This is a Python library to help you build servers/services within Sygna Bridge Ecosystem.
Project description
Python Sygna Bridge Util
This is a Python library to help you build servers/services within Sygna Bridge Ecosystem. For more detail information, please see Sygna Bridge.
Installation
pip install sygna-bridge-util
Crypto
Dealing with encoding, decoding, signing and verifying in Sygna Bridge.
ECIES Encoding an Decoding
During the communication of VASPs, there are some private information that must be encrypted. We use ECIES(Elliptic Curve Integrated Encryption Scheme) to securely encrypt these private data so that they can only be accessed by the recipient.
We're using IVMS101 (interVASP Messaging Standard) as our private information format.
We also provide IVMS101 Python Utility to construct data payload.
sensitive_data = {
"originator": {
"originator_persons": [
{
"natural_person": {
"name": {
"name_identifiers": [
{
"primary_identifier": "Wu Xinli",
"name_identifier_type": "LEGL"
}
]
},
"national_identification": {
"national_identifier": "446005",
"national_identifier_type": "RAID",
"registration_authority": "RA000553"
},
"country_of_residence": "TZ"
}
}
],
"account_numbers": [
"r3kmLJN5D28dHuH8vZNUZpMC43pEHpaocV"
]
},
"beneficiary": {
"beneficiary_persons": [
{
"legal_person": {
"name": {
"name_identifiers": [
{
"legal_person_name": "ABC Limited",
"legal_person_name_identifier_type": "LEGL"
}
]
}
}
}
],
"account_numbers": [
"rAPERVgXZavGgiGv6xBgtiZurirW2yAmY"
]
}
}
private_info = sygna_bridge_util.crypto.encrypt_private_data(
sensitive_data,
recipient_public_key
)
decoded_priv_info = sygna_bridge_util.crypto.decrypt_private_data(
private_info,
recipient_private_key
)
Sign and Verify
In Sygna Bridge, we use secp256k1 ECDSA over sha256 of utf-8 json string to create signature on every API call. Since you need to provide the identical utf-8 string during verification, the order of key-value pair you put into the object is important.
The following example is the snippet of originator's signing process of permissionRequest
API call. If you put the key transaction
before private_info
in the object, the verification will fail in the central server.
transaction = {
"originator_vasp": {
"vasp_code": "VASPUSNY1",
"addrs": [
{
"address": "r3kmLJN5D28dHuH8vZNUZpMC43pEHpaocV",
"addr_extra_info": []
}
]
},
"beneficiary_vasp": {
"vasp_code": "VASPUSNY2",
"addrs": [
{
"address": "rAPERVgXZavGgiGv6xBgtiZurirW2yAmY",
"addr_extra_info": [
{
"tag": "abc"
}
]
}
]
},
"currency_id": "sygna:0x80000090",
"amount": "4.51120135938784"
}
data_dt = "2019-07-29T06:28:00Z"
# using sign_data to get a valid signed object (with signature attached)
data_to_sign = {
"private_info":private_info,
"transaction":transaction,
"data_dt":data_dt
}
sygna_bridge_util.crypto.sign_data(data_to_sign, originator_private_key)
valid = sygna_bridge_util.crypto.verify_data(obj, originator_public_Key)
# or you can use the method that's built for `transfer` request:
signed_data = sygna_bridge_util.crypto.sign_permission_request(
data_to_sign,
originator_private_key
)
valid = sygna_bridge_util.crypto.verify_data(
signed_data,
originator_public_Key
)
We provide different methods like sign_permission_request
, sign_callback()
to sign different objects(or parameters) we specified in our api doc. You can also find more examples in the following section.
API
API calls to communicate with Sygna Bridge server.
We use basic auth with all the API calls. To simplify the process, we provide a API class to deal with authentication and post/ get request format.
sb_server = "https://api.sygna.io/"
sb_api_instance = sygna_bridge_util.API("api-key", sb_server)
After you create the API
instance, you can use it to make any API call to communicate with Sygna Bridge central server.
