The Mobius DApp Store JS SDK makes it easy to integrate Mobius DApp Store MOBI payments into any Go application.
A big advantage of the Mobius DApp Store over centralized competitors such as the Apple App Store or Google Play Store is significantly lower fees - currently 0% compared to 30% - for in-app purchases.
The Mobius DApp Store will be an open-source, non-custodial "wallet" interface for easily sending crypto payments to apps. You can think of the DApp Store like https://stellarterm.com/ or https://www.myetherwallet.com/ but instead of a wallet interface it is an App Store interface.
The DApp Store is non-custodial meaning Mobius never holds the secret key of either the user or developer.
An overview of the DApp Store architecture is:
- Every application holds the private key for the account where it receives MOBI.
- An application specific unique account where a user deposits MOBI for use with the application is generated for each app based on the user's seed phrase.
- When a user opens an app through the DApp Store:
- Adds the application's public key as a signer so the application can access the MOBI and
- Signs a challenge transaction from the app with its secret key to authenticate that this user owns the account. This prevents a different person from pretending they own the account and spending the MOBI (more below under Authentication).
Install with go get
$ go get github.com/codehakase/mobius-client-go
Your production server must use HTTPS and set the below header on the /auth
endpoint:
Access-Control-Allow-Origin: *
When a user opens an app through the DApp Store it tells the app what Mobius account it should use for payment.
The application needs to ensure that the user actually owns the secret key to the Mobius account and that this isn't a replay attack from a user who captured a previous request and is replaying it.
This authentication is accomplished through the following process:
When the user opens an app in the DApp Store it requests a challenge from the application. The challenge is a payment transaction of 1 XLM from and to the application account. It is never sent to the network - it is just used for authentication. The application generates the challenge transaction on request, signs it with its own private key, and sends it to user. The user receives the challenge transaction and verifies it is signed by the application's secret key by checking it against the application's published public key (that it receives through the DApp Store). Then the user signs the transaction with its own private key and sends it back to application along with its public key. Application checks that challenge transaction is now signed by itself and the public key that was passed in. Time bounds are also checked to make sure this isn't a replay attack. If everything passes the server replies with a token the application can pass in to "login" with the specified public key and use it for payment (it would have previously given the app access to the public key by adding the app's public key as a signer). Note: the challenge transaction also has time bounds to restrict the time window when it can be used.
See demo at:
$ git clone https://github.com/codehakase/mobius-client-go.git $GOPATH/src/github.com/codehakase/mobius-client-go
$ cd $GOPATH/src/github.com/codehakase/mobius-client-go/example
$ go run main.go
# navigate to http://localhost:3000 for demo
package main
import (
"net/http"
"encoding/json"
MobiusAuth "github.com/codehakase/mobius-client-go/auth"
"github.com/gorilla/mux"
"github.com/rs/cors"
)
var APPLICATION_SECRET_KEY string
func init() {
os.Getenv("APPLICATION_SECRET_KEY")
}
func main() {
r := mux.NewRouter()
// GET /auth
// Generates and returns challenge transaction XDR signed by application to user
r.HandleFunc("/auth", func (w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json;charset=utf-8")
chl := new(MobiusAuth.Challenge)
w.WriteHeader(http.StatusOK)
w.Write([]byte((chl.Call(APPLICATION_SECRET_KEY, 0))))
}).Methods("GET")
// POST /auth
// Validates challenge transaction. It must be:
// - Signed by application and requesting user.
// - Not older than 10 seconds from now (see MobiusClient.Client.strictInterval`)
r.HandleFunc("/auth", func(w http.ResponseWriter, r *http.Request) {
err := r.ParseForm()
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
w.Header().Set("Content-Type", "application/json;charset=utf-8")
token, err := MobiusAuth.NewToken(
APPLICATION_SECRET_KEY,
r.FormValue("xdr"),
r.FormValue("public_key"),
)
if err != nil {
http.Error(w, err.Error(), 500)
}
// Important! Otherwise, token will be considered valid
if _, err := token.Validate(true); err != nil {
log.Fatal(err)
}
w.WriteHeader(http.StatusOK)
h := token.Hash("hex").(string)
w.Write([]byte(h))
}).Methods("POST")
c := cors.New(cors.Options{
AllowedOrigins: []string{"*"},
AllowCredentials: true,
AllowedHeaders: []string{"Origin", "X-Requested-With", "Content-Type",
"Accept"},
})
r.PathPrefix("/").Handler(http.StripPrefix("/", http.FileServer(http.Dir("./"))))
handler := c.Handler(r)
log.Println("Starting app server...")
log.Fatal(http.ListenAndServe(":3000", handler))
}
More examples can be found in the
examples
directory
After the user completes the authentication process they have a token. They now pass it to the application to "login" which tells the application which Mobius account to withdraw MOBI from (the user public key) when a payment is needed. For a web application the token is generally passed in via a token request parameter. Upon opening the website/loading the application it checks that the token is valid (within time bounds etc) and the account in the token has added the app as a signer so it can withdraw MOBI from it.
See demo at
examples/flappy
package main
import (
"fmt"
"log"
"net/http"
"os"
"strconv"
"github.com/codehakase/mobius-client-go/app"
"github.com/codehakase/mobius-client-go/auth"
jwt "github.com/dgrijalva/jwt-go"
"github.com/gorilla/mux"
"github.com/rs/cors"
)
var APP_KEY string
func init() {
APP_KEY = os.Getenv("APPLICATION_SECRET_KEY")
}
func main() {
r := mux.NewRouter()
r.HandleFunc("/pay", func(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json;charset=utf-8")
publicKey := getPublicKeyFromToken(r.URL.Query().Get("token"))
err := r.ParseForm()
if err != nil {
log.Fatalf("failed to parse request, %v", err)
}
var amount float64
if r.FormValue("amount") != "" {
amount, _ = strconv.ParseFloat(r.FormValue("amount"), 64)
} else {
amount = 1
}
dapp, err := app.Build(APP_KEY, publicKey)
if err != nil {
log.Fatal(err)
}
res, err := dapp.Charge(amount)
if err != nil {
log.Fatal(err)
}
w.WriteHeader(http.StatusOK)
w.Write([]byte(fmt.Sprintf(
"{'status': 'ok','tx_hash': '%s','balance': %v}",
res.Hash,
dapp.UserBalance(),
)))
}).Methods("POST")
}
func getPublicKeyFromToken(token string) string {
if token == "" {
log.Fatal("token is sent empty")
os.Exit(1)
}
j := &auth.JWT{Secret: APP_KEY}
jwtToken := j.Decode(token)
return jwtToken.Claims.(jwt.MapClaims)["sub"].(string)
}
# Clone this repo
$ git clone https://github.com/codehakase/mobius-client-go.git $GOPATH/src/github.com/codehakase/mobius-client-go && cd $_
# Install dependencies (using go dep) https://github.com/golang/dep
$ dep ensure -v
# Run authentication example
$ make example:auth # will boot http server @ http://localhost:3000
# Run Tests
$ make test # or make test-verbose
Bug reports and pull requests are welcome on GitHub at https://github.com/codehakase/mobius-client-go. This project is intended to be a safe, welcoming space for collaboration, and contributors are expected to adhere to the Contributor Covenant code of conduct.
The SDK is available as open source under the terms of the MIT License.