Add readme, avoid forced gpg import (and trust) for main user gpg config
This commit is contained in:
parent
cffc207b24
commit
53afc83dbe
134
README.md
Normal file
134
README.md
Normal file
@ -0,0 +1,134 @@
|
||||
# CIC STAFF CLIENT
|
||||
|
||||
Services installer temporarily for internal use by GE.
|
||||
|
||||
|
||||
## Dependencies
|
||||
|
||||
The os-level dependencies below must be met both at install and run time.
|
||||
|
||||
The version numbers are the version numbers used at implmentation time. It may very well work with earlier versions of the components, as long as they are not too old.
|
||||
|
||||
- systemd (249)
|
||||
- gcc (11.1.0)
|
||||
- git (2.33.0)
|
||||
- python (>= 3.9)
|
||||
- pip (20.3.4)
|
||||
- sqlite (3.36.0)
|
||||
|
||||
For the optional bloxberg node build (`INSTALL_EVM=bloxberg`), additionally these dependencies must be met, aswell as a working internet connection:
|
||||
|
||||
- rustup (1.24.3)
|
||||
- clang (12.0.1)
|
||||
- cmake (3.21.2)
|
||||
|
||||
|
||||
## Installation settings
|
||||
|
||||
The examples below assume working directory of the cic-staff-installer repository root.
|
||||
|
||||
<!--The `CIC_ROOT_URL` environment variable points to a location where top-level configuration settings can be found. These are individual files named after the environment variables they are setting, whose contents are signed by the trusted key defined in `CIC_SETUP_TRUSTED_FINGERPRINT`.-->
|
||||
|
||||
### cic-stack docker-compose cluster settings
|
||||
|
||||
To use against the cic-stack docker-compose local cluster:
|
||||
|
||||
```
|
||||
export CIC_ROOT_URL=file://`pwd`/var
|
||||
```
|
||||
|
||||
If you want to select python packages from a specific repository only, also add:
|
||||
|
||||
```
|
||||
export PIP_INDEX_URL=<url>
|
||||
export PIP_EXTRA_INDEX_URL=<url>
|
||||
```
|
||||
|
||||
If you want to build the bloxberg mode executable (be warned, that's a long wait), add:
|
||||
|
||||
```
|
||||
export INSTALL_EVM=bloxberg
|
||||
```
|
||||
|
||||
|
||||
## Installation
|
||||
|
||||
To proceed with the installation, enter:
|
||||
|
||||
```
|
||||
bash setup.sh
|
||||
```
|
||||
|
||||
During the installation you will be prompted to enter your name, email and as password for the gnupg setup.
|
||||
|
||||
The gnupg key will both be used to authenticate using HTTP HOBA when necessary, aswell as encrypt local cached content.
|
||||
|
||||
|
||||
|
||||
|
||||
## Running the services
|
||||
|
||||
```
|
||||
systemctl --user start cic-cache-tracker
|
||||
systemctl --user start cic-cache-server
|
||||
```
|
||||
|
||||
Verify that they are running
|
||||
|
||||
```
|
||||
systemctl --user status cic-cache-tracker
|
||||
systemctl --user status cic-cache-server
|
||||
```
|
||||
|
||||
Please note that although installing the bloxberg node is an optional feature of the installer, there is currently no supporting files for running the bloxberg node.
|
||||
|
||||
To run the bloxberg node manually:
|
||||
|
||||
```
|
||||
/home/lash/.local/bin/parity -c /home/cic/.local/share/io.parity.ethereum/bloxberg/bootnode.toml
|
||||
```
|
||||
|
||||
|
||||
## Using `clicada`
|
||||
|
||||
It should now be possible to run `clicada` without any extra settings needed.
|
||||
|
||||
Please refer to the documentation on `clicada` for details on how to use the tool.
|
||||
|
||||
|
||||
## Files and directories
|
||||
|
||||
The installation produces a number of files in the user home directory, some of which may be edited directly to change behavior of the program.
|
||||
|
||||
All paths relative to `$HOME`
|
||||
|
||||
| location | description | editable |
|
||||
|-|-|-|
|
||||
| `.config/cic/cache/*.ini` | Configuration file(s) for the `cic-cache-*` services | yes |
|
||||
| `.config/cic/cache/*.ini` | Configuration file(s) for the `cic-cache-*` services | yes |
|
||||
| `.config/cic/clicada/*.ini` | Configuration file(s) for the `clicada` tool | yes |
|
||||
| `.config/cic/staff-client/key_fingerprint` | gnupg key fingerprint for key used by clicada for authentication | no |
|
||||
| `.config/cic/staff-client/user.asc` | gnupg public key used by cicada for authentication | no |
|
||||
| `.config/cic/staff-client/.gnupg` | gnupg homedir used by cicada for authentication | no |
|
||||
| `.config/systemd/user/cic-cache-*.service` | systemd user service definition file for `cic-cache-*` services | yes, with `systemctl --user edit <service>` |
|
||||
| `.config/environment.d/01-cic-cache-*.conf` | environment variables for systemd user services | yes |
|
||||
| `.local/share/cic/.gnupg` | gnupg homedir for holding trust keys for global cic configurations | no |
|
||||
| `.local/share/cic/clicada/.secret` | A gnupg encrypted symmetric secret used to encrypt local cached content | no |
|
||||
| `.local/share/io.parity.ethereum/bloxberg` | Bloxberg configurations and chain data | no |
|
||||
|
||||
|
||||
## Installing as a different user
|
||||
|
||||
You may want to create a dedicated user for the installation, so as to not pollute your regular user data directories.
