv8ZgxMBicQKsPeHy2kPPVzYpbUqwTVBjSthMJUcGyqUiXk8eZTQ6xrJKEmdX8NYJKLLGCHGjuByqz2ahJXp52E8zCUV7njziJzwN7V7zfrKZ/{normal_path}/*");
32+
let charlie = format!("tprv8ZgxMBicQKsPdYaiWLUQCprj7Ej9Ka5GEq6giWHgTnbJvdLWnSuYnsF5sonVh6iy2HzvfkfxRDAmWEXNo3SJWTHCXM6XuxVZvqxtEyjdC29/{normal_path}/*");
33+
let dave = format!("tprv8ZgxMBicQKsPfCRUoMSWthoE8aJKr7De5YkxS1y55PuiSoi5ACyYUbas8Kv4vVtDzhKnBgY7cVSuogg2QLqtFcSZVv4ZTeBEzkzSnF9cSUT/{weird_path}/*");
34+
let eve = format!("tprv8ZgxMBicQKsPdYD5umCPZeh6tMqKfQATctqJbycgJ5N1rrJ15cHMgxds5iYENHZHmkMiXccAqUFx2k3ZNwU9qxPMjrKvTbCtgLFxk7mjMWD/{normal_path}/*");
35+
let frank = format!("tprv8ZgxMBicQKsPemyPyxqZ85T1UjpToCbLQ7uSn4JpbtwMBCodjvrLbgjBZeGgT4tMHdHCqyieDwCNzE7RrtRMVCQjPKQbGJzrg5vfn4eT7og/{normal_path}/*");
36+
let heather = format!("tprv8ZgxMBicQKsPefp99xLkwnQbU9LEEb8v4Aig3o4hwnjbaYotixkbJv3Ssmog68ptHij2LgExefNU96DYJKtFbDazTr1jm48twYhQLG775qw/{normal_path}/*");
37+
let ian = format!("tprv8ZgxMBicQKsPfGsuwfAdg3xPP452wreLk7ZEgusb8zdMqh1fyKGKnzFbxyxeHY3qhg8ESDRp5F6RgWiQGcvkmLyERcMys5V8DuT4gvxMDmS/{unhardened_path}/*");
38+
let judy = format!("tprv8ZgxMBicQKsPcz4VcN87e2e9k1LHDBLLajbVSAKAedpm1qakjtRT5xrdnmsQARWAfwg3REr6sNd5YHeWuWkHVvyey3rYmq9xYorMvwY3XAB/{normal_path}/*");
39+
let liam = format!("tprv8ZgxMBicQKsPcycCJ2v7B1utZrhWJNdQTBm7m9eR6iX1D9a9YvjbCNeT6dTEdMh4JziVCHD4YHQ7AXkZNMLfaBVf3CCiVWQLxwdU2SnrPcT/{normal_path}/*");
40+
let s_backup_1 = format!("tprv8ZgxMBicQKsPetPYYt5GUtNmQPChghNDBLbgJXz3cTZopeDrxHMendLpujaBHMPX3dXLZcv2NkgAvxMeuf1jWBU3iYxdeJAhktdeM9cKcYF/{normal_path}/*");
41+
let x_backup_2 = format!("tprv8ZgxMBicQKsPdf55kYg8pVPrUaW3VLZyt8XwxwrvSPkpskxDah1mAWypsTTZJeomWPrGf4e5RyT4zVzENHrwAsXxJP2EPYbfrYLRVFC1rLb/{normal_path}/*");
42+
43+
// define DescriptorSecretKeys
44+
let internal_desc_secret = DescriptorSecretKey::from_str(&internal).unwrap();
45+
let a_descriptor_desc_secret = DescriptorSecretKey::from_str(&alice).unwrap();
46+
let b_descriptor_desc_secret = DescriptorSecretKey::from_str(&bob).unwrap();
47+
let c_descriptor_desc_secret = DescriptorSecretKey::from_str(&charlie).unwrap();
48+
let d_descriptor_desc_secret = DescriptorSecretKey::from_str(&dave).unwrap();
49+
let e_descriptor_desc_secret = DescriptorSecretKey::from_str(&eve).unwrap();
50+
let f_descriptor_desc_secret = DescriptorSecretKey::from_str(&frank).unwrap();
51+
let h_descriptor_desc_secret = DescriptorSecretKey::from_str(&heather).unwrap();
52+
let i_descriptor_desc_secret = DescriptorSecretKey::from_str(&ian).unwrap();
53+
let j_descriptor_desc_secret = DescriptorSecretKey::from_str(&judy).unwrap();
54+
let l_descriptor_desc_secret = DescriptorSecretKey::from_str(&liam).unwrap();
55+
let s_descriptor_desc_secret = DescriptorSecretKey::from_str(&s_backup_1).unwrap();
56+
let x_descriptor_desc_secret = DescriptorSecretKey::from_str(&x_backup_2).unwrap();
57+
let grim = produce_grim_hash("sovereignty through knowledge");
58+
let kelly = produce_kelly_hash("the ultimate pre-preimage");
59+
60+
// ====== 2. Derive Keys, Preimages, Hashes, and Timelocks for Policy and Signing ======
61+
62+
let internal_xpub: miniscript::DescriptorPublicKey =
63+
internal_desc_secret.to_public(secp).unwrap();
64+
65+
// example of how defining the internal xpriv that can be used for signing.
