Add readme, avoid forced gpg import (and trust) for main user gpg config
This commit is contained in:
parent
cffc207b24
commit
53afc83dbe
134
README.md
Normal file
134
README.md
Normal file
@ -0,0 +1,134 @@
|
|||||||
|
# CIC STAFF CLIENT
|
||||||
|
|
||||||
|
Services installer temporarily for internal use by GE.
|
||||||
|
|
||||||
|
|
||||||
|
## Dependencies
|
||||||
|
|
||||||
|
The os-level dependencies below must be met both at install and run time.
|
||||||
|
|
||||||
|
The version numbers are the version numbers used at implmentation time. It may very well work with earlier versions of the components, as long as they are not too old.
|
||||||
|
|
||||||
|
- systemd (249)
|
||||||
|
- gcc (11.1.0)
|
||||||
|
- git (2.33.0)
|
||||||
|
- python (>= 3.9)
|
||||||
|
- pip (20.3.4)
|
||||||
|
- sqlite (3.36.0)
|
||||||
|
|
||||||
|
For the optional bloxberg node build (`INSTALL_EVM=bloxberg`), additionally these dependencies must be met, aswell as a working internet connection:
|
||||||
|
|
||||||
|
- rustup (1.24.3)
|
||||||
|
- clang (12.0.1)
|
||||||
|
- cmake (3.21.2)
|
||||||
|
|
||||||
|
|
||||||
|
## Installation settings
|
||||||
|
|
||||||
|
The examples below assume working directory of the cic-staff-installer repository root.
|
||||||
|
|
||||||
|
<!--The `CIC_ROOT_URL` environment variable points to a location where top-level configuration settings can be found. These are individual files named after the environment variables they are setting, whose contents are signed by the trusted key defined in `CIC_SETUP_TRUSTED_FINGERPRINT`.-->
|
||||||
|
|
||||||
|
### cic-stack docker-compose cluster settings
|
||||||
|
|
||||||
|
To use against the cic-stack docker-compose local cluster:
|
||||||
|
|
||||||
|
```
|
||||||
|
export CIC_ROOT_URL=file://`pwd`/var
|
||||||
|
```
|
||||||
|
|
||||||
|
If you want to select python packages from a specific repository only, also add:
|
||||||
|
|
||||||
|
```
|
||||||
|
export PIP_INDEX_URL=<url>
|
||||||
|
export PIP_EXTRA_INDEX_URL=<url>
|
||||||
|
```
|
||||||
|
|
||||||
|
If you want to build the bloxberg mode executable (be warned, that's a long wait), add:
|
||||||
|
|
||||||
|
```
|
||||||
|
export INSTALL_EVM=bloxberg
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
## Installation
|
||||||
|
|
||||||
|
To proceed with the installation, enter:
|
||||||
|
|
||||||
|
```
|
||||||
|
bash setup.sh
|
||||||
|
```
|
||||||
|
|
||||||
|
During the installation you will be prompted to enter your name, email and as password for the gnupg setup.
|
||||||
|
|
||||||
|
The gnupg key will both be used to authenticate using HTTP HOBA when necessary, aswell as encrypt local cached content.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
## Running the services
|
||||||
|
|
||||||
|
```
|
||||||
|
systemctl --user start cic-cache-tracker
|
||||||
|
systemctl --user start cic-cache-server
|
||||||
|
```
|
||||||
|
|
||||||
|
Verify that they are running
|
||||||
|
|
||||||
|
```
|
||||||
|
systemctl --user status cic-cache-tracker
|
||||||
|
systemctl --user status cic-cache-server
|
||||||
|
```
|
||||||
|
|
||||||
|
Please note that although installing the bloxberg node is an optional feature of the installer, there is currently no supporting files for running the bloxberg node.
|
||||||
|
|
||||||
|
To run the bloxberg node manually:
|
||||||
|
|
||||||
|
```
|
||||||
|
/home/lash/.local/bin/parity -c /home/cic/.local/share/io.parity.ethereum/bloxberg/bootnode.toml
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
## Using `clicada`
|
||||||
|
|
||||||
|
It should now be possible to run `clicada` without any extra settings needed.
|
||||||
|
|
||||||
|
Please refer to the documentation on `clicada` for details on how to use the tool.
|
||||||
|
|
||||||
|
|
||||||
|
## Files and directories
|
||||||
|
|
||||||
|
The installation produces a number of files in the user home directory, some of which may be edited directly to change behavior of the program.
|
||||||
|
|
||||||
|
All paths relative to `$HOME`
|
||||||
|
|
||||||
|
| location | description | editable |
|
||||||
|
|-|-|-|
|
||||||
|
| `.config/cic/cache/*.ini` | Configuration file(s) for the `cic-cache-*` services | yes |
|
||||||
|
| `.config/cic/cache/*.ini` | Configuration file(s) for the `cic-cache-*` services | yes |
|
||||||
|
| `.config/cic/clicada/*.ini` | Configuration file(s) for the `clicada` tool | yes |
|
||||||
|
| `.config/cic/staff-client/key_fingerprint` | gnupg key fingerprint for key used by clicada for authentication | no |
|
||||||
|
| `.config/cic/staff-client/user.asc` | gnupg public key used by cicada for authentication | no |
|
||||||
|
| `.config/cic/staff-client/.gnupg` | gnupg homedir used by cicada for authentication | no |
|
||||||
|
| `.config/systemd/user/cic-cache-*.service` | systemd user service definition file for `cic-cache-*` services | yes, with `systemctl --user edit <service>` |
|
||||||
|
| `.config/environment.d/01-cic-cache-*.conf` | environment variables for systemd user services | yes |
|
||||||
|
| `.local/share/cic/.gnupg` | gnupg homedir for holding trust keys for global cic configurations | no |
|
||||||
|
| `.local/share/cic/clicada/.secret` | A gnupg encrypted symmetric secret used to encrypt local cached content | no |
|
||||||
|
| `.local/share/io.parity.ethereum/bloxberg` | Bloxberg configurations and chain data | no |
|
||||||
|
|
||||||
|
|
||||||
|
## Installing as a different user
|
||||||
|
|
||||||
|
You may want to create a dedicated user for the installation, so as to not pollute your regular user data directories.
