DIMO SDK in Python
Project description
DIMO Python Developer SDK
Installation
You can install the SDK using pip
pip install dimo-python-sdk
Unit Testing
Coming Soon
API Documentation
Please visit the DIMO Developer Documentation to learn more about building on DIMO and detailed information on the API.
Developer License
In order to build on DIMO, you’ll need to get a DIMO Developer License via the DIMO Dev Console. The DIMO Developer license is our approach and design to a more secured, decentralized access control. As a developer, you will need to perform the following steps:
- Sign Up for an Account - You can use your Google or Github account to register.
- Complete Registration - Enter the details of the application that you’re building.
- Create An App - Click “Create App”, fill out the form & select your preferred environment (at this time, please select “Production” until we’re ready to launch our Sandbox environment), then hit “Create Application”.
- Finish Configuring Your Application - Once your project is initialized, you’ll use your connected wallet to generate an API Key and any optional Redirect URIs.
More information about this process can be found on our docs here
How to Use the SDK
Importing the SDK:
from dimo import DIMO
Initiate the SDK depending on the envionrment of your interest, we currently support both Production
and Dev
environments:
dimo = DIMO("Production")
or
dimo = DIMO("Dev")
Authentication
To get authenticated as a developer, you must have already obtained a Developer License via the Console. To learn more about authentication, including the User JWT, Developer JWT, and Vehicle JWT needed for accessing certain endpoints, please read: Authentication Docs.
API Authentication
(Option 1) 3-Step Function Calls
The SDK offers 3 basic functions that maps to the steps listed in Authentication: generate_challenge
, sign_challenge
, and submit_challenge
. You can use them accordingly depending on how you build your application.
challenge = dimo.auth.generate_challenge(
client_id = '<client_id>',
domain = '<domain>',
address = '<address>'
)
signature = dimo.auth.sign_challenge(
message = challenge['challenge'],
private_key = '<api_key>'
)
tokens = dimo.auth.submit_challenge(
client_id = '<client_id>',
domain = '<domain>',
state = challenge['state'],
signature = signature
)
(Option 2) Auth Endpoint Shortcut Function
As mentioned earlier, this is the streamlined function call to directly get the developer_jwt
. The address
field in challenge generation is omitted since it is essentially the client_id
of your application per Developer License:
auth_header = dimo.auth.get_dev_jwt(
client_id = '<client_id>',
domain = '<domain>',
private_key = '<api_key>'
)
# Store the Developer JWT from the auth_header
dev_jwt = auth_header["access_token"]
Querying the DIMO REST API
The SDK uses the requests library for making HTTP requests. You can perform a query like so:
def decode_vin():
device_makes = dimo.device_definitions.decode_vin(
developer_jwt = dev_jwt,
country_code = "USA",
vin = "<VIN>"
)
# Do something with the response
Query Parameters
For query parameters, simply feed in an input that matches with the expected query parameters:
dimo.device_definitions.search_device_definitions(
query = "Lexus gx 2023"
)
Vehicle JWTs
As the 2nd leg of the API authentication, applications may exchange for short-lived Vehicle JWTs for specific vehicles that granted privileges to the app. This uses the DIMO Token Exchange API.
For the end users of your application, they will need to share their vehicle permissions via the DIMO Mobile App or through your implementation of the Login with DIMO flow. You can use the pre-built React component SDK, or redirect users to the URLs included in the documentation here.
Typically, any endpoints that uses a NFT tokenId
in path parameters will require JWTs. You can use this flow to obtain a privilege token.
There are now two methods of invoking the token exchange to obtain a Vehicle JWT: a streamlined method and a more verbose method:
Streamlined Method (Recommended):
This method uses your client_id to check the privileges for a specified token_id via a query to the Identity API. This strips away the need to provide a privileges list:
# Start by obtaining a Developer JWT
auth_header = dimo.auth.get_dev_jwt(
client_id = '<client_id>',
domain = '<domain>',
private_key = '<private_key>'
)
dev_jwt = auth_header["access_token"]
# Then use the simplified method for getting a Vehicle JWT
get_vehicle_jwt = dimo.token_exchange.exchange(
developer_jwt = dev_jwt
token_id ="<token_id>"
)
vehicle_jwt = get_vehicle_jwt['token']
Verbose Method:
This method requires you to explicity provide the list of privileges that this token_id has granted to your developer license. For more information, review the Permissions Contract (SACD) Documentation.
get_vehicle_jwt = dimo.token_exchange.exchange(
developer_jwt = dev_jwt,
privileges=[1, 3, 4, 5],
token_id="<token_id>"
)
vehicle_jwt = get_vehicle_jwt['token']
Once you have the privilege token, you can pipe it through to corresponding endpoints like so:
def my_trips():
trip_data = dimo.trips.trips(
vehicle_jwt=vehicle_jwt,
token_id=<token_id>
)
return trip_data
Querying the DIMO GraphQL API
The SDK accepts any type of valid custom GraphQL queries, but we've also included a few sample queries to help you understand the DIMO GraphQL APIs.