|
||||
|
||||
Since the services are run using systemd, a simple `su` or `sudo` will not be sufficient in this case.
|
||||
|
||||
Perhaps the simplest solution is to launch a new login shell within the systemd vm using the following command:
|
||||
|
||||
```
|
||||
machinectl login
|
||||
```
|
||||
|
||||
Another alternative can be to open an `ssh` session.
|
||||
|
||||
|
1
keys/trust
Normal file
1
keys/trust
Normal file
@ -0,0 +1 @@
|
||||
0826EDA1702D1E87C6E2875121D2E7BB88C2A746:6:
|
@ -1,2 +1,67 @@
|
||||
alembic==1.4.2
|
||||
amqp==2.6.1
|
||||
asn1crypto==1.4.0
|
||||
attrs==21.2.0
|
||||
billiard==3.6.4.0
|
||||
celery==4.4.7
|
||||
certifi==2021.10.8
|
||||
cffi==1.14.6
|
||||
chainlib==0.0.12
|
||||
chainlib-eth==0.0.12
|
||||
chainsyncer==0.0.7
|
||||
charset-normalizer==2.0.7
|
||||
cic-cache==0.2.1a10
|
||||
cic-eth-registry==0.6.1
|
||||
cic-types==0.2.1a5
|
||||
clicada==0.0.1a8
|
||||
coincurve==15.0.0
|
||||
confini==0.5.2
|
||||
cryptography==3.2.1
|
||||
cytoolz==0.11.0
|
||||
erc20-faucet==0.3.2
|
||||
eth-accounts-index==0.1.2
|
||||
eth-address-index==0.2.4
|
||||
eth-contract-registry==0.6.3
|
||||
eth-erc20==0.1.2
|
||||
eth-hash==0.3.2
|
||||
eth-token-index==0.2.4
|
||||
eth-typing==2.2.2
|
||||
eth-utils==1.10.0
|
||||
funga==0.5.1
|
||||
funga-eth==0.5.1
|
||||
hexathon==0.1.0
|
||||
http-hoba-auth==0.2.1a3
|
||||
http-token-auth==0.0.1a6
|
||||
idna==3.3
|
||||
json-rpc==1.13.0
|
||||
jsonschema==3.2.0
|
||||
kombu==4.6.11
|
||||
Mako==1.1.5
|
||||
MarkupSafe==2.0.1
|
||||
moolb==0.2.0
|
||||
okota==0.2.4
|
||||
phonenumbers==8.12.12
|
||||
potaahto==0.1.0
|
||||
psycopg2==2.8.6
|
||||
pycparser==2.20
|
||||
pycryptodome==3.10.1
|
||||
pyrsistent==0.18.0
|
||||
pysha3==1.0.2
|
||||
python-dateutil==2.8.2
|
||||
python-editor==1.0.4
|
||||
python-gnupg==0.4.7
|
||||
pytz==2021.3
|
||||
PyYAML==5.3.1
|
||||
redis==3.5.3
|
||||
requests==2.26.0
|
||||
rlp==2.0.1
|
||||
semver==2.13.0
|
||||
six==1.15.0
|
||||
SQLAlchemy==1.3.20
|
||||
toolz==0.11.1
|
||||
urllib3==1.26.7
|
||||
usumbufu==0.3.3a3
|
||||
uWSGI==2.0.19.1
|
||||
vine==1.3.0
|
||||
vobject==0.9.6.1
|
||||
websocket-client==0.57.0
|
||||
|
2
root_requirements.txt
Normal file
2
root_requirements.txt
Normal file
@ -0,0 +1,2 @@
|
||||
cic-cache==0.2.1a10
|
||||
clicada==0.0.1a8
|
38
setup.sh
38
setup.sh
@ -2,8 +2,7 @@
|
||||
|
||||
want_cic_cache_version=0.2.1a10
|
||||
want_cicada_version=0.0.1a8
|
||||
#want_evm=bloxberg
|
||||
want_evm=
|
||||
#INSTALL_EVM=bloxberg
|
||||
|
||||
. aux/bdbg/bdbg.sh
|
||||
|
||||
@ -25,10 +24,13 @@ fi
|
||||
. setup_path.sh
|
||||
|
||||
dbg $dbg_debug "importing keys"
|
||||
for f in ./keys/*.asc; do
|
||||
gpg --import $f
|
||||
done
|
||||
|
||||
mkdir -vp $HOME/.local/share/cic/.gnupg
|
||||
chmod 700 $HOME/.local/share/cic/.gnupg
|
||||
for f in ./keys/*.asc; do
|
||||
gpg --homedir $HOME/.local/share/cic/.gnupg --import $f
|
||||
done
|
||||
gpg --homedir $HOME/.local/share/cic/.gnupg --import-ownertrust ./keys/trust
