Compare commits
11 Commits
lash/defau
...
spencer/re
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
1c846234a3 | ||
|
|
d0e39a6fb2 | ||
|
|
6ac04cbdc6 | ||
|
|
df8a031b5a | ||
|
|
266edd20c8 | ||
|
|
9310f7cce1 | ||
|
|
395080340b | ||
|
|
2f8531c195 | ||
|
|
426818baa1 | ||
|
|
5853aab840 | ||
|
|
edbd7ffdf5 |
4
.gitignore
vendored
4
.gitignore
vendored
@@ -4,7 +4,3 @@ service-configs/*
|
|||||||
__pycache__
|
__pycache__
|
||||||
*.pyc
|
*.pyc
|
||||||
*.o
|
*.o
|
||||||
gmon.out
|
|
||||||
*.egg-info
|
|
||||||
dist/
|
|
||||||
build/
|
|
||||||
|
|||||||
@@ -2,9 +2,4 @@
|
|||||||
|
|
||||||
. ./db.sh
|
. ./db.sh
|
||||||
|
|
||||||
if [ $? -ne "0" ]; then
|
|
||||||
>&2 echo db migrate fail
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
/usr/local/bin/cic-cache-trackerd $@
|
/usr/local/bin/cic-cache-trackerd $@
|
||||||
|
|||||||
@@ -32,9 +32,7 @@ def lock(chained_input, chain_spec_dict, address=ZERO_ADDRESS, flags=LockEnum.AL
|
|||||||
:returns: New lock state for address
|
:returns: New lock state for address
|
||||||
:rtype: number
|
:rtype: number
|
||||||
"""
|
"""
|
||||||
chain_str = '::'
|
chain_str = str(ChainSpec.from_dict(chain_spec_dict))
|
||||||
if chain_spec_dict != None:
|
|
||||||
chain_str = str(ChainSpec.from_dict(chain_spec_dict))
|
|
||||||
r = Lock.set(chain_str, flags, address=address, tx_hash=tx_hash)
|
r = Lock.set(chain_str, flags, address=address, tx_hash=tx_hash)
|
||||||
logg.debug('Locked {} for {}, flag now {}'.format(flags, address, r))
|
logg.debug('Locked {} for {}, flag now {}'.format(flags, address, r))
|
||||||
return chained_input
|
return chained_input
|
||||||
@@ -53,9 +51,7 @@ def unlock(chained_input, chain_spec_dict, address=ZERO_ADDRESS, flags=LockEnum.
|
|||||||
:returns: New lock state for address
|
:returns: New lock state for address
|
||||||
:rtype: number
|
:rtype: number
|
||||||
"""
|
"""
|
||||||
chain_str = '::'
|
chain_str = str(ChainSpec.from_dict(chain_spec_dict))
|
||||||
if chain_spec_dict != None:
|
|
||||||
chain_str = str(ChainSpec.from_dict(chain_spec_dict))
|
|
||||||
r = Lock.reset(chain_str, flags, address=address)
|
r = Lock.reset(chain_str, flags, address=address)
|
||||||
logg.debug('Unlocked {} for {}, flag now {}'.format(flags, address, r))
|
logg.debug('Unlocked {} for {}, flag now {}'.format(flags, address, r))
|
||||||
return chained_input
|
return chained_input
|
||||||
@@ -131,9 +127,7 @@ def unlock_queue(chained_input, chain_spec_dict, address=ZERO_ADDRESS):
|
|||||||
|
|
||||||
@celery_app.task(base=CriticalSQLAlchemyTask)
|
@celery_app.task(base=CriticalSQLAlchemyTask)
|
||||||
def check_lock(chained_input, chain_spec_dict, lock_flags, address=None):
|
def check_lock(chained_input, chain_spec_dict, lock_flags, address=None):
|
||||||
chain_str = '::'
|
chain_str = str(ChainSpec.from_dict(chain_spec_dict))
|
||||||
if chain_spec_dict != None:
|
|
||||||
chain_str = str(ChainSpec.from_dict(chain_spec_dict))
|
|
||||||
session = SessionBase.create_session()
|
session = SessionBase.create_session()
|
||||||
r = Lock.check(chain_str, lock_flags, address=ZERO_ADDRESS, session=session)
|
r = Lock.check(chain_str, lock_flags, address=ZERO_ADDRESS, session=session)
|
||||||
if address != None:
|
if address != None:
|
||||||
|
|||||||
@@ -1,19 +0,0 @@
|
|||||||
# standard imports
|
|
||||||
import logging
|
|
||||||
|
|
||||||
# external imports
|
|
||||||
import celery
|
|
||||||
|
|
||||||
# local imports
|
|
||||||
from cic_eth.task import BaseTask
|
|
||||||
|
|
||||||
celery_app = celery.current_app
|
|
||||||
logg = logging.getLogger()
|
|
||||||
|
|
||||||
|
|
||||||
@celery_app.task(bind=True, base=BaseTask)
|
|
||||||
def default_token(self):
|
|
||||||
return {
|
|
||||||
'symbol': self.default_token_symbol,
|
|
||||||
'address': self.default_token_address,
|
|
||||||
}
|
|
||||||
@@ -62,18 +62,6 @@ class Api:
|
|||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
def default_token(self):
|
|
||||||
s_token = celery.signature(
|
|
||||||
'cic_eth.admin.token.default_token',
|
|
||||||
[],
|
|
||||||
queue=self.queue,
|
|
||||||
)
|
|
||||||
if self.callback_param != None:
|
|
||||||
s_token.link(self.callback_success)
|
|
||||||
|
|
||||||
return s_token.apply_async()
|
|
||||||
|
|
||||||
|
|
||||||
def convert_transfer(self, from_address, to_address, target_return, minimum_return, from_token_symbol, to_token_symbol):
|
def convert_transfer(self, from_address, to_address, target_return, minimum_return, from_token_symbol, to_token_symbol):
|
||||||
"""Executes a chain of celery tasks that performs conversion between two ERC20 tokens, and transfers to a specified receipient after convert has completed.
|
"""Executes a chain of celery tasks that performs conversion between two ERC20 tokens, and transfers to a specified receipient after convert has completed.
|
||||||
|
|
||||||
|
|||||||
@@ -1,8 +0,0 @@
|
|||||||
from cic_eth.db.models.base import SessionBase
|
|
||||||
|
|
||||||
|
|
||||||
def health(*args, **kwargs):
|
|
||||||
session = SessionBase.create_session()
|
|
||||||
session.execute('SELECT count(*) from alembic_version')
|
|
||||||
session.close()
|
|
||||||
return True
|
|
||||||
@@ -1,48 +0,0 @@
|
|||||||
# standard imports
|
|
||||||
import logging
|
|
||||||
|
|
||||||
# external imports
|
|
||||||
from chainlib.connection import RPCConnection
|
|
||||||
from chainlib.chain import ChainSpec
|
|
||||||
from chainlib.eth.gas import balance
|
|
||||||
|
|
||||||
# local imports
|
|
||||||
from cic_eth.db.models.role import AccountRole
|
|
||||||
from cic_eth.db.models.base import SessionBase
|
|
||||||
from cic_eth.db.enum import LockEnum
|
|
||||||
from cic_eth.error import LockedError
|
|
||||||
from cic_eth.admin.ctrl import check_lock
|
|
||||||
|
|
||||||
logg = logging.getLogger().getChild(__name__)
|
|
||||||
|
|
||||||
|
|
||||||
def health(*args, **kwargs):
|
|
||||||
|
|
||||||
session = SessionBase.create_session()
|
|
||||||
|
|
||||||
config = kwargs['config']
|
|
||||||
chain_spec = ChainSpec.from_chain_str(config.get('CIC_CHAIN_SPEC'))
|
|
||||||
logg.debug('check gas balance of gas gifter for chain {}'.format(chain_spec))
|
|
||||||
|
|
||||||
try:
|
|
||||||
check_lock(None, None, LockEnum.INIT)
|
|
||||||
except LockedError:
|
|
||||||
logg.warning('INIT lock is set, skipping GAS GIFTER balance check.')
|
|
||||||
return True
|
|
||||||
|
|
||||||
gas_provider = AccountRole.get_address('GAS_GIFTER', session=session)
|
|
||||||
session.close()
|
|
||||||
|
|
||||||
rpc = RPCConnection.connect(chain_spec, 'default')
|
|
||||||
o = balance(gas_provider)
|
|
||||||
r = rpc.do(o)
|
|
||||||
try:
|
|
||||||
r = int(r, 16)
|
|
||||||
except TypeError:
|
|
||||||
r = int(r)
|
|
||||||
gas_min = int(config.get('ETH_GAS_GIFTER_MINIMUM_BALANCE'))
|
|
||||||
if r < gas_min:
|
|
||||||
logg.error('EEK! gas gifter has balance {}, below minimum {}'.format(r, gas_min))
|
|
||||||
return False
|
|
||||||
|
|
||||||
return True
|
|
||||||
@@ -1,37 +0,0 @@
|
|||||||
# standard imports
|
|
||||||
import time
|
|
||||||
import logging
|
|
||||||
from urllib.error import URLError
|
|
||||||
|
|
||||||
# external imports
|
|
||||||
from chainlib.connection import RPCConnection
|
|
||||||
from chainlib.eth.constant import ZERO_ADDRESS
|
|
||||||
from chainlib.eth.sign import sign_message
|
|
||||||
from chainlib.error import JSONRPCException
|
|
||||||
|
|
||||||
logg = logging.getLogger().getChild(__name__)
|
|
||||||
|
|
||||||
|
|
||||||
def health(*args, **kwargs):
|
|
||||||
blocked = True
|
|
||||||
max_attempts = 5
|
|
||||||
conn = RPCConnection.connect(kwargs['config'].get('CIC_CHAIN_SPEC'), tag='signer')
|
|
||||||
for i in range(max_attempts):
|
|
||||||
idx = i + 1
|
|
||||||
logg.debug('attempt signer connection check {}/{}'.format(idx, max_attempts))
|
|
||||||
try:
|
|
||||||
conn.do(sign_message(ZERO_ADDRESS, '0x2a'))
|
|
||||||
except FileNotFoundError:
|
|
||||||
pass
|
|
||||||
except ConnectionError:
|
|
||||||
pass
|
|
||||||
except URLError:
|
|
||||||
pass
|
|
||||||
except JSONRPCException:
|
|
||||||
logg.debug('signer connection succeeded')
|
|
||||||
return True
|
|
||||||
|
|
||||||
if idx < max_attempts:
|
|
||||||
time.sleep(0.5)
|
|
||||||
|
|
||||||
return False
|
|
||||||
@@ -74,11 +74,10 @@ class LockEnum(enum.IntEnum):
|
|||||||
QUEUE: Disable queueing new or modified transactions
|
QUEUE: Disable queueing new or modified transactions
|
||||||
"""
|
"""
|
||||||
STICKY=1
|
STICKY=1
|
||||||
INIT=2
|
CREATE=2
|
||||||
CREATE=4
|
SEND=4
|
||||||
SEND=8
|
QUEUE=8
|
||||||
QUEUE=16
|
QUERY=16
|
||||||
QUERY=32
|
|
||||||
ALL=int(0xfffffffffffffffe)
|
ALL=int(0xfffffffffffffffe)
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
@@ -5,11 +5,8 @@ Revises: 1f1b3b641d08
|
|||||||
Create Date: 2021-04-02 18:41:20.864265
|
Create Date: 2021-04-02 18:41:20.864265
|
||||||
|
|
||||||
"""
|
"""