66+
// let internal_xpriv: DescriptorXKey<bitcoin::bip32::Xpriv> = match internal_desc_secret {
67+
// miniscript::descriptor::DescriptorSecretKey::XPrv(x) => Some(x.clone()),
68+
// _ => None,
69+
// }
70+
// .unwrap();
71+
72+
let (a_pks, a_prvs) = produce_key_pairs(a_descriptor_desc_secret, secp, normal_path, "alice");
73+
let (b_pks, b_prvs) = produce_key_pairs(b_descriptor_desc_secret, secp, normal_path, "bob");
74+
let (c_pks, c_prvs) = produce_key_pairs(c_descriptor_desc_secret, secp, normal_path, "charlie");
75+
let (d_pks, d_prvs) = produce_key_pairs(d_descriptor_desc_secret, secp, weird_path, "dave");
76+
let (e_pks, e_prvs) = produce_key_pairs(e_descriptor_desc_secret, secp, normal_path, "eve");
77+
let (f_pks, f_prvs) = produce_key_pairs(f_descriptor_desc_secret, secp, normal_path, "frank");
78+
let (h_pks, h_prvs) = produce_key_pairs(h_descriptor_desc_secret, secp, normal_path, "heather");
79+
let (i_pks, i_prvs) = produce_key_pairs(i_descriptor_desc_secret, secp, unhardened_path, "ian");
80+
let (j_pks, j_prvs) = produce_key_pairs(j_descriptor_desc_secret, secp, normal_path, "judy");
81+
let (l_pks, l_prvs) = produce_key_pairs(l_descriptor_desc_secret, secp, normal_path, "liam");
82+
let (s_pks, _s_prvs) =
83+
produce_key_pairs(s_descriptor_desc_secret, secp, normal_path, "s_backup1");
84+
let (x_pks, _x_prvs) =
85+
produce_key_pairs(x_descriptor_desc_secret, secp, normal_path, "x_backup2");
86+
87+
// For this example we are grabbing the 9 keys for each persona
88+
let [a0, a1, a2, a3, a4, a5, a6, a7, a8]: [PublicKey; KEYS_PER_PERSONA] =
89+
a_pks[..].try_into().unwrap();
90+
let [b0, b1, b2, b3, b4, b5, b6, b7, b8]: [PublicKey; KEYS_PER_PERSONA] =
91+
b_pks[..].try_into().unwrap();
92+
let [c0, c1, c2, c3, c4, c5, c6, c7, c8]: [PublicKey; KEYS_PER_PERSONA] =
93+
c_pks[..].try_into().unwrap();
94+
let [d0, d1, d2, d3, d4, d5, d6, d7, d8]: [PublicKey; KEYS_PER_PERSONA] =
95+
d_pks[..].try_into().unwrap();
96+
let [e0, e1, e2, e3, e4, e5, e6, e7, e8]: [PublicKey; KEYS_PER_PERSONA] =
97+
e_pks[..].try_into().unwrap();
98+
let [f0, f1, f2, f3, f4, f5, f6, f7, f8]: [PublicKey; KEYS_PER_PERSONA] =
99+
f_pks[..].try_into().unwrap();
100+
let [h0, h1, h2, h3, h4, h5, h6, h7, h8]: [PublicKey; KEYS_PER_PERSONA] =
101+
h_pks[..].try_into().unwrap();
102+
let [i0, i1, i2, i3, i4, i5, i6, i7, i8]: [PublicKey; KEYS_PER_PERSONA] =
103+
i_pks[..].try_into().unwrap();
104+
let [j0, j1, j2, j3, j4, j5, j6, j7, j8]: [PublicKey; KEYS_PER_PERSONA] =
105+
j_pks[..].try_into().unwrap();
106+
let [l0, l1, l2, l3, l4, l5, l6, l7, l8]: [PublicKey; KEYS_PER_PERSONA] =
107+
l_pks[..].try_into().unwrap();
108+
let [_s0, _s1, s2, _s3, s4, s5, _s6, s7, s8]: [PublicKey; KEYS_PER_PERSONA] =
109+
s_pks[..].try_into().unwrap();
110+
let [_x0, _x1, x2, _x3, x4, x5, x6, _x7, x8]: [PublicKey; KEYS_PER_PERSONA] =
111+
x_pks[..].try_into().unwrap();
112+
113+
// Hashes that will also be used in the policy.
