Skip to content
Snippets Groups Projects
Select Git revision
  • 234552ab4bd5791c75a9486fc6677c388d1f16dc
  • master default protected
  • fix_picked_up_file_in_runtime_release
  • network/gtest-1000 protected
  • upgradable-multisig
  • runtime/gtest-1000
  • network/gdev-800 protected
  • cgeek/issue-297-cpu
  • gdev-800-tests
  • update-docker-compose-rpc-squid-names
  • fix-252
  • 1000i100-test
  • hugo/tmp-0.9.1
  • network/gdev-803 protected
  • hugo/endpoint-gossip
  • network/gdev-802 protected
  • hugo/distance-precompute
  • network/gdev-900 protected
  • tuxmain/anonymous-tx
  • debug/podman
  • hugo/195-doc
  • gtest-1000-0.11.1 protected
  • gtest-1000-0.11.0 protected
  • gtest-1000 protected
  • gdev-900-0.10.1 protected
  • gdev-900-0.10.0 protected
  • gdev-900-0.9.2 protected
  • gdev-800-0.8.0 protected
  • gdev-900-0.9.1 protected
  • gdev-900-0.9.0 protected
  • gdev-803 protected
  • gdev-802 protected
  • runtime-801 protected
  • gdev-800 protected
  • runtime-800-bis protected
  • runtime-800 protected
  • runtime-800-backup protected
  • runtime-701 protected
  • runtime-700 protected
  • runtime-600 protected
  • runtime-500 protected
41 results

git-conventions.md

Blame
  • send_identity.py 2.98 KiB
    # Copyright  2014-2021 Vincent Texier <vit@free.fr>
    #
    # DuniterPy is free software: you can redistribute it and/or modify
    # it under the terms of the GNU General Public License as published by
    # the Free Software Foundation, either version 3 of the License, or
    # (at your option) any later version.
    #
    # DuniterPy is distributed in the hope that it will be useful,
    # but WITHOUT ANY WARRANTY; without even the implied warranty of
    # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
    # GNU General Public License for more details.
    #
    # You should have received a copy of the GNU General Public License
    # along with this program.  If not, see <http://www.gnu.org/licenses/>.
    
    import getpass
    import urllib
    
    from duniterpy.api import bma
    from duniterpy.api.client import Client
    from duniterpy.documents import BlockUID, Identity
    from duniterpy.key import SigningKey
    
    # CONFIG #######################################
    
    # You can either use a complete defined endpoint : [NAME_OF_THE_API] [DOMAIN] [IPv4] [IPv6] [PORT] [PATH]
    # or the simple definition : [NAME_OF_THE_API] [DOMAIN] [PORT] [PATH]
    # Here we use the secure BASIC_MERKLED_API (BMAS)
    BMAS_ENDPOINT = "BMAS g1-test.duniter.org 443"
    
    
    ################################################
    
    
    def get_identity_document(
        current_block: dict,
        uid: str,
        key: SigningKey,
    ) -> Identity:
        """
        Get an Identity document
    
        :param current_block: Current block data
        :param uid: Unique IDentifier
        :param key: cryptographic key to sign documents
    
        :rtype: Identity
        """
    
        # get current block BlockStamp
        timestamp = BlockUID(current_block["number"], current_block["hash"])
    
        # create identity document
        identity = Identity(
            version=10,
            currency=current_block["currency"],
            pubkey=key.pubkey,
            uid=uid,
            ts=timestamp,
            signature=None,
        )
    
        # sign document
        identity.sign([key])
    
        return identity
    
    
    def send_identity():
        """
        Main code
        """
        # Create Client from endpoint string in Duniter format
        client = Client(BMAS_ENDPOINT)
    
        # Get the node summary infos to test the connection
        response = client(bma.node.summary)
        print(response)
    
        # capture current block to get version and currency and blockstamp
        current_block = client(bma.blockchain.current)
    
        # prompt entry
        uid = input("Enter your Unique IDentifier (pseudonym): ")
    
        # prompt hidden user entry
        salt = getpass.getpass("Enter your passphrase (salt): ")
    
        # prompt hidden user entry
        password = getpass.getpass("Enter your password: ")
    
        # create keys from credentials
        key = SigningKey.from_credentials(salt, password)
    
        # create our signed identity document
        identity = get_identity_document(current_block, uid, key)
    
        # send the identity signed raw document to the node
        try:
            client(bma.wot.add, identity.signed_raw())
        except urllib.error.HTTPError as e:
            print(f"Error while publishing identity: {e}")
    
    
    if __name__ == "__main__":
        send_identity()