|
||||||
import datetime
|
|
||||||
from alembic import op
|
from alembic import op
|
||||||
import sqlalchemy as sa
|
import sqlalchemy as sa
|
||||||
from chainlib.eth.constant import ZERO_ADDRESS
|
|
||||||
from cic_eth.db.enum import LockEnum
|
|
||||||
|
|
||||||
|
|
||||||
# revision identifiers, used by Alembic.
|
# revision identifiers, used by Alembic.
|
||||||
@@ -26,11 +23,10 @@ def upgrade():
|
|||||||
sa.Column("address", sa.String(42), nullable=True),
|
sa.Column("address", sa.String(42), nullable=True),
|
||||||
sa.Column('blockchain', sa.String),
|
sa.Column('blockchain', sa.String),
|
||||||
sa.Column("flags", sa.BIGINT(), nullable=False, default=0),
|
sa.Column("flags", sa.BIGINT(), nullable=False, default=0),
|
||||||
sa.Column("date_created", sa.DateTime, nullable=False, default=datetime.datetime.utcnow),
|
sa.Column("date_created", sa.DateTime, nullable=False),
|
||||||
sa.Column("otx_id", sa.Integer, sa.ForeignKey('otx.id'), nullable=True),
|
sa.Column("otx_id", sa.Integer, sa.ForeignKey('otx.id'), nullable=True),
|
||||||
)
|
)
|
||||||
op.create_index('idx_chain_address', 'lock', ['blockchain', 'address'], unique=True)
|
op.create_index('idx_chain_address', 'lock', ['blockchain', 'address'], unique=True)
|
||||||
op.execute("INSERT INTO lock (address, date_created, blockchain, flags) VALUES('{}', '{}', '::', {})".format(ZERO_ADDRESS, datetime.datetime.utcnow(), LockEnum.INIT | LockEnum.SEND | LockEnum.QUEUE))
|
|
||||||
|
|
||||||
|
|
||||||
def downgrade():
|
def downgrade():
|
||||||
|
|||||||
@@ -59,7 +59,6 @@ args_override = {
|
|||||||
'CIC_CHAIN_SPEC': getattr(args, 'i'),
|
'CIC_CHAIN_SPEC': getattr(args, 'i'),
|
||||||
}
|
}
|
||||||
# override args
|
# override args
|
||||||
config.dict_override(args_override, 'cli')
|
|
||||||
config.censor('PASSWORD', 'DATABASE')
|
config.censor('PASSWORD', 'DATABASE')
|
||||||
config.censor('PASSWORD', 'SSL')
|
config.censor('PASSWORD', 'SSL')
|
||||||
logg.debug('config loaded from {}:\n{}'.format(config_dir, config))
|
logg.debug('config loaded from {}:\n{}'.format(config_dir, config))
|
||||||
@@ -68,9 +67,7 @@ celery_app = celery.Celery(broker=config.get('CELERY_BROKER_URL'), backend=confi
|
|||||||
|
|
||||||
queue = args.q
|
queue = args.q
|
||||||
|
|
||||||
chain_spec = None
|
chain_spec = ChainSpec.from_chain_str(config.get('CIC_CHAIN_SPEC'))
|
||||||
if config.get('CIC_CHAIN_SPEC') != None and config.get('CIC_CHAIN_SPEC') != '::':
|
|
||||||
chain_spec = ChainSpec.from_chain_str(config.get('CIC_CHAIN_SPEC'))
|
|
||||||
admin_api = AdminApi(None)
|
admin_api = AdminApi(None)
|
||||||
|
|
||||||
|
|
||||||
@@ -85,9 +82,6 @@ def lock_names_to_flag(s):
|
|||||||
|
|
||||||
# TODO: move each command to submodule
|
# TODO: move each command to submodule
|
||||||
def main():
|
def main():
|
||||||
chain_spec_dict = None
|
|
||||||
if chain_spec != None:
|
|
||||||
chain_spec_dict = chain_spec.asdict()
|
|
||||||
if args.command == 'unlock':
|
if args.command == 'unlock':
|
||||||
flags = lock_names_to_flag(args.flags)
|
flags = lock_names_to_flag(args.flags)
|
||||||
if not is_checksum_address(args.address):
|
if not is_checksum_address(args.address):
|
||||||
@@ -97,7 +91,7 @@ def main():
|
|||||||
'cic_eth.admin.ctrl.unlock',
|
'cic_eth.admin.ctrl.unlock',
|
||||||
[
|
[
|
||||||
None,
|
None,
|
||||||
chain_spec_dict,
|
chain_spec.asdict(),
|
||||||
args.address,
|
args.address,
|
||||||
flags,
|
flags,
|
||||||
],
|
],
|
||||||
@@ -116,7 +110,7 @@ def main():
|
|||||||
'cic_eth.admin.ctrl.lock',
|
'cic_eth.admin.ctrl.lock',
|
||||||
[
|
[
|
||||||
None,
|
None,
|
||||||
chain_spec_dict,
|
chain_spec.asdict(),
|
||||||
args.address,
|
args.address,
|
||||||
flags,
|
flags,
|
||||||
],
|
],
|
||||||
|
|||||||
@@ -15,9 +15,6 @@ from chainlib.connection import RPCConnection
|
|||||||
from chainlib.eth.connection import EthUnixSignerConnection
|
from chainlib.eth.connection import EthUnixSignerConnection
|
||||||
from chainlib.chain import ChainSpec
|
from chainlib.chain import ChainSpec
|
||||||
from chainqueue.db.models.otx import Otx
|
from chainqueue.db.models.otx import Otx
|
||||||
from cic_eth_registry.error import UnknownContractError
|
|
||||||
import liveness.linux
|
|
||||||
|
|
||||||
|
|
||||||
# local imports
|
# local imports
|
||||||
from cic_eth.eth import (
|
from cic_eth.eth import (
|
||||||
@@ -30,7 +27,6 @@ from cic_eth.eth import (
|
|||||||
from cic_eth.admin import (
|
from cic_eth.admin import (
|
||||||
debug,
|
debug,
|
||||||
ctrl,
|
ctrl,
|
||||||
token,
|
|
||||||
)
|
)
|
||||||
from cic_eth.queue import (
|
from cic_eth.queue import (
|
||||||
query,
|
query,
|
||||||
@@ -55,8 +51,6 @@ from cic_eth.registry import (
|
|||||||
connect_declarator,
|
connect_declarator,
|
||||||
connect_token_registry,
|
connect_token_registry,
|
||||||
)
|
)
|
||||||
from cic_eth.task import BaseTask
|
|
||||||
|
|
||||||
|
|
||||||
logging.basicConfig(level=logging.WARNING)
|
logging.basicConfig(level=logging.WARNING)
|
||||||
logg = logging.getLogger()
|
logg = logging.getLogger()
|
||||||
@@ -68,7 +62,6 @@ argparser.add_argument('-p', '--provider', dest='p', type=str, help='rpc provide
|
|||||||
argparser.add_argument('-c', type=str, default=config_dir, help='config file')
|
argparser.add_argument('-c', type=str, default=config_dir, help='config file')
|
||||||
argparser.add_argument('-q', type=str, default='cic-eth', help='queue name for worker tasks')
|
argparser.add_argument('-q', type=str, default='cic-eth', help='queue name for worker tasks')
|
||||||
argparser.add_argument('-r', type=str, help='CIC registry address')
|
argparser.add_argument('-r', type=str, help='CIC registry address')
|
||||||
argparser.add_argument('--default-token-symbol', dest='default_token_symbol', type=str, help='Symbol of default token to use')
|
|
||||||
argparser.add_argument('--abi-dir', dest='abi_dir', type=str, help='Directory containing bytecode and abi')
|
argparser.add_argument('--abi-dir', dest='abi_dir', type=str, help='Directory containing bytecode and abi')
|
||||||
argparser.add_argument('--trace-queue-status', default=None, dest='trace_queue_status', action='store_true', help='set to perist all queue entry status changes to storage')
|
argparser.add_argument('--trace-queue-status', default=None, dest='trace_queue_status', action='store_true', help='set to perist all queue entry status changes to storage')
|
||||||
argparser.add_argument('-i', '--chain-spec', dest='i', type=str, help='chain spec')
|
argparser.add_argument('-i', '--chain-spec', dest='i', type=str, help='chain spec')
|
||||||
@@ -88,7 +81,6 @@ config.process()
|
|||||||
args_override = {
|
args_override = {
|
||||||
'CIC_CHAIN_SPEC': getattr(args, 'i'),
|
'CIC_CHAIN_SPEC': getattr(args, 'i'),
|
||||||
'CIC_REGISTRY_ADDRESS': getattr(args, 'r'),
|
'CIC_REGISTRY_ADDRESS': getattr(args, 'r'),
|
||||||
'CIC_DEFAULT_TOKEN_SYMBOL': getattr(args, 'default_token_symbol'),
|
|
||||||
'ETH_PROVIDER': getattr(args, 'p'),
|
'ETH_PROVIDER': getattr(args, 'p'),
|
||||||
'TASKS_TRACE_QUEUE_STATUS': getattr(args, 'trace_queue_status'),
|
'TASKS_TRACE_QUEUE_STATUS': getattr(args, 'trace_queue_status'),
|
||||||
}
|
}
|
||||||
@@ -98,15 +90,14 @@ config.censor('PASSWORD', 'DATABASE')
|
|||||||
config.censor('PASSWORD', 'SSL')
|
config.censor('PASSWORD', 'SSL')
|
||||||
logg.debug('config loaded from {}:\n{}'.format(args.c, config))
|
logg.debug('config loaded from {}:\n{}'.format(args.c, config))
|
||||||
|
|
||||||
health_modules = config.get('CIC_HEALTH_MODULES', [])
|
|
||||||
if len(health_modules) != 0:
|
|
||||||
health_modules = health_modules.split(',')
|
|
||||||
logg.debug('health mods {}'.format(health_modules))
|
|
||||||
|
|
||||||
# connect to database
|
# connect to database
|
||||||
dsn = dsn_from_config(config)
|
dsn = dsn_from_config(config)
|
||||||
SessionBase.connect(dsn, pool_size=int(config.get('DATABASE_POOL_SIZE')), debug=config.true('DATABASE_DEBUG'))
|
SessionBase.connect(dsn, pool_size=int(config.get('DATABASE_POOL_SIZE')), debug=config.true('DATABASE_DEBUG'))
|
||||||
|
|
||||||
|
# verify database connection with minimal sanity query
|
||||||
|
session = SessionBase.create_session()
|
||||||
|
session.execute('select version_num from alembic_version')
|
||||||
|
session.close()
|
||||||
|
|
||||||
# set up celery
|
# set up celery
|
||||||
current_app = celery.Celery(__name__)
|
current_app = celery.Celery(__name__)
|
||||||
@@ -144,15 +135,10 @@ else:
|
|||||||
|
|
||||||
chain_spec = ChainSpec.from_chain_str(config.get('CIC_CHAIN_SPEC'))
|
chain_spec = ChainSpec.from_chain_str(config.get('CIC_CHAIN_SPEC'))
|
||||||
RPCConnection.register_location(config.get('ETH_PROVIDER'), chain_spec, 'default')
|
RPCConnection.register_location(config.get('ETH_PROVIDER'), chain_spec, 'default')
|
||||||
#RPCConnection.register_location(config.get('SIGNER_SOCKET_PATH'), chain_spec, 'signer', constructor=EthUnixSignerConnection)
|
RPCConnection.register_location(config.get('SIGNER_SOCKET_PATH'), chain_spec, 'signer', constructor=EthUnixSignerConnection)
|
||||||
RPCConnection.register_location(config.get('SIGNER_SOCKET_PATH'), chain_spec, 'signer')
|
|
||||||
|
|
||||||
Otx.tracing = config.true('TASKS_TRACE_QUEUE_STATUS')
|
Otx.tracing = config.true('TASKS_TRACE_QUEUE_STATUS')
|
||||||
|
|
||||||
#import cic_eth.checks.gas
|
|
||||||
#if not cic_eth.checks.gas.health(config=config):
|
|
||||||
# raise RuntimeError()
|
|
||||||
liveness.linux.load(health_modules, rundir=config.get('CIC_RUN_DIR'), config=config)
|
|
||||||
|
|
||||||
def main():
|
def main():
|
||||||
argv = ['worker']
|
argv = ['worker']
|
||||||
@@ -176,11 +162,7 @@ def main():
|
|||||||
|
|
||||||
rpc = RPCConnection.connect(chain_spec, 'default')
|
rpc = RPCConnection.connect(chain_spec, 'default')
|
||||||
|
|
||||||
try:
|
connect_registry(rpc, chain_spec, config.get('CIC_REGISTRY_ADDRESS'))
|
||||||
registry = connect_registry(rpc, chain_spec, config.get('CIC_REGISTRY_ADDRESS'))
|
|
||||||
except UnknownContractError as e:
|
|
||||||
logg.exception('Registry contract connection failed for {}: {}'.format(config.get('CIC_REGISTRY_ADDRESS'), e))
|
|
||||||
sys.exit(1)
|
|
||||||
|
|
||||||
trusted_addresses_src = config.get('CIC_TRUST_ADDRESS')
|
trusted_addresses_src = config.get('CIC_TRUST_ADDRESS')
|
||||||
if trusted_addresses_src == None:
|
if trusted_addresses_src == None:
|
||||||
@@ -189,17 +171,10 @@ def main():
|
|||||||
trusted_addresses = trusted_addresses_src.split(',')
|
trusted_addresses = trusted_addresses_src.split(',')
|
||||||
for address in trusted_addresses:
|
for address in trusted_addresses:
|
||||||
logg.info('using trusted address {}'.format(address))
|
logg.info('using trusted address {}'.format(address))
|
||||||
|
|
||||||
connect_declarator(rpc, chain_spec, trusted_addresses)
|
connect_declarator(rpc, chain_spec, trusted_addresses)
|
||||||
connect_token_registry(rpc, chain_spec)
|
connect_token_registry(rpc, chain_spec)
|
||||||
|
|
||||||
BaseTask.default_token_symbol = config.get('CIC_DEFAULT_TOKEN_SYMBOL')
|
|
||||||
BaseTask.default_token_address = registry.by_name(BaseTask.default_token_symbol)
|
|
||||||
logg.info('default token set to {} {}'.format(BaseTask.default_token_symbol, BaseTask.default_token_address))
|
|
||||||
|
|
||||||
liveness.linux.set()
|
|
||||||
current_app.worker_main(argv)
|
current_app.worker_main(argv)
|
||||||
liveness.linux.reset()
|
|
||||||
|
|
||||||
|
|
||||||
@celery.signals.eventlet_pool_postshutdown.connect
|
@celery.signals.eventlet_pool_postshutdown.connect
|
||||||
|
|||||||
@@ -1,65 +0,0 @@
|
|||||||
#!python3
|
|
||||||
|
|
||||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
|
||||||
|
|
||||||
# standard imports
|
|
||||||
import logging
|
|
||||||
import argparse
|
|
||||||
import os
|
|
||||||
|
|
||||||
# external imports
|
|
||||||
import confini
|
|
||||||
import celery
|
|
||||||
|
|
||||||
# local imports
|
|
||||||
from cic_eth.api import Api
|
|
||||||
|
|
||||||
logging.basicConfig(level=logging.WARNING)
|
|
||||||
logg = logging.getLogger()
|
|
||||||
|
|
||||||
default_format = 'terminal'
|
|
||||||
default_config_dir = os.environ.get('CONFINI_DIR', '/usr/local/etc/cic')
|
|
||||||
|
|
||||||
|
|
||||||
argparser = argparse.ArgumentParser()
|
|
||||||
argparser.add_argument('-i', '--chain-spec', dest='i', type=str, help='chain spec')