|
||||
|
||||
t=`mktemp`
|
||||
dbg $dbg_debug "identify root values"
|
||||
@ -43,8 +45,10 @@ if [ ! -f "$HOME/.config/cic/staff-client/key_fingerprint" ]; then
|
||||
for c in ${config_directives[@]}; do
|
||||
v=${!c}
|
||||
if [ -z "$v" ]; then
|
||||
v=`curl -X GET $CIC_ROOT_URL/cic-staff-client/$c`
|
||||
#gpg --verify $v
|
||||
d=`mktemp -d`
|
||||
curl -X GET $CIC_ROOT_URL/cic-staff-client/$c -o $d/$c
|
||||
gpg --homedir $HOME/.local/share/cic/.gnupg --verify $d/$c
|
||||
v=`gpg --homedir $HOME/.local/share/cic/.gnupg -d $d/$c`
|
||||
echo $v >> $t
|
||||
dbg $dbg_debug "fetched environment variable $v"
|
||||
else
|
||||
@ -52,17 +56,12 @@ if [ ! -f "$HOME/.config/cic/staff-client/key_fingerprint" ]; then
|
||||
fi
|
||||
done
|
||||
|
||||
echo seting
|
||||
cat $t
|
||||
|
||||
set -a
|
||||
. $t
|
||||
set +a
|
||||
|
||||
# DATABASE_NAME set here works as long as only one database is involved...
|
||||
export DATABASE_PREFIX=$HOME/.local/share/cic/cache/${DATABASE_PREFIX:-staffclient}
|
||||
#export DATABASE_HOST=${DATABASE_HOST:-localhost}
|
||||
#export DATABASE_PORT=${DATABASE_PORT:-5432}
|
||||
export DATABASE_ENGINE=sqlite
|
||||
export DATABASE_DRIVER=pysqlite
|
||||
export DATABASE_DEBUG=0
|
||||
@ -76,10 +75,6 @@ if [ ! -f "$HOME/.config/cic/staff-client/key_fingerprint" ]; then
|
||||
else
|
||||
t=`mktemp`
|
||||
gpg --export -a $AUTH_KEY > $t
|
||||
#gpg --list-packets $t | awk '/issuer fpr/ { print $9; }' | cut -b -40 > $HOME/.config/cic/staff-client/key_fingerprint
|
||||
#gpg --list-packets $t | awk '/keyid:/ { print $2; }'
|
||||
#gpg --list-packets $t | awk '/keyid:/ { print $2; }' > $HOME/.config/cic/staff-client/key_fingerprint
|
||||
#fp=`cat $HOME/.config/cic/staff-client/key_fingerprint`
|
||||
echo -n $AUTH_KEY > $HOME/.config/cic/staff-client/key_fingerprint
|
||||
dbg $dbg_info "using key $AUTH_KEY"
|
||||
fi
|
||||
@ -172,10 +167,6 @@ mkdir -vp $HOME/.local/share/cic/cache
|
||||
|
||||
python ../cic-internal-integration/apps/cic-cache/scripts/migrate.py -c $HOME/.config/cic/cache/
|
||||
|
||||
if [ ! -z $want_evm ]; then
|
||||
. setup_${want_evm}.sh
|
||||
fi
|
||||
|
||||
t=`mktemp`
|
||||
clicada --dumpconfig env $clicada_config_flag -vv > $t
|
||||
set -a
|
||||
@ -183,3 +174,10 @@ set -a
|
||||
set +a
|
||||
|
||||
. setup_systemd.sh
|
||||
|
||||
echo foo $INSTALL_EVM
|
||||
if [ ! -z $INSTALL_EVM ]; then
|
||||
. setup_${INSTALL_EVM}.sh
|
||||
fi
|
||||
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
GIT_OPENETHEREUM=${GIT_OPENETHEREUM:-https://github.com/openethereum/openethereum}
|
||||
OPENETHEREUM_PATH=${OPENETHEREUM_PATH:-$HOME/.local/bin/parity}
|
||||
openethereum_dir=`realpath $(dirname $OPENETHEREUM_PATH)`
|
||||
default_openethereum_run=$HOME/.local/share/bloxberg
|
||||
default_openethereum_run=$HOME/.local/share/io.parity.ethereum/bloxberg
|
||||
OPENETHEREUM_RUN=${OPENETHEREUM_RUN:-$default_openethereum_run}
|
||||
|
||||
install_env=
|
||||
@ -19,12 +19,15 @@ else
|
||||