|
||||||
|
|
||||||
|
Since the services are run using systemd, a simple `su` or `sudo` will not be sufficient in this case.
|
||||||
|
|
||||||
|
Perhaps the simplest solution is to launch a new login shell within the systemd vm using the following command:
|
||||||
|
|
||||||
|
```
|
||||||
|
machinectl login
|
||||||
|
```
|
||||||
|
|
||||||
|
Another alternative can be to open an `ssh` session.
|
||||||
|
|
||||||
|
|
1
keys/trust
Normal file
1
keys/trust
Normal file
@ -0,0 +1 @@
|
|||||||
|
0826EDA1702D1E87C6E2875121D2E7BB88C2A746:6:
|
@ -1,2 +1,67 @@
|
|||||||
|
alembic==1.4.2
|
||||||
|
amqp==2.6.1
|
||||||
|
asn1crypto==1.4.0
|
||||||
|
attrs==21.2.0
|
||||||
|
billiard==3.6.4.0
|
||||||
|
celery==4.4.7
|
||||||
|
certifi==2021.10.8
|
||||||
|
cffi==1.14.6
|
||||||
|
chainlib==0.0.12
|
||||||
|
chainlib-eth==0.0.12
|
||||||
|
chainsyncer==0.0.7
|
||||||
|
charset-normalizer==2.0.7
|
||||||
cic-cache==0.2.1a10
|
cic-cache==0.2.1a10
|
||||||
|
cic-eth-registry==0.6.1
|
||||||
|
cic-types==0.2.1a5
|
||||||
clicada==0.0.1a8
|
clicada==0.0.1a8
|
||||||
|
coincurve==15.0.0
|
||||||
|
confini==0.5.2
|
||||||
|
cryptography==3.2.1
|
||||||
|
cytoolz==0.11.0
|
||||||
|
erc20-faucet==0.3.2
|
||||||
|
eth-accounts-index==0.1.2
|
||||||
|
eth-address-index==0.2.4
|
||||||
|
eth-contract-registry==0.6.3
|
||||||
|
eth-erc20==0.1.2
|
||||||
|
eth-hash==0.3.2
|
||||||
|
eth-token-index==0.2.4
|
||||||
|
eth-typing==2.2.2
|
||||||
|
eth-utils==1.10.0
|
||||||
|
funga==0.5.1
|
||||||
|
funga-eth==0.5.1
|
||||||
|
hexathon==0.1.0
|
||||||
|
http-hoba-auth==0.2.1a3
|
||||||
|
http-token-auth==0.0.1a6
|
||||||
|
idna==3.3
|
||||||
|
json-rpc==1.13.0
|
||||||
|
jsonschema==3.2.0
|
||||||
|
kombu==4.6.11
|
||||||
|
Mako==1.1.5
|
||||||
|
MarkupSafe==2.0.1
|
||||||
|
moolb==0.2.0
|
||||||
|
okota==0.2.4
|
||||||
|
phonenumbers==8.12.12
|
||||||
|
potaahto==0.1.0
|
||||||
|
psycopg2==2.8.6
|
||||||
|
pycparser==2.20
|
||||||
|
pycryptodome==3.10.1
|
||||||
|
pyrsistent==0.18.0
|
||||||
|
pysha3==1.0.2
|
||||||
|
python-dateutil==2.8.2
|
||||||
|
python-editor==1.0.4
|
||||||
|
python-gnupg==0.4.7
|
||||||
|
pytz==2021.3
|
||||||
|
PyYAML==5.3.1
|
||||||
|
redis==3.5.3
|
||||||
|
requests==2.26.0
|
||||||
|
rlp==2.0.1
|
||||||
|
semver==2.13.0
|
||||||
|
six==1.15.0
|
||||||
|
SQLAlchemy==1.3.20
|
||||||
|
toolz==0.11.1
|
||||||
|
urllib3==1.26.7
|
||||||
|
usumbufu==0.3.3a3
|
||||||
|
uWSGI==2.0.19.1
|
||||||
|
vine==1.3.0
|
||||||
|
vobject==0.9.6.1
|
||||||
|
websocket-client==0.57.0
|
||||||
|
2
root_requirements.txt
Normal file
2
root_requirements.txt
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
cic-cache==0.2.1a10
|
||||||
|
clicada==0.0.1a8
|
40
setup.sh
40
setup.sh
@ -2,8 +2,7 @@
|
|||||||
|
|
||||||
want_cic_cache_version=0.2.1a10
|
want_cic_cache_version=0.2.1a10
|
||||||
want_cicada_version=0.0.1a8
|
want_cicada_version=0.0.1a8
|
||||||
#want_evm=bloxberg
|
#INSTALL_EVM=bloxberg
|
||||||
want_evm=
|
|
||||||
|
|
||||||
. aux/bdbg/bdbg.sh
|
. aux/bdbg/bdbg.sh
|
||||||
|
|
||||||
@ -25,10 +24,13 @@ fi
|
|||||||
. setup_path.sh
|
. setup_path.sh
|
||||||
|
|
||||||
dbg $dbg_debug "importing keys"
|
dbg $dbg_debug "importing keys"
|
||||||
for f in ./keys/*.asc; do
|
|
||||||
gpg --import $f
|
|
||||||
done
|
|
||||||
|
|
||||||
|
mkdir -vp $HOME/.local/share/cic/.gnupg
|
||||||
|
chmod 700 $HOME/.local/share/cic/.gnupg
|
||||||
|
for f in ./keys/*.asc; do
|
||||||
|
gpg --homedir $HOME/.local/share/cic/.gnupg --import $f
|
||||||
|
done
|
||||||
|
gpg --homedir $HOME/.local/share/cic/.gnupg --import-ownertrust ./keys/trust
|
||||||
|
|
||||||
t=`mktemp`
|
t=`mktemp`
|
||||||
dbg $dbg_debug "identify root values"
|
dbg $dbg_debug "identify root values"
|
||||||
@ -43,26 +45,23 @@ if [ ! -f "$HOME/.config/cic/staff-client/key_fingerprint" ]; then
|
|||||||
for c in ${config_directives[@]}; do
|
for c in ${config_directives[@]}; do
|
||||||
v=${!c}
|
v=${!c}
|
||||||
if [ -z "$v" ]; then
|
if [ -z "$v" ]; then
|
||||||
v=`curl -X GET $CIC_ROOT_URL/cic-staff-client/$c`
|
d=`mktemp -d`
|
||||||
#gpg --verify $v
|
curl -X GET $CIC_ROOT_URL/cic-staff-client/$c -o $d/$c
|
||||||
|
gpg --homedir $HOME/.local/share/cic/.gnupg --verify $d/$c
|
||||||
|
v=`gpg --homedir $HOME/.local/share/cic/.gnupg -d $d/$c`
|
||||||
echo $v >> $t
|
echo $v >> $t
|
||||||
dbg $dbg_debug "fetched environment variable $v"
|
dbg $dbg_debug "fetched environment variable $v"
|
||||||
else
|
else
|
||||||
dbg $dbg_debug "using predefined environment variable for $c = $v"
|
dbg $dbg_debug "using predefined environment variable for $c = $v"
|
||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
|
|
||||||
echo seting
|
|
||||||
cat $t
|
|
||||||
|
|
||||||
set -a
|
set -a
|
||||||
. $t
|
. $t
|
||||||
set +a
|
set +a
|
||||||
|
|
||||||
# DATABASE_NAME set here works as long as only one database is involved...
|
# DATABASE_NAME set here works as long as only one database is involved...
|
||||||
export DATABASE_PREFIX=$HOME/.local/share/cic/cache/${DATABASE_PREFIX:-staffclient}
|
export DATABASE_PREFIX=$HOME/.local/share/cic/cache/${DATABASE_PREFIX:-staffclient}
|
||||||
#export DATABASE_HOST=${DATABASE_HOST:-localhost}
|
|
||||||
#export DATABASE_PORT=${DATABASE_PORT:-5432}
|
|
||||||
export DATABASE_ENGINE=sqlite
|
export DATABASE_ENGINE=sqlite
|
||||||
export DATABASE_DRIVER=pysqlite
|
export DATABASE_DRIVER=pysqlite
|
||||||
export DATABASE_DEBUG=0
|
export DATABASE_DEBUG=0
|
||||||
@ -76,10 +75,6 @@ if [ ! -f "$HOME/.config/cic/staff-client/key_fingerprint" ]; then
|
|||||||
else
|
else
|
||||||
t=`mktemp`
|
t=`mktemp`
|
||||||
gpg --export -a $AUTH_KEY > $t
|
gpg --export -a $AUTH_KEY > $t
|
||||||
#gpg --list-packets $t | awk '/issuer fpr/ { print $9; }' | cut -b -40 > $HOME/.config/cic/staff-client/key_fingerprint
|
|
||||||
#gpg --list-packets $t | awk '/keyid:/ { print $2; }'
|
|
||||||
#gpg --list-packets $t | awk '/keyid:/ { print $2; }' > $HOME/.config/cic/staff-client/key_fingerprint
|
|
||||||
#fp=`cat $HOME/.config/cic/staff-client/key_fingerprint`
|
|
||||||
echo -n $AUTH_KEY > $HOME/.config/cic/staff-client/key_fingerprint
|
echo -n $AUTH_KEY > $HOME/.config/cic/staff-client/key_fingerprint
|
||||||
dbg $dbg_info "using key $AUTH_KEY"
|
dbg $dbg_info "using key $AUTH_KEY"
|
||||||
fi
|
fi
|
||||||
@ -172,10 +167,6 @@ mkdir -vp $HOME/.local/share/cic/cache
|
|||||||
|
|
||||||
python ../cic-internal-integration/apps/cic-cache/scripts/migrate.py -c $HOME/.config/cic/cache/
|
python ../cic-internal-integration/apps/cic-cache/scripts/migrate.py -c $HOME/.config/cic/cache/
|
||||||
|
|
||||||
if [ ! -z $want_evm ]; then
|
|
||||||
. setup_${want_evm}.sh
|
|
||||||
fi
|
|
||||||
|
|
||||||
t=`mktemp`
|
t=`mktemp`
|
||||||
clicada --dumpconfig env $clicada_config_flag -vv > $t
|
clicada --dumpconfig env $clicada_config_flag -vv > $t
|
||||||
set -a
|
set -a
|
||||||
@ -183,3 +174,10 @@ set -a
|
|||||||
set +a
|
set +a
|
||||||
|
|
||||||
. setup_systemd.sh
|
. setup_systemd.sh
|
||||||
|
|
||||||
|
echo foo $INSTALL_EVM
|
||||||
|
if [ ! -z $INSTALL_EVM ]; then
|
||||||
|
. setup_${INSTALL_EVM}.sh
|
||||||
|
fi
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
GIT_OPENETHEREUM=${GIT_OPENETHEREUM:-https://github.com/openethereum/openethereum}
|
GIT_OPENETHEREUM=${GIT_OPENETHEREUM:-https://github.com/openethereum/openethereum}
|
||||||
OPENETHEREUM_PATH=${OPENETHEREUM_PATH:-$HOME/.local/bin/parity}
|
OPENETHEREUM_PATH=${OPENETHEREUM_PATH:-$HOME/.local/bin/parity}
|
||||||
openethereum_dir=`realpath $(dirname $OPENETHEREUM_PATH)`
|
openethereum_dir=`realpath $(dirname $OPENETHEREUM_PATH)`
|
||||||
default_openethereum_run=$HOME/.local/share/bloxberg
|
default_openethereum_run=$HOME/.local/share/io.parity.ethereum/bloxberg
|
||||||
OPENETHEREUM_RUN=${OPENETHEREUM_RUN:-$default_openethereum_run}
|
OPENETHEREUM_RUN=${OPENETHEREUM_RUN:-$default_openethereum_run}
|
||||||
|
|
||||||
install_env=
|
install_env=
|
||||||
@ -19,12 +19,15 @@ else
|
|||||||
dbg $dbg_info "found bloxberg node executable in $OPENETHEREUM_PATH"
|
dbg $dbg_info "found bloxberg node executable in $OPENETHEREUM_PATH"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
OPENETHEREUM_RUN=$HOME/.local/share/bloxberg
|
#OPENETHEREUM_RUN=$HOME/.local/share/bloxberg
|
||||||
if [ ! -d $OPENETHEREUM_RUN ]; then
|
if [ ! -d $OPENETHEREUM_RUN ]; then
|
||||||
mkdir -vp $OPENETHEREUM_RUN/bootnode
|
mkdir -vp $OPENETHEREUM_RUN/bootnode
|
||||||
touch $OPENETHEREUM_RUN/bootnode.pwd
|
touch $OPENETHEREUM_RUN/bootnode.pwd
|
||||||
dd if=/dev/urandom bs=32 count=1 2> /dev/null | hexdump -v -n 32 -e '1/1 "%02x"' > $OPENETHEREUM_RUN/bootnode.pwd
|
dd if=/dev/urandom bs=32 count=1 2> /dev/null | hexdump -v -n 32 -e '1/1 "%02x"' > $OPENETHEREUM_RUN/bootnode.pwd
|
||||||
chmod 400 $OPENETHEREUM_RUN/bootnode.pwd
|
chmod 400 $OPENETHEREUM_RUN/bootnode.pwd
|
||||||
|
./aux/bash-templater/templater.sh var/bloxberg/bootnode.toml > $OPENETHEREUM_RUN/bootnode.toml
|
||||||
|
cp -v var/bloxberg/bloxberg.json $OPENETHEREUM_RUN/
|
||||||
|
cp -v var/bloxberg/bootnodes.txt $OPENETHEREUM_RUN/
|
||||||
fi
|
fi
|
||||||
|
|
||||||
update_path $openethereum_dir
|
update_path $openethereum_dir
|
||||||
|
@ -7,7 +7,11 @@ function checkk {
|
|||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
exec=(systemctl clang git rustup gcc cmake pip python3 psql postgres)
|
if [ "$INSTALL_EVM" == "bloxberg"] ; then
|
||||||
|
exec=(systemctl git gcc pip python3 sqlite3 clang rustup cmake)
|
||||||
|
else
|
||||||
|
exec=(systemctl git gcc pip python3 sqlite3)
|
||||||
|
fi
|
||||||
|
|
||||||
for e in ${exec[@]}; do
|
for e in ${exec[@]}; do
|
||||||
dbg $dbg_trace "Checking for dependency $e"
|
dbg $dbg_trace "Checking for dependency $e"
|
||||||
|
@ -18,9 +18,7 @@ while [ -z $pgp_ok ]; do
|
|||||||
echo -n "(Yes/No): "
|
echo -n "(Yes/No): "
|
||||||
read pgp_r
|
read pgp_r
|
||||||
r=${pgp_r:0:1}
|
r=${pgp_r:0:1}
|
||||||
if [ "$r" == "y" ]; then
|
if [[ "$r" =~ ^[yY] ]]; then
|
||||||
pgp_ok=1
|
|
||||||
elif [ "$r" == "Y" ]; then
|
|
||||||
pgp_ok=1
|
pgp_ok=1
|
||||||
fi
|
fi
|
||||||
echo
|
echo
|
||||||
@ -61,9 +59,6 @@ t=`mktemp -d`
|
|||||||
gpg --homedir $t --pinentry-mode loopback --passphrase-file $password_file --quick-gen-key "$pgp_name (CIC staff client signing key) <$pgp_email>" secp256k1 sign 0
|
gpg --homedir $t --pinentry-mode loopback --passphrase-file $password_file --quick-gen-key "$pgp_name (CIC staff client signing key) <$pgp_email>" secp256k1 sign 0
|
||||||
|
|
||||||
|
|
||||||
#echo -e "\e[0;93mNow let's see if you've forgotten your passphrase already"
|
|
||||||
#echo -e "Please enter it again at the given prompts to import the newly created key into your environment\e[0m"
|
|
||||||
|
|
||||||
mkdir -vp $HOME/.config/cic/staff-client/.gnupg
|
mkdir -vp $HOME/.config/cic/staff-client/.gnupg
|
||||||
chmod 0700 -v $HOME/.config/cic/staff-client/.gnupg
|
chmod 0700 -v $HOME/.config/cic/staff-client/.gnupg
|
||||||
|
|
||||||
|
136
var/bloxberg/bloxberg.json
Normal file
136
var/bloxberg/bloxberg.json
Normal file
@ -0,0 +1,136 @@
|
|||||||
|
{
|
||||||
|
"name": "Bloxberg",
|
||||||
|
"engine": {
|
||||||
|
"authorityRound": {
|
||||||
|
"params": {
|
||||||
|
"maximumUncleCountTransition": 5006743,
|
||||||
|
"maximumUncleCount": 0,
|
||||||
|
"stepDuration": "5",
|
||||||
|
"validators" : {
|
||||||
|
"multi": {
|
||||||
|
"0": {
|
||||||
|
"list": ["0xaa84378fa41da83a9b6523ba46e45a664fbebfc8"]
|
||||||
|
},
|
||||||
|
"100": {
|
||||||
|
"contract": "0x9850711951a84ef8a2a31a7868d0dca34b0661ca"
|
||||||
|
},
|
||||||
|
"5006743": {
|
||||||
|
"safeContract": "0x9850711951a84ef8a2a31a7868d0dca34b0661ca"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"params": {
|
||||||
|
"gasLimitBoundDivisor": "0x400",
|
||||||
|
"maximumExtraDataSize": "0x20",
|
||||||
|
"minGasLimit": "0x7A1200",
|
||||||
|
"networkID" : "0x2323",
|
||||||
|
|
||||||
|
"eip140Transition": "0x0",
|
||||||
|
"eip211Transition": "0x0",
|
||||||
|
"eip214Transition": "0x0",
|
||||||
|
"eip658Transition": "0x0",
|
||||||
|
|
||||||
|
"eip145Transition": 5006743,
|
||||||
|
"eip1014Transition": 5006743,
|
||||||
|
"eip1052Transition": 5006743,
|
||||||
|
|
||||||
|
"eip1283Transition": 5006743,
|
||||||
|
"eip1344Transition": 5006743,
|
||||||
|
"eip1706Transition": 5006743,
|
||||||
|
"eip1884Transition": 5006743,
|
||||||
|
"eip2028Transition": 5006743
|
||||||
|
},
|
||||||
|
"genesis": {
|
||||||
|
"seal": {
|
||||||
|
"authorityRound": {
|
||||||
|
"step": "0x0",
|
||||||
|
"signature": "0x0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"difficulty": "0x20000",
|
||||||
|
"gasLimit": "0x7A1200"
|
||||||
|
},
|
||||||
|
"accounts": {
|
||||||
|
"0x0000000000000000000000000000000000000001": { "balance": "1", "builtin": { "name": "ecrecover", "pricing": { "linear": { "base": 3000, "word": 0 } } } },
|
||||||
|
"0x0000000000000000000000000000000000000002": { "balance": "1", "builtin": { "name": "sha256", "pricing": { "linear": { "base": 60, "word": 12 } } } },
|
||||||
|
"0x0000000000000000000000000000000000000003": { "balance": "1", "builtin": { "name": "ripemd160", "pricing": { "linear": { "base": 600, "word": 120 } } } },
|
||||||
|
"0x0000000000000000000000000000000000000004": { "balance": "1", "builtin": { "name": "identity", "pricing": { "linear": { "base": 15, "word": 3 } } } },
|
||||||
|
"0x0000000000000000000000000000000000000005": { "builtin": { "name": "modexp", "activate_at": 0, "pricing": { "modexp": { "divisor": 20 } } } },
|
||||||
|
"0x0000000000000000000000000000000000000006": {
|
||||||
|
"builtin": {
|
||||||
|
"name": "alt_bn128_add",
|
||||||
|
"activate_at": 0,
|
||||||
|
"pricing": {
|
||||||
|
"alt_bn128_const_operations": {
|
||||||
|
"price": 500
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"0000000000000000000000000000000000000007": {
|
||||||
|
"builtin": {
|
||||||
|
"name": "alt_bn128_mul",
|
||||||
|
"pricing": {
|
||||||
|
"0": {
|
||||||
|
"price": {
|
||||||
|
"alt_bn128_const_operations": {
|
||||||
|
"price": 40000
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"5006743": {
|
||||||
|
"info": "Istanbul HF",
|
||||||
|
"price": {
|
||||||
|
"alt_bn128_const_operations": {
|
||||||
|
"price": 6000
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"0000000000000000000000000000000000000008": {
|
||||||
|
"builtin": {
|
||||||
|
"name": "alt_bn128_pairing",
|
||||||
|
"pricing": {
|
||||||
|
"0": {
|
||||||
|
"price": {
|
||||||
|
"alt_bn128_pairing": {
|
||||||
|
"base": 100000,
|
||||||
|
"pair": 80000
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"5006743": {
|
||||||
|
"info": "Istanbul HF",
|
||||||
|
"price": {
|
||||||
|
"alt_bn128_pairing": {
|
||||||
|
"base": 45000,
|
||||||
|
"pair": 34000
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"0x0000000000000000000000000000000000000009": {
|
||||||
|
"builtin": {
|
||||||
|
"name": "blake2_f",
|
||||||
|
"pricing": {
|
||||||
|
"5006743": {
|
||||||
|
"info": "Istanbul HF",
|
||||||
|
"price": {
|
||||||
|
"blake2_f": {
|
||||||
|
"gas_per_round": 1
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"0xab59a1ea1ac9af9f77518b9b4ad80942ade35088": { "balance": "100000000000000000000000000000000" }
|
||||||
|
}
|
||||||
|
}
|
35
var/bloxberg/bootnode.toml
Normal file
35
var/bloxberg/bootnode.toml
Normal file
@ -0,0 +1,35 @@
|
|||||||
|
# File bootnode.toml
|
||||||
|
|
||||||
|
[parity]
|
||||||
|
chain = "{{HOME}}/.local/share/io.parity.ethereum/bloxberg/bloxberg.json"
|
||||||
|
base_path = "{{HOME}}/.local/share/io.parity.ethereum/bloxberg/bootnode"
|
||||||
|
|
||||||
|
[network]
|
||||||
|
port = 30303
|
||||||
|
reserved_peers = "{{HOME}}/.local/share/io.parity.ethereum/bloxberg/bootnodes.txt"
|
||||||
|
# reserved_only = true
|
||||||
|
max_peers = 100
|
||||||
|
snapshot_peers = 25
|
||||||
|
#nat = "extip:217.197.85.156"
|
||||||
|
|
||||||
|
[rpc]
|
||||||
|
port = 8545
|
||||||
|
#apis = ["web3", "eth", "net", "personal", "parity", "parity_set", "traces", "rpc", "parity_accounts"]
|
||||||
|
apis = ["eth", "net" ]
|
||||||
|
interface = "all"
|
||||||
|
cors = ["*"]
|
||||||
|
|
||||||
|
[websockets]
|
||||||
|
disable = true
|
||||||
|
port = 8546
|
||||||
|
interface = "all"
|
||||||
|
origins = ["all"]
|
||||||
|
|
||||||
|
[account]
|
||||||
|
password = ["{{HOME}}/.local/share/io.parity.ethereum/bloxberg/bootnode.pwd"]
|
||||||
|
|
||||||
|
[footprint]
|
||||||
|
tracing = "on"
|
||||||
|
pruning = "archive"
|
||||||
|
pruning_history = 256
|
||||||
|
cache_size_db = 2000
|
17
var/bloxberg/bootnodes.txt
Normal file
17
var/bloxberg/bootnodes.txt
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
#MPDL Bootnode and Authority
|
||||||
|
enode://a7a53baf91b612b25b84993c964beb987879bfe7430cf6acb55bd721b9c0d96ceb1849049b1dcc0aa6e86fa1e2234280581b16c1265d56644fb09085e6906034@141.5.98.231:30304
|
||||||
|
enode://a7a53baf91b612b25b84993c964beb987879bfe7430cf6acb55bd721b9c0d96ceb1849049b1dcc0aa6e86fa1e2234280581b16c1265d56644fb09085e6906034@130.183.206.234:30304
|
||||||
|
enode://e6b181c16d20194029c220ce886fdc7a745cb37ee655c3b41ea744ec89143db6731a1c01ff3c40b39f969079090ad34e0e3319e47b0d22a8d510ff1f7b5a9ac7@141.5.98.231:30303
|
||||||
|
enode://e6b181c16d20194029c220ce886fdc7a745cb37ee655c3b41ea744ec89143db6731a1c01ff3c40b39f969079090ad34e0e3319e47b0d22a8d510ff1f7b5a9ac7@130.183.206.234:30303
|
||||||
|
#GeorgiaTech
|
||||||
|
enode://4d9e6925ef3a92315283a655e856aa29dd516172c4f38d2a8fcd58c233a2cd80c57b507fed3bf351b1ac0611e8c7fefd6fb1c49de2d0d15eb1816d43629ac4ba@3.14.148.213:30303
|
||||||
|
#CMU
|
||||||
|
enode://ce0154eb13c1c038017151dd1ff4d736178ffedc33f5e11fe694c247eb09279886d253c3c775486eb709a65057901e2788098f991c58e6ad26ff957a8f45253e@128.2.25.89:30303
|
||||||
|
#UCL
|
||||||
|