|
|
||||||
argparser.add_argument('-c', type=str, default=default_config_dir, help='config root to use')
|
|
||||||
argparser.add_argument('-q', type=str, default='cic-eth', help='celery queue to submit transaction tasks to')
|
|
||||||
argparser.add_argument('--env-prefix', default=os.environ.get('CONFINI_ENV_PREFIX'), dest='env_prefix', type=str, help='environment prefix for variables to overwrite configuration')
|
|
||||||
argparser.add_argument('-v', action='store_true', help='Be verbose')
|
|
||||||
argparser.add_argument('-vv', help='be more verbose', action='store_true')
|
|
||||||
args = argparser.parse_args()
|
|
||||||
|
|
||||||
if args.v == True:
|
|
||||||
logging.getLogger().setLevel(logging.INFO)
|
|
||||||
elif args.vv == True:
|
|
||||||
logging.getLogger().setLevel(logging.DEBUG)
|
|
||||||
|
|
||||||
config_dir = os.path.join(args.c)
|
|
||||||
os.makedirs(config_dir, 0o777, True)
|
|
||||||
config = confini.Config(config_dir, args.env_prefix)
|
|
||||||
config.process()
|
|
||||||
args_override = {
|
|
||||||
'CIC_CHAIN_SPEC': getattr(args, 'i'),
|
|
||||||
}
|
|
||||||
config.dict_override(args_override, 'cli args')
|
|
||||||
config.censor('PASSWORD', 'DATABASE')
|
|
||||||
config.censor('PASSWORD', 'SSL')
|
|
||||||
logg.debug('config loaded from {}:\n{}'.format(config_dir, config))
|
|
||||||
|
|
||||||
|
|
||||||
celery_app = celery.Celery(broker=config.get('CELERY_BROKER_URL'), backend=config.get('CELERY_RESULT_URL'))
|
|
||||||
|
|
||||||
queue = args.q
|
|
||||||
|
|
||||||
api = Api(config.get('CIC_CHAIN_SPEC'), queue=queue)
|
|
||||||
|
|
||||||
def main():
|
|
||||||
t = api.default_token()
|
|
||||||
token_info = t.get()
|
|
||||||
print('Default token symbol: {}'.format(token_info['symbol']))
|
|
||||||
print('Default token address: {}'.format(token_info['address']))
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
|
||||||
main()
|
|
||||||
@@ -29,8 +29,6 @@ class BaseTask(celery.Task):
|
|||||||
call_address = ZERO_ADDRESS
|
call_address = ZERO_ADDRESS
|
||||||
create_nonce_oracle = RPCNonceOracle
|
create_nonce_oracle = RPCNonceOracle
|
||||||
create_gas_oracle = RPCGasOracle
|
create_gas_oracle = RPCGasOracle
|
||||||
default_token_address = None
|
|
||||||
default_token_symbol = None
|
|
||||||
|
|
||||||
def create_session(self):
|
def create_session(self):
|
||||||
return BaseTask.session_func()
|
return BaseTask.session_func()
|
||||||
@@ -96,8 +94,3 @@ class CriticalWeb3AndSignerTask(CriticalTask):
|
|||||||
def hello(self):
|
def hello(self):
|
||||||
time.sleep(0.1)
|
time.sleep(0.1)
|
||||||
return id(SessionBase.create_session)
|
return id(SessionBase.create_session)
|
||||||
|
|
||||||
|
|
||||||
@celery_app.task()
|
|
||||||
def check_health(self):
|
|
||||||
celery.app.control.shutdown()
|
|
||||||
|
|||||||
@@ -10,7 +10,7 @@ version = (
|
|||||||
0,
|
0,
|
||||||
11,
|
11,
|
||||||
0,
|
0,
|
||||||
'beta.9',
|
'beta.6',
|
||||||
)
|
)
|
||||||
|
|
||||||
version_object = semver.VersionInfo(
|
version_object = semver.VersionInfo(
|
||||||
|
|||||||
@@ -3,6 +3,3 @@ registry_address =
|
|||||||
chain_spec = evm:bloxberg:8996
|
chain_spec = evm:bloxberg:8996
|
||||||
tx_retry_delay =
|
tx_retry_delay =
|
||||||
trust_address =
|
trust_address =
|
||||||
default_token_symbol = GFT
|
|
||||||
health_modules = cic_eth.check.db,cic_eth.check.signer,cic_eth.check.gas
|
|
||||||
run_dir = /run
|
|
||||||
|
|||||||
@@ -3,6 +3,3 @@ registry_address =
|
|||||||
chain_spec = evm:bloxberg:8996
|
chain_spec = evm:bloxberg:8996
|
||||||
trust_address = 0xEb3907eCad74a0013c259D5874AE7f22DcBcC95C
|
trust_address = 0xEb3907eCad74a0013c259D5874AE7f22DcBcC95C
|
||||||
tx_retry_delay = 20
|
tx_retry_delay = 20
|
||||||
default_token_symbol = GFT
|
|
||||||
health_modules = cic_eth.check.db,cic_eth.check.signer,cic_eth.check.gas
|
|
||||||
run_dir = /run
|
|
||||||
|
|||||||
@@ -1,3 +1,8 @@
|
|||||||
[eth]
|
[eth]
|
||||||
|
#ws_provider = ws://localhost:8546
|
||||||
|
#ttp_provider = http://localhost:8545
|
||||||
provider = http://localhost:63545
|
provider = http://localhost:63545
|
||||||
gas_gifter_minimum_balance = 10000000000000000000000
|
gas_provider_address =
|
||||||
|
#chain_id =
|
||||||
|
abi_dir = /home/lash/src/ext/cic/grassrootseconomics/cic-contracts/abis
|
||||||
|
account_accounts_index_writer =
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
[signer]
|
[signer]
|
||||||
socket_path = ipc:///tmp/crypto-dev-signer/jsonrpc.ipc
|
socket_path = /tmp/crypto-dev-signer/jsonrpc.ipc
|
||||||
secret = deedbeef
|
secret = deedbeef
|
||||||
database_name = signer_test
|
database_name = signer_test
|
||||||
dev_keys_path =
|
dev_keys_path =
|
||||||
|
|||||||
@@ -1,3 +1,8 @@
|
|||||||
[eth]
|
[eth]
|
||||||
|
#ws_provider = ws://localhost:8546
|
||||||
|
#ttp_provider = http://localhost:8545
|
||||||
provider = http://localhost:8545
|
provider = http://localhost:8545
|
||||||
gas_gifter_minimum_balance = 10000000000000000000000
|
gas_provider_address =
|
||||||
|
#chain_id =
|
||||||
|
abi_dir = /usr/local/share/cic/solidity/abi
|
||||||
|
account_accounts_index_writer =
|
||||||
|
|||||||
@@ -53,5 +53,3 @@ COPY cic-eth/crypto_dev_signer_config/ /usr/local/etc/crypto-dev-signer/
|
|||||||
RUN git clone https://gitlab.com/grassrootseconomics/cic-contracts.git && \
|
RUN git clone https://gitlab.com/grassrootseconomics/cic-contracts.git && \
|
||||||
mkdir -p /usr/local/share/cic/solidity && \
|
mkdir -p /usr/local/share/cic/solidity && \
|
||||||
cp -R cic-contracts/abis /usr/local/share/cic/solidity/abi
|
cp -R cic-contracts/abis /usr/local/share/cic/solidity/abi
|
||||||
|
|
||||||
COPY util/liveness/health.sh /usr/local/bin/health.sh
|
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
cic-base==0.1.2b1
|
cic-base~=0.1.2a76
|
||||||
celery==4.4.7
|
celery==4.4.7
|
||||||
crypto-dev-signer~=0.4.14b3
|
crypto-dev-signer~=0.4.14b2
|
||||||
confini~=0.3.6rc3
|
confini~=0.3.6rc3
|
||||||
cic-eth-registry~=0.5.4a16
|
cic-eth-registry~=0.5.4a16
|
||||||
#cic-bancor~=0.0.6
|
#cic-bancor~=0.0.6
|
||||||
|
|||||||
@@ -38,7 +38,6 @@ packages =
|
|||||||
cic_eth.runnable.daemons.filters
|
cic_eth.runnable.daemons.filters
|
||||||
cic_eth.callbacks
|
cic_eth.callbacks
|
||||||
cic_eth.sync
|
cic_eth.sync
|
||||||
cic_eth.check
|
|
||||||
scripts =
|
scripts =
|
||||||
./scripts/migrate.py
|
./scripts/migrate.py
|
||||||
|
|
||||||
@@ -53,7 +52,6 @@ console_scripts =
|
|||||||
cic-eth-create = cic_eth.runnable.create:main
|
cic-eth-create = cic_eth.runnable.create:main
|
||||||
cic-eth-inspect = cic_eth.runnable.view:main
|
cic-eth-inspect = cic_eth.runnable.view:main
|
||||||
cic-eth-ctl = cic_eth.runnable.ctrl:main
|
cic-eth-ctl = cic_eth.runnable.ctrl:main
|
||||||
cic-eth-info = cic_eth.runnable.info:main
|
|
||||||
# TODO: Merge this with ctl when subcmds sorted to submodules
|
# TODO: Merge this with ctl when subcmds sorted to submodules
|
||||||
cic-eth-tag = cic_eth.runnable.tag:main
|
cic-eth-tag = cic_eth.runnable.tag:main
|
||||||
cic-eth-resend = cic_eth.runnable.resend:main
|
cic-eth-resend = cic_eth.runnable.resend:main
|
||||||
|
|||||||
@@ -3,12 +3,8 @@ import os
|
|||||||
import sys
|
import sys
|
||||||
import logging
|
import logging
|
||||||
|
|
||||||
# external imports
|
|
||||||
from chainlib.eth.erc20 import ERC20
|
|
||||||
|
|
||||||
# local imports
|
# local imports
|
||||||
from cic_eth.api import Api
|
from cic_eth.api import Api
|
||||||
from cic_eth.task import BaseTask
|
|
||||||
|
|
||||||
script_dir = os.path.dirname(os.path.realpath(__file__))
|
script_dir = os.path.dirname(os.path.realpath(__file__))
|
||||||
root_dir = os.path.dirname(script_dir)
|
root_dir = os.path.dirname(script_dir)
|
||||||
@@ -32,26 +28,3 @@ def api(
|
|||||||
):
|
):
|
||||||
chain_str = str(default_chain_spec)
|
chain_str = str(default_chain_spec)
|
||||||
return Api(chain_str, queue=None, callback_param='foo')
|
return Api(chain_str, queue=None, callback_param='foo')
|
||||||
|
|
||||||
|
|
||||||
@pytest.fixture(scope='function')
|
|
||||||
def foo_token_symbol(
|
|
||||||
default_chain_spec,
|
|
||||||
foo_token,
|
|
||||||
eth_rpc,
|
|
||||||
contract_roles,
|
|
||||||
):
|
|
||||||
|
|
||||||
c = ERC20(default_chain_spec)
|
|
||||||
o = c.symbol(foo_token, sender_address=contract_roles['CONTRACT_DEPLOYER'])
|
|
||||||
r = eth_rpc.do(o)
|
|
||||||
return c.parse_symbol(r)
|
|
||||||
|
|
||||||
|
|
||||||
@pytest.fixture(scope='function')
|
|
||||||
def default_token(
|
|
||||||
foo_token,
|
|
||||||
foo_token_symbol,
|
|
||||||
):
|
|
||||||
BaseTask.default_token_symbol = foo_token_symbol
|
|
||||||
BaseTask.default_token_address = foo_token
|
|
||||||
|
|||||||
@@ -34,7 +34,6 @@ def celery_includes():
|
|||||||
'cic_eth.admin.ctrl',
|
'cic_eth.admin.ctrl',
|
||||||
'cic_eth.admin.nonce',
|
'cic_eth.admin.nonce',
|
||||||
'cic_eth.admin.debug',
|
'cic_eth.admin.debug',
|
||||||
'cic_eth.admin.token',
|
|
||||||
'cic_eth.eth.account',
|
'cic_eth.eth.account',
|
||||||
'cic_eth.callbacks.noop',
|
'cic_eth.callbacks.noop',
|
||||||
'cic_eth.callbacks.http',
|
'cic_eth.callbacks.http',
|
||||||
|
|||||||
@@ -1,21 +0,0 @@
|
|||||||
# external imports
|
|
||||||
import celery
|
|
||||||
|
|
||||||
|
|
||||||
def test_default_token(
|
|
||||||
default_token,
|
|
||||||
celery_session_worker,
|
|
||||||
foo_token,
|
|
||||||
foo_token_symbol,
|
|
||||||
):
|
|
||||||
|
|
||||||
s = celery.signature(
|
|
||||||
'cic_eth.admin.token.default_token',
|
|
||||||
[],
|
|
||||||
queue=None,
|
|
||||||
)
|
|
||||||
t = s.apply_async()
|
|
||||||
r = t.get()
|
|
||||||
|
|
||||||
assert r['address'] == foo_token
|
|
||||||
assert r['symbol'] == foo_token_symbol
|
|
||||||
1
apps/cic-meta/.gitignore
vendored
1
apps/cic-meta/.gitignore
vendored
@@ -3,4 +3,3 @@ dist
|
|||||||
dist-web
|
dist-web
|
||||||
dist-server
|
dist-server
|
||||||
scratch
|
scratch
|
||||||
tests
|
|
||||||
|
|||||||
101
apps/cic-meta/package-lock.json
generated
101
apps/cic-meta/package-lock.json
generated
@@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"name": "cic-client-meta",
|
"name": "cic-client-meta",
|
||||||
"version": "0.0.7-alpha.2",
|
"version": "0.0.7-alpha.7",
|
||||||
"lockfileVersion": 1,
|
"lockfileVersion": 1,
|
||||||
"requires": true,
|
"requires": true,
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
@@ -852,6 +852,75 @@
|
|||||||
"printj": "~1.1.0"
|
"printj": "~1.1.0"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"crdt-meta": {
|
||||||
|
"version": "0.0.8",
|
||||||
|
"resolved": "https://registry.npmjs.org/crdt-meta/-/crdt-meta-0.0.8.tgz",
|
||||||
|
"integrity": "sha512-CS0sS0L2QWthz7vmu6vzl3p4kcpJ+IKILBJ4tbgN4A3iNG8wnBeuDIv/z3KFFQjcfuP4QAh6E9LywKUTxtDc3g==",
|
||||||
|
"requires": {
|
||||||
|
"automerge": "^0.14.2",
|
||||||
|
"ini": "^1.3.8",
|
||||||
|
"openpgp": "^4.10.8",
|
||||||
|
"pg": "^8.5.1",
|
||||||
|
"sqlite3": "^5.0.2"
|
||||||
|
},
|
||||||
|
"dependencies": {
|
||||||
|
"automerge": {
|
||||||
|
"version": "0.14.2",
|
||||||
|
"resolved": "https://registry.npmjs.org/automerge/-/automerge-0.14.2.tgz",
|
||||||
|
"integrity": "sha512-shiwuJHCbNRI23WZyIECLV4Ovf3WiAFJ7P9BH4l5gON1In/UUbjcSJKRygtIirObw2UQumeYxp3F2XBdSvQHnA==",
|
||||||
|
"requires": {
|
||||||
|
"immutable": "^3.8.2",
|
||||||
|
"transit-immutable-js": "^0.7.0",
|
||||||
|
"transit-js": "^0.8.861",
|
||||||
|
"uuid": "^3.4.0"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"node-addon-api": {
|
||||||
|
"version": "3.1.0",
|
||||||
|
"resolved": "https://registry.npmjs.org/node-addon-api/-/node-addon-api-3.1.0.tgz",
|
||||||
|
"integrity": "sha512-flmrDNB06LIl5lywUz7YlNGZH/5p0M7W28k8hzd9Lshtdh1wshD2Y+U4h9LD6KObOy1f+fEVdgprPrEymjM5uw=="
|
||||||
|
},
|
||||||
|
"pg": {
|
||||||
|
"version": "8.6.0",
|
||||||
|
"resolved": "https://registry.npmjs.org/pg/-/pg-8.6.0.tgz",
|
||||||
|
"integrity": "sha512-qNS9u61lqljTDFvmk/N66EeGq3n6Ujzj0FFyNMGQr6XuEv4tgNTXvJQTfJdcvGit5p5/DWPu+wj920hAJFI+QQ==",
|
||||||
|
"requires": {
|
||||||
|
"buffer-writer": "2.0.0",
|
||||||
|
"packet-reader": "1.0.0",
|
||||||
|
"pg-connection-string": "^2.5.0",
|
||||||
|
"pg-pool": "^3.3.0",
|
||||||
|
"pg-protocol": "^1.5.0",
|
||||||
|
"pg-types": "^2.1.0",
|
||||||
|
"pgpass": "1.x"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"pg-connection-string": {
|
||||||
|
"version": "2.5.0",
|
||||||
|
"resolved": "https://registry.npmjs.org/pg-connection-string/-/pg-connection-string-2.5.0.tgz",
|
||||||
|
"integrity": "sha512-r5o/V/ORTA6TmUnyWZR9nCj1klXCO2CEKNRlVuJptZe85QuhFayC7WeMic7ndayT5IRIR0S0xFxFi2ousartlQ=="
|
||||||
|
},
|
||||||
|
"pg-pool": {
|
||||||
|
"version": "3.3.0",
|
||||||
|
"resolved": "https://registry.npmjs.org/pg-pool/-/pg-pool-3.3.0.tgz",
|
||||||
|
"integrity": "sha512-0O5huCql8/D6PIRFAlmccjphLYWC+JIzvUhSzXSpGaf+tjTZc4nn+Lr7mLXBbFJfvwbP0ywDv73EiaBsxn7zdg=="
|
||||||
|
},
|
||||||
|
"pg-protocol": {
|
||||||
|
"version": "1.5.0",
|
||||||
|
"resolved": "https://registry.npmjs.org/pg-protocol/-/pg-protocol-1.5.0.tgz",
|
||||||
|
"integrity": "sha512-muRttij7H8TqRNu/DxrAJQITO4Ac7RmX3Klyr/9mJEOBeIpgnF8f9jAfRz5d3XwQZl5qBjF9gLsUtMPJE0vezQ=="
|
||||||
|
},
|
||||||
|
"sqlite3": {
|
||||||
|
"version": "5.0.2",
|
||||||
|
"resolved": "https://registry.npmjs.org/sqlite3/-/sqlite3-5.0.2.tgz",
|
||||||
|
"integrity": "sha512-1SdTNo+BVU211Xj1csWa8lV6KM0CtucDwRyA0VHl91wEH1Mgh7RxUpI4rVvG7OhHrzCSGaVyW5g8vKvlrk9DJA==",
|
||||||
|
"requires": {
|
||||||
|
"node-addon-api": "^3.0.0",
|
||||||
|
"node-gyp": "3.x",
|
||||||
|
"node-pre-gyp": "^0.11.0"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
"create-hash": {
|
"create-hash": {
|
||||||
"version": "1.2.0",
|
"version": "1.2.0",
|
||||||
"resolved": "https://registry.npmjs.org/create-hash/-/create-hash-1.2.0.tgz",
|
"resolved": "https://registry.npmjs.org/create-hash/-/create-hash-1.2.0.tgz",
|
||||||
@@ -966,17 +1035,17 @@
|
|||||||
"dev": true
|
"dev": true
|
||||||
},
|
},
|
||||||
"elliptic": {
|
"elliptic": {
|
||||||
"version": "6.5.3",
|
"version": "6.5.4",
|
||||||
"resolved": "https://registry.npmjs.org/elliptic/-/elliptic-6.5.3.tgz",
|
"resolved": "https://registry.npmjs.org/elliptic/-/elliptic-6.5.4.tgz",
|
||||||
"integrity": "sha512-IMqzv5wNQf+E6aHeIqATs0tOLeOTwj1QKbRcS3jBbYkl5oLAserA8yJTT7/VyHUYG91PRmPyeQDObKLPpeS4dw==",
|
"integrity": "sha512-iLhC6ULemrljPZb+QutR5TQGB+pdW6KGD5RSegS+8sorOZT+rdQFbsQFJgvN3eRqNALqJer4oQ16YvJHlU8hzQ==",
|
||||||
"requires": {
|
"requires": {
|
||||||
"bn.js": "^4.4.0",
|
"bn.js": "^4.11.9",
|
||||||
"brorand": "^1.0.1",
|
"brorand": "^1.1.0",
|
||||||
"hash.js": "^1.0.0",
|
"hash.js": "^1.0.0",
|
||||||
"hmac-drbg": "^1.0.0",
|
"hmac-drbg": "^1.0.1",
|
||||||
"inherits": "^2.0.1",
|
"inherits": "^2.0.4",
|
||||||
"minimalistic-assert": "^1.0.0",
|
"minimalistic-assert": "^1.0.1",
|
||||||
"minimalistic-crypto-utils": "^1.0.0"
|
"minimalistic-crypto-utils": "^1.0.1"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"emoji-regex": {
|
"emoji-regex": {
|
||||||
@@ -1489,9 +1558,9 @@
|
|||||||
"integrity": "sha512-k/vGaX4/Yla3WzyMCvTQOXYeIHvqOKtnqBduzTHpzpQZzAskKMhZ2K+EnBiSM9zGSoIFeMpXKxa4dYeZIQqewQ=="
|
"integrity": "sha512-k/vGaX4/Yla3WzyMCvTQOXYeIHvqOKtnqBduzTHpzpQZzAskKMhZ2K+EnBiSM9zGSoIFeMpXKxa4dYeZIQqewQ=="
|
||||||
},
|
},
|
||||||
"ini": {
|
"ini": {
|
||||||
"version": "1.3.5",
|
"version": "1.3.8",
|
||||||
"resolved": "https://registry.npmjs.org/ini/-/ini-1.3.5.tgz",
|
"resolved": "https://registry.npmjs.org/ini/-/ini-1.3.8.tgz",
|
||||||
"integrity": "sha512-RZY5huIKCMRWDUqZlEi72f/lmXKMvuszcMBduliQ3nnWbx9X/ZBQO7DijMEYS9EhHBb2qacRUMtC7svLwe0lcw=="
|
"integrity": "sha512-JV/yugV2uzW5iMRSiZAyDtQd+nxtUnjeLt0acNdw98kKLrvuRVyB80tsREOE7yvGVgalhZ6RNXCmEHkUKBKxew=="
|
||||||
},
|
},
|
||||||
"interpret": {
|
"interpret": {
|
||||||
"version": "2.2.0",
|
"version": "2.2.0",
|
||||||
@@ -1957,9 +2026,9 @@
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
"y18n": {
|
"y18n": {
|
||||||
"version": "4.0.0",
|
"version": "4.0.3",
|
||||||
"resolved": "https://registry.npmjs.org/y18n/-/y18n-4.0.0.tgz",
|
"resolved": "https://registry.npmjs.org/y18n/-/y18n-4.0.3.tgz",
|
||||||
"integrity": "sha512-r9S/ZyXu/Xu9q1tYlpsLIsa3EeLXXk0VwlxqTcFRfg9EhMW+17kbt9G0NrgCmhGb5vT2hyhJZLfDGx+7+5Uj/w==",
|
"integrity": "sha512-JKhqTOwSrqNA1NY5lSztJ1GrBiUodLMmIZuLiDaMRJ+itFd+ABVE8XBjOvIWL+rSqNDC74LCSFmlb/U4UZ4hJQ==",
|
||||||
"dev": true
|
"dev": true
|
||||||
},
|
},
|
||||||
"yargs": {
|
"yargs": {
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"name": "cic-client-meta",
|
"name": "cic-client-meta",
|
||||||
"version": "0.0.7-alpha.6",
|
"version": "0.0.7-alpha.8",
|
||||||
"description": "Signed CRDT metadata graphs for the CIC network",
|
"description": "Signed CRDT metadata graphs for the CIC network",
|
||||||
"main": "dist/index.js",
|
"main": "dist/index.js",
|
||||||
"types": "dist/index.d.ts",
|
"types": "dist/index.d.ts",
|
||||||
@@ -15,8 +15,9 @@
|
|||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@ethereumjs/tx": "^3.0.0-beta.1",
|
"@ethereumjs/tx": "^3.0.0-beta.1",
|
||||||
"automerge": "^0.14.1",
|
"automerge": "^0.14.1",
|
||||||
|
"crdt-meta": "0.0.8",
|
||||||
"ethereumjs-wallet": "^1.0.1",
|
"ethereumjs-wallet": "^1.0.1",
|
||||||
"ini": "^1.3.5",
|
"ini": "^1.3.8",
|
||||||
"openpgp": "^4.10.8",
|
"openpgp": "^4.10.8",
|
||||||
"pg": "^8.4.2",
|
"pg": "^8.4.2",
|
||||||
"sqlite3": "^5.0.0",
|
"sqlite3": "^5.0.0",
|
||||||
@@ -40,6 +41,6 @@
|
|||||||
],
|
],
|
||||||
"license": "GPL-3.0-or-later",
|
"license": "GPL-3.0-or-later",
|
||||||
"engines": {
|
"engines": {
|
||||||
"node": "~14.16.1"
|
"node": ">=14.16.1"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
const config = require('./src/config');
|
import { Config } from 'crdt-meta';
|
||||||
const fs = require('fs');
|
const fs = require('fs');
|
||||||
|
|
||||||
if (process.argv[2] === undefined) {
|
if (process.argv[2] === undefined) {
|
||||||
@@ -15,6 +15,6 @@ try {
|
|||||||
process.exit(1);
|
process.exit(1);
|
||||||
}
|
}
|
||||||
|
|
||||||
const c = new config.Config(process.argv[2], process.env['CONFINI_ENV_PREFIX']);
|
const c = new Config(process.argv[2], process.env['CONFINI_ENV_PREFIX']);
|
||||||
c.process();
|
c.process();
|
||||||
process.stdout.write(c.toString());
|
process.stdout.write(c.toString());
|
||||||
|
|||||||
@@ -1,8 +1,7 @@
|
|||||||
import * as Automerge from 'automerge';
|
import * as Automerge from 'automerge';
|
||||||
import * as pgp from 'openpgp';
|
import * as pgp from 'openpgp';
|
||||||
import * as pg from 'pg';
|
|
||||||
|
|
||||||
import { Envelope, Syncable } from '../../src/sync';
|
import { Envelope, Syncable } from 'crdt-meta';
|
||||||
|
|
||||||
|
|
||||||
function handleNoMergeGet(db, digest, keystore) {
|
function handleNoMergeGet(db, digest, keystore) {
|
||||||
|
|||||||
@@ -1,15 +1,11 @@
|
|||||||
import * as http from 'http';
|
import * as http from 'http';
|
||||||
import * as fs from 'fs';
|
import * as fs from 'fs';
|
||||||
import * as path from 'path';
|
import * as path from 'path';
|
||||||
import * as pgp from 'openpgp';
|
|
||||||
|
|
||||||
import * as handlers from './handlers';
|
import * as handlers from './handlers';
|
||||||
import { Envelope, Syncable } from '../../src/sync';
|
import { PGPKeyStore, PGPSigner, Config, SqliteAdapter, PostgresAdapter } from 'crdt-meta';
|
||||||
import { PGPKeyStore, PGPSigner } from '../../src/auth';
|
|
||||||
|
|
||||||
import { standardArgs } from './args';
|
import { standardArgs } from './args';
|
||||||
import { Config } from '../../src/config';
|
|
||||||
import { SqliteAdapter, PostgresAdapter } from '../../src/db';
|
|
||||||
|
|
||||||
let configPath = '/usr/local/etc/cic-meta';
|
let configPath = '/usr/local/etc/cic-meta';
|
||||||
|
|
||||||
|
|||||||
@@ -1,191 +0,0 @@
|
|||||||
import * as pgp from 'openpgp';
|
|
||||||
import * as crypto from 'crypto';
|
|
||||||
|
|
||||||
interface Signable {
|
|
||||||
digest():string;
|
|
||||||
}
|
|
||||||
|
|
||||||
type KeyGetter = () => any;
|
|
||||||
|
|
||||||
type Signature = {
|
|
||||||
engine:string
|
|
||||||
algo:string
|
|
||||||
data:string
|
|
||||||
digest:string
|
|
||||||
}
|
|
||||||
|
|
||||||
interface Signer {
|
|
||||||
prepare(Signable):boolean;
|
|
||||||
onsign(Signature):void;
|
|
||||||
onverify(boolean):void;
|
|
||||||
sign(digest:string):void
|
|
||||||
verify(digest:string, signature:Signature):void
|
|
||||||
fingerprint():string
|
|
||||||
}
|
|
||||||
|
|
||||||
interface Authoritative {
|
|
||||||
}
|
|
||||||
|
|
||||||
interface KeyStore {
|
|
||||||
getPrivateKey: KeyGetter
|
|
||||||
getFingerprint: () => string
|
|
||||||
getTrustedKeys: () => Array<any>
|
|
||||||
getTrustedActiveKeys: () => Array<any>
|
|
||||||
getEncryptKeys: () => Array<any>
|
|
||||||
}
|
|
||||||
|
|
||||||
class PGPKeyStore implements KeyStore {
|
|
||||||
|
|
||||||
fingerprint: string
|
|
||||||
pk: any
|
|
||||||
|
|
||||||
pubk = {
|
|
||||||
active: [],
|
|
||||||
trusted: [],
|
|
||||||
encrypt: [],
|
|
||||||
}
|
|
||||||
loads = 0x00;
|
|
||||||
loadsTarget = 0x0f;
|
|
||||||
onload: (k:KeyStore) => void;
|
|
||||||
|
|
||||||
constructor(passphrase:string, pkArmor:string, pubkActiveArmor:string, pubkTrustedArmor:string, pubkEncryptArmor:string, onload = (ks:KeyStore) => {}) {
|
|
||||||
this._readKey(pkArmor, undefined, 1, passphrase);
|
|
||||||
this._readKey(pubkActiveArmor, 'active', 2);
|
|
||||||
this._readKey(pubkTrustedArmor, 'trusted', 4);
|
|
||||||
this._readKey(pubkEncryptArmor, 'encrypt', 8);
|
|
||||||
this.onload = onload;
|
|
||||||
}
|
|
||||||
|
|
||||||
private _readKey(a:string, x:any, n:number, pass?:string) {
|
|
||||||
pgp.key.readArmored(a).then((k) => {
|
|
||||||
if (pass !== undefined) {
|
|
||||||
this.pk = k.keys[0];
|
|
||||||
this.pk.decrypt(pass).then(() => {
|
|
||||||
this.fingerprint = this.pk.getFingerprint();
|
|
||||||
console.log('private key (sign)', this.fingerprint);
|
|
||||||
this._registerLoad(n);
|
|
||||||
});
|
|
||||||
} else {
|
|
||||||
this.pubk[x] = k.keys;
|
|
||||||
k.keys.forEach((pubk) => {
|
|
||||||
console.log('public key (' + x + ')', pubk.getFingerprint());
|
|
||||||
});
|
|
||||||
this._registerLoad(n);
|
|
||||||
}
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
private _registerLoad(b:number) {
|
|
||||||
this.loads |= b;
|
|
||||||
if (this.loads == this.loadsTarget) {
|
|
||||||
this.onload(this);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
public getTrustedKeys(): Array<any> {
|
|
||||||
return this.pubk['trusted'];
|
|
||||||
}
|
|
||||||
|
|
||||||
public getTrustedActiveKeys(): Array<any> {
|
|
||||||
return this.pubk['active'];
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
public getEncryptKeys(): Array<any> {
|
|
||||||
return this.pubk['encrypt'];
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
public getPrivateKey(): any {
|
|
||||||
return this.pk;
|
|
||||||
}
|
|
||||||
|
|
||||||
public getFingerprint(): string {
|
|
||||||
return this.fingerprint;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
class PGPSigner implements Signer {
|
|
||||||
|
|
||||||
engine = 'pgp'
|
|
||||||
algo = 'sha256'
|
|
||||||
dgst: string
|
|
||||||
signature: Signature
|
|
||||||
keyStore: KeyStore
|
|
||||||
onsign: (Signature) => void
|
|
||||||
onverify: (boolean) => void
|
|
||||||
|
|
||||||
constructor(keyStore:KeyStore) {
|
|
||||||
this.keyStore = keyStore
|
|
||||||
this.onsign = (string) => {};
|
|
||||||
this.onverify = (boolean) => {};
|
|
||||||
}
|
|
||||||
|
|
||||||
public fingerprint(): string {
|
|
||||||
return this.keyStore.getFingerprint();
|
|
||||||
}
|
|
||||||
|
|
||||||
public prepare(material:Signable):boolean {
|
|
||||||
this.dgst = material.digest();
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
public verify(digest:string, signature:Signature) {
|
|
||||||
pgp.signature.readArmored(signature.data).then((s) => {
|
|
||||||
const opts = {
|
|
||||||
message: pgp.cleartext.fromText(digest),
|
|
||||||
publicKeys: this.keyStore.getTrustedKeys(),
|
|
||||||
signature: s,
|
|
||||||
};
|
|
||||||
pgp.verify(opts).then((v) => {
|
|
||||||
let i = 0;
|
|
||||||
for (i = 0; i < v.signatures.length; i++) {
|
|
||||||
const s = v.signatures[i];
|
|
||||||
if (s.valid) {
|
|
||||||
this.onverify(s);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
console.error('checked ' + i + ' signature(s) but none valid');
|
|
||||||
this.onverify(false);
|
|
||||||
});
|
|
||||||
}).catch((e) => {
|
|
||||||
console.error(e);
|
|
||||||
this.onverify(false);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
public sign(digest:string) {
|
|
||||||
const m = pgp.cleartext.fromText(digest);
|
|
||||||
const pk = this.keyStore.getPrivateKey();
|
|
||||||
const opts = {
|
|
||||||
message: m,
|
|
||||||
privateKeys: [pk],
|
|
||||||
detached: true,
|
|
||||||
}
|
|
||||||
pgp.sign(opts).then((s) => {
|
|
||||||
this.signature = {
|
|
||||||
engine: this.engine,
|
|
||||||
algo: this.algo,
|
|
||||||
data: s.signature,
|
|
||||||
// TODO: fix for browser later
|
|
||||||
digest: digest,
|
|
||||||
};
|
|
||||||
this.onsign(this.signature);
|
|
||||||
}).catch((e) => {
|
|
||||||
console.error(e);
|
|
||||||
this.onsign(undefined);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
export {
|
|
||||||
Signature,
|
|
||||||
Authoritative,
|
|
||||||
Signer,
|
|
||||||
KeyGetter,
|
|
||||||
Signable,
|
|
||||||
KeyStore,
|
|
||||||
PGPSigner,
|
|
||||||
PGPKeyStore,
|
|
||||||
};
|
|
||||||
@@ -1,71 +0,0 @@
|
|||||||
import * as fs from 'fs';
|
|
||||||
import * as ini from 'ini';
|
|
||||||
import * as path from 'path';
|
|
||||||
|
|
||||||
class Config {
|
|
||||||
|
|
||||||
filepath: string
|
|
||||||
store: Object
|
|
||||||
censor: Array<string>
|
|
||||||
require: Array<string>
|
|
||||||
env_prefix: string
|
|
||||||
|
|
||||||
constructor(filepath:string, env_prefix?:string) {
|
|
||||||
this.filepath = filepath;
|
|
||||||
this.store = {};
|
|
||||||
this.censor = [];
|
|
||||||
this.require = [];
|
|
||||||
this.env_prefix = '';
|
|
||||||
if (env_prefix !== undefined) {
|
|
||||||
this.env_prefix = env_prefix + "_";
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
public process() {
|
|
||||||
const d = fs.readdirSync(this.filepath);
|
|
||||||
|
|
||||||
const r = /.*\.ini$/;
|
|
||||||
for (let i = 0; i < d.length; i++) {
|
|
||||||
const f = d[i];
|
|
||||||
if (!f.match(r)) {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
const fp = path.join(this.filepath, f);
|
|
||||||
const v = fs.readFileSync(fp, 'utf-8');
|
|
||||||
const inid = ini.decode(v);
|
|
||||||
const inik = Object.keys(inid);
|
|
||||||
for (let j = 0; j < inik.length; j++) {
|
|
||||||
const k_section = inik[j]
|
|
||||||
const k = k_section.toUpperCase();
|
|
||||||
Object.keys(inid[k_section]).forEach((k_directive) => {
|
|
||||||
const kk = k_directive.toUpperCase();
|
|
||||||
const kkk = k + '_' + kk;
|
|
||||||
|
|
||||||
let r = inid[k_section][k_directive];
|
|
||||||
const k_env = this.env_prefix + kkk
|
|
||||||
const env = process.env[k_env];
|
|
||||||
if (env !== undefined) {
|
|
||||||
console.debug('Environment variable ' + k_env + ' overrides ' + kkk);
|
|
||||||
r = env;
|
|
||||||
}
|
|
||||||
this.store[kkk] = r;
|
|
||||||
});
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
public get(s:string) {
|
|
||||||
return this.store[s];
|
|
||||||
}
|
|
||||||
|
|
||||||
public toString() {
|
|
||||||
let s = '';
|
|
||||||
Object.keys(this.store).forEach((k) => {
|
|
||||||
s += k + '=' + this.store[k] + '\n';
|
|
||||||
});
|
|
||||||
return s;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
export { Config };
|
|
||||||
@@ -1,38 +0,0 @@
|
|||||||
import { JSONSerializable } from './format';
|
|
||||||
|
|
||||||
const ENGINE_NAME = 'automerge';
|
|
||||||
const ENGINE_VERSION = '0.14.1';
|
|
||||||
|
|
||||||
const NETWORK_NAME = 'cic';
|
|
||||||
const NETWORK_VERSION = '1';
|
|
||||||
|
|
||||||
const CRYPTO_NAME = 'pgp';
|
|
||||||
const CRYPTO_VERSION = '2';
|
|
||||||
|
|
||||||
type VersionedSpec = {
|
|
||||||
name: string
|
|
||||||
version: string
|
|
||||||
ext?: Object
|
|
||||||
}
|
|
||||||
|
|
||||||
const engineSpec:VersionedSpec = {
|
|
||||||
name: ENGINE_NAME,
|
|
||||||
version: ENGINE_VERSION,
|
|
||||||
}
|
|
||||||
|
|
||||||
const cryptoSpec:VersionedSpec = {
|
|
||||||
name: CRYPTO_NAME,
|
|
||||||
version: CRYPTO_VERSION,
|
|
||||||
}
|
|
||||||
|
|
||||||
const networkSpec:VersionedSpec = {
|
|
||||||
name: NETWORK_NAME,
|
|
||||||
version: NETWORK_VERSION,
|
|
||||||
}
|
|
||||||
|
|
||||||
export {
|
|
||||||
engineSpec,
|
|
||||||
cryptoSpec,
|
|
||||||
networkSpec,
|
|
||||||
VersionedSpec,
|
|
||||||
};
|
|
||||||
@@ -1,27 +0,0 @@
|
|||||||
import * as crypto from 'crypto';
|
|
||||||
|
|
||||||
const _algs = {
|
|
||||||
'SHA-256': 'sha256',
|
|
||||||
}
|
|
||||||
|
|
||||||
function cryptoWrapper() {
|
|
||||||
}
|
|
||||||
|
|
||||||
cryptoWrapper.prototype.digest = async function(s, d) {
|
|
||||||
const h = crypto.createHash(_algs[s]);
|
|
||||||
h.update(d);
|
|
||||||
return h.digest();
|
|
||||||
}
|
|
||||||
|
|
||||||
let subtle = undefined;
|
|
||||||
if (typeof window !== 'undefined') {
|
|
||||||
subtle = window.crypto.subtle;
|
|
||||||
} else {
|
|
||||||
subtle = new cryptoWrapper();
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
export {
|
|
||||||
subtle,
|
|
||||||
}
|
|
||||||
|
|
||||||
@@ -1,90 +0,0 @@
|
|||||||
import * as pg from 'pg';
|
|
||||||
import * as sqlite from 'sqlite3';
|
|
||||||
|
|
||||||
type DbConfig = {
|
|
||||||
name: string
|
|
||||||
host: string
|
|
||||||
port: number
|
|
||||||
user: string
|
|
||||||
password: string
|
|
||||||
}
|
|
||||||
|
|
||||||
interface DbAdapter {
|
|
||||||
query: (s:string, callback:(e:any, rs:any) => void) => void
|
|
||||||
close: () => void
|
|
||||||
}
|
|
||||||
|
|
||||||
const re_creatematch = /^(CREATE)/i
|
|
||||||
const re_getmatch = /^(SELECT)/i;
|
|
||||||
const re_setmatch = /^(INSERT|UPDATE)/i;
|
|
||||||
|
|
||||||
class SqliteAdapter implements DbAdapter {
|
|
||||||
|
|
||||||
db: any
|
|
||||||
|
|
||||||
constructor(dbConfig:DbConfig, callback?:(any) => void) {
|
|
||||||
this.db = new sqlite.Database(dbConfig.name); //, callback);
|
|
||||||
}
|
|
||||||
|
|
||||||
public query(s:string, callback:(e:any, rs?:any) => void): void {
|
|
||||||
const local_callback = (e, rs) => {
|
|
||||||
let r = undefined;
|
|
||||||
if (rs !== undefined) {
|
|
||||||
r = {
|
|
||||||
rowCount: rs.length,
|
|
||||||
rows: rs,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
callback(e, r);
|
|
||||||
};
|
|
||||||
if (s.match(re_getmatch)) {
|
|
||||||
this.db.all(s, local_callback);
|
|
||||||
} else if (s.match(re_setmatch)) {
|
|
||||||
this.db.run(s, local_callback);
|
|
||||||
} else if (s.match(re_creatematch)) {
|
|
||||||
this.db.run(s, callback);
|
|
||||||
} else {
|
|
||||||
throw 'unhandled query';
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
public close() {
|
|
||||||
this.db.close();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
class PostgresAdapter implements DbAdapter {
|
|
||||||
|
|
||||||
db: any
|
|
||||||
|
|
||||||
constructor(dbConfig:DbConfig) {
|
|
||||||
let o = dbConfig;
|
|
||||||
o['database'] = o.name;
|
|
||||||
this.db = new pg.Pool(o);
|
|
||||||
return this.db;
|
|
||||||
}
|
|
||||||
|
|
||||||
public query(s:string, callback:(e:any, rs:any) => void): void {
|
|
||||||
this.db.query(s, (e, rs) => {
|
|
||||||
let r = {
|
|
||||||
length: rs.rowCount,
|
|
||||||
}
|
|
||||||
rs.length = rs.rowCount;
|
|
||||||
if (e === undefined) {
|
|
||||||
e = null;
|
|
||||||
}
|
|
||||||
console.debug(e, rs);
|
|
||||||
callback(e, rs);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
public close() {
|
|
||||||
this.db.end();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
export {
|
|
||||||
DbConfig,
|
|
||||||
SqliteAdapter,
|
|
||||||
PostgresAdapter,
|
|
||||||
}
|
|
||||||
@@ -1,68 +0,0 @@
|
|||||||
import * as crypto from './crypto';
|
|
||||||
|
|
||||||
interface Addressable {
|
|
||||||
key(): string
|
|
||||||
digest(): string
|
|
||||||
}
|
|
||||||
|
|
||||||
function stringToBytes(s:string) {
|
|
||||||
const a = new Uint8Array(20);
|
|
||||||
let j = 2;
|
|
||||||
for (let i = 0; i < a.byteLength; i++) {
|
|
||||||
const n = parseInt(s.substring(j, j+2), 16);
|
|
||||||
a[i] = n;
|
|
||||||
j += 2;
|
|
||||||
}
|
|
||||||
return a;
|
|
||||||
}
|
|
||||||
|
|
||||||
function bytesToHex(a:Uint8Array) {
|
|
||||||
let s = '';
|
|
||||||
for (let i = 0; i < a.byteLength; i++) {
|
|
||||||
const h = '00' + a[i].toString(16);
|
|
||||||
s += h.slice(-2);
|
|
||||||
}
|
|
||||||
return s;
|
|
||||||
}
|
|
||||||
|
|
||||||
async function mergeKey(a:Uint8Array, s:Uint8Array) {
|
|
||||||
const y = new Uint8Array(a.byteLength + s.byteLength);
|
|
||||||
for (let i = 0; i < a.byteLength; i++) {
|
|
||||||
y[i] = a[i];
|
|
||||||
}
|
|
||||||
for (let i = 0; i < s.byteLength; i++) {
|
|
||||||
y[a.byteLength + i] = s[i];
|
|
||||||
}
|
|
||||||
const z = await crypto.subtle.digest('SHA-256', y);
|
|
||||||
return bytesToHex(new Uint8Array(z));
|
|
||||||
}
|
|
||||||
|
|
||||||
async function toKey(v:string, salt:string) {
|
|
||||||
const a = stringToBytes(v);
|
|
||||||
const s = new TextEncoder().encode(salt);
|
|
||||||
return await mergeKey(a, s);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
async function toAddressKey(zeroExHex:string, salt:string) {
|
|
||||||
const a = addressToBytes(zeroExHex);
|
|
||||||
const s = new TextEncoder().encode(salt);
|
|
||||||
return await mergeKey(a, s);
|
|
||||||
}
|
|
||||||
|
|
||||||
const re_addrHex = /^0[xX][a-fA-F0-9]{40}$/;
|
|
||||||
function addressToBytes(s:string) {
|
|
||||||
if (!s.match(re_addrHex)) {
|
|
||||||
throw 'invalid address hex';
|
|
||||||
}
|
|
||||||
return stringToBytes(s);
|
|
||||||
}
|
|
||||||
|
|
||||||
export {
|
|
||||||
toKey,
|
|
||||||
toAddressKey,
|
|
||||||
mergeKey,
|
|
||||||
bytesToHex,
|
|
||||||
addressToBytes,
|
|
||||||
Addressable,
|
|
||||||
}
|
|
||||||
@@ -1,58 +0,0 @@
|
|||||||
import { v4 as uuidv4 } from 'uuid';
|
|
||||||
import { Syncable } from './sync';
|
|
||||||
import { Store } from './store';
|
|
||||||
import { PubSub } from './transport';
|
|
||||||
|
|
||||||
function toIndexKey(id:string):string {
|
|
||||||
const d = Date.now();
|
|
||||||
return d + '_' + id + '_' + uuidv4();
|
|
||||||
}
|
|
||||||
|
|
||||||
const _re_indexKey = /^\d+_(.+)_[-\d\w]+$/;
|
|
||||||
function fromIndexKey(s:string):string {
|
|
||||||
const m = s.match(_re_indexKey);
|
|
||||||
if (m === null) {
|
|
||||||
throw 'Invalid index key';
|
|
||||||
}
|
|
||||||
return m[1];
|
|
||||||
}
|
|
||||||
|
|
||||||
class Dispatcher {
|
|
||||||
|
|
||||||
idx: Array<string>
|
|
||||||
syncer: PubSub
|
|
||||||
store: Store
|
|
||||||
|
|
||||||
constructor(store:Store, syncer:PubSub) {
|
|
||||||
this.idx = new Array<string>()
|
|
||||||
this.syncer = syncer;
|
|
||||||
this.store = store;
|
|
||||||
}
|
|
||||||
|
|
||||||
public isDirty(): boolean {
|
|
||||||
return this.idx.length > 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
public add(id:string, item:Syncable): string {
|
|
||||||
const v = item.toJSON();
|
|
||||||
const k = toIndexKey(id);
|
|
||||||
this.store.put(k, v, true);
|
|
||||||
localStorage.setItem(k, v);
|
|
||||||
this.idx.push(k);
|
|
||||||
return k;
|
|
||||||
}
|
|
||||||
|
|
||||||
public sync(offset:number): number {
|
|
||||||
let i = 0;
|
|
||||||
this.idx.forEach((k) => {
|
|
||||||
const v = localStorage.getItem(k);
|
|
||||||
const k_id = fromIndexKey(k);
|
|
||||||
this.syncer.pub(v); // this must block until guaranteed delivery
|
|
||||||
localStorage.removeItem(k);
|
|
||||||
i++;
|
|
||||||
});
|
|
||||||
return i;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
export { Dispatcher, toIndexKey, fromIndexKey }
|
|
||||||
@@ -1,5 +0,0 @@
|
|||||||
interface JSONSerializable {
|
|
||||||
toJSON(): string
|
|
||||||
}
|
|
||||||
|
|
||||||
export { JSONSerializable };
|
|
||||||
@@ -1,5 +1,2 @@
|
|||||||
export { PGPSigner, PGPKeyStore, Signer, KeyStore } from './auth';
|
export { User } from './user';
|
||||||
export { ArgPair, Envelope, Syncable } from './sync';
|
export { Phone } from './phone';
|
||||||
export { User } from './assets/user';
|
|
||||||
export { Phone } from './assets/phone';
|
|
||||||
export { Config } from './config';
|
|
||||||
|
|||||||
@@ -1,5 +1,4 @@
|
|||||||
import { ArgPair, Syncable } from '../sync';
|
import { Syncable, Addressable, mergeKey } from 'crdt-meta';
|
||||||
import { Addressable, mergeKey } from '../digest';
|
|
||||||
|
|
||||||
class Phone extends Syncable implements Addressable {
|
class Phone extends Syncable implements Addressable {
|
||||||
|
|
||||||
@@ -1,9 +0,0 @@
|
|||||||
import { Syncable } from './sync';
|
|
||||||
|
|
||||||
interface Store {
|
|
||||||
put(string, Syncable, boolean?)
|
|
||||||
get(string):Syncable
|
|
||||||
delete(string)
|
|
||||||
}
|
|
||||||
|
|
||||||
export { Store };
|
|
||||||
@@ -1,266 +0,0 @@
|
|||||||
import * as Automerge from 'automerge';
|
|
||||||
|
|
||||||
import { JSONSerializable } from './format';
|
|
||||||
|
|
||||||
import { Authoritative, Signer, PGPSigner, Signable, Signature } from './auth';
|
|
||||||
|
|
||||||
import { engineSpec, cryptoSpec, networkSpec, VersionedSpec } from './constants';
|
|
||||||
|
|
||||||
const fullSpec:VersionedSpec = {
|
|
||||||
name: 'cic',
|
|
||||||
version: '1',
|
|
||||||
ext: {
|
|
||||||
network: cryptoSpec,
|
|
||||||
engine: engineSpec,
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
class Envelope {
|
|
||||||
|
|
||||||
o = fullSpec
|
|
||||||
|
|
||||||
constructor(payload:Object) {
|
|
||||||
this.set(payload);
|
|
||||||
}
|
|
||||||
|
|
||||||
public set(payload:Object) {
|
|
||||||
this.o['payload'] = payload
|
|
||||||
}
|
|
||||||
|
|
||||||
public get():string {
|
|
||||||
return this.o['payload'];
|
|
||||||
}
|
|
||||||
|
|
||||||
public toJSON() {
|
|
||||||
return JSON.stringify(this.o);
|
|
||||||
}
|
|
||||||
|
|
||||||
public static fromJSON(s:string): Envelope {
|
|
||||||
const e = new Envelope(undefined);
|
|
||||||
e.o = JSON.parse(s);
|
|
||||||
return e;
|
|
||||||
}
|
|
||||||
|
|
||||||
public unwrap(): Syncable {
|
|
||||||
return Syncable.fromJSON(this.o['payload']);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
class ArgPair {
|
|
||||||
|
|
||||||
k:string
|
|
||||||
v:any
|
|
||||||
|
|
||||||
constructor(k:string, v:any) {
|
|
||||||
this.k = k;
|
|
||||||
this.v = v;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
class SignablePart implements Signable {
|
|
||||||
|
|
||||||
s: string
|
|
||||||
|
|
||||||
constructor(s:string) {
|
|
||||||
this.s = s;
|
|
||||||
}
|
|
||||||
|
|
||||||
public digest():string {
|
|
||||||
return this.s;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function orderDict(src) {
|
|
||||||
let dst;
|
|
||||||
if (Array.isArray(src)) {
|
|
||||||
dst = [];
|
|
||||||
src.forEach((v) => {
|
|
||||||
if (typeof(v) == 'object') {
|
|
||||||
v = orderDict(v);
|
|
||||||
}
|
|
||||||
dst.push(v);
|
|
||||||
});
|
|
||||||
} else {
|
|
||||||
dst = {}
|
|
||||||
Object.keys(src).sort().forEach((k) => {
|
|
||||||
let v = src[k];
|
|
||||||
if (typeof(v) == 'object') {
|
|
||||||
v = orderDict(v);
|
|
||||||
}
|
|
||||||
dst[k] = v;
|
|
||||||
});
|
|
||||||
}
|
|
||||||
return dst;
|
|
||||||
}
|
|
||||||
|
|
||||||
class Syncable implements JSONSerializable, Authoritative, Signable {
|
|
||||||
|
|
||||||
id: string
|
|
||||||
timestamp: number
|
|
||||||
m: any // automerge object
|
|
||||||
e: Envelope
|
|
||||||
signer: Signer
|
|
||||||
onwrap: (string) => void
|
|
||||||
onauthenticate: (boolean) => void
|
|
||||||
|
|
||||||
// TODO: Move data to sub-object so timestamp, id, signature don't collide
|
|
||||||
constructor(id:string, v:Object) {
|
|
||||||
this.id = id;
|
|
||||||
const o = {
|
|
||||||
'id': id,
|
|
||||||
'timestamp': Math.floor(Date.now() / 1000),
|
|
||||||
'data': v,
|
|
||||||
}
|
|
||||||
//this.m = Automerge.from(v)
|
|
||||||
this.m = Automerge.from(o)
|
|
||||||
}
|
|
||||||
|
|
||||||
public setSigner(signer:Signer) {
|
|
||||||
this.signer = signer;
|
|
||||||
this.signer.onsign = (s) => {
|
|
||||||
this.wrap(s);
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
// TODO: To keep integrity, the non-link key/value pairs for each step also need to be hashed
|
|
||||||
public digest(): string {
|
|
||||||
const links = [];
|
|
||||||
Automerge.getAllChanges(this.m).forEach((ch:Object) => {
|
|
||||||
const op:Array<any> = ch['ops'];
|
|
||||||
ch['ops'].forEach((op:Array<Object>) => {
|
|
||||||
if (op['action'] == 'link') {
|
|
||||||
//console.log('op link', op);
|
|
||||||
links.push([op['obj'], op['value']]);
|
|
||||||
}
|
|
||||||
});
|
|
||||||
});
|
|
||||||
//return JSON.stringify(links);
|
|
||||||
const j = JSON.stringify(links);
|
|
||||||
return Buffer.from(j).toString('base64');
|
|
||||||
}
|
|
||||||
|
|
||||||
private wrap(s:any) {
|
|
||||||
this.m = Automerge.change(this.m, 'sign', (doc) => {
|
|
||||||
doc['signature'] = s;
|
|
||||||
});
|
|
||||||
this.e = new Envelope(this.toJSON());
|
|
||||||
console.log('wrappin s', s, typeof(s));
|
|
||||||
this.e.o['digest'] = s.digest;
|
|
||||||
if (this.onwrap !== undefined) {
|
|
||||||
this.onwrap(this.e);
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
// private _verifyLoop(i:number, history:Array<any>, signable:Signable, result:boolean) {
|
|
||||||
// if (!result) {
|
|
||||||
// this.onauthenticate(false);
|
|
||||||
// return;
|
|
||||||
// } else if (history.length == 0) {
|
|
||||||
// this.onauthenticate(true);
|
|
||||||
// return;
|
|
||||||
// }
|
|
||||||
// const h = history.shift()
|
|
||||||
// if (i % 2 == 0) {
|
|
||||||
// i++;
|
|
||||||
// signable = {
|
|
||||||
// digest: () => {
|
|
||||||
// return Automerge.save(h.snapshot)
|
|
||||||
// },
|
|
||||||
// };
|
|
||||||
// this._verifyLoop(i, history, signable, true);
|
|
||||||
// } else {
|
|
||||||
// i++;
|
|
||||||
// const signature = h.snapshot['signature'];
|
|
||||||
// console.debug('signature', signature, signable.digest());
|
|
||||||
// this.signer.onverify = (v) => {
|
|
||||||
// this._verifyLoop(i, history, signable, v)
|
|
||||||
// }
|
|
||||||
// this.signer.verify(signable, signature);
|
|
||||||
// }
|
|
||||||
// }
|
|
||||||
//
|
|
||||||
// // TODO: This should replay the graph and check signatures on each step
|
|
||||||
// public _authenticate(full:boolean=false) {
|
|
||||||
// let h = Automerge.getHistory(this.m);
|
|
||||||
// h.forEach((m) => {
|
|
||||||
// //console.debug(m.snapshot);
|
|
||||||
// });
|
|
||||||
// const signable = {
|
|
||||||
// digest: () => { return '' },
|
|
||||||
// }
|
|
||||||
// if (!full) {
|
|
||||||
// h = h.slice(h.length-2);
|
|
||||||
// }
|
|
||||||
// this._verifyLoop(0, h, signable, true);
|
|
||||||
// }
|
|
||||||
|
|
||||||
public authenticate(full:boolean=false) {
|
|
||||||
if (full) {
|
|
||||||
console.warn('only doing shallow authentication for now, sorry');
|
|
||||||
}
|
|
||||||
//console.log('authenticating', signable.digest());
|
|
||||||
//console.log('signature', this.m.signature);
|
|
||||||
this.signer.onverify = (v) => {
|
|
||||||
//this._verifyLoop(i, history, signable, v)
|
|
||||||
this.onauthenticate(v);
|
|
||||||
}
|
|
||||||
this.signer.verify(this.m.signature.digest, this.m.signature);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
public sign() {
|
|
||||||
//this.signer.prepare(this);
|
|
||||||
this.signer.sign(this.digest());
|
|
||||||
}
|
|
||||||
|
|
||||||
public update(changes:Array<ArgPair>, changesDescription:string) {
|
|
||||||
this.m = Automerge.change(this.m, changesDescription, (m) => {
|
|
||||||
changes.forEach((c) => {
|
|
||||||
let path = c.k.split('.');
|
|
||||||
let target = m['data'];
|
|
||||||
while (path.length > 1) {
|
|
||||||
const part = path.shift();
|
|
||||||
target = target[part];
|
|
||||||
}
|
|
||||||
target[path[0]] = c.v;
|
|
||||||
});
|
|
||||||
m['timestamp'] = Math.floor(Date.now() / 1000);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
public replace(o:Object, changesDescription:string) {
|
|
||||||
this.m = Automerge.change(this.m, changesDescription, (m) => {
|
|
||||||
Object.keys(o).forEach((k) => {
|
|
||||||
m['data'][k] = o[k];
|
|
||||||
});
|
|
||||||
Object.keys(m).forEach((k) => {
|
|
||||||
if (o[k] == undefined) {
|
|
||||||
delete m['data'][k];
|
|
||||||
}
|
|
||||||
});
|
|
||||||
m['timestamp'] = Math.floor(Date.now() / 1000);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
public merge(s:Syncable) {
|
|
||||||
this.m = Automerge.merge(s.m, this.m);
|
|
||||||
}
|
|
||||||
|
|
||||||
public toJSON(): string {
|
|
||||||
const s = Automerge.save(this.m);
|
|
||||||
const o = JSON.parse(s);
|
|
||||||
const oo = orderDict(o)
|
|
||||||
return JSON.stringify(oo);
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
public static fromJSON(s:string): Syncable {
|
|
||||||
const doc = Automerge.load(s);
|
|
||||||
let y = new Syncable(doc['id'], {});
|
|
||||||
y.m = doc
|
|
||||||
return y
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
export { JSONSerializable, Syncable, ArgPair, Envelope };
|
|
||||||
@@ -1,11 +0,0 @@
|
|||||||
interface SubConsumer {
|
|
||||||
post(string)
|
|
||||||
}
|
|
||||||
|
|
||||||
interface PubSub {
|
|
||||||
pub(v:string):boolean
|
|
||||||
close()
|
|
||||||
}
|
|
||||||
|
|
||||||
export { PubSub, SubConsumer };
|
|
||||||
|
|
||||||
@@ -1,5 +1,4 @@
|
|||||||
import { ArgPair, Syncable } from '../sync';
|
import { Syncable, Addressable, toAddressKey } from 'crdt-meta';
|
||||||
import { Addressable, addressToBytes, bytesToHex, toAddressKey } from '../digest';
|
|
||||||
|
|
||||||
const keySalt = new TextEncoder().encode(':cic.person');
|
const keySalt = new TextEncoder().encode(':cic.person');
|
||||||
class User extends Syncable implements Addressable {
|
class User extends Syncable implements Addressable {
|
||||||
@@ -1,50 +0,0 @@
|
|||||||
import * as Automerge from 'automerge';
|
|
||||||
import assert = require('assert');
|
|
||||||
|
|
||||||
import { Dispatcher, toIndexKey, fromIndexKey } from '../src/dispatch';
|
|
||||||
import { User } from '../src/assets/user';
|
|
||||||
import { Syncable, ArgPair } from '../src/sync';
|
|
||||||
|
|
||||||
import { MockSigner, MockStore } from './mock';
|
|
||||||
|
|
||||||
describe('basic', () => {
|
|
||||||
|
|
||||||
it('store', () => {
|
|
||||||
const store = new MockStore('s');
|
|
||||||
assert.equal(store.name, 's');
|
|
||||||
|
|
||||||
const mockSigner = new MockSigner();
|
|
||||||
const v = new Syncable('foo', {baz: 42});
|
|
||||||
v.setSigner(mockSigner);
|
|
||||||
store.put('foo', v);
|
|
||||||
const one = store.get('foo').toJSON();
|
|
||||||
const vv = new Syncable('bar', {baz: 666});
|
|
||||||
vv.setSigner(mockSigner);
|
|
||||||
assert.throws(() => {
|
|
||||||
store.put('foo', vv)
|
|
||||||
});
|
|
||||||
store.put('foo', vv, true);
|
|
||||||
const other = store.get('foo').toJSON();
|
|
||||||
assert.notEqual(one, other);
|
|
||||||
store.delete('foo');
|
|
||||||
assert.equal(store.get('foo'), undefined);
|
|
||||||
});
|
|
||||||
|
|
||||||
it('add_doc_to_dispatcher', () => {
|
|
||||||
const store = new MockStore('s');
|
|
||||||
//const syncer = new MockSyncer();
|
|
||||||
const dispatcher = new Dispatcher(store, undefined);
|
|
||||||
const user = new User('foo');
|
|
||||||
dispatcher.add(user.id, user);
|
|
||||||
assert(dispatcher.isDirty());
|
|
||||||
});
|
|
||||||
|
|
||||||
it('dispatch_keyindex', () => {
|
|
||||||
const s = 'foo';
|
|
||||||
const k = toIndexKey(s);
|
|
||||||
const v = fromIndexKey(k);
|
|
||||||
assert.equal(s, v);
|
|
||||||
});
|
|
||||||
|
|
||||||
|
|
||||||
});
|
|
||||||
@@ -1,212 +0,0 @@
|
|||||||
import * as Automerge from 'automerge';
|
|
||||||
import assert = require('assert');
|
|
||||||
|
|
||||||
import * as pgp from 'openpgp';
|
|
||||||
import * as fs from 'fs';
|
|
||||||
|
|
||||||
import { PGPSigner } from '../src/auth';
|
|
||||||
|
|
||||||
import { Syncable, ArgPair } from '../src/sync';
|
|
||||||
|
|
||||||
import { MockKeyStore, MockSigner } from './mock';
|
|
||||||
|
|
||||||
|
|
||||||
describe('sync', async () => {
|
|
||||||
it('sync_merge', () => {
|
|
||||||
const mockSigner = new MockSigner();
|
|
||||||
const s = new Syncable('foo', {
|
|
||||||
bar: 'baz',
|
|
||||||
});
|
|
||||||
s.setSigner(mockSigner);
|
|
||||||
const changePair = new ArgPair('xyzzy', 42);
|
|
||||||
s.update([changePair], 'ch-ch-cha-changes');
|
|
||||||
assert.equal(s.m.data['xyzzy'], 42)
|
|
||||||
assert.equal(s.m.data['bar'], 'baz')
|
|
||||||
assert.equal(s.m['id'], 'foo')
|
|
||||||
assert.equal(Automerge.getHistory(s.m).length, 2);
|
|
||||||
});
|
|
||||||
|
|
||||||
it('sync_serialize', () => {
|
|
||||||
const mockSigner = new MockSigner();
|
|
||||||
const s = new Syncable('foo', {
|
|
||||||
bar: 'baz',
|
|
||||||
});
|
|
||||||
s.setSigner(mockSigner);
|
|
||||||
const j = s.toJSON();
|
|
||||||
const ss = Syncable.fromJSON(j);
|
|
||||||
assert.equal(ss.m['id'], 'foo');
|
|
||||||
assert.equal(ss.m['data']['bar'], 'baz');
|
|
||||||
assert.equal(Automerge.getHistory(ss.m).length, 1);
|
|
||||||
});
|
|
||||||
|
|
||||||
it('sync_sign_and_wrap', () => {
|
|
||||||
const mockSigner = new MockSigner();
|
|
||||||
const s = new Syncable('foo', {
|
|
||||||
bar: 'baz',
|
|
||||||
});
|
|
||||||
s.setSigner(mockSigner);
|
|
||||||
s.onwrap = (e) => {
|
|
||||||
const j = e.toJSON();
|
|
||||||
const v = JSON.parse(j);
|
|
||||||
assert.deepEqual(v.payload, e.o.payload);
|
|
||||||
|
|
||||||
}
|
|
||||||
s.sign();
|
|
||||||
});
|
|
||||||
it('sync_verify_success', async () => {
|
|
||||||
const pksa = fs.readFileSync(__dirname + '/privatekeys.asc');
|
|
||||||
const pks = await pgp.key.readArmored(pksa);
|
|
||||||
await pks.keys[0].decrypt('merman');
|
|
||||||
await pks.keys[1].decrypt('beastman');
|
|
||||||
|
|
||||||
const pubksa = fs.readFileSync(__dirname + '/publickeys.asc');
|
|
||||||
const pubks = await pgp.key.readArmored(pubksa);