dbg $dbg_info "found bloxberg node executable in $OPENETHEREUM_PATH"
|
||||
fi
|
||||
|
||||
OPENETHEREUM_RUN=$HOME/.local/share/bloxberg
|
||||
#OPENETHEREUM_RUN=$HOME/.local/share/bloxberg
|
||||
if [ ! -d $OPENETHEREUM_RUN ]; then
|
||||
mkdir -vp $OPENETHEREUM_RUN/bootnode
|
||||
touch $OPENETHEREUM_RUN/bootnode.pwd
|
||||
dd if=/dev/urandom bs=32 count=1 2> /dev/null | hexdump -v -n 32 -e '1/1 "%02x"' > $OPENETHEREUM_RUN/bootnode.pwd
|
||||
chmod 400 $OPENETHEREUM_RUN/bootnode.pwd
|
||||
./aux/bash-templater/templater.sh var/bloxberg/bootnode.toml > $OPENETHEREUM_RUN/bootnode.toml
|
||||
cp -v var/bloxberg/bloxberg.json $OPENETHEREUM_RUN/
|
||||
cp -v var/bloxberg/bootnodes.txt $OPENETHEREUM_RUN/
|
||||
fi
|
||||
|
||||
update_path $openethereum_dir
|
||||
|
@ -7,7 +7,11 @@ function checkk {
|
||||
fi
|
||||
}
|
||||
|
||||
exec=(systemctl clang git rustup gcc cmake pip python3 psql postgres)
|
||||
if [ "$INSTALL_EVM" == "bloxberg"] ; then
|
||||
exec=(systemctl git gcc pip python3 sqlite3 clang rustup cmake)
|
||||
else
|
||||
exec=(systemctl git gcc pip python3 sqlite3)
|
||||
fi
|
||||
|
||||
for e in ${exec[@]}; do
|
||||
dbg $dbg_trace "Checking for dependency $e"
|
||||
|
@ -18,9 +18,7 @@ while [ -z $pgp_ok ]; do
|
||||
echo -n "(Yes/No): "
|
||||
read pgp_r
|
||||
r=${pgp_r:0:1}
|
||||
if [ "$r" == "y" ]; then
|
||||
pgp_ok=1
|
||||
elif [ "$r" == "Y" ]; then
|
||||
if [[ "$r" =~ ^[yY] ]]; then
|
||||
pgp_ok=1
|
||||
fi
|
||||
echo
|
||||
@ -61,9 +59,6 @@ t=`mktemp -d`
|
||||
gpg --homedir $t --pinentry-mode loopback --passphrase-file $password_file --quick-gen-key "$pgp_name (CIC staff client signing key) <$pgp_email>" secp256k1 sign 0
|
||||
|
||||
|
||||
#echo -e "\e[0;93mNow let's see if you've forgotten your passphrase already"
|
||||
#echo -e "Please enter it again at the given prompts to import the newly created key into your environment\e[0m"
|
||||
|
||||
mkdir -vp $HOME/.config/cic/staff-client/.gnupg
|
||||
chmod 0700 -v $HOME/.config/cic/staff-client/.gnupg
|
||||
|
||||
|
136
var/bloxberg/bloxberg.json
Normal file
136
var/bloxberg/bloxberg.json
Normal file
@ -0,0 +1,136 @@
|
||||
{
|
||||
"name": "Bloxberg",
|
||||
"engine": {
|
||||
"authorityRound": {
|
||||
"params": {
|
||||
"maximumUncleCountTransition": 5006743,
|
||||
"maximumUncleCount": 0,
|
||||
"stepDuration": "5",
|
||||
"validators" : {
|
||||
"multi": {
|
||||
"0": {
|
||||
"list": ["0xaa84378fa41da83a9b6523ba46e45a664fbebfc8"]
|
||||
},
|
||||
"100": {
|
||||
"contract": "0x9850711951a84ef8a2a31a7868d0dca34b0661ca"
|
||||
},
|
||||
"5006743": {
|
||||
"safeContract": "0x9850711951a84ef8a2a31a7868d0dca34b0661ca"
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"params": {
|
||||
"gasLimitBoundDivisor": "0x400",
|
||||
"maximumExtraDataSize": "0x20",
|
||||
"minGasLimit": "0x7A1200",
|
||||
"networkID" : "0x2323",
|
||||
|
||||
"eip140Transition": "0x0",
|
||||
"eip211Transition": "0x0",
|
||||
"eip214Transition": "0x0",
|
||||
"eip658Transition": "0x0",
|