Authentication for GraphQL API
The GraphQL entry points are designed almost identical to the REST API entry points. For any GraphQL API that requires auth headers (Telemetry API for example), you can use the same pattern as you would in the REST protected endpoints.
telemetry_data = dimo.telemetry.query(
vehicle_jwt=vehicle_jwt,
query= """
query {
some_valid_GraphQL_query
}
"""
)
Send a custom GraphQL query
To send a custom GraphQL query, you can simply call the query
function on any GraphQL API Endpoints and pass in any valid GraphQL query. To check whether your GraphQL query is valid, please visit our Identity API GraphQL Playground or Telemetry API GraphQL Playground.
my_query = """
{
vehicles (first:10) {
totalCount
}
}
"""
total_network_vehicles = dimo.identity.query(query=my_query)
Vehicle Events API (DIMO Webhooks)
The SDK supports calls to the Vehicle Events API, including: registering a new webhook, subscribing and unsubscribing vehicles, checking vehicles subscribed to a specific webhook, and more. To view all the available methods, check out the Vehicle Events API Documentation here.
Here's a sample of how you might register a new webhook:
new_webhook_config = {
"service": "Telemetry",
"data": "powertrainTransmissionTravelledDistance",
"trigger": "valueNumber > 10000",
"setup": "Realtime",
"description": "Trigger when odometer above 10000 km",
"target_uri": "https://my-target-uri.com/webhook",
"status": "Active",
"verification_token": "abc"
}
dimo.vehicle_events.register_webhook(developer_jwt=dev_jwt, request=new_webhook_config)
How to Contribute to the SDK
You can read more about contributing here
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file dimo_python_sdk-1.4.0.tar.gz
.
File metadata
- Download URL: dimo_python_sdk-1.4.0.tar.gz
- Upload date:
- Size: 22.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.12.9
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 |
9bbaa7f3b4e87f642fbad007aba5a914cc665f9298a18a761d9cecee160c76ce
|
|
MD5 |
f42224ed32a8b6c6f23af1bc9ca973d5
|
|
BLAKE2b-256 |
6d9fd26d38f9efd212b575be96d5a67fbc6c63bb6f356f6489cccbf428a8b196
|
Provenance
The following attestation bundles were made for dimo_python_sdk-1.4.0.tar.gz
:
Publisher:
publish-pypi.yml
on DIMO-Network/dimo-python-sdk
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1
-
Predicate type:
https://docs.pypi.org/attestations/publish/v1
-
Subject name:
dimo_python_sdk-1.4.0.tar.gz
-
Subject digest:
9bbaa7f3b4e87f642fbad007aba5a914cc665f9298a18a761d9cecee160c76ce
- Sigstore transparency entry: 216612231
- Sigstore integration time:
-
Permalink:
DIMO-Network/dimo-python-sdk@df6cbe92572d8dc5d6f046b6a92863c67888472d
-
Branch / Tag:
refs/tags/v1.4.0
- Owner: https://github.com/DIMO-Network
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com
-
Runner Environment:
github-hosted
-
Publication workflow:
publish-pypi.yml@df6cbe92572d8dc5d6f046b6a92863c67888472d
-
Trigger Event:
push
-
Statement type:
File details
Details for the file dimo_python_sdk-1.4.0-py3-none-any.whl
.
File metadata
- Download URL: dimo_python_sdk-1.4.0-py3-none-any.whl
- Upload date:
- Size: 21.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.12.9
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 |
d0206822e7d6fad3014912ffd2693f857219b7a7ccbb5d3e2ab69710062c8657
|
|
MD5 |
0e14dd007b69d9af75597ca51b8cba07
|
|
BLAKE2b-256 |
8c5aff8eb072653caba0717382192cbbfaa6911dd033c3d10e2fb5a98fb5a041
|
Provenance
The following attestation bundles were made for dimo_python_sdk-1.4.0-py3-none-any.whl
:
Publisher:
publish-pypi.yml
on DIMO-Network/dimo-python-sdk
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1
-
Predicate type:
https://docs.pypi.org/attestations/publish/v1
-
Subject name:
dimo_python_sdk-1.4.0-py3-none-any.whl
-
Subject digest:
d0206822e7d6fad3014912ffd2693f857219b7a7ccbb5d3e2ab69710062c8657
- Sigstore transparency entry: 216612232
- Sigstore integration time:
-
Permalink:
DIMO-Network/dimo-python-sdk@df6cbe92572d8dc5d6f046b6a92863c67888472d
-
Branch / Tag:
refs/tags/v1.4.0
- Owner: https://github.com/DIMO-Network
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com
-
Runner Environment:
github-hosted
-
Publication workflow:
publish-pypi.yml@df6cbe92572d8dc5d6f046b6a92863c67888472d
-
Trigger Event:
push
-
Statement type: