From 53afc83dbe2f3253ee94d960e06c76474ef92b50 Mon Sep 17 00:00:00 2001 From: nolash Date: Thu, 11 Nov 2021 18:42:29 +0100 Subject: [PATCH] Add readme, avoid forced gpg import (and trust) for main user gpg config --- README.md | 134 +++++++++++++++++++++ keys/trust | 1 + requirements.txt | 65 +++++++++++ root_requirements.txt | 2 + setup.sh | 40 +++---- setup_bloxberg.sh | 7 +- setup_check.sh | 6 +- setup_key.sh | 7 +- var/bloxberg/bloxberg.json | 136 ++++++++++++++++++++++ var/bloxberg/bootnode.toml | 35 ++++++ var/bloxberg/bootnodes.txt | 17 +++ var/cic-staff-client/CHAIN_SPEC | 18 +++ var/cic-staff-client/CIC_REGISTRY_ADDRESS | 19 +++ var/cic-staff-client/CIC_TRUST_ADDRESS | 18 +++ var/cic-staff-client/META_URL | 18 +++ var/cic-staff-client/TX_CACHE_URL | 18 +++ 16 files changed, 511 insertions(+), 30 deletions(-) create mode 100644 README.md create mode 100644 keys/trust create mode 100644 root_requirements.txt create mode 100644 var/bloxberg/bloxberg.json create mode 100644 var/bloxberg/bootnode.toml create mode 100644 var/bloxberg/bootnodes.txt create mode 100644 var/cic-staff-client/CHAIN_SPEC create mode 100644 var/cic-staff-client/CIC_REGISTRY_ADDRESS create mode 100644 var/cic-staff-client/CIC_TRUST_ADDRESS create mode 100644 var/cic-staff-client/META_URL create mode 100644 var/cic-staff-client/TX_CACHE_URL diff --git a/README.md b/README.md new file mode 100644 index 0000000..f8c08f7 --- /dev/null +++ b/README.md @@ -0,0 +1,134 @@ +# CIC STAFF CLIENT + +Services installer temporarily for internal use by GE. + + +## Dependencies + +The os-level dependencies below must be met both at install and run time. + +The version numbers are the version numbers used at implmentation time. It may very well work with earlier versions of the components, as long as they are not too old. + +- systemd (249) +- gcc (11.1.0) +- git (2.33.0) +- python (>= 3.9) +- pip (20.3.4) +- sqlite (3.36.0) + +For the optional bloxberg node build (`INSTALL_EVM=bloxberg`), additionally these dependencies must be met, aswell as a working internet connection: + +- rustup (1.24.3) +- clang (12.0.1) +- cmake (3.21.2) + + +## Installation settings + +The examples below assume working directory of the cic-staff-installer repository root. + + + +### cic-stack docker-compose cluster settings + +To use against the cic-stack docker-compose local cluster: + +``` +export CIC_ROOT_URL=file://`pwd`/var +``` + +If you want to select python packages from a specific repository only, also add: + +``` +export PIP_INDEX_URL= +export PIP_EXTRA_INDEX_URL= +``` + +If you want to build the bloxberg mode executable (be warned, that's a long wait), add: + +``` +export INSTALL_EVM=bloxberg +``` + + +## Installation + +To proceed with the installation, enter: + +``` +bash setup.sh +``` + +During the installation you will be prompted to enter your name, email and as password for the gnupg setup. + +The gnupg key will both be used to authenticate using HTTP HOBA when necessary, aswell as encrypt local cached content. + + + + +## Running the services + +``` +systemctl --user