enode://e41a38d659f13d47f3d88c5178e0cfe97487d3568000b85ae3a4abbcc35404d2628cee8a7e9071b63802542bafd886447ecf1d02fc663be0534779094a3e4fd1@128.16.12.165:30303
|
||||||
|
#Sarajevo
|
||||||
|
enode://6959137e1c66384e82ce6d9ba7e09bb0e56817f4834416448b98f646a335168c2967760a1daa5e3ec5ac2a3401be1cd05927568cdebf49c25d4770f5bb8fbfd7@195.222.43.21:30303
|
||||||
|
#Zurich
|
||||||
|
enode://6173beaabd1a82d41e3615da2a755e99f3bd53e04737e2ae2f02a004c42445d8dfd1d87aadfafabc4c45a1df2a80f359ab628c93522d1dac70690a9689912bbc@129.132.178.74:30303
|
||||||
|
#Internet Security
|
||||||
|
enode://bc50cf41d29f346f43f84ee7d03b21cd2d4176cd759cd0d26ce04c16448d4c8611c4eab4c5543e29075c758c0afc2fd6743fa38f48dc0ed1f016efbb5c5a7654@194.94.127.78:30303
|
18
var/cic-staff-client/CHAIN_SPEC
Normal file
18
var/cic-staff-client/CHAIN_SPEC
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
-----BEGIN PGP MESSAGE-----
|
||||||
|
|
||||||
|
owEBfQKC/ZANAwAIASHS57uIwqdGAaw2YgpDSEFJTl9TUEVDYY1AikNIQUlOX1NQ
|
||||||
|
RUM9ZXZtOmJ5emFudGl1bTo4OTk2OmJsb3hiZXJniQIzBAABCAAdFiEECCbtoXAt
|
||||||
|
HofG4odRIdLnu4jCp0YFAmGNQIoACgkQIdLnu4jCp0ZtMg/+PZJjTa05dxCO4A/J
|
||||||
|
1/A+I+HuBFt4LQY+mjTnDeCRF3cjgKrUfF+D6nIIbCMsL+F/HlN9NO2x0RvdkGkg
|
||||||
|
k6whux+HBl7WxGQAGPlFIAJTz+xGhQ9gJD6djuILjNcWKtfzpCdEBq5nXnlcK6xo
|
||||||
|
X1gbSQgaHvIiau6qPHobKF9EciF99QB2f/3BSAeZpge3wOxC4NIibPL1o/QwEJrx
|
||||||
|
QcNCoxRvI0Nvx51AfJ/VoyW/WbYOgrOVv8ZYqhpuPMC8MYFOzJByN73p5JNA2qGg
|
||||||
|
BF5WHOARBiEXH3xAVcnvKSegqh8o3ZeQT6mwc6vzHmBA1BTiPeT256rQwDkXaaFY
|
||||||
|
TXXbg/1uvCyPUoXJgyH8FErs/7iYZo7tOy7qGEV8IM+O4IpVxogq7VVJj4UlFEJN
|
||||||
|
Sggjon/4aGc6dTThdkxn2FhJzTY7fPDjlNoxVRYxOzL96nSmLM5fslOYBUt9QZXP
|
||||||
|
QkNRlhbxyhpZ+MODmzqt5JRLMLPSdLCd7zVf//zlYVjeb4PCzr7/CeGHhwmyyBj3
|
||||||
|
oc9waZ1bLspIAJxHzuK4cQq/MAsRlL/Mo+DHKOPgtXF5xoW1Cvt/bOAdgl9A7tHE
|
||||||
|
ttwZAWw9FUmSpxfQbfV+R3zvgxC1wUGfqElMa5xT5iK1Vm0IYUBEFrUeqGbyAZwe
|
||||||
|
3WNmOQJ0w1A4a/lPMDI8wcUVmV0=
|
||||||
|
=5hcY
|
||||||
|
-----END PGP MESSAGE-----
|
19
var/cic-staff-client/CIC_REGISTRY_ADDRESS
Normal file
19
var/cic-staff-client/CIC_REGISTRY_ADDRESS
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
-----BEGIN PGP MESSAGE-----
|
||||||
|
|
||||||
|
owGbwMvMwMGoeOn57o5Dy90Y10QliTh7OscHubp7BocERcY7urgEuQYHJ/Y6TMQm
|
||||||
|
bmtQkZxmZpCalGxiYppkZmyWaJqYZG5hnmaZagEUMzNNNEo0Tk2zMLK05OpkMmZh
|
||||||
|
YORgkBVTZOFQe7uwQFeu/dij9kCY5axMIFsYuDgFYCLX/vH/L+QPX/Jvu5zLVudE
|
||||||
|
hX3fpKdM3ma0IU5vw0ye6X+jZrfslLphllHHr775QO31zYFeCiELZ75JlHtdGSAQ
|
||||||
|
WTNRfnewr13spQ3/oi8c5jhY5JQj+2THY5EKrhX1TnufWBiLvszNe5WjXbDtCJd5
|
||||||
|
p+2n4LVyTSvOhqxaeOL/cZ1PnTV/Jp37oqHjbXgh2OBb72WtI4JTHCaVHp3BI1PM
|
||||||
|
uoPV+iu/xcltS+u+m0wqFw866Pz2An9WkqLzwnOfT2X5/Zq1K0tsJ9spscVtOx1z
|
||||||
|
Svp/Gi/uLjWwrPH5q/0uSsP7bvvDV5O1NY+dYy5zSF4r4ZCbYCbPnbXT9rVQyKc5
|
||||||
|
TX7Hbyvf3fdwQ46WzoqWhvvprb+iymymREU/EJiwSXVz7bGoDa9dwo4WOgjE/pj6
|
||||||
|
fl6WVsLaC9VTNtlfOJXGPOP7xuRjF1XeCCX/dOib4codJfXlqOaFGU8/XznB2PzY
|
||||||
|
/1G/5MIdDksW/7ToC5X+vzjd+EVC49rHkfOTtkpNvyPjODn8/4xHTW2f77cvZmk7
|
||||||
|
oKPD/OUVT3TNDC3f92q/zJfK23yYalh3xMRitdTRWYstLswP/ctw9q/Mp345z273
|
||||||
|
w0HvK5ue/ftnLnlZ4eXG29Izz0hbvtuippPzNXXaP0bFDMYPa3k55gd7Bs8oNT09
|
||||||
|
9Z7ZG5mDJlN45tr1XvCwdIif1KP9f7n/I3fV/Xe+rqtKWJIk+P8N64aua6ss2LQU
|
||||||
|
LwMA
|
||||||
|
=YNnV
|
||||||
|
-----END PGP MESSAGE-----
|
18
var/cic-staff-client/CIC_TRUST_ADDRESS
Normal file
18
var/cic-staff-client/CIC_TRUST_ADDRESS
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
-----BEGIN PGP MESSAGE-----
|
||||||
|
|
||||||
|
owGbwMvMwMGoeOn57o5Dy90Y1wQlCTp7OseHBIUGh8Q7urgEuQYHJ/Y6TMUQtHVN
|
||||||
|