114+
let g = grim.1;
115+
let k = kelly.1;
116+
// Absolute timelocks that were used at TABConf 6, The event took place Oct 23-26 and more spending paths for the puzzle became available during the conference.
117+
let oct_23_morning: u32 = 1729692000; // Oct 23, 10:00 AM EST
118+
let oct_24_evening: u32 = 1729819800; // Oct 24, 09:30 PM EST
119+
let oct_25_afternoon: u32 = 1729877400; // Oct 25, 01:30 PM EST
120+
let oct_26_morning: u32 = 1729942200; // Oct 26, 07:30 AM EST
121+
122+
// ====== 3. Create Taptree Policy and Descriptor ======
123+
124+
let pol_str = format!(
125+
"or(
126+
pk({internal_xpub}),
127+
or(
128+
and(
129+
thresh(10, pk({a0}), pk({b0}), pk({c0}), pk({d0}), pk({e0}), pk({f0}), pk({h0}), pk({i0}), pk({j0}), pk({l0})),
130+
thresh(3, sha256({k}), ripemd160({g}), after({oct_23_morning}))
131+
),
132+
or(
133+
or(
134+
and(
135+
thresh(8, pk({a1}), pk({b1}), pk({c1}), pk({e1}), pk({f1}), pk({h1}), pk({i1}), pk({j1}), pk({l1})),
136+
thresh(3, pk({d1}), sha256({k}), after({oct_24_evening}))
137+
),
138+
and(
139+
thresh(4, pk({a2}), pk({b2}), pk({c2}), pk({e2}), pk({f2}), pk({h2}), pk({i2}), pk({l2})),
140+
and(
141+
thresh(4, pk({d2}), pk({j2}), ripemd160({g}), after({oct_24_evening})),
142+
or(pk({s2}), pk({x2}))
143+
)
144+
)
145+
),
146+
or(
147+
or(
148+
or(
149+
and(
150+
thresh(6, pk({a3}), pk({b3}), pk({c3}), pk({e3}), pk({f3}), pk({h3}), pk({i3}), pk({l3})),
151+
thresh(4, pk({d3}), pk({j3}), sha256({k}), after({oct_25_afternoon}))
152+
),
153+
thresh(14, pk({a8}), pk({b8}), pk({c8}), pk({d8}), pk({e8}), pk({f8}), pk({h8}), pk({i8}), pk({j8}), pk({l8}), pk({s8}), pk({x8}), sha256({k}), ripemd160({g}))
154+
),
155+
or(
156+
and(
157+
thresh(9, pk({a4}), pk({b4}), pk({c4}), pk({d4}), pk({e4}), pk({f4}), pk({h4}), pk({i4}), pk({j4}), pk({l4}), pk({s4}), pk({x4})),
158+
thresh(2, sha256({k}), after({oct_26_morning}))
159+
),
160+
and(
161+
thresh(10, pk({a5}), pk({b5}), pk({c5}), pk({d5}), pk({e5}), pk({f5}), pk({h5}), pk({i5}), pk({j5}), pk({l5}), pk({s5}), pk({x5})),
162+
after({oct_26_morning})
163+
)
164+
)
165+
),
166+
or(
167+
and(
168+
thresh(4, pk({a6}), pk({b6}), pk({c6}), pk({e6}), pk({f6}), pk({h6}), pk({i6}), pk({l6})),
169+
thresh(5, pk({d6}), pk({x6}), pk({j6}), ripemd160({g}), after({oct_25_afternoon}))
170+
),
171+
and(
172+
thresh(4, pk({a7}), pk({b7}), pk({c7}), pk({e7}), pk({f7}), pk({h7}), pk({i7}), pk({l7})),
173+
thresh(5, pk({d7}), pk({s7}), pk({j7}), ripemd160({g}), after({oct_25_afternoon}))
174+
)
175+
)
176+
)
177+
)
178+
)
179+
180+
)"
181+
)
182+
.replace(&[' ', '\n', '\t'][..], "");
183+
184+
// make sure policy doesn't have any issues
185+
let pol = Concrete::<DescriptorPublicKey>::from_str(&pol_str).unwrap();
186+
let policy_desc: Descriptor<DescriptorPublicKey> = pol.compile_tr(None).unwrap();
187+
188+
// Now, using this public descriptor create the script address
189+
let derived_descriptor = policy_desc.at_derivation_index(0).unwrap();
190+
let _script_address = derived_descriptor.address(Network::Regtest).unwrap();
191+
println!("the receiving address of this script is: {}", _script_address);
192+
println!("\ndescriptor is: {}\n", policy_desc);
193+
194+
// We assert internal key is the one used in the descriptor
195+
match &policy_desc {
196+
Descriptor::Tr(tr) => {
197+
// println!("internal: {}, eve: {}", tr.internal_key(), eve_xpub);
198+