||||
|
||||
"eip145Transition": 5006743,
|
||||
"eip1014Transition": 5006743,
|
||||
"eip1052Transition": 5006743,
|
||||
|
||||
"eip1283Transition": 5006743,
|
||||
"eip1344Transition": 5006743,
|
||||
"eip1706Transition": 5006743,
|
||||
"eip1884Transition": 5006743,
|
||||
"eip2028Transition": 5006743
|
||||
},
|
||||
"genesis": {
|
||||
"seal": {
|
||||
"authorityRound": {
|
||||
"step": "0x0",
|
||||
"signature": "0x0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"
|
||||
}
|
||||
},
|
||||
"difficulty": "0x20000",
|
||||
"gasLimit": "0x7A1200"
|
||||
},
|
||||
"accounts": {
|
||||
"0x0000000000000000000000000000000000000001": { "balance": "1", "builtin": { "name": "ecrecover", "pricing": { "linear": { "base": 3000, "word": 0 } } } },
|
||||
"0x0000000000000000000000000000000000000002": { "balance": "1", "builtin": { "name": "sha256", "pricing": { "linear": { "base": 60, "word": 12 } } } },
|
||||
"0x0000000000000000000000000000000000000003": { "balance": "1", "builtin": { "name": "ripemd160", "pricing": { "linear": { "base": 600, "word": 120 } } } },
|
||||
"0x0000000000000000000000000000000000000004": { "balance": "1", "builtin": { "name": "identity", "pricing": { "linear": { "base": 15, "word": 3 } } } },
|
||||
"0x0000000000000000000000000000000000000005": { "builtin": { "name": "modexp", "activate_at": 0, "pricing": { "modexp": { "divisor": 20 } } } },
|
||||
"0x0000000000000000000000000000000000000006": {
|
||||
"builtin": {
|
||||
"name": "alt_bn128_add",
|
||||
"activate_at": 0,
|
||||
"pricing": {
|
||||
"alt_bn128_const_operations": {
|
||||
"price": 500
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"0000000000000000000000000000000000000007": {
|
||||
"builtin": {
|
||||
"name": "alt_bn128_mul",
|
||||
"pricing": {
|
||||
"0": {
|
||||
"price": {
|
||||
"alt_bn128_const_operations": {
|
||||
"price": 40000
|
||||
}
|
||||
}
|
||||
},
|
||||
"5006743": {
|
||||
"info": "Istanbul HF",
|
||||
"price": {
|
||||
"alt_bn128_const_operations": {
|
||||
"price": 6000
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"0000000000000000000000000000000000000008": {
|
||||
"builtin": {
|
||||
"name": "alt_bn128_pairing",
|
||||
"pricing": {
|
||||
"0": {
|
||||
"price": {
|
||||
"alt_bn128_pairing": {
|
||||
"base": 100000,
|
||||
"pair": 80000
|
||||
}
|
||||
}
|
||||
},
|
||||
"5006743": {
|
||||
"info": "Istanbul HF",
|
||||
"price": {
|
||||
"alt_bn128_pairing": {
|
||||
"base": 45000,
|
||||
"pair": 34000
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"0x0000000000000000000000000000000000000009": {
|
||||
"builtin": {
|
||||
"name": "blake2_f",
|
||||
"pricing": {
|
||||
"5006743": {
|
||||
"info": "Istanbul HF",
|
||||
"price": {
|
||||
"blake2_f": {
|
||||
"gas_per_round": 1
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"0xab59a1ea1ac9af9f77518b9b4ad80942ade35088": { "balance": "100000000000000000000000000000000" }
|
||||
}
|
||||
}
|
35
var/bloxberg/bootnode.toml
Normal file
35
var/bloxberg/bootnode.toml
