|
| 1 | +use std::collections::BTreeMap; |
| 2 | +use std::str::FromStr; |
| 3 | + |
| 4 | +use bitcoin::absolute::Height; |
| 5 | +use bitcoin::blockdata::locktime::absolute; |
| 6 | +use bitcoin::key::TapTweak; |
| 7 | +use bitcoin::psbt::{self, Psbt}; |
| 8 | +use bitcoin::sighash::SighashCache; |
| 9 | +use bitcoin::{taproot, PrivateKey, ScriptBuf}; |
| 10 | +use miniscript::bitcoin::consensus::encode::deserialize; |
| 11 | +use miniscript::bitcoin::hashes::hex::FromHex; |
| 12 | +use miniscript::bitcoin::{ |
| 13 | + self, base64, secp256k1, Address, Network, OutPoint, Sequence, Transaction, TxIn, TxOut, |
| 14 | +}; |
| 15 | +use miniscript::psbt::{PsbtExt, PsbtInputExt}; |
| 16 | +use miniscript::{Descriptor, DescriptorPublicKey}; |
| 17 | +use secp256k1::Secp256k1; |
| 18 | + |
| 19 | +fn main() { |
| 20 | + // Defining the descriptor keys required. |
| 21 | + let secp256k1 = secp256k1::Secp256k1::new(); |
| 22 | + let keys = vec![ |
| 23 | + "036a7ae441409bd40af1b8efba7dbd34b822b9a72566eff10b889b8de13659e343", |
| 24 | + "03b6c8a1a901edf3c5f1cb0e3ffe1f20393435a5d467f435e2858c9ab43d3ca78c", |
| 25 | + "03500a2b48b0f66c8183cc0d6645ab21cc19c7fad8a33ff04d41c3ece54b0bc1c5", |
| 26 | + "033ad2d191da4f39512adbaac320cae1f12f298386a4e9d43fd98dec7cf5db2ac9", |
| 27 | + "023fc33527afab09fa97135f2180bcd22ce637b1d2fbcb2db748b1f2c33f45b2b4", |
| 28 | + ]; |
| 29 | + |
| 30 | + // The taproot descriptor combines different spending paths and conditions, allowing the funds to be spent using |
| 31 | + // different methods depending on the desired conditions. |
| 32 | + |
| 33 | + // tr({A},{{pkh({B}),{{multi_a(1,{C},{D}),and_v(v:pk({E}),after(10))}}}}) represents a taproot spending policy. |
| 34 | + // Let's break it down: |
| 35 | + // |
| 36 | + // * Key Spend Path |
| 37 | + // {A} represents the public key for the taproot key spending path. |
| 38 | + // |
| 39 | + // * Script Spend Paths |
| 40 | + // {B} represents the public key for the pay-to-pubkey-hash (P2PKH) spending path. |
| 41 | + // The multi_a(1,{C},{D}) construct represents a 1-of-2 multi-signature script condition. |
| 42 | + // It requires at least one signature from {C} and {D} to spend funds using the script spend path. |
| 43 | + // The and_v(v:pk({E}),after(10)) construct represents a combination of a P2PK script condition and a time lock. |
| 44 | + // It requires a valid signature from {E} and enforces a time lock of 10 blocks on spending funds. |
| 45 | + |
| 46 | + // By constructing transactions using this taproot descriptor and signing them appropriately, |
| 47 | + // you can create flexible spending policies that enable different spending paths and conditions depending on the |
| 48 | + // transaction's inputs and outputs. |
| 49 | + let s = format!( |
| 50 | + "tr({},{{pkh({}),{{multi_a(1,{},{}),and_v(v:pk({}),after(10))}}}})", |
| 51 | + keys[0], keys[1], keys[2], keys[3], keys[4] |
| 52 | + ); |
| 53 | + |
| 54 | + let bridge_descriptor = Descriptor::from_str(&s).expect("parse descriptor string"); |