|
|
||||||
|
|
||||||
const oneStore = new MockKeyStore(pks.keys[0], pubks.keys);
|
|
||||||
const twoStore = new MockKeyStore(pks.keys[1], pubks.keys);
|
|
||||||
const threeStore = new MockKeyStore(pks.keys[2], [pubks.keys[0], pubks.keys[2]]);
|
|
||||||
|
|
||||||
const oneSigner = new PGPSigner(oneStore);
|
|
||||||
const twoSigner = new PGPSigner(twoStore);
|
|
||||||
const threeSigner = new PGPSigner(threeStore);
|
|
||||||
|
|
||||||
const x = new Syncable('foo', {
|
|
||||||
bar: 'baz',
|
|
||||||
});
|
|
||||||
x.setSigner(oneSigner);
|
|
||||||
|
|
||||||
// TODO: make this look better
|
|
||||||
x.onwrap = (e) => {
|
|
||||||
let updateData = new ArgPair('bar', 'xyzzy');
|
|
||||||
x.update([updateData], 'change one');
|
|
||||||
|
|
||||||
x.onwrap = (e) => {
|
|
||||||
x.setSigner(twoSigner);
|
|
||||||
updateData = new ArgPair('bar', 42);
|
|
||||||
x.update([updateData], 'change two');
|
|
||||||
|
|
||||||
x.onwrap = (e) => {
|
|
||||||
const p = e.unwrap();
|
|
||||||
p.setSigner(twoSigner);
|
|
||||||
p.onauthenticate = (v) => {
|
|
||||||
assert(v);
|
|
||||||
}
|
|
||||||
p.authenticate();
|
|
||||||
}
|
|
||||||
|
|
||||||
x.sign();
|
|
||||||
};
|
|
||||||
|
|
||||||
x.sign();
|
|
||||||
}
|
|
||||||
|
|
||||||
x.sign();
|
|
||||||
|
|
||||||
});
|
|
||||||
|
|
||||||
it('sync_verify_fail', async () => {
|
|
||||||
const pksa = fs.readFileSync(__dirname + '/privatekeys.asc');
|
|
||||||
const pks = await pgp.key.readArmored(pksa);
|
|
||||||
await pks.keys[0].decrypt('merman');
|
|
||||||
await pks.keys[1].decrypt('beastman');
|
|
||||||
|
|
||||||
const pubksa = fs.readFileSync(__dirname + '/publickeys.asc');
|
|
||||||
const pubks = await pgp.key.readArmored(pubksa);
|
|
||||||
|
|
||||||
const oneStore = new MockKeyStore(pks.keys[0], pubks.keys);
|
|
||||||
const twoStore = new MockKeyStore(pks.keys[1], pubks.keys);
|
|
||||||
const threeStore = new MockKeyStore(pks.keys[2], [pubks.keys[0], pubks.keys[2]]);
|
|
||||||
|
|
||||||
const oneSigner = new PGPSigner(oneStore);
|
|
||||||
const twoSigner = new PGPSigner(twoStore);
|
|
||||||
const threeSigner = new PGPSigner(threeStore);
|
|
||||||
|
|
||||||
const x = new Syncable('foo', {
|
|
||||||
bar: 'baz',
|
|
||||||
});
|
|
||||||
x.setSigner(oneSigner);
|
|
||||||
|
|
||||||
// TODO: make this look better
|
|
||||||
x.onwrap = (e) => {
|
|
||||||
let updateData = new ArgPair('bar', 'xyzzy');
|
|
||||||
x.update([updateData], 'change one');
|
|
||||||
|
|
||||||
x.onwrap = (e) => {
|
|
||||||
x.setSigner(twoSigner);
|
|
||||||
updateData = new ArgPair('bar', 42);
|
|
||||||
x.update([updateData], 'change two');
|
|
||||||
|
|
||||||
x.onwrap = (e) => {
|
|
||||||
const p = e.unwrap();
|
|
||||||
p.setSigner(threeSigner);
|
|
||||||
p.onauthenticate = (v) => {
|
|
||||||
assert(!v);
|
|
||||||
}
|
|
||||||
p.authenticate();
|
|
||||||
}
|
|
||||||
|
|
||||||
x.sign();
|
|
||||||
};
|
|
||||||
|
|
||||||
x.sign();
|
|
||||||
}
|
|
||||||
|
|
||||||
x.sign();
|
|
||||||
|
|
||||||
});
|
|
||||||
|
|
||||||
xit('sync_verify_shallow_tricked', async () => {
|
|
||||||
const pksa = fs.readFileSync(__dirname + '/privatekeys.asc');
|
|
||||||
const pks = await pgp.key.readArmored(pksa);
|
|
||||||
await pks.keys[0].decrypt('merman');
|
|
||||||
await pks.keys[1].decrypt('beastman');
|
|
||||||
|
|
||||||
const pubksa = fs.readFileSync(__dirname + '/publickeys.asc');
|
|
||||||
const pubks = await pgp.key.readArmored(pubksa);
|
|
||||||
|
|
||||||
const oneStore = new MockKeyStore(pks.keys[0], pubks.keys);
|
|
||||||
const twoStore = new MockKeyStore(pks.keys[1], pubks.keys);
|
|
||||||
const threeStore = new MockKeyStore(pks.keys[2], [pubks.keys[0], pubks.keys[2]]);
|
|
||||||
|
|
||||||
const oneSigner = new PGPSigner(oneStore);
|
|
||||||
const twoSigner = new PGPSigner(twoStore);
|
|
||||||
const threeSigner = new PGPSigner(threeStore);
|
|
||||||
|
|
||||||
const x = new Syncable('foo', {
|
|
||||||
bar: 'baz',
|
|
||||||
});
|
|
||||||
x.setSigner(twoSigner);
|
|
||||||
|
|
||||||
// TODO: make this look better
|
|
||||||
x.onwrap = (e) => {
|
|
||||||
let updateData = new ArgPair('bar', 'xyzzy');
|
|
||||||
x.update([updateData], 'change one');
|
|
||||||
|
|
||||||
x.onwrap = (e) => {
|
|
||||||
updateData = new ArgPair('bar', 42);
|
|
||||||
x.update([updateData], 'change two');
|
|
||||||
x.setSigner(oneSigner);
|
|
||||||
|
|
||||||
x.onwrap = (e) => {
|
|
||||||
const p = e.unwrap();
|
|
||||||
p.setSigner(threeSigner);
|
|
||||||
p.onauthenticate = (v) => {
|
|
||||||
assert(v);
|
|
||||||
p.onauthenticate = (v) => {
|
|
||||||
assert(!v);
|
|
||||||
}
|
|
||||||
p.authenticate(true);
|
|
||||||
}
|
|
||||||
p.authenticate();
|
|
||||||
}
|
|
||||||
|
|
||||||
x.sign();
|
|
||||||
};
|
|
||||||
|
|
||||||
x.sign();
|
|
||||||
}
|
|
||||||
|
|
||||||
x.sign();
|
|
||||||
|
|
||||||
});
|
|
||||||
});
|
|
||||||
@@ -1,14 +0,0 @@
|
|||||||
import * as assert from 'assert';
|
|
||||||
|
|
||||||
import { MockPubSub, MockConsumer } from './mock';
|
|
||||||
|
|
||||||
describe('transport', () => {
|
|
||||||
it('pub_sub', () => {
|
|
||||||
const c = new MockConsumer();
|
|
||||||
const ps = new MockPubSub('foo', c);
|
|
||||||
ps.pub('foo');
|
|
||||||
ps.pub('bar');
|
|
||||||
ps.flush();
|
|
||||||
assert.deepEqual(c.omnoms, ['foo', 'bar']);
|
|
||||||
});
|
|
||||||
});
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
import assert = require('assert');
|
|
||||||
import pgp = require('openpgp');
|
|
||||||
import crypto = require('crypto');
|
|
||||||
|
|
||||||
import { Syncable, ArgPair } from '../src/sync';
|
|
||||||
|
|
||||||
import { MockKeyStore, MockSignable } from './mock';
|
|
||||||
|
|
||||||
import { PGPSigner } from '../src/auth';
|
|
||||||
|
|
||||||
|
|
||||||
describe('auth', async () => {
|
|
||||||
await it('digest', async () => {
|
|
||||||
const opts = {
|
|
||||||
userIds: [
|
|
||||||
{
|
|
||||||
name: 'John Marston',
|
|
||||||
email: 'red@dead.com',
|
|
||||||
},
|
|
||||||
],
|
|
||||||
numBits: 2048,
|
|
||||||
passphrase: 'foo',
|
|
||||||
};
|
|
||||||
const pkgen = await pgp.generateKey(opts);
|
|
||||||
const pka = pkgen.privateKeyArmored;
|
|
||||||
const pks = await pgp.key.readArmored(pka);
|
|
||||||
await pks.keys[0].decrypt('foo');
|
|
||||||
const pubka = pkgen.publicKeyArmored;
|
|
||||||
const pubks = await pgp.key.readArmored(pubka);
|
|
||||||
const keyStore = new MockKeyStore(pks.keys[0], pubks.keys);
|
|
||||||
const s = new PGPSigner(keyStore);
|
|
||||||
|
|
||||||
const message = await pgp.cleartext.fromText('foo');
|
|
||||||
s.onverify = (ok) => {
|
|
||||||
assert(ok);
|
|
||||||
}
|
|
||||||
s.onsign = (signature) => {
|
|
||||||
s.onverify((v) => {
|
|
||||||
console.log('bar', v);
|
|
||||||
});
|
|
||||||
s.verify('foo', signature);
|
|
||||||
}
|
|
||||||
|
|
||||||
await s.sign('foo');
|
|
||||||
});
|
|
||||||
});
|
|
||||||
@@ -1,47 +0,0 @@
|
|||||||
import * as assert from 'assert';
|
|
||||||
import * as pgp from 'openpgp';
|
|
||||||
|
|
||||||
import { Dispatcher } from '../src/dispatch';
|
|
||||||
import { User } from '../src/assets/user';
|
|
||||||
import { PGPSigner, KeyStore } from '../src/auth';
|
|
||||||
import { SubConsumer } from '../src/transport';
|
|
||||||
|
|
||||||
import { MockStore, MockPubSub, MockConsumer, MockKeyStore } from './mock';
|
|
||||||
|
|
||||||
async function createKeyStore() {
|
|
||||||
const opts = {
|
|
||||||
userIds: [
|
|
||||||
{
|
|
||||||
name: 'John Marston',
|
|
||||||
email: 'red@dead.com',
|
|
||||||
},
|
|
||||||
],
|
|
||||||
numBits: 2048,
|
|
||||||
passphrase: 'foo',
|
|
||||||
};
|
|
||||||
const pkgen = await pgp.generateKey(opts);
|
|
||||||
const pka = pkgen.privateKeyArmored;
|
|
||||||
const pks = await pgp.key.readArmored(pka);
|
|
||||||
await pks.keys[0].decrypt('foo');
|
|
||||||
return new MockKeyStore(pks.keys[0], []);
|
|
||||||
}
|
|
||||||
|
|
||||||
describe('fullchain', async () => {
|
|
||||||
it('dispatch_and_publish_user', async () => {
|
|
||||||
const g = await createKeyStore();
|
|
||||||
const n = new PGPSigner(g);
|
|
||||||
const u = new User('u1', {});
|
|
||||||
u.setSigner(n);
|
|
||||||
u.setName('Nico', 'Bellic');
|
|
||||||
const s = new MockStore('fooStore');
|
|
||||||
const c = new MockConsumer();
|
|
||||||
const p = new MockPubSub('fooPubSub', c);
|
|
||||||
const d = new Dispatcher(s, p);
|
|
||||||
u.onwrap = (e) => {
|
|
||||||
d.add(u.id, e);
|
|
||||||
d.sync(0);
|
|
||||||
assert.equal(p.pubs.length, 1);
|
|
||||||
};
|
|
||||||
u.sign();
|
|
||||||
});
|
|
||||||
});
|
|
||||||
@@ -1,150 +0,0 @@
|
|||||||
import * as crypto from 'crypto';
|
|
||||||
|
|
||||||
import { Signable, Signature, KeyStore } from '../src/auth';
|
|
||||||
import { Store } from '../src/store';
|
|
||||||
import { PubSub, SubConsumer } from '../src/transport';
|
|
||||||
import { Syncable } from '../src/sync';
|
|
||||||
|
|
||||||
class MockStore implements Store {
|
|
||||||
|
|
||||||
contents: Object
|
|
||||||
name: string
|
|
||||||
|
|
||||||
constructor(name:string) {
|
|
||||||
this.name = name;
|
|
||||||
this.contents = {};
|
|
||||||
}
|
|
||||||
|
|
||||||
public put(k:string, v:Syncable, existsOk = false) {
|
|
||||||
if (!existsOk && this.contents[k] !== undefined) {
|
|
||||||
throw '"' + k + '" already exists in store ' + this.name;
|
|
||||||
}
|
|
||||||
this.contents[k] = v;
|
|
||||||
}
|
|
||||||
|
|
||||||
public get(k:string): Syncable {
|
|
||||||
return this.contents[k];
|
|
||||||
}
|
|
||||||
|
|
||||||
public delete(k:string) {
|
|
||||||
delete this.contents[k];
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
class MockSigner {
|
|
||||||
onsign: (string) => void
|
|
||||||
onverify: (boolean) => void
|
|
||||||
public verify(src:string, signature:Signature) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
public sign(s:string):boolean {
|
|
||||||
this.onsign('there would be a signature here');
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
public prepare(m:Signable):boolean {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
public fingerprint():string {
|
|
||||||
return '';
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
class MockConsumer implements SubConsumer {
|
|
||||||
|
|
||||||
omnoms: Array<string>
|
|
||||||
|
|
||||||
constructor() {
|
|
||||||
this.omnoms = Array<string>();
|
|
||||||
}
|
|
||||||
|
|
||||||
public post(v:string) {
|
|
||||||
this.omnoms.push(v);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
class MockPubSub implements PubSub {
|
|
||||||
|
|
||||||
pubs: Array<string>
|
|
||||||
consumer: SubConsumer
|
|
||||||
|
|
||||||
constructor(name:string, consumer:SubConsumer) {
|
|
||||||
this.pubs = Array<string>();
|
|
||||||
this.consumer = consumer;
|
|
||||||
}
|
|
||||||
|
|
||||||
public pub(v:string): boolean {
|
|
||||||
this.pubs.push(v);
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
public flush() {
|
|
||||||
while (this.pubs.length > 0) {
|
|
||||||
const s = this.pubs.shift();
|
|
||||||
this.consumer.post(s);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
public close() {
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
class MockSignable implements Signable {
|
|
||||||
|
|
||||||
src: string
|
|
||||||
dst: string
|
|
||||||
|
|
||||||
constructor(src:string) {
|
|
||||||
this.src = src;
|
|
||||||
}
|
|
||||||
|
|
||||||
public digest():string {
|
|
||||||
const h = crypto.createHash('sha256');
|
|
||||||
h.update(this.src);
|
|
||||||
this.dst= h.digest('hex');
|
|
||||||
return this.dst;
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
class MockKeyStore implements KeyStore {
|
|
||||||
|
|
||||||
pk: any
|
|
||||||
pubks: Array<any>
|
|
||||||
|
|
||||||
constructor(pk:any, pubks:Array<any>) {
|
|
||||||
this.pk = pk;
|
|
||||||
this.pubks = pubks;
|
|
||||||
}
|
|
||||||
|
|
||||||
public getPrivateKey(): any {
|
|
||||||
return this.pk;
|
|
||||||
}
|
|
||||||
|
|
||||||
public getTrustedKeys(): Array<any> {
|
|
||||||
return this.pubks;
|
|
||||||
}
|
|
||||||
|
|
||||||
public getTrustedActiveKeys(): Array<any> {
|
|
||||||
return [];
|
|
||||||
}
|
|
||||||
|
|
||||||
public getEncryptKeys(): Array<any> {
|
|
||||||
return [];
|
|
||||||
}
|
|
||||||
|
|
||||||
public getFingerprint(): string {
|
|
||||||
return '';
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
export {
|
|
||||||
MockStore,
|
|
||||||
MockPubSub,
|
|
||||||
MockConsumer,
|
|
||||||
MockSignable,
|
|
||||||
MockKeyStore,
|
|
||||||
MockSigner,
|
|
||||||
};
|
|
||||||
@@ -1,13 +1,10 @@
|
|||||||
import Automerge = require('automerge');
|
|
||||||
import assert = require('assert');
|
import assert = require('assert');
|
||||||
import fs = require('fs');
|
import fs = require('fs');
|
||||||
import pgp = require('openpgp');
|
import pgp = require('openpgp');
|
||||||
import sqlite = require('sqlite3');
|
import sqlite = require('sqlite3');
|
||||||
|
|
||||||
import * as handlers from '../scripts/server/handlers';
|
import * as handlers from '../scripts/server/handlers';
|
||||||
import { Envelope, Syncable, ArgPair } from '../src/sync';
|
import { Envelope, Syncable, ArgPair, PGPKeyStore, PGPSigner, KeyStore, Signer, SqliteAdapter } from 'crdt-meta';
|
||||||
import { PGPKeyStore, PGPSigner, KeyStore, Signer } from '../src/auth';