Normal file
@ -0,0 +1,35 @@
|
||||
# File bootnode.toml
|
||||
|
||||
[parity]
|
||||
chain = "{{HOME}}/.local/share/io.parity.ethereum/bloxberg/bloxberg.json"
|
||||
base_path = "{{HOME}}/.local/share/io.parity.ethereum/bloxberg/bootnode"
|
||||
|
||||
[network]
|
||||
port = 30303
|
||||
reserved_peers = "{{HOME}}/.local/share/io.parity.ethereum/bloxberg/bootnodes.txt"
|
||||
# reserved_only = true
|
||||
max_peers = 100
|
||||
snapshot_peers = 25
|
||||
#nat = "extip:217.197.85.156"
|
||||
|
||||
[rpc]
|
||||
port = 8545
|
||||
#apis = ["web3", "eth", "net", "personal", "parity", "parity_set", "traces", "rpc", "parity_accounts"]
|
||||
apis = ["eth", "net" ]
|
||||
interface = "all"
|
||||
cors = ["*"]
|
||||
|
||||
[websockets]
|
||||
disable = true
|
||||
port = 8546
|
||||
interface = "all"
|
||||
origins = ["all"]
|
||||
|
||||
[account]
|
||||
password = ["{{HOME}}/.local/share/io.parity.ethereum/bloxberg/bootnode.pwd"]
|
||||
|
||||
[footprint]
|
||||
tracing = "on"
|
||||
pruning = "archive"
|
||||
pruning_history = 256
|
||||
cache_size_db = 2000
|
17
var/bloxberg/bootnodes.txt
Normal file
17
var/bloxberg/bootnodes.txt
Normal file
@ -0,0 +1,17 @@
|
||||
#MPDL Bootnode and Authority
|
||||
enode://a7a53baf91b612b25b84993c964beb987879bfe7430cf6acb55bd721b9c0d96ceb1849049b1dcc0aa6e86fa1e2234280581b16c1265d56644fb09085e6906034@141.5.98.231:30304
|
||||
enode://a7a53baf91b612b25b84993c964beb987879bfe7430cf6acb55bd721b9c0d96ceb1849049b1dcc0aa6e86fa1e2234280581b16c1265d56644fb09085e6906034@130.183.206.234:30304
|
||||
enode://e6b181c16d20194029c220ce886fdc7a745cb37ee655c3b41ea744ec89143db6731a1c01ff3c40b39f969079090ad34e0e3319e47b0d22a8d510ff1f7b5a9ac7@141.5.98.231:30303
|
||||
enode://e6b181c16d20194029c220ce886fdc7a745cb37ee655c3b41ea744ec89143db6731a1c01ff3c40b39f969079090ad34e0e3319e47b0d22a8d510ff1f7b5a9ac7@130.183.206.234:30303
|
||||
#GeorgiaTech
|
||||
enode://4d9e6925ef3a92315283a655e856aa29dd516172c4f38d2a8fcd58c233a2cd80c57b507fed3bf351b1ac0611e8c7fefd6fb1c49de2d0d15eb1816d43629ac4ba@3.14.148.213:30303
|
||||
#CMU
|
||||
enode://ce0154eb13c1c038017151dd1ff4d736178ffedc33f5e11fe694c247eb09279886d253c3c775486eb709a65057901e2788098f991c58e6ad26ff957a8f45253e@128.2.25.89:30303
|
||||
#UCL
|
||||
enode://e41a38d659f13d47f3d88c5178e0cfe97487d3568000b85ae3a4abbcc35404d2628cee8a7e9071b63802542bafd886447ecf1d02fc663be0534779094a3e4fd1@128.16.12.165:30303
|
||||
#Sarajevo
|
||||
enode://6959137e1c66384e82ce6d9ba7e09bb0e56817f4834416448b98f646a335168c2967760a1daa5e3ec5ac2a3401be1cd05927568cdebf49c25d4770f5bb8fbfd7@195.222.43.21:30303
|
||||
#Zurich
|
||||
enode://6173beaabd1a82d41e3615da2a755e99f3bd53e04737e2ae2f02a004c42445d8dfd1d87aadfafabc4c45a1df2a80f359ab628c93522d1dac70690a9689912bbc@129.132.178.74:30303
|
||||
#Internet Security
|
||||
enode://bc50cf41d29f346f43f84ee7d03b21cd2d4176cd759cd0d26ce04c16448d4c8611c4eab4c5543e29075c758c0afc2fd6743fa38f48dc0ed1f016efbb5c5a7654@194.94.127.78:30303
|
18
var/cic-staff-client/CHAIN_SPEC