start cic-cache-tracker +systemctl --user start cic-cache-server +``` + +Verify that they are running + +``` +systemctl --user status cic-cache-tracker +systemctl --user status cic-cache-server +``` + +Please note that although installing the bloxberg node is an optional feature of the installer, there is currently no supporting files for running the bloxberg node. + +To run the bloxberg node manually: + +``` +/home/lash/.local/bin/parity -c /home/cic/.local/share/io.parity.ethereum/bloxberg/bootnode.toml +``` + + +## Using `clicada` + +It should now be possible to run `clicada` without any extra settings needed. + +Please refer to the documentation on `clicada` for details on how to use the tool. + + +## Files and directories + +The installation produces a number of files in the user home directory, some of which may be edited directly to change behavior of the program. + +All paths relative to `$HOME` + +| location | description | editable | +|-|-|-| +| `.config/cic/cache/*.ini` | Configuration file(s) for the `cic-cache-*` services | yes | +| `.config/cic/cache/*.ini` | Configuration file(s) for the `cic-cache-*` services | yes | +| `.config/cic/clicada/*.ini` | Configuration file(s) for the `clicada` tool | yes | +| `.config/cic/staff-client/key_fingerprint` | gnupg key fingerprint for key used by clicada for authentication | no | +| `.config/cic/staff-client/user.asc` | gnupg public key used by cicada for authentication | no | +| `.config/cic/staff-client/.gnupg` | gnupg homedir used by cicada for authentication | no | +| `.config/systemd/user/cic-cache-*.service` | systemd user service definition file for `cic-cache-*` services | yes, with `systemctl --user edit ` | +| `.config/environment.d/01-cic-cache-*.conf` | environment variables for systemd user services | yes | +| `.local/share/cic/.gnupg` | gnupg homedir for holding trust keys for global cic configurations | no | +| `.local/share/cic/clicada/.secret` | A gnupg encrypted symmetric secret used to encrypt local cached content | no | +| `.local/share/io.parity.ethereum/bloxberg` | Bloxberg configurations and chain data | no | + + +## Installing as a different user + +You may want to create a dedicated user for the installation, so as to not pollute your regular user data directories. + +Since the services are run using systemd, a simple `su` or `sudo` will not be sufficient in this case. + +Perhaps the simplest solution is to launch a new login shell within the systemd vm using the following command: + +``` +machinectl login +``` + +Another alternative can be to open an `ssh` session. + + diff --git a/keys/trust b/keys/trust new file mode 100644 index 0000000..6be4af9 --- /dev/null +++ b/keys/trust @@ -0,0 +1 @@ +0826EDA1702D1E87C6E2875121D2E7BB88C2A746:6: diff --git a/requirements.txt b/requirements.txt index 40eb538..0aed88e 100644 --- a/requirements.txt +++ b/requirements.txt @@ -1,2 +1,67 @@ +alembic==1.4.2 +amqp==2.6.1 +asn1crypto==1.4.0 +attrs==21.2.0 +billiard==3.6.4.0 +celery==4.4.7 +certifi==2021.10.8 +cffi==1.14.6 +chainlib==0.0.12 +chainlib-eth==0.0.12 +chainsyncer==0.0.7 +charset-normalizer==2.0.7 cic-cache==0.2.1a10 +cic-eth-registry==0.6.1 +cic-types==0.2.1a5 clicada==0.0.1a8 +coincurve==15.0.0 +confini==0.5.2 +cryptography==3.2.1 +cytoolz==0.11.0 +erc20-faucet==0.3.2 +eth-accounts-index==0.1.2 +eth-address-index==0.2.4 +eth-contract-registry==0.6.3 +eth-erc20==0.1.2 +eth-hash==0.3.2 +eth-token-index==0.2.4 +eth-typing==2.2.2 +eth-utils==1.10.0 +funga==0.5.1 +funga-eth==0.5.1 +hexathon==0.1.0 +http-hoba-auth==0.2.1a3 +http-token-auth==0.0.1a6 +idna==3.3 +json-rpc==1.13.0 +jsonschema==3.2.0 +kombu==4.6.11 +Mako==1.1.5 +MarkupSafe==2.0.1 +moolb==0.2.0 +okota==0.2.4 +phonenumbers==8.12.12 +potaahto==0.1.0 +psycopg2==2.8.6 +pycparser==2.20 +pycryptodome==3.10.1 +pyrsistent==0.18.0 +pysha3==1.0.2 +python-dateutil==2.8.2 +python-editor==1.0.4 +python-gnupg==0.4.7 +pytz==2021.3 +PyYAML==5.3.1 +redis==3.5.3 +requests==2.26.0 +rlp==2.0.1 +semver==2.13.0 +six==1.15.0 +SQLAlchemy==1.3.20 +toolz==0.11.1 +urllib3==1.26.7 +usumbufu==0.3.3a3 +uWSGI==2.0.19.1 +vine==1.3.0 +vobject==0.9.6.1 +websocket-client==0.57.0 diff --git a/root_requirements.txt b/root_requirements.txt new file mode 100644 index 0000000..40eb538 --- /dev/null +++ b/root_requirements.txt @@ -0,0 +1,2 @@ +cic-cache==0.2.1a10 +clicada==0.0.1a8 diff --git a/setup.sh b/setup.sh index ef69c00..08da800 100644 --- a/setup.sh +++ b/setup.sh @@ -2,8 +2,7 @@ want_cic_cache_version=0.2.1a10 want_cicada_version=0.0.1a8 -#want_evm=bloxberg -want_evm= +#INSTALL_EVM=bloxberg . aux/bdbg/bdbg.sh @@ -25,10 +24,13 @@ fi . setup_path.sh dbg $dbg_debug "importing keys" -for f in ./keys/*.asc; do - gpg --import $f -done +mkdir -vp $HOME/.local/share/cic/.gnupg +chmod 700 $HOME/.local/share/cic/.gnupg +for f in ./keys/*.asc; do + gpg --homedir $HOME/.local/share/cic/.gnupg --import $f +done +gpg --homedir $HOME/.local/share/cic/.gnupg --import-ownertrust ./keys/trust t=`mktemp` dbg $dbg_debug "identify root values" @@ -43,26 +45,23 @@ if [ ! -f "$HOME/.config/cic/staff-client/key_fingerprint" ]; then for c in ${config_directives[@]}; do v=${!c} if [ -z "$v" ]; then - v=`curl -X GET $CIC_ROOT_URL/cic-staff-client/$c` - #gpg --verify $v + d=`mktemp -d` + curl -X GET $CIC_ROOT_URL/cic-staff-client/$c -o $d/$c + gpg --homedir $HOME/.local/share/cic/.gnupg --verify $d/$c + v=`gpg --homedir $HOME/.local/share/cic/.gnupg -d $d/$c` echo $v >> $t dbg $dbg_debug "fetched environment variable $v" else dbg $dbg_debug "using predefined environment variable for $c = $v" fi done - - echo seting - cat $t - + set -a . $t set +a # DATABASE_NAME set here works as long as only one database is involved... export DATABASE_PREFIX=$HOME/.local/share/cic/cache/${DATABASE_PREFIX:-staffclient} - #export DATABASE_HOST=${DATABASE_HOST:-localhost} - #export DATABASE_PORT=${DATABASE_PORT:-5432} export DATABASE_ENGINE=sqlite export DATABASE_DRIVER=pysqlite export DATABASE_DEBUG=0 @@ -76,10 +75,6 @@ if [ ! -f "$HOME/.config/cic/staff-client/key_fingerprint" ]; then else t=`mktemp` gpg --export -a $AUTH_KEY > $t - #gpg --list-packets $t | awk '/issuer fpr/ { print $9; }' | cut -b -40 > $HOME/.config/cic/staff-client/key_fingerprint - #gpg --list-packets $t | awk '/keyid:/ { print $2; }' - #gpg --list-packets $t | awk '/keyid:/ { print $2; }' > $HOME/.config/cic/staff-client/key_fingerprint - #fp=`cat $HOME/.config/cic/staff-client/key_fingerprint` echo -n $AUTH_KEY > $HOME/.config/cic/staff-client/key_fingerprint dbg $dbg_info "using key $AUTH_KEY" fi @@ -172,10 +167,6 @@ mkdir -vp $HOME/.local/share/cic/cache python ../cic-internal-integration/apps/cic-cache/scripts/migrate.py -c $HOME/.config/cic/cache/ -if [ ! -z $want_evm ]; then - . setup_${want_evm}.sh -fi - t=`mktemp` clicada --dumpconfig env $clicada_config_flag -vv > $t set -a @@ -183,3 +174,10 @@ set -a set +a . setup_systemd.sh + +echo foo $INSTALL_EVM +if [ ! -z $INSTALL_EVM ]; then + . setup_${INSTALL_EVM}.sh +fi + + diff --git a/setup_bloxberg.sh b/setup_bloxberg.sh index 2f6e3f0..b397944 100644 --- a/setup_bloxberg.sh +++ b/setup_bloxberg.sh @@ -1,7 +1,7 @@ GIT_OPENETHEREUM=${GIT_OPENETHEREUM:-https://github.com/openethereum/openethereum} OPENETHEREUM_PATH=${OPENETHEREUM_PATH:-$HOME/.local/bin/parity} openethereum_dir=`realpath $(dirname $OPENETHEREUM_PATH)` -default_openethereum_run=$HOME/.local/share/bloxberg +default_openethereum_run=$HOME/.local/share/io.parity.ethereum/bloxberg OPENETHEREUM_RUN=${OPENETHEREUM_RUN:-$default_openethereum_run} install_env= @@ -19,12 +19,15 @@ else dbg $dbg_info "found bloxberg node executable in $OPENETHEREUM_PATH" fi -OPENETHEREUM_RUN=$HOME/.local/share/bloxberg +#OPENETHEREUM_RUN=$HOME/.local/share/bloxberg if [ ! -d $OPENETHEREUM_RUN ]; then mkdir -vp $OPENETHEREUM_RUN/bootnode touch $OPENETHEREUM_RUN/bootnode.pwd dd if=/dev/urandom bs=32 count=1 2> /dev/null | hexdump -v -n 32 -e '1/1 "%02x"' > $OPENETHEREUM_RUN/bootnode.pwd chmod 400 $OPENETHEREUM_RUN/bootnode.pwd + ./aux/bash-templater/templater.sh var/bloxberg/bootnode.toml > $OPENETHEREUM_RUN/bootnode.toml + cp -v var/bloxberg/bloxberg.json $OPENETHEREUM_RUN/ + cp -v var/bloxberg/bootnodes.txt $OPENETHEREUM_RUN/ fi update_path $openethereum_dir diff --git a/setup_check.sh b/setup_check.sh index c34c5ce..12890e9 100644 --- a/setup_check.sh +++ b/setup_check.sh @@ -7,7 +7,11 @@ function checkk { fi } -exec=(systemctl clang git rustup gcc cmake pip python3 psql postgres) +if [ "$INSTALL_EVM" == "bloxberg"] ; then + exec=(systemctl git gcc pip python3 sqlite3 clang rustup cmake) +else + exec=(systemctl git gcc pip python3 sqlite3) +fi for e in ${exec[@]}; do dbg $dbg_trace "Checking for dependency $e" diff --git a/setup_key.sh b/setup_key.sh index f58b495..341c230 100644 --- a/setup_key.sh +++ b/setup_key.sh @@ -18,9 +18,7 @@ while [ -z $pgp_ok ]; do echo -n "(Yes/No): " read pgp_r r=${pgp_r:0:1} - if [ "$r" == "y" ]; then - pgp_ok=1 - elif [ "$r" == "Y" ]; then + if [[ "$r" =~ ^[yY] ]]; then pgp_ok=1 fi echo @@ -61,9 +59,6 @@ t=`mktemp -d` gpg --homedir $t --pinentry-mode loopback --passphrase-file $password_file --quick-gen-key "$pgp_name (CIC staff client signing key) <$pgp_email>" secp256k1 sign 0 -#echo -e "\e[0;93mNow