Skip to content
Snippets Groups Projects
Select Git revision
  • fe571d884ebaab8b12a1bf299de45c7efc633c98
  • master default protected
  • 313_ci_image
  • 311_gtest_fixes
  • set_UniversalDividendApi_in_RuntimeApiCollection
  • tuxmain/fix-change-owner-key
  • network/gtest-1000 protected
  • upgradable-multisig
  • runtime/gtest-1000
  • network/gdev-800 protected
  • cgeek/issue-297-cpu
  • gdev-800-tests
  • update-docker-compose-rpc-squid-names
  • fix-252
  • 1000i100-test
  • hugo/tmp-0.9.1
  • network/gdev-803 protected
  • hugo/endpoint-gossip
  • network/gdev-802 protected
  • hugo/distance-precompute
  • network/gdev-900 protected
  • gtest-1000-0.11.1 protected
  • gtest-1000-0.11.0 protected
  • gtest-1000 protected
  • gdev-900-0.10.1 protected
  • gdev-900-0.10.0 protected
  • gdev-900-0.9.2 protected
  • gdev-800-0.8.0 protected
  • gdev-900-0.9.1 protected
  • gdev-900-0.9.0 protected
  • gdev-803 protected
  • gdev-802 protected
  • runtime-801 protected
  • gdev-800 protected
  • runtime-800-bis protected
  • runtime-800 protected
  • runtime-800-backup protected
  • runtime-701 protected
  • runtime-700 protected
  • runtime-600 protected
  • runtime-500 protected
41 results

main.rs

Blame
  • send_certification.py 4.50 KiB
    # Copyright  2014-2021 Vincent Texier <vit@free.fr>
    #
    # DuniterPy is free software: you can redistribute it and/or modify
    # it under the terms of the GNU General Public License as published by
    # the Free Software Foundation, either version 3 of the License, or
    # (at your option) any later version.
    #
    # DuniterPy is distributed in the hope that it will be useful,
    # but WITHOUT ANY WARRANTY; without even the implied warranty of
    # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
    # GNU General Public License for more details.
    #
    # You should have received a copy of the GNU General Public License
    # along with this program.  If not, see <http://www.gnu.org/licenses/>.
    
    import getpass
    from typing import Optional
    import urllib
    
    from duniterpy.api import bma
    from duniterpy.api.client import Client
    from duniterpy.documents import BlockUID, Identity, Certification
    from duniterpy.key import SigningKey
    
    # CONFIG #######################################
    
    # You can either use a complete defined endpoint : [NAME_OF_THE_API] [DOMAIN] [IPv4] [IPv6] [PORT] [PATH]
    # or the simple definition : [NAME_OF_THE_API] [DOMAIN] [PORT] [PATH]
    # Here we use the secure BASIC_MERKLED_API (BMAS)
    BMAS_ENDPOINT = "BMAS g1-test.duniter.org 443"
    
    
    ################################################
    
    
    def get_identity_document(
        client: Client, current_block: dict, pubkey: str
    ) -> Optional[Identity]:
        """
        Get the identity document of the pubkey
    
        :param client: Client to connect to the api
        :param current_block: Current block data
        :param pubkey: UID/Public key
    
        :rtype: Identity
        """
        # Here we request for the path wot/lookup/pubkey
        lookup_data = client(bma.wot.lookup, pubkey)
        identity = None
    
        # parse results
        for result in lookup_data["results"]:
            if result["pubkey"] == pubkey:
                uids = result["uids"]
                uid_data = uids[0]
                # capture data
                timestamp = BlockUID.from_str(uid_data["meta"]["timestamp"])
                uid = uid_data["uid"]  # type: str
                signature = uid_data["self"]  # type: str
    
                # return self-certification document
                identity = Identity(
                    version=10,
                    currency=current_block["currency"],
                    pubkey=pubkey,
                    uid=uid,
                    ts=timestamp,
                    signature=signature,
                )
                break
    
        return identity
    
    
    def get_certification_document(
        current_block: dict, self_cert_document: Identity, from_pubkey: str
    ) -> Certification:
        """
        Create and return a Certification document
    
        :param current_block: Current block data
        :param self_cert_document: Identity document
        :param from_pubkey: Pubkey of the certifier
    
        :rtype: Certification
        """
        # construct Certification Document
        return Certification(
            version=10,
            currency=current_block["currency"],
            pubkey_from=from_pubkey,
            identity=self_cert_document,
            timestamp=BlockUID(current_block["number"], current_block["hash"]),
            signature="",
        )
    
    
    def send_certification():
        """
        Main code
        """
        # Create Client from endpoint string in Duniter format
        client = Client(BMAS_ENDPOINT)
    
        # Get the node summary infos to test the connection
        response = client(bma.node.summary)
        print(response)
    
        # prompt hidden user entry
        salt = getpass.getpass("Enter your passphrase (salt): ")
    
        # prompt hidden user entry
        password = getpass.getpass("Enter your password: ")
    
        # create key from credentials
        key = SigningKey.from_credentials(salt, password)
        pubkey_from = key.pubkey
    
        # prompt entry
        pubkey_to = input("Enter certified pubkey: ")
    
        # capture current block to get version and currency and blockstamp
        current_block = client(bma.blockchain.current)
    
        # create our Identity document to sign the Certification document
        identity = get_identity_document(client, current_block, pubkey_to)
        if identity is None:
            print("Identity not found for pubkey {0}".format(pubkey_to))
            # Close client aiohttp session
            return
    
        # send the Certification document to the node
        certification = get_certification_document(current_block, identity, pubkey_from)
    
        # sign document
        certification.sign([key])
    
        # Here we request for the path wot/certify
        try:
            client(bma.wot.certify, certification.signed_raw())
        except urllib.error.HTTPError as e:
            print(f"Error while publishing certification: {e}")
    
    
    if __name__ == "__main__":
        send_certification()