MrY0ME91TkwxN0k0MDA0TjYytXQxtTA3cXQ1TzMyckl2Sna2NHXm6mQyZmFg5GCQ
|
||||||
|
FVNk4VB7u7BAV6792KP2QJilrEwgCxi4OAVgIleD+f8nMstfi1+2rzu1aaLUuyWq
|
||||||
|
PAxHpu3bGOr0kHNu2ttjHEbBe0qzXzS9MX58MPCXuH3LAknu7wUr9l+qOyietf9s
|
||||||
|
/rvphUwfvL2sb3tYntorLx/9ctqFXceEG7RCY6eWvX98clHN6cIJcutmZU0TYS7/
|
||||||
|
taFQd9LF50w83QvnFbYVNO7Sydm76N1rTb0oPrs1SdqLXY4yZn5iut+stPHIacVd
|
||||||
|
bjvEsi1177DP3WMk5rbCueS4zS0N7p0bS/xMeE+rBs/97la1yCREcu79H/9iWxvf
|
||||||
|
nLFKtPgx22XNzSz2uDd3jib+ynue2+rzIbtSXirgl8fV5ylaNnmxLz9f+nNKfwt3
|
||||||
|
v9y0tji/o25Wb06K/dwwZ3an5tIoS+F0F4c4Z8+KZSem2rvPEMhfP0XTzLbIZ9Xi
|
||||||
|
Q7v1lXlzEzYWHrA4zm//zdu8fO9HF86oreUhp++9Obs9p0LA0ux/X8WTZcKcbyWs
|
||||||
|
zxzVZn9kkaub8XG3a/CMB83bHmx98nKC+mw2Xx6p3FxX3s2xeVus1B4GLLN6vY3t
|
||||||
|
8mU5A/VEe6VZN18xPPw32VBol9FcfkO7Khd5a8eDRxaYO90MyLuu2FXcVjFtwzPP
|
||||||
|
7O9SO24oRh9pnb39xq3jnRFPrjBUmK/ScFwc/tyeyWfRAYZ/Z09JnnoQXdWfVl8Y
|
||||||
|
Wcq1zefghqra24ereD9O1e088OqAb919tglP9m+eu2cxZ+qyNV/m/hdLuuEJAA==
|
||||||
|
=+uzd
|
||||||
|
-----END PGP MESSAGE-----
|
18
var/cic-staff-client/META_URL
Normal file
18
var/cic-staff-client/META_URL
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
-----BEGIN PGP MESSAGE-----
|
||||||
|
|
||||||
|
owEBdQKK/ZANAwAIASHS57uIwqdGAawuYghNRVRBX1VSTGGNQJhNRVRBX1VSTD1o
|
||||||
|
dHRwOi8vbG9jYWxob3N0OjYzMzgwCokCMwQAAQgAHRYhBAgm7aFwLR6HxuKHUSHS
|
||||||
|
57uIwqdGBQJhjUCYAAoJECHS57uIwqdG2GsP/3VH0vlEXC+X0Nh8ufRLdtBiw73J
|
||||||
|
LNTGNXslIg3szwGGgaHjNoARpluZjJ6AvH83s7jYV/OFuip+zwBIcqRZ4BT0rtEf
|
||||||
|
YlojiVnEIkIahbxYlD+gIU37WjbiBcpPAqYErYDaJhEyUzGD9aLhLg0r+TImHLUH
|
||||||
|
/WRWioEwSdAAzetzkY0R3aNtEZlolxvt7HumSOIMKNX7qQHpnpPUOqergsiwN0J7
|
||||||
|
ynWAD1vgXaiZ3lI+8iyDWwQHpaTjHuRbFmROVhBRiFCY6xlyotYP8waGldEZVvnc
|
||||||
|
0mP5cRg2PogEuCO5cDQ+2vszR7N8xPpQKI/9Q3gUTv2gPj5Cy7ko4+N6bsTgQk7H
|
||||||
|
aX1jvUwaU0HBD0A//l6eGxl0gze5hrr4v/4O8MZLdzKfYPqgOzPcDgo42aykua7x
|
||||||
|
0zHWTCtmiy/PaW4/c+bPKvbMMUO5ZojRant4O+pCZ80CTkH18rkY2pcQGGGP+XTI
|
||||||
|
pDTKB1IdrvnVc508v59UaXoKHOKpaES8SqTe4XWZY9w/pr7alw9LjjEOu3mrNypT
|
||||||
|
/CszUjwx5FYRKQxLrF8fj7UuODX9bbUP9XAdggy6wwy8NWZbw1hxBlJRKgDvvvoK
|
||||||
|
jqGAkRig8yzhT6f0F7f5U3AVdCCFfZXWBWk0NCqT5oMHbI5VGMKLAdV8m8+ptyB+
|
||||||
|
GlDGJ7sdcwrUhM3U
|
||||||
|
=Va+P
|
||||||
|
-----END PGP MESSAGE-----
|
18
var/cic-staff-client/TX_CACHE_URL
Normal file
18
var/cic-staff-client/TX_CACHE_URL
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
-----BEGIN PGP MESSAGE-----
|
||||||
|
|
||||||
|
owEBfAKD/ZANAwAIASHS57uIwqdGAaw1YgxUWF9DQUNIRV9VUkxhjUCcVFhfQ0FD
|
||||||
|
SEVfVVJMPWh0dHA6Ly9sb2NhbGhvc3Q6ODMxMwqJAjMEAAEIAB0WIQQIJu2hcC0e
|
||||||
|
h8bih1Eh0ue7iMKnRgUCYY1AnAAKCRAh0ue7iMKnRsGVD/41suPkAo85ue4IHY4g
|
||||||
|
yXl5IuxF6TPAkG9UPTB7Lb4RLmlmwsoN4oMssn0//QZJ/0l/vfJQqf0NPUhEwOWw
|
||||||
|
vnr8rK+l0jZ77pewP38aptMvq7S2TIXgrRYPwWKhwZFe0F5fUqk5nPxjdKoSCANE
|
||||||
|
eifd7Igf543x3oqahaM4W1jHe8JjzXPdKpqC/eubU5o3Uc8RDygM8Y3aTXR25siq
|
||||||
|
0D/yx5X3y5BbETKkTmkDRjowsMkYPLL6TWUdHspYYq0I224RVwOG408XWGDi4YJQ
|
||||||
|
z8PK4W+rR6oPUmcpTy+PgTdu7d16I1B1b4OqYeXmy6QK0TOK9KhxcsZlJiBYeJ7n
|
||||||
|
xMOVHA/9mAfagXsbovz7Hh+q4uebR4jmm/jwHP2tZMotrPuTfQJmdI7LSMwwB8Kk
|
||||||
|
/Amh2Kq2W0otcg2h7fTylmnCLVql+8j0ECykE7QcdeNFPNrlhEG1qi033adJ9CL+
|
||||||
|
JmDxGGGEKIyL4mK6qzZFeOQpUC8P9aFOXt79NbOtqvyNQtxxNiXNCJvH0gI3aYeY
|
||||||
|
+VDcINFjLTJQ88lcfCgLoZ4mFDP4PffKwyYf7GvdxI1Xrd7diniwwUHqvoIjHb3r
|
||||||
|
LGL0XNCaVkFH6bsHt2EIlR5/8aGl0G3189tM+i4IOW/sl+ktZAEupGEXNXjaN1IY
|
||||||
|
tG5M/oJuWUJzOPv7ZJql0PLWNw==
|
||||||
|
=IueR
|
||||||
|
-----END PGP MESSAGE-----
|
Loading…
Reference in New Issue
Block a user