let's see if you've forgotten your passphrase already" -#echo -e "Please enter it again at the given prompts to import the newly created key into your environment\e[0m" - mkdir -vp $HOME/.config/cic/staff-client/.gnupg chmod 0700 -v $HOME/.config/cic/staff-client/.gnupg diff --git a/var/bloxberg/bloxberg.json b/var/bloxberg/bloxberg.json new file mode 100644 index 0000000..a89632e --- /dev/null +++ b/var/bloxberg/bloxberg.json @@ -0,0 +1,136 @@ +{ + "name": "Bloxberg", + "engine": { + "authorityRound": { + "params": { + "maximumUncleCountTransition": 5006743, + "maximumUncleCount": 0, + "stepDuration": "5", + "validators" : { + "multi": { + "0": { + "list": ["0xaa84378fa41da83a9b6523ba46e45a664fbebfc8"] + }, + "100": { + "contract": "0x9850711951a84ef8a2a31a7868d0dca34b0661ca" + }, + "5006743": { + "safeContract": "0x9850711951a84ef8a2a31a7868d0dca34b0661ca" + } + } + } + } + } + }, + "params": { + "gasLimitBoundDivisor": "0x400", + "maximumExtraDataSize": "0x20", + "minGasLimit": "0x7A1200", + "networkID" : "0x2323", + + "eip140Transition": "0x0", + "eip211Transition": "0x0", + "eip214Transition": "0x0", + "eip658Transition": "0x0", + + "eip145Transition": 5006743, + "eip1014Transition": 5006743, + "eip1052Transition": 5006743, + + "eip1283Transition": 5006743, + "eip1344Transition": 5006743, + "eip1706Transition": 5006743, + "eip1884Transition": 5006743, + "eip2028Transition": 5006743 + }, + "genesis": { + "seal": { + "authorityRound": { +"step": "0x0", + "signature": "0x0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000" + } + }, + "difficulty": "0x20000", + "gasLimit": "0x7A1200" + }, + "accounts": { + "0x0000000000000000000000000000000000000001": { "balance": "1", "builtin": { "name": "ecrecover", "pricing": { "linear": { "base": 3000, "word": 0 } } } }, + "0x0000000000000000000000000000000000000002": { "balance": "1", "builtin": { "name": "sha256", "pricing": { "linear": { "base": 60, "word": 12 } } } }, + "0x0000000000000000000000000000000000000003": { "balance": "1", "builtin": { "name": "ripemd160", "pricing": { "linear": { "base": 600, "word": 120 } } } }, + "0x0000000000000000000000000000000000000004": { "balance": "1", "builtin": { "name": "identity", "pricing": { "linear": { "base": 15, "word": 3 } } } }, + "0x0000000000000000000000000000000000000005": { "builtin": { "name": "modexp", "activate_at": 0, "pricing": { "modexp": { "divisor": 20 } } } }, + "0x0000000000000000000000000000000000000006": { + "builtin": { + "name": "alt_bn128_add", + "activate_at": 0, + "pricing": { + "alt_bn128_const_operations": { + "price": 500 + } + } + } + }, + "0000000000000000000000000000000000000007": { + "builtin": { + "name": "alt_bn128_mul", + "pricing": { + "0": { + "price": { + "alt_bn128_const_operations": { + "price": 40000 + } + } + }, + "5006743": { + "info": "Istanbul HF", + "price": { + "alt_bn128_const_operations": { + "price": 6000 + } + } + } + } + } + }, +"0000000000000000000000000000000000000008": { + "builtin": { + "name": "alt_bn128_pairing", + "pricing": { + "0": { + "price": { + "alt_bn128_pairing": { + "base": 