assert!(tr.internal_key() == &internal_xpub);
199+
}
200+
_ => panic!("internal spending path is not correct"),
201+
}
202+
203+
// ====== 4. Create an Example Spending Transaction from the Tapscript ======
204+
205+
let secp: &secp256k1::Secp256k1<secp256k1::All> = &secp256k1::Secp256k1::new();
206+
207+
let tx_in = TxIn {
208+
previous_output: bitcoin::OutPoint {
209+
txid: "8888888899999999aaaaaaaabbbbbbbbccccccccddddddddeeeeeeeeffffffff"
210+
.parse()
211+
.unwrap(),
212+
vout: 0,
213+
},
214+
sequence: Sequence(0),
215+
// sequence: Sequence(40),
216+
..Default::default()
217+
};
218+
219+
let prev_amount = Amount::from_sat(100_000_000);
220+
let witness_utxo =
221+
TxOut { value: prev_amount, script_pubkey: derived_descriptor.clone().script_pubkey() };
222+
223+
let destination_address =
224+
Address::from_str("bcrt1p2tl8zasepqe3j6m7hx4tdmqzndddr5wa9ugglpdzgenjwv42rkws66dk5a")
225+
.unwrap();
226+
let destination_output: TxOut = TxOut {
227+
value: bitcoin::Amount::from_sat(99_999_000),
228+
script_pubkey: destination_address.assume_checked().script_pubkey(),
229+
};
230+
231+
let time = oct_23_morning;
232+
233+
let unsigned_tx = bitcoin::Transaction {
234+
version: Version::TWO,
235+
lock_time: LockTime::from_time(time).unwrap(),
236+
input: vec![tx_in],
237+
output: vec![destination_output],
238+
};
239+
240+
let unsigned_tx_test_string = serialize(&unsigned_tx).to_hex_string(Case::Lower);
241+
assert!(unsigned_tx_test_string == "0200000001ffffffffeeeeeeeeddddddddccccccccbbbbbbbbaaaaaaaa99999999888888880000000000000000000118ddf5050000000022512052fe7176190833196b7eb9aab6ec029b5ad1d1dd2f108f85a246672732aa1d9d60011967");
242+
243+
let mut psbt = Psbt::from_unsigned_tx(unsigned_tx).unwrap();
244+
psbt.inputs[0].witness_utxo = Some(witness_utxo);
245+
246+
// Tell Psbt about the descriptor so it can sign with it
247+
psbt.update_input_with_descriptor(0, &derived_descriptor)
248+
.unwrap();
249+
250+
// ====== 5. Sign and Create a Spending Transaction ======
251+
252+
// this is how you would sign for an internal key spend
253+
//let _res = psbt.sign(&intneral_xpriv.xkey, secp).unwrap();
254+
255+
// how you would sign using the leaf that uses index 0 keys
256+
let _res = psbt.sign(&a_prvs[0], secp).unwrap();
257+
let _res = psbt.sign(&b_prvs[0], secp).unwrap();
258+
let _res = psbt.sign(&c_prvs[0], secp).unwrap();
259+
let _res = psbt.sign(&d_prvs[0], secp).unwrap();
260+
let _res = psbt.sign(&e_prvs[0], secp).unwrap();
261+
let _res = psbt.sign(&f_prvs[0], secp).unwrap();
262+
let _res = psbt.sign(&h_prvs[0], secp).unwrap();
263+
let _res = psbt.sign(&i_prvs[0], secp).unwrap();
264+
let _res = psbt.sign(&j_prvs[0], secp).unwrap();
265+
let _res = psbt.sign(&l_prvs[0], secp).unwrap();
266+
267+
psbt.inputs[0]
268+
.sha256_preimages
269+
.insert(kelly.1, kelly.0.to_byte_array().to_vec());
270+
271+
psbt.inputs[0]
272+
.ripemd160_preimages
273+
.insert(grim.1, grim.0.to_byte_array().to_vec());
274+
275+
// Finalize PSBT now that we have all the required signatures and hash preimages.
276+
psbt.finalize_mut(secp).unwrap();
277+
278+
// Now extract the tx
279+
let signed_tx = psbt.extract_tx().unwrap();
280+
let raw_tx = bitcoin::consensus::encode::serialize(&signed_tx).to_hex_string(Case::Lower);
281+
282+
assert!(raw_tx == "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");
283+
}

0 commit comments

Comments
 (0)
Please sign in to comment.