Overview
An IC (Internet Computer) Agent is responsible for encoding and decoding messages used to communicate with the IC via its HTTPS interface, as well as verifying responses from the IC by checking the signature against the public key of the IC.
DFINITY is maintaining two IC agent implementations which can be seen in a template:
In addition, there are currently the following community-driven IC agent implementations with varying completeness:
We are open to supporting work on existing agent implementations if features are missing, and we might support additional implementations for languages/frameworks that already exist if there is a good reason for this. In addition, the following agent implementations are desired:
Currently, there are active projects for all agents that have been requested. If you need another client library, please get in touch.
Requirements
Acceptance Criteria
References
Overview
An IC (Internet Computer) Agent is responsible for encoding and decoding messages used to communicate with the IC via its HTTPS interface, as well as verifying responses from the IC by checking the signature against the public key of the IC.
DFINITY is maintaining two IC agent implementations which can be seen in a template:
In addition, there are currently the following community-driven IC agent implementations with varying completeness:
We are open to supporting work on existing agent implementations if features are missing, and we might support additional implementations for languages/frameworks that already exist if there is a good reason for this. In addition, the following agent implementations are desired:
Currently, there are active projects for all agents that have been requested. If you need another client library, please get in touch.
Requirements
call,read_state,queryandstatus.request idusing representation-independent hashingPrincipaldata type.read_stateAPI include a certificate that needs to be parsed (to look up the relevant information from the state tree) and verified. The public key of the IC must be hard coded in the software. For verification of responses from a local replica the public key needs to be fetched first.Acceptance Criteria
References