| 55 | + assert!(bridge_descriptor.sanity_check().is_ok()); |
| 56 | + |
| 57 | + println!( |
| 58 | + "Bridge pubkey script: {}", |
| 59 | + bridge_descriptor.script_pubkey() |
| 60 | + ); |
| 61 | + println!( |
| 62 | + "Bridge address: {}", |
| 63 | + bridge_descriptor.address(Network::Regtest).unwrap() |
| 64 | + ); |
| 65 | + |
| 66 | + let master_private_key_str = "KxQqtbUnMugSEbKHG3saknvVYux1cgFjFqWzMfwnFhLm8QrGq26v"; |
| 67 | + let master_private_key = |
| 68 | + PrivateKey::from_str(master_private_key_str).expect("Can't create private key"); |
| 69 | + println!( |
| 70 | + "Master public key: {}", |
| 71 | + master_private_key.public_key(&secp256k1) |
| 72 | + ); |
| 73 | + |
| 74 | + let backup1_private_key_str = "Kwb9oFfPNt6D3Fa9DCF5emRvLyJ3UUvCHnVxp4xf7bWDxWmeVdeH"; |
| 75 | + let backup1_private = |
| 76 | + PrivateKey::from_str(backup1_private_key_str).expect("Can't create private key"); |
| 77 | + |
| 78 | + println!( |
| 79 | + "Backup1 public key: {}", |
| 80 | + backup1_private.public_key(&secp256k1) |
| 81 | + ); |
| 82 | + |
| 83 | + let backup2_private_key_str = "cPJFWUKk8sdL7pcDKrmNiWUyqgovimmhaaZ8WwsByDaJ45qLREkh"; |
| 84 | + let backup2_private = |
| 85 | + PrivateKey::from_str(backup2_private_key_str).expect("Can't create private key"); |
| 86 | + |
| 87 | + println!( |
| 88 | + "Backup2 public key: {}", |
| 89 | + backup2_private.public_key(&secp256k1) |
| 90 | + ); |
| 91 | + |
| 92 | + let backup3_private_key_str = "cT5cH9UVm81W5QAf5KABXb23RKNSMbMzMx85y6R2mF42L94YwKX6"; |
| 93 | + let _backup3_private = |
| 94 | + PrivateKey::from_str(backup3_private_key_str).expect("Can't create private key"); |
| 95 | + |
| 96 | + println!( |
| 97 | + "Backup3 public key: {}", |
| 98 | + _backup3_private.public_key(&secp256k1) |
| 99 | + ); |
| 100 | + |
| 101 | + // Create a spending transaction |
| 102 | + let spend_tx = Transaction { |
| 103 | + version: 2, |
| 104 | + lock_time: absolute::LockTime::Blocks(Height::ZERO), |
| 105 | + input: vec![], |
| 106 | + output: vec![], |
| 107 | + }; |
| 108 | + |
| 109 | + let hex_tx = "020000000001018ff27041f3d738f5f84fd5ee62f1c5b36afebfb15f6da0c9d1382ddd0eaaa23c0000000000feffffff02b3884703010000001600142ca3b4e53f17991582d47b15a053b3201891df5200e1f5050000000022512061763f4288d086c0347c4e3c387ce22ab9372cecada6c326e77efd57e9a5ea460247304402207b820860a9d425833f729775880b0ed59dd12b64b9a3d1ab677e27e4d6b370700220576003163f8420fe0b9dc8df726cff22cbc191104a2d4ae4f9dfedb087fcec72012103817e1da42a7701df4db94db8576f0e3605f3ab3701608b7e56f92321e4d8999100000000"; |
| 110 | + let depo_tx: Transaction = deserialize(&Vec::<u8>::from_hex(hex_tx).unwrap()).unwrap(); |
| 111 | + |
| 112 | + let receiver = Address::from_str("bcrt1qsdks5za4t6sevaph6tz9ddfjzvhkdkxe9tfrcy").unwrap(); |
| 113 | + |
| 114 | + let amount = 100000000; |
| 115 | + |
| 116 | + let (outpoint, witness_utxo) = get_vout(&depo_tx, bridge_descriptor.script_pubkey()); |
| 117 | + |
| 118 | + let all_assets = Descriptor::<DescriptorPublicKey>::from_str(&s) |
| 119 | + .unwrap() |