Normal file
18
var/cic-staff-client/CHAIN_SPEC
Normal file
@ -0,0 +1,18 @@
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
owEBfQKC/ZANAwAIASHS57uIwqdGAaw2YgpDSEFJTl9TUEVDYY1AikNIQUlOX1NQ
|
||||
RUM9ZXZtOmJ5emFudGl1bTo4OTk2OmJsb3hiZXJniQIzBAABCAAdFiEECCbtoXAt
|
||||
HofG4odRIdLnu4jCp0YFAmGNQIoACgkQIdLnu4jCp0ZtMg/+PZJjTa05dxCO4A/J
|
||||
1/A+I+HuBFt4LQY+mjTnDeCRF3cjgKrUfF+D6nIIbCMsL+F/HlN9NO2x0RvdkGkg
|
||||
k6whux+HBl7WxGQAGPlFIAJTz+xGhQ9gJD6djuILjNcWKtfzpCdEBq5nXnlcK6xo
|
||||
X1gbSQgaHvIiau6qPHobKF9EciF99QB2f/3BSAeZpge3wOxC4NIibPL1o/QwEJrx
|
||||
QcNCoxRvI0Nvx51AfJ/VoyW/WbYOgrOVv8ZYqhpuPMC8MYFOzJByN73p5JNA2qGg
|
||||
BF5WHOARBiEXH3xAVcnvKSegqh8o3ZeQT6mwc6vzHmBA1BTiPeT256rQwDkXaaFY
|
||||
TXXbg/1uvCyPUoXJgyH8FErs/7iYZo7tOy7qGEV8IM+O4IpVxogq7VVJj4UlFEJN
|
||||
Sggjon/4aGc6dTThdkxn2FhJzTY7fPDjlNoxVRYxOzL96nSmLM5fslOYBUt9QZXP
|
||||
QkNRlhbxyhpZ+MODmzqt5JRLMLPSdLCd7zVf//zlYVjeb4PCzr7/CeGHhwmyyBj3
|
||||
oc9waZ1bLspIAJxHzuK4cQq/MAsRlL/Mo+DHKOPgtXF5xoW1Cvt/bOAdgl9A7tHE
|
||||
ttwZAWw9FUmSpxfQbfV+R3zvgxC1wUGfqElMa5xT5iK1Vm0IYUBEFrUeqGbyAZwe
|
||||
3WNmOQJ0w1A4a/lPMDI8wcUVmV0=
|
||||
=5hcY
|
||||
-----END PGP MESSAGE-----
|
19
var/cic-staff-client/CIC_REGISTRY_ADDRESS
Normal file
19
var/cic-staff-client/CIC_REGISTRY_ADDRESS
Normal file
@ -0,0 +1,19 @@
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
owGbwMvMwMGoeOn57o5Dy90Y10QliTh7OscHubp7BocERcY7urgEuQYHJ/Y6TMQm
|
||||
bmtQkZxmZpCalGxiYppkZmyWaJqYZG5hnmaZagEUMzNNNEo0Tk2zMLK05OpkMmZh
|
||||
YORgkBVTZOFQe7uwQFeu/dij9kCY5axMIFsYuDgFYCLX/vH/L+QPX/Jvu5zLVudE
|
||||
hX3fpKdM3ma0IU5vw0ye6X+jZrfslLphllHHr775QO31zYFeCiELZ75JlHtdGSAQ
|
||||
WTNRfnewr13spQ3/oi8c5jhY5JQj+2THY5EKrhX1TnufWBiLvszNe5WjXbDtCJd5
|
||||
p+2n4LVyTSvOhqxaeOL/cZ1PnTV/Jp37oqHjbXgh2OBb72WtI4JTHCaVHp3BI1PM
|
||||
uoPV+iu/xcltS+u+m0wqFw866Pz2An9WkqLzwnOfT2X5/Zq1K0tsJ9spscVtOx1z
|
||||
Svp/Gi/uLjWwrPH5q/0uSsP7bvvDV5O1NY+dYy5zSF4r4ZCbYCbPnbXT9rVQyKc5
|
||||
TX7Hbyvf3fdwQ46WzoqWhvvprb+iymymREU/EJiwSXVz7bGoDa9dwo4WOgjE/pj6
|
||||
fl6WVsLaC9VTNtlfOJXGPOP7xuRjF1XeCCX/dOib4codJfXlqOaFGU8/XznB2PzY
|
||||
/1G/5MIdDksW/7ToC5X+vzjd+EVC49rHkfOTtkpNvyPjODn8/4xHTW2f77cvZmk7
|
||||
oKPD/OUVT3TNDC3f92q/zJfK23yYalh3xMRitdTRWYstLswP/ctw9q/Mp345z273
|
||||
w0HvK5ue/ftnLnlZ4eXG29Izz0hbvtuippPzNXXaP0bFDMYPa3k55gd7Bs8oNT09
|
||||
9Z7ZG5mDJlN45tr1XvCwdIif1KP9f7n/I3fV/Xe+rqtKWJIk+P8N64aua6ss2LQU
|
||||
LwMA
|
||||
=YNnV
|
||||
-----END PGP MESSAGE-----
|
18
var/cic-staff-client/CIC_TRUST_ADDRESS
Normal file
18
var/cic-staff-client/CIC_TRUST_ADDRESS
Normal file
@ -0,0 +1,18 @@
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
owGbwMvMwMGoeOn57o5Dy90Y1wQlCTp7OseHBIUGh8Q7urgEuQYHJ/Y6TMUQtHVN
|
||||
MrY0ME91TkwxN0k0MDA0TjYytXQxtTA3cXQ1TzMyckl2Sna2NHXm6mQyZmFg5GCQ
|
||||
FVNk4VB7u7BAV6792KP2QJilrEwgCxi4OAVgIleD+f8nMstfi1+2rzu1aaLUuyWq
|
||||
PAxHpu3bGOr0kHNu2ttjHEbBe0qzXzS9MX58MPCXuH3LAknu7wUr9l+qOyietf9s
|
||||
/rvphUwfvL2sb3tYntorLx/9ctqFXceEG7RCY6eWvX98clHN6cIJcutmZU0TYS7/
|
||||
taFQd9LF50w83QvnFbYVNO7Sydm76N1rTb0oPrs1SdqLXY4yZn5iut+stPHIacVd
|
||||