Get VASP Information
# Get List of VASPs associated with public keys.
verify = True # set verify to true to verify the signature attached with api response automatically.
vasps = sb_api_instance.get_vasp_list(verify)
# Or call use get_vasp_public_key() to directly get public key for a specific VASP.
public_key = sb_api_instance.get_vasp_public_key("10298", verify)
For Originator
There are two API calls from transaction originator to Sygna Bridge Server defined in the protocol, which are post_permission_request
and post_transaction_id
.
The full logic of originator would be like the following:
# originator.py
recipient_public_key = sb_api_instance.get_vasp_public_key("10298")
private_info = sygna_bridge_util.crypto.sygna_encrypt_private_data(
# example from above
sensitive_data,
recipient_public_key
)
data_dt = "2019-07-29T07:29:80Z"
data_to_sign = {
"private_info":private_info,
# from example above
"transaction":transaction,
"data_dt":data_dt
}
transfer_data = sygna_bridge_util.crypto.sign_permission_request(
data_to_sign,
sender_privKey
)
callback_url = "https://81f7d956.ngrok.io/v2/originator/transaction/premission"
callback_data = sygna_bridge_util.crypto.sign_callback(
{
"callback_url":callback_url
},
sender_privKey
)
response = sb_api_instance.post_permission_request(
{
"data":transfer_data,
"callback":callback_data
}
)
# Broadcast your transaction to blockchain after got and api response at your api server.
txid = "1a0c9bef489a136f7e05671f7f7fada2b9d96ac9f44598e1bcaa4779ac564dcd"
# Inform Sygna Bridge that a specific transfer is successfully broadcasted to the blockchain.
send_tx_id_data = sygna_bridge_util.crypto.sign_transaction_id(
{
"transfer_id":response["transfer_id"],
"txid":txid
},
sender_privKey
)
post_tx_id_response = sb_api_instance.post_transaction_id(send_tx_id_data)
For Beneficiary
There is only one api for Beneficiary VASP to call, which is post_permission
. After the beneficiary server confirm their legitimacy of a transfer request, they will sign { transfer_id, permission_status }
using sign_permission()
function, and send the result with signature to Sygna Bridge Central Server.
permission_status = "ACCEPTED" # or "REJECTED"
permission_data = sygna_bridge_util.crypto.sign_permission(
{
"transfer_id":response["transfer_id"],
"permission_status":permission_status
},
beneficiary_private_key
)
final_result = sb_api_instance.post_permission(permission_data)
For more complete example, please refer to Example file.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file sygna-bridge-util-2.0.3.tar.gz
.
File metadata
- Download URL: sygna-bridge-util-2.0.3.tar.gz
- Upload date:
- Size: 13.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.4.2 importlib_metadata/6.8.0 pkginfo/1.9.6 requests/2.31.0 requests-toolbelt/1.0.0 tqdm/4.66.1 CPython/3.11.6
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 0d68df1f7ec97067648b0219020637dc7b50f21a94f594cd87c8c9c5f572d946 |
|
MD5 | 0667acf1a398f1ae70f2bd5ba4bf20bf |
|
BLAKE2b-256 | 034817e9a17a6f241afc1b5d124baebb69a1d72c2d26b0dd1879a684b5d89283 |
File details
Details for the file sygna_bridge_util-2.0.3-py3-none-any.whl
.
File metadata
- Download URL: sygna_bridge_util-2.0.3-py3-none-any.whl
- Upload date:
- Size: 13.8 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.4.2 importlib_metadata/6.8.0 pkginfo/1.9.6 requests/2.31.0 requests-toolbelt/1.0.0 tqdm/4.66.1 CPython/3.11.6
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 66dfdc8027fc0517abfc07a54cce98ec2180f06614f78861e72804b02ef6dbee |
|
MD5 | fff860d0343d361d91029f363519287f |
|
BLAKE2b-256 | 45961b7d404b27b9097bcae44dcbbe0cb11d818e31c1311ef2ed16cb2686d53f |