| 120 | + .get_all_assets() |
| 121 | + .unwrap(); |
| 122 | + |
| 123 | + for asset in all_assets { |
| 124 | + // Creating a PSBT Object |
| 125 | + let mut psbt = Psbt { |
| 126 | + unsigned_tx: spend_tx.clone(), |
| 127 | + unknown: BTreeMap::new(), |
| 128 | + proprietary: BTreeMap::new(), |
| 129 | + xpub: BTreeMap::new(), |
| 130 | + version: 0, |
| 131 | + inputs: vec![], |
| 132 | + outputs: vec![], |
| 133 | + }; |
| 134 | + |
| 135 | + // Defining the Transaction Input |
| 136 | + let mut txin = TxIn::default(); |
| 137 | + txin.previous_output = outpoint; |
| 138 | + txin.sequence = Sequence::from_height(26); //Sequence::MAX; // |
| 139 | + psbt.unsigned_tx.input.push(txin); |
| 140 | + |
| 141 | + // Defining the Transaction Output |
| 142 | + psbt.unsigned_tx.output.push(TxOut { |
| 143 | + script_pubkey: receiver.payload.script_pubkey(), |
| 144 | + value: amount / 5 - 500, |
| 145 | + }); |
| 146 | + |
| 147 | + psbt.unsigned_tx.output.push(TxOut { |
| 148 | + script_pubkey: bridge_descriptor.script_pubkey(), |
| 149 | + value: amount * 4 / 5, |
| 150 | + }); |
| 151 | + |
| 152 | + // Consider that out of all the keys required to sign the descriptor spend path we only have some handful of assets. |
| 153 | + // We can plan the PSBT with only few assets(keys or hashes) if that are enough for satisfying any policy. |
| 154 | + // |
| 155 | + // Here for example assume that we only have two keys available. |
| 156 | + // Key A and Key B (as seen from the descriptor above) |
| 157 | + // We have to add the keys to `Asset` and then obtain plan with only available signatures if the descriptor can be satisfied. |
| 158 | + |
| 159 | + // Obtain the Plan based on available Assets |
| 160 | + let plan = bridge_descriptor.clone().get_plan(&asset).unwrap(); |
| 161 | + |
| 162 | + // Creating PSBT Input |
| 163 | + let mut input = psbt::Input::default(); |
| 164 | + plan.update_psbt_input(&mut input); |
| 165 | + |
| 166 | + // Update the PSBT input from the result which we have obtained from the Plan. |
| 167 | + input |
| 168 | + .update_with_descriptor_unchecked(&bridge_descriptor) |
| 169 | + .unwrap(); |
| 170 | + input.witness_utxo = Some(witness_utxo.clone()); |
| 171 | + |
| 172 | + // Push the PSBT Input and declare an PSBT Output Structure |
| 173 | + psbt.inputs.push(input); |
| 174 | + psbt.outputs.push(psbt::Output::default()); |
| 175 | + |
| 176 | + // Use private keys to sign |
| 177 | + let key_a = master_private_key.inner; |
| 178 | + let key_b = backup1_private.inner; |
| 179 | + |
| 180 | + // Taproot script can be signed when we have either Key spend or Script spend or both. |
| 181 | + // Here you can try to verify by commenting one of the spend path or try signing with both. |
| 182 | + sign_taproot_psbt(&key_a, &mut psbt, &secp256k1); // Key Spend - With Key A |
| 183 | + sign_taproot_psbt(&key_b, &mut psbt, &secp256k1); // Script Spend - With Key B |
| 184 | + |
| 185 | + // Serializing and finalizing the PSBT Transaction |