bjvEsi1177DP3WMk5rbCueS4zS0N7p0bS/xMeE+rBs/97la1yCREcu79H/9iWxvf
|
||||
nLFKtPgx22XNzSz2uDd3jib+ynue2+rzIbtSXirgl8fV5ylaNnmxLz9f+nNKfwt3
|
||||
v9y0tji/o25Wb06K/dwwZ3an5tIoS+F0F4c4Z8+KZSem2rvPEMhfP0XTzLbIZ9Xi
|
||||
Q7v1lXlzEzYWHrA4zm//zdu8fO9HF86oreUhp++9Obs9p0LA0ux/X8WTZcKcbyWs
|
||||
zxzVZn9kkaub8XG3a/CMB83bHmx98nKC+mw2Xx6p3FxX3s2xeVus1B4GLLN6vY3t
|
||||
8mU5A/VEe6VZN18xPPw32VBol9FcfkO7Khd5a8eDRxaYO90MyLuu2FXcVjFtwzPP
|
||||
7O9SO24oRh9pnb39xq3jnRFPrjBUmK/ScFwc/tyeyWfRAYZ/Z09JnnoQXdWfVl8Y
|
||||
Wcq1zefghqra24ereD9O1e088OqAb919tglP9m+eu2cxZ+qyNV/m/hdLuuEJAA==
|
||||
=+uzd
|
||||
-----END PGP MESSAGE-----
|
18
var/cic-staff-client/META_URL
Normal file
18
var/cic-staff-client/META_URL
Normal file
@ -0,0 +1,18 @@
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
owEBdQKK/ZANAwAIASHS57uIwqdGAawuYghNRVRBX1VSTGGNQJhNRVRBX1VSTD1o
|
||||
dHRwOi8vbG9jYWxob3N0OjYzMzgwCokCMwQAAQgAHRYhBAgm7aFwLR6HxuKHUSHS
|
||||
57uIwqdGBQJhjUCYAAoJECHS57uIwqdG2GsP/3VH0vlEXC+X0Nh8ufRLdtBiw73J
|
||||
LNTGNXslIg3szwGGgaHjNoARpluZjJ6AvH83s7jYV/OFuip+zwBIcqRZ4BT0rtEf
|
||||
YlojiVnEIkIahbxYlD+gIU37WjbiBcpPAqYErYDaJhEyUzGD9aLhLg0r+TImHLUH
|
||||
/WRWioEwSdAAzetzkY0R3aNtEZlolxvt7HumSOIMKNX7qQHpnpPUOqergsiwN0J7
|
||||
ynWAD1vgXaiZ3lI+8iyDWwQHpaTjHuRbFmROVhBRiFCY6xlyotYP8waGldEZVvnc
|
||||
0mP5cRg2PogEuCO5cDQ+2vszR7N8xPpQKI/9Q3gUTv2gPj5Cy7ko4+N6bsTgQk7H
|
||||
aX1jvUwaU0HBD0A//l6eGxl0gze5hrr4v/4O8MZLdzKfYPqgOzPcDgo42aykua7x
|
||||
0zHWTCtmiy/PaW4/c+bPKvbMMUO5ZojRant4O+pCZ80CTkH18rkY2pcQGGGP+XTI
|
||||
pDTKB1IdrvnVc508v59UaXoKHOKpaES8SqTe4XWZY9w/pr7alw9LjjEOu3mrNypT
|
||||
/CszUjwx5FYRKQxLrF8fj7UuODX9bbUP9XAdggy6wwy8NWZbw1hxBlJRKgDvvvoK
|
||||
jqGAkRig8yzhT6f0F7f5U3AVdCCFfZXWBWk0NCqT5oMHbI5VGMKLAdV8m8+ptyB+
|
||||
GlDGJ7sdcwrUhM3U
|
||||
=Va+P
|
||||
-----END PGP MESSAGE-----
|
18
var/cic-staff-client/TX_CACHE_URL
Normal file
18
var/cic-staff-client/TX_CACHE_URL
Normal file
@ -0,0 +1,18 @@
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
owEBfAKD/ZANAwAIASHS57uIwqdGAaw1YgxUWF9DQUNIRV9VUkxhjUCcVFhfQ0FD
|
||||
SEVfVVJMPWh0dHA6Ly9sb2NhbGhvc3Q6ODMxMwqJAjMEAAEIAB0WIQQIJu2hcC0e
|
||||
h8bih1Eh0ue7iMKnRgUCYY1AnAAKCRAh0ue7iMKnRsGVD/41suPkAo85ue4IHY4g
|
||||
yXl5IuxF6TPAkG9UPTB7Lb4RLmlmwsoN4oMssn0//QZJ/0l/vfJQqf0NPUhEwOWw
|
||||
vnr8rK+l0jZ77pewP38aptMvq7S2TIXgrRYPwWKhwZFe0F5fUqk5nPxjdKoSCANE
|
||||
eifd7Igf543x3oqahaM4W1jHe8JjzXPdKpqC/eubU5o3Uc8RDygM8Y3aTXR25siq
|
||||
0D/yx5X3y5BbETKkTmkDRjowsMkYPLL6TWUdHspYYq0I224RVwOG408XWGDi4YJQ
|
||||
z8PK4W+rR6oPUmcpTy+PgTdu7d16I1B1b4OqYeXmy6QK0TOK9KhxcsZlJiBYeJ7n
|
||||
xMOVHA/9mAfagXsbovz7Hh+q4uebR4jmm/jwHP2tZMotrPuTfQJmdI7LSMwwB8Kk
|
||||
/Amh2Kq2W0otcg2h7fTylmnCLVql+8j0ECykE7QcdeNFPNrlhEG1qi033adJ9CL+
|
||||
JmDxGGGEKIyL4mK6qzZFeOQpUC8P9aFOXt79NbOtqvyNQtxxNiXNCJvH0gI3aYeY
|
||||
+VDcINFjLTJQ88lcfCgLoZ4mFDP4PffKwyYf7GvdxI1Xrd7diniwwUHqvoIjHb3r
|
||||
LGL0XNCaVkFH6bsHt2EIlR5/8aGl0G3189tM+i4IOW/sl+ktZAEupGEXNXjaN1IY
|
||||
tG5M/oJuWUJzOPv7ZJql0PLWNw==
|
||||
=IueR
|
||||
-----END PGP MESSAGE-----
|
Loading…
Reference in New Issue
Block a user