100000, + "pair": 80000 + } + } + }, + "5006743": { + "info": "Istanbul HF", + "price": { + "alt_bn128_pairing": { + "base": 45000, + "pair": 34000 + } + } + } + } + } + }, + "0x0000000000000000000000000000000000000009": { + "builtin": { + "name": "blake2_f", + "pricing": { + "5006743": { + "info": "Istanbul HF", + "price": { + "blake2_f": { + "gas_per_round": 1 + } + } + } + } + } + }, + "0xab59a1ea1ac9af9f77518b9b4ad80942ade35088": { "balance": "100000000000000000000000000000000" } +} +} diff --git a/var/bloxberg/bootnode.toml b/var/bloxberg/bootnode.toml new file mode 100644 index 0000000..798f86b --- /dev/null +++ b/var/bloxberg/bootnode.toml @@ -0,0 +1,35 @@ +# File bootnode.toml + +[parity] +chain = "{{HOME}}/.local/share/io.parity.ethereum/bloxberg/bloxberg.json" +base_path = "{{HOME}}/.local/share/io.parity.ethereum/bloxberg/bootnode" + +[network] +port = 30303 +reserved_peers = "{{HOME}}/.local/share/io.parity.ethereum/bloxberg/bootnodes.txt" +# reserved_only = true +max_peers = 100 +snapshot_peers = 25 +#nat = "extip:217.197.85.156" + +[rpc] +port = 8545 +#apis = ["web3", "eth", "net", "personal", "parity", "parity_set", "traces", "rpc", "parity_accounts"] +apis = ["eth", "net" ] +interface = "all" +cors = ["*"] + +[websockets] +disable = true +port = 8546 +interface = "all" +origins = ["all"] + +[account] +password = ["{{HOME}}/.local/share/io.parity.ethereum/bloxberg/bootnode.pwd"] + +[footprint] +tracing = "on" +pruning = "archive" +pruning_history = 256 +cache_size_db = 2000 diff --git a/var/bloxberg/bootnodes.txt b/var/bloxberg/bootnodes.txt new file mode 100644 index 0000000..4fe63bd --- /dev/null +++ b/var/bloxberg/bootnodes.txt @@ -0,0 +1,17 @@ +#MPDL Bootnode and Authority +enode://a7a53baf91b612b25b84993c964beb987879bfe7430cf6acb55bd721b9c0d96ceb1849049b1dcc0aa6e86fa1e2234280581b16c1265d56644fb09085e6906034@141.5.98.231:30304 +enode://a7a53baf91b612b25b84993c964beb987879bfe7430cf6acb55bd721b9c0d96ceb1849049b1dcc0aa6e86fa1e2234280581b16c1265d56644fb09085e6906034@130.183.206.234:30304 +enode://e6b181c16d20194029c220ce886fdc7a745cb37ee655c3b41ea744ec89143db6731a1c01ff3c40b39f969079090ad34e0e3319e47b0d22a8d510ff1f7b5a9ac7@141.5.98.231:30303 +enode://e6b181c16d20194029c220ce886fdc7a745cb37ee655c3b41ea744ec89143db6731a1c01ff3c40b39f969079090ad34e0e3319e47b0d22a8d510ff1f7b5a9ac7@130.183.206.234:30303 +#GeorgiaTech +enode://4d9e6925ef3a92315283a655e856aa29dd516172c4f38d2a8fcd58c233a2cd80c57b507fed3bf351b1ac0611e8c7fefd6fb1c49de2d0d15eb1816d43629ac4ba@3.14.148.213:30303 +#CMU +enode://ce0154eb13c1c038017151dd1ff4d736178ffedc33f5e11fe694c247eb09279886d253c3c775486eb709a65057901e2788098f991c58e6ad26ff957a8f45253e@128.2.25.89:30303 +#UCL +enode://e41a38d659f13d47f3d88c5178e0cfe97487d3568000b85ae3a4abbcc35404d2628cee8a7e9071b63802542bafd886447ecf1d02fc663be0534779094a3e4fd1@128.16.12.165:30303 +#Sarajevo +enode://6959137e1c66384e82ce6d9ba7e09bb0e56817f4834416448b98f646a335168c2967760a1daa5e3ec5ac2a3401be1cd05927568cdebf49c25d4770f5bb8fbfd7@195.222.43.21:30303 +#Zurich +enode://6173beaabd1a82d41e3615da2a755e99f3bd53e04737e2ae2f02a004c42445d8dfd1d87aadfafabc4c45a1df2a80f359ab628c93522d1dac70690a9689912bbc@129.132.178.74:30303 +#Internet Security +enode://bc50cf41d29f346f43f84ee7d03b21cd2d4176cd759cd0d26ce04c16448d4c8611c4eab4c5543e29075c758c0afc2fd6743fa38f48dc0ed1f016efbb5c5a7654@194.94.127.78:30303 diff --git a/var/cic-staff-client/CHAIN_SPEC b/var/cic-staff-client/CHAIN_SPEC new file mode 100644 index 0000000..2b9c443 --- /dev/null +++ b/var/cic-staff-client/CHAIN_SPEC @@ -0,0 +1,18 @@ +-----BEGIN PGP MESSAGE----- + +owEBfQKC/ZANAwAIASHS57uIwqdGAaw2YgpDSEFJTl9TUEVDYY1AikNIQUlOX1NQ +RUM9ZXZtOmJ5emFudGl1bTo4OTk2OmJsb3hiZXJniQIzBAABCAAdFiEECCbtoXAt +HofG4odRIdLnu4jCp0YFAmGNQIoACgkQIdLnu4jCp0ZtMg/+PZJjTa05dxCO4A/J +1/A+I+HuBFt4LQY+mjTnDeCRF3cjgKrUfF+D6nIIbCMsL+F/HlN9NO2x0RvdkGkg +k6whux+HBl7WxGQAGPlFIAJTz+xGhQ9gJD6djuILjNcWKtfzpCdEBq5nXnlcK6xo +X1gbSQgaHvIiau6qPHobKF9EciF99QB2f/3BSAeZpge3wOxC4NIibPL1o/QwEJrx +QcNCoxRvI0Nvx51AfJ/VoyW/WbYOgrOVv8ZYqhpuPMC8MYFOzJByN73p5JNA2qGg +BF5WHOARBiEXH3xAVcnvKSegqh8o3ZeQT6mwc6vzHmBA1BTiPeT256rQwDkXaaFY +TXXbg/1uvCyPUoXJgyH8FErs/7iYZo7tOy7qGEV8IM+O4IpVxogq7VVJj4UlFEJN +Sggjon/4aGc6dTThdkxn2FhJzTY7fPDjlNoxVRYxOzL96nSmLM5fslOYBUt9QZXP +QkNRlhbxyhpZ+MODmzqt5JRLMLPSdLCd7zVf//zlYVjeb4PCzr7/CeGHhwmyyBj3 +oc9waZ1bLspIAJxHzuK4cQq/MAsRlL/Mo+DHKOPgtXF5xoW1Cvt/bOAdgl9A7tHE +ttwZAWw9FUmSpxfQbfV+R3zvgxC1wUGfqElMa5xT5iK1Vm0IYUBEFrUeqGbyAZwe +3WNmOQJ0w1A4a/lPMDI8wcUVmV0= +=5hcY +-----END PGP MESSAGE----- diff --git a/var/cic-staff-client/CIC_REGISTRY_ADDRESS b/var/cic-staff-client/CIC_REGISTRY_ADDRESS new file mode 100644 index 0000000..1802975 --- /dev/null +++ b/var/cic-staff-client/CIC_REGISTRY_ADDRESS @@ -0,0 +1,19 @@ +-----BEGIN PGP MESSAGE----- + +owGbwMvMwMGoeOn57o5Dy90Y10QliTh7OscHubp7BocERcY7urgEuQYHJ/Y6TMQm +bmtQkZxmZpCalGxiYppkZmyWaJqYZG5hnmaZagEUMzNNNEo0Tk2zMLK05OpkMmZh +YORgkBVTZOFQe7uwQFeu/dij9kCY5axMIFsYuDgFYCLX/vH/L+QPX/Jvu5zLVudE +hX3fpKdM3ma0IU5vw0ye6X+jZrfslLphllHHr775QO31zYFeCiELZ75JlHtdGSAQ +WTNRfnewr13spQ3/oi8c5jhY5JQj+2THY5EKrhX1TnufWBiLvszNe5WjXbDtCJd5 +p+2n4LVyTSvOhqxaeOL/cZ1PnTV/Jp37oqHjbXgh2OBb72WtI4JTHCaVHp3BI1PM +uoPV+iu/xcltS+u+m0wqFw866Pz2An9WkqLzwnOfT2X5/Zq1K0tsJ9spscVtOx1z +Svp/Gi/uLjWwrPH5q/0uSsP7bvvDV5O1NY+dYy5zSF4r4ZCbYCbPnbXT9rVQyKc5 +TX7Hbyvf3fdwQ46WzoqWhvvprb+iymymREU/EJiwSXVz7bGoDa9dwo4WOgjE/pj6 +fl6WVsLaC9VTNtlfOJXGPOP7xuRjF1XeCCX/dOib4codJfXlqOaFGU8/XznB2PzY +/1G/5MIdDksW/7ToC5X+vzjd+EVC49rHkfOTtkpNvyPjODn8/4xHTW2f77cvZmk7 +oKPD/OUVT3TNDC3f92q/zJfK23yYalh3xMRitdTRWYstLswP/ctw9q/Mp345z273 +w0HvK5ue/ftnLnlZ4eXG29Izz0hbvtuippPzNXXaP0bFDMYPa3k55gd7Bs8oNT09 +9Z7ZG5mDJlN45tr1XvCwdIif1KP9f7n/I3fV/Xe+rqtKWJIk+P8N64aua6ss2LQU +LwMA +=YNnV +-----END PGP MESSAGE----- diff --git a/var/cic-staff-client/CIC_TRUST_ADDRESS b/var/cic-staff-client/CIC_TRUST_ADDRESS new file mode 100644 index 0000000..1737915 --- /dev/null +++ b/var/cic-staff-client/CIC_TRUST_ADDRESS @@ -0,0 +1,18 @@ +-----BEGIN PGP MESSAGE----- + +owGbwMvMwMGoeOn57o5Dy90Y1wQlCTp7OseHBIUGh8Q7urgEuQYHJ/Y6TMUQtHVN +MrY0ME91TkwxN0k0MDA0TjYytXQxtTA3cXQ1TzMyckl2Sna2NHXm6mQyZmFg5GCQ +FVNk4VB7u7BAV6792KP2QJilrEwgCxi4OAVgIleD+f8nMstfi1+2rzu1aaLUuyWq +PAxHpu3bGOr0kHNu2ttjHEbBe0qzXzS9MX58MPCXuH3LAknu7wUr9l+qOyietf9s +/rvphUwfvL2sb3tYntorLx/9ctqFXceEG7RCY6eWvX98clHN6cIJcutmZU0TYS7/ +taFQd9LF50w83QvnFbYVNO7Sydm76N1rTb0oPrs1SdqLXY4yZn5iut+stPHIacVd +bjvEsi1177DP3WMk5rbCueS4zS0N7p0bS/xMeE+rBs/97la1yCREcu79H/9iWxvf +nLFKtPgx22XNzSz2uDd3jib+ynue2+rzIbtSXirgl8fV5ylaNnmxLz9f+nNKfwt3 +v9y0tji/o25Wb06K/dwwZ3an5tIoS+F0F4c4Z8+KZSem2rvPEMhfP0XTzLbIZ9Xi +Q7v1lXlzEzYWHrA4zm//zdu8fO9HF86oreUhp++9Obs9p0LA0ux/X8WTZcKcbyWs +zxzVZn9kkaub8XG3a/CMB83bHmx98nKC+mw2Xx6p3FxX3s2xeVus1B4GLLN6vY3t +8mU5A/VEe6VZN18xPPw32VBol9FcfkO7Khd5a8eDRxaYO90MyLuu2FXcVjFtwzPP +7O9SO24oRh9pnb39xq3jnRFPrjBUmK/ScFwc/tyeyWfRAYZ/Z09JnnoQXdWfVl8Y +Wcq1zefghqra24ereD9O1e088OqAb919tglP9m+eu2cxZ+qyNV/m/hdLuuEJAA== +=+uzd +-----END PGP MESSAGE----- diff --git a/var/cic-staff-client/META_URL b/var/cic-staff-client/META_URL new file mode 100644 index 0000000..4c94c74 --- /dev/null +++ b/var/cic-staff-client/META_URL @@ -0,0 +1,18 @@ +-----BEGIN PGP MESSAGE----- + +owEBdQKK/ZANAwAIASHS57uIwqdGAawuYghNRVRBX1VSTGGNQJhNRVRBX1VSTD1o +dHRwOi8vbG9jYWxob3N0OjYzMzgwCokCMwQAAQgAHRYhBAgm7aFwLR6HxuKHUSHS +57uIwqdGBQJhjUCYAAoJECHS57uIwqdG2GsP/3VH0vlEXC+X0Nh8ufRLdtBiw73J +LNTGNXslIg3szwGGgaHjNoARpluZjJ6AvH83s7jYV/OFuip+zwBIcqRZ4BT0rtEf +YlojiVnEIkIahbxYlD+gIU37WjbiBcpPAqYErYDaJhEyUzGD9aLhLg0r+TImHLUH +/WRWioEwSdAAzetzkY0R3aNtEZlolxvt7HumSOIMKNX7qQHpnpPUOqergsiwN0J7 +ynWAD1vgXaiZ3lI+8iyDWwQHpaTjHuRbFmROVhBRiFCY6xlyotYP8waGldEZVvnc +0mP5cRg2PogEuCO5cDQ+2vszR7N8xPpQKI/9Q3gUTv2gPj5Cy7ko4+N6bsTgQk7H +aX1jvUwaU0HBD0A//l6eGxl0gze5hrr4v/4O8MZLdzKfYPqgOzPcDgo42aykua7x +0zHWTCtmiy/PaW4/c+bPKvbMMUO5ZojRant4O+pCZ80CTkH18rkY2pcQGGGP+XTI +pDTKB1IdrvnVc508v59UaXoKHOKpaES8SqTe4XWZY9w/pr7alw9LjjEOu3mrNypT +/CszUjwx5FYRKQxLrF8fj7UuODX9bbUP9XAdggy6wwy8NWZbw1hxBlJRKgDvvvoK +jqGAkRig8yzhT6f0F7f5U3AVdCCFfZXWBWk0NCqT5oMHbI5VGMKLAdV8m8+ptyB+ +GlDGJ7sdcwrUhM3U +=Va+P +-----END PGP MESSAGE----- diff --git a/var/cic-staff-client/TX_CACHE_URL b/var/cic-staff-client/TX_CACHE_URL new file mode 100644 index 0000000..2f3e5ec --- /dev/null +++ b/var/cic-staff-client/TX_CACHE_URL @@ -0,0 +1,18 @@ +-----BEGIN PGP MESSAGE----- + +owEBfAKD/ZANAwAIASHS57uIwqdGAaw1YgxUWF9DQUNIRV9VUkxhjUCcVFhfQ0FD +SEVfVVJMPWh0dHA6Ly9sb2NhbGhvc3Q6ODMxMwqJAjMEAAEIAB0WIQQIJu2hcC0e +h8bih1Eh0ue7iMKnRgUCYY1AnAAKCRAh0ue7iMKnRsGVD/41suPkAo85ue4IHY4g +yXl5IuxF6TPAkG9UPTB7Lb4RLmlmwsoN4oMssn0//QZJ/0l/vfJQqf0NPUhEwOWw +vnr8rK+l0jZ77pewP38aptMvq7S2TIXgrRYPwWKhwZFe0F5fUqk5nPxjdKoSCANE +eifd7Igf543x3oqahaM4W1jHe8JjzXPdKpqC/eubU5o3Uc8RDygM8Y3aTXR25siq +0D/yx5X3y5BbETKkTmkDRjowsMkYPLL6TWUdHspYYq0I224RVwOG408XWGDi4YJQ +z8PK4W+rR6oPUmcpTy+PgTdu7d16I1B1b4OqYeXmy6QK0TOK9KhxcsZlJiBYeJ7n +xMOVHA/9mAfagXsbovz7Hh+q4uebR4jmm/jwHP2tZMotrPuTfQJmdI7LSMwwB8Kk +/Amh2Kq2W0otcg2h7fTylmnCLVql+8j0ECykE7QcdeNFPNrlhEG1qi033adJ9CL+ +JmDxGGGEKIyL4mK6qzZFeOQpUC8P9aFOXt79NbOtqvyNQtxxNiXNCJvH0gI3aYeY ++VDcINFjLTJQ88lcfCgLoZ4mFDP4PffKwyYf7GvdxI1Xrd7diniwwUHqvoIjHb3r +LGL0XNCaVkFH6bsHt2EIlR5/8aGl0G3189tM+i4IOW/sl+ktZAEupGEXNXjaN1IY +tG5M/oJuWUJzOPv7ZJql0PLWNw== +=IueR +-----END PGP MESSAGE-----