| 186 | + let serialized = psbt.serialize(); |
| 187 | + println!("{}", base64::encode(&serialized)); |
| 188 | + psbt.finalize_mut(&secp256k1).unwrap(); |
| 189 | + |
| 190 | + let tx = psbt.extract_tx(); |
| 191 | + println!("{}", bitcoin::consensus::encode::serialize_hex(&tx)); |
| 192 | + } |
| 193 | +} |
| 194 | + |
| 195 | +// Siging the Taproot PSBT Transaction |
| 196 | +fn sign_taproot_psbt( |
| 197 | + secret_key: &secp256k1::SecretKey, |
| 198 | + psbt: &mut psbt::Psbt, |
| 199 | + secp256k1: &Secp256k1<secp256k1::All>, |
| 200 | +) { |
| 201 | + // Creating signing entitites required |
| 202 | + let hash_ty = bitcoin::sighash::TapSighashType::Default; |
| 203 | + let mut sighash_cache = SighashCache::new(&psbt.unsigned_tx); |
| 204 | + |
| 205 | + // Defining Keypair for given private key |
| 206 | + let keypair = secp256k1::KeyPair::from_seckey_slice(&secp256k1, secret_key.as_ref()).unwrap(); |
| 207 | + |
| 208 | + // Checking if leaf hash exist or not. |
| 209 | + // For Key Spend -> Leaf Hash is None |
| 210 | + // For Script Spend -> Leaf Hash is Some(_) |
| 211 | + // Convert this leaf_hash tree to a full map. |
| 212 | + let (leaf_hashes, (_, _)) = &psbt.inputs[0].tap_key_origins[&keypair.x_only_public_key().0]; |
| 213 | + let leaf_hash = if !leaf_hashes.is_empty() { |
| 214 | + Some(leaf_hashes[0]) |
| 215 | + } else { |
| 216 | + None |
| 217 | + }; |
| 218 | + |
| 219 | + let keypair = match leaf_hash { |
| 220 | + None => keypair |
| 221 | + .tap_tweak(&secp256k1, psbt.inputs[0].tap_merkle_root) |
| 222 | + .to_inner(), // tweak for key spend |
| 223 | + Some(_) => keypair, // no tweak for script spend |
| 224 | + }; |
| 225 | + |
| 226 | + // Construct the message to input for schnorr signature |
| 227 | + let msg = psbt |
| 228 | + .sighash_msg(0, &mut sighash_cache, leaf_hash) |
| 229 | + .unwrap() |
| 230 | + .to_secp_msg(); |
| 231 | + let sig = secp256k1.sign_schnorr(&msg, &keypair); |
| 232 | + let (pk, _parity) = keypair.x_only_public_key(); |
| 233 | + assert!(secp256k1.verify_schnorr(&sig, &msg, &pk).is_ok()); |
| 234 | + |
| 235 | + // Create final signature with corresponding hash type |
| 236 | + let final_signature1 = taproot::Signature { hash_ty, sig }; |
| 237 | + |
| 238 | + if let Some(lh) = leaf_hash { |
| 239 | + // Script Spend |
| 240 | + psbt.inputs[0] |
| 241 | + .tap_script_sigs |
| 242 | + .insert((pk, lh), final_signature1); |
| 243 | + } else { |
| 244 | + // Key Spend |
| 245 | + psbt.inputs[0].tap_key_sig = Some(final_signature1); |
| 246 | + println!("{:#?}", psbt); |
| 247 | + } |
| 248 | +} |
| 249 | + |
| 250 | +// Find the Outpoint by spk |
| 251 | +fn get_vout(tx: &Transaction, spk: ScriptBuf) -> (OutPoint, TxOut) { |
| 252 | + for (i, txout) in tx.clone().output.into_iter().enumerate() { |
| 253 | + if spk == txout.script_pubkey { |
| 254 | + return (OutPoint::new(tx.txid(), i as u32), txout); |
| 255 | + } |
| 256 | + } |
| 257 | + panic!("Only call get vout on functions which have the expected outpoint"); |
| 258 | +} |
0 commit comments