|
|
||||||
import { SqliteAdapter } from '../src/db';
|
|
||||||
|
|
||||||
function createKeystore() {
|
function createKeystore() {
|
||||||
const pksa = fs.readFileSync(__dirname + '/privatekeys.asc', 'utf-8');
|
const pksa = fs.readFileSync(__dirname + '/privatekeys.asc', 'utf-8');
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
cic_base[full_graph]~=0.1.2ab2
|
cic_base[full_graph]~=0.1.2a68
|
||||||
cic-eth~=0.11.0b9
|
cic-eth~=0.11.0b3
|
||||||
cic-notify~=0.4.0a4
|
cic-notify~=0.4.0a4
|
||||||
cic-types~=0.1.0a10
|
cic-types~=0.1.0a10
|
||||||
|
|||||||
@@ -57,8 +57,8 @@ WORKDIR /home/grassroots
|
|||||||
USER grassroots
|
USER grassroots
|
||||||
|
|
||||||
ARG pip_extra_index_url=https://pip.grassrootseconomics.net:8433
|
ARG pip_extra_index_url=https://pip.grassrootseconomics.net:8433
|
||||||
ARG cic_base_version=0.1.2a79
|
ARG cic_base_version=0.1.2a77
|
||||||
ARG cic_eth_version=0.11.0b8+build.c2286e5c
|
ARG cic_eth_version=0.11.0b6
|
||||||
ARG sarafu_faucet_version=0.0.2a28
|
ARG sarafu_faucet_version=0.0.2a28
|
||||||
ARG sarafu_token_version==0.0.1a6
|
ARG sarafu_token_version==0.0.1a6
|
||||||
ARG cic_contracts_version=0.0.2a2
|
ARG cic_contracts_version=0.0.2a2
|
||||||
|
|||||||
@@ -3,7 +3,7 @@
|
|||||||
set -a
|
set -a
|
||||||
|
|
||||||
CIC_CHAIN_SPEC=${CIC_CHAIN_SPEC:-evm:bloxberg:8995}
|
CIC_CHAIN_SPEC=${CIC_CHAIN_SPEC:-evm:bloxberg:8995}
|
||||||
CIC_DEFAULT_TOKEN_SYMBOL=${CIC_DEFAULT_TOKEN_SYMBOL:-GFT}
|
DEV_TOKEN_TYPE=${DEV_TOKEN_TYPE:-giftable}
|
||||||
DEV_ETH_ACCOUNT_RESERVE_MINTER=${DEV_ETH_ACCOUNT_RESERVE_MINTER:-$DEV_ETH_ACCOUNT_CONTRACT_DEPLOYER}
|
DEV_ETH_ACCOUNT_RESERVE_MINTER=${DEV_ETH_ACCOUNT_RESERVE_MINTER:-$DEV_ETH_ACCOUNT_CONTRACT_DEPLOYER}
|
||||||
DEV_ETH_ACCOUNT_ACCOUNTS_INDEX_WRITER=${DEV_ETH_ACCOUNT_RESERVE_MINTER:-$DEV_ETH_ACCOUNT_CONTRACT_DEPLOYER}
|
DEV_ETH_ACCOUNT_ACCOUNTS_INDEX_WRITER=${DEV_ETH_ACCOUNT_RESERVE_MINTER:-$DEV_ETH_ACCOUNT_CONTRACT_DEPLOYER}
|
||||||
DEV_RESERVE_AMOUNT=${DEV_ETH_RESERVE_AMOUNT:-""10000000000000000000000000000000000}
|
DEV_RESERVE_AMOUNT=${DEV_ETH_RESERVE_AMOUNT:-""10000000000000000000000000000000000}
|
||||||
@@ -19,8 +19,9 @@ if [ ! -z $DEV_ETH_GAS_PRICE ]; then
|
|||||||
>&2 echo using static gas price $DEV_ETH_GAS_PRICE
|
>&2 echo using static gas price $DEV_ETH_GAS_PRICE
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [[ $CIC_DEFAULT_TOKEN_SYMBOL != 'GFT' && $CIC_DEFAULT_TOKEN_SYMBOL != 'SRF' ]]; then
|
if [[ $DEV_TOKEN_TYPE != 'giftable' && $DEV_TOKEN_TYPE != 'sarafu' ]]; then
|
||||||
>&2 echo CIC_DEFAULT_TOKEN_SYMBOL must be one of [GFT,SRF], but was $CIC_DEFAULT_TOKEN_SYMBOL
|
echo $DEV_TOKEN_TYPE
|
||||||
|
>&2 echo DEV_TOKEN_TYPE must be one of [giftable,sarafu]
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
@@ -60,7 +61,7 @@ if [[ -n "${ETH_PROVIDER}" ]]; then
|
|||||||
./wait-for-it.sh "${ETH_PROVIDER_HOST}:${ETH_PROVIDER_PORT}"
|
./wait-for-it.sh "${ETH_PROVIDER_HOST}:${ETH_PROVIDER_PORT}"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [ $CIC_DEFAULT_TOKEN_SYMBOL == 'GFT' ]; then
|
if [ $DEV_TOKEN_TYPE == 'giftable' ]; then
|
||||||
>&2 echo "deploying 'giftable token'"
|
>&2 echo "deploying 'giftable token'"
|
||||||
DEV_RESERVE_ADDRESS=`giftable-token-deploy $gas_price_arg -p $ETH_PROVIDER -y $DEV_ETH_KEYSTORE_FILE -i $CIC_CHAIN_SPEC -vv -w --name "Giftable Token" --symbol "GFT" --decimals 6 -vv`
|
DEV_RESERVE_ADDRESS=`giftable-token-deploy $gas_price_arg -p $ETH_PROVIDER -y $DEV_ETH_KEYSTORE_FILE -i $CIC_CHAIN_SPEC -vv -w --name "Giftable Token" --symbol "GFT" --decimals 6 -vv`
|
||||||
else
|
else
|
||||||
|
|||||||
@@ -32,7 +32,6 @@ default_config_dir = '/usr/local/etc/cic'
|
|||||||
argparser = argparse.ArgumentParser()
|
argparser = argparse.ArgumentParser()
|
||||||
argparser.add_argument('-c', type=str, default=default_config_dir, help='config file')
|
argparser.add_argument('-c', type=str, default=default_config_dir, help='config file')
|
||||||
argparser.add_argument('-i', '--chain-spec', dest='i', type=str, help='Chain specification string')
|
argparser.add_argument('-i', '--chain-spec', dest='i', type=str, help='Chain specification string')
|
||||||
argparser.add_argument('--old-chain-spec', type=str, dest='old_chain_spec', default='evm:oldchain:1', help='chain spec')
|
|
||||||
argparser.add_argument('--redis-host', dest='redis_host', type=str, help='redis host to use for task submission')
|
argparser.add_argument('--redis-host', dest='redis_host', type=str, help='redis host to use for task submission')
|
||||||
argparser.add_argument('--redis-port', dest='redis_port', type=int, help='redis host to use for task submission')
|
argparser.add_argument('--redis-port', dest='redis_port', type=int, help='redis host to use for task submission')
|
||||||
argparser.add_argument('--redis-db', dest='redis_db', type=int, help='redis db to use for task submission and callback')
|
argparser.add_argument('--redis-db', dest='redis_db', type=int, help='redis db to use for task submission and callback')
|
||||||
@@ -77,11 +76,6 @@ os.makedirs(user_new_dir)
|
|||||||
meta_dir = os.path.join(args.user_dir, 'meta')
|
meta_dir = os.path.join(args.user_dir, 'meta')
|
||||||
os.makedirs(meta_dir)
|
os.makedirs(meta_dir)
|
||||||
|
|
||||||
custom_dir = os.path.join(args.user_dir, 'custom')
|
|
||||||
os.makedirs(custom_dir)
|
|
||||||
os.makedirs(os.path.join(custom_dir, 'new'))
|
|
||||||
os.makedirs(os.path.join(custom_dir, 'meta'))
|
|
||||||
|
|
||||||
phone_dir = os.path.join(args.user_dir, 'phone')
|
phone_dir = os.path.join(args.user_dir, 'phone')
|
||||||
os.makedirs(os.path.join(phone_dir, 'meta'))
|
os.makedirs(os.path.join(phone_dir, 'meta'))
|
||||||
|
|
||||||
@@ -91,11 +85,6 @@ os.stat(user_old_dir)
|
|||||||
txs_dir = os.path.join(args.user_dir, 'txs')
|
txs_dir = os.path.join(args.user_dir, 'txs')
|
||||||
os.makedirs(txs_dir)
|
os.makedirs(txs_dir)
|
||||||
|
|
||||||
user_dir = args.user_dir
|
|
||||||
|
|
||||||
old_chain_spec = ChainSpec.from_chain_str(args.old_chain_spec)
|
|
||||||
old_chain_str = str(old_chain_spec)
|
|
||||||
|
|
||||||
chain_spec = ChainSpec.from_chain_str(config.get('CIC_CHAIN_SPEC'))
|
chain_spec = ChainSpec.from_chain_str(config.get('CIC_CHAIN_SPEC'))
|
||||||
chain_str = str(chain_spec)
|
chain_str = str(chain_spec)
|
||||||
|
|
||||||
@@ -144,17 +133,7 @@ def register_eth(i, u):
|
|||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
|
|
||||||
user_tags = {}
|
#fi = open(os.path.join(user_out_dir, 'addresses.csv'), 'a')
|
||||||
f = open(os.path.join(user_dir, 'tags.csv'), 'r')
|
|
||||||
while True:
|
|
||||||
r = f.readline().rstrip()
|
|
||||||
if len(r) == 0:
|
|
||||||
break
|
|
||||||
(old_address, tags_csv) = r.split(':')
|
|
||||||
old_address = strip_0x(old_address)
|
|
||||||
user_tags[old_address] = tags_csv.split(',')
|
|
||||||
logg.debug('read tags {} for old address {}'.format(user_tags[old_address], old_address))
|
|
||||||
|
|
||||||
|
|
||||||
i = 0
|
i = 0
|
||||||
j = 0
|
j = 0
|
||||||
@@ -219,29 +198,6 @@ if __name__ == '__main__':
|
|||||||
os.symlink(os.path.realpath(filepath), meta_phone_filepath)
|
os.symlink(os.path.realpath(filepath), meta_phone_filepath)
|
||||||
|
|
||||||
|
|
||||||
# custom data
|
|
||||||
custom_key = generate_metadata_pointer(phone.encode('utf-8'), ':cic.custom')
|
|
||||||
custom_filepath = os.path.join(custom_dir, 'meta', custom_key)
|
|
||||||
|
|
||||||
filepath = os.path.join(
|
|
||||||
custom_dir,
|
|
||||||
'new',
|
|
||||||
custom_key[:2].upper(),
|
|
||||||
custom_key[2:4].upper(),
|
|
||||||
custom_key.upper() + '.json',
|
|
||||||
)
|
|
||||||
os.makedirs(os.path.dirname(filepath), exist_ok=True)
|
|
||||||
|
|
||||||
sub_old_chain_str = '{}:{}'.format(old_chain_spec.common_name(), old_chain_spec.network_id())
|
|
||||||
f = open(filepath, 'w')
|
|
||||||
k = u.identities['evm'][sub_old_chain_str][0]
|
|
||||||
tag_data = {'tags': user_tags[strip_0x(k)]}
|
|
||||||
f.write(json.dumps(tag_data))
|
|
||||||
f.close()
|
|
||||||
|
|
||||||
os.symlink(os.path.realpath(filepath), custom_filepath)
|
|
||||||
|
|
||||||
|
|
||||||
i += 1
|
i += 1
|
||||||
sys.stdout.write('imported {} {}'.format(i, u).ljust(200) + "\r")
|
sys.stdout.write('imported {} {}'.format(i, u).ljust(200) + "\r")
|
||||||
|
|
||||||
|
|||||||
@@ -3,10 +3,11 @@ const path = require('path');
|
|||||||
const http = require('http');
|
const http = require('http');
|
||||||
|
|
||||||
const cic = require('cic-client-meta');
|
const cic = require('cic-client-meta');
|
||||||
|
const crdt = require('crdt-meta');
|
||||||
|
|
||||||
//const conf = JSON.parse(fs.readFileSync('./cic.conf'));
|
//const conf = JSON.parse(fs.readFileSync('./cic.conf'));
|
||||||
|
|
||||||
const config = new cic.Config('./config');
|
const config = new crdt.Config('./config');
|
||||||
config.process();
|
config.process();
|
||||||
console.log(config);
|
console.log(config);
|
||||||
|
|
||||||
@@ -41,7 +42,7 @@ function sendit(uid, envelope) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
function doOne(keystore, filePath) {
|
function doOne(keystore, filePath) {
|
||||||
const signer = new cic.PGPSigner(keystore);
|
const signer = new crdt.PGPSigner(keystore);
|
||||||
const parts = path.basename(filePath).split('.');
|
const parts = path.basename(filePath).split('.');
|
||||||
const ethereum_address = path.basename(parts[0]);
|
const ethereum_address = path.basename(parts[0]);
|
||||||
|
|
||||||
@@ -51,7 +52,7 @@ function doOne(keystore, filePath) {
|
|||||||
//console.log(o);
|
//console.log(o);
|
||||||
fs.unlinkSync(filePath);
|
fs.unlinkSync(filePath);
|
||||||
|
|
||||||
const s = new cic.Syncable(uid, o);
|
const s = new crdt.Syncable(uid, o);
|
||||||
s.setSigner(signer);
|
s.setSigner(signer);
|
||||||
s.onwrap = (env) => {
|
s.onwrap = (env) => {
|
||||||
sendit(uid, env);
|
sendit(uid, env);
|
||||||
@@ -65,7 +66,7 @@ const publicKeyPath = path.join(config.get('PGP_EXPORTS_DIR'), config.get('PGP_P
|
|||||||
pk = fs.readFileSync(privateKeyPath);
|
pk = fs.readFileSync(privateKeyPath);
|
||||||
pubk = fs.readFileSync(publicKeyPath);
|
pubk = fs.readFileSync(publicKeyPath);
|
||||||
|
|
||||||
new cic.PGPKeyStore(
|
new crdt.PGPKeyStore(
|
||||||
config.get('PGP_PASSPHRASE'),
|
config.get('PGP_PASSPHRASE'),
|
||||||
pk,
|
pk,
|
||||||
pubk,
|
pubk,
|
||||||
|
|||||||
@@ -1,139 +0,0 @@
|
|||||||
const fs = require('fs');
|
|
||||||
const path = require('path');
|
|
||||||
const http = require('http');
|
|
||||||
|
|
||||||
const cic = require('cic-client-meta');
|
|
||||||
const vcfp = require('vcard-parser');
|
|
||||||
|
|
||||||
//const conf = JSON.parse(fs.readFileSync('./cic.conf'));
|
|
||||||
|
|
||||||
const config = new cic.Config('./config');
|
|
||||||
config.process();
|
|
||||||
console.log(config);
|
|
||||||
|
|
||||||
|
|
||||||
function sendit(uid, envelope) {
|
|
||||||
const d = envelope.toJSON();
|
|
||||||
|
|
||||||
const contentLength = (new TextEncoder().encode(d)).length;
|
|
||||||
const opts = {
|
|
||||||
method: 'PUT',
|
|
||||||
headers: {
|
|
||||||
'Content-Type': 'application/json',
|
|
||||||
'Content-Length': contentLength,
|
|
||||||
'X-CIC-AUTOMERGE': 'client',
|
|
||||||
|
|
||||||
},
|
|
||||||
};
|
|
||||||
let url = config.get('META_URL');
|
|
||||||
url = url.replace(new RegExp('^(.+://[^/]+)/*$'), '$1/');
|
|
||||||
console.log('posting to url: ' + url + uid);
|
|
||||||
const req = http.request(url + uid, opts, (res) => {
|
|
||||||
res.on('data', process.stdout.write);
|
|
||||||
res.on('end', () => {
|
|
||||||
console.log('result', res.statusCode, res.headers);
|
|
||||||
});
|
|
||||||
});
|
|
||||||
if (!req.write(d)) {
|
|
||||||
console.error('foo', d);
|
|
||||||
process.exit(1);
|
|
||||||
}
|
|
||||||
req.end();
|
|
||||||
}
|
|
||||||
|
|
||||||
function doOne(keystore, filePath, identifier) {
|
|
||||||
const signer = new cic.PGPSigner(keystore);
|
|
||||||
|
|
||||||
const o = JSON.parse(fs.readFileSync(filePath).toString());
|
|
||||||
//const b = Buffer.from(j['vcard'], 'base64');
|
|
||||||
//const s = b.toString();
|
|
||||||
//const o = vcfp.parse(s);
|
|
||||||
//const phone = o.tel[0].value;
|
|
||||||
|
|
||||||
//cic.Phone.toKey(phone).then((uid) => {
|
|
||||||
//const o = fs.readFileSync(filePath, 'utf-8');
|
|
||||||
|
|
||||||
const s = new cic.Syncable(identifier, o);
|
|
||||||
s.setSigner(signer);
|
|
||||||
s.onwrap = (env) => {
|
|
||||||
sendit(identifier, env);
|
|
||||||
};
|
|
||||||
s.sign();
|
|
||||||
//});
|
|
||||||
}
|
|
||||||
|
|
||||||
const privateKeyPath = path.join(config.get('PGP_EXPORTS_DIR'), config.get('PGP_PRIVATE_KEY_FILE'));
|
|
||||||
const publicKeyPath = path.join(config.get('PGP_EXPORTS_DIR'), config.get('PGP_PRIVATE_KEY_FILE'));
|
|
||||||
pk = fs.readFileSync(privateKeyPath);
|
|
||||||
pubk = fs.readFileSync(publicKeyPath);
|
|
||||||
|
|
||||||
new cic.PGPKeyStore(
|
|
||||||
config.get('PGP_PASSPHRASE'),
|
|
||||||
pk,
|
|
||||||
pubk,
|
|
||||||
undefined,
|
|
||||||
undefined,
|
|
||||||
importMetaCustom,
|
|
||||||
);
|
|
||||||
|
|
||||||
const batchSize = 16;
|
|
||||||
const batchDelay = 1000;
|
|
||||||
const total = parseInt(process.argv[3]);
|
|
||||||
const dataDir = process.argv[2];
|
|
||||||
const workDir = path.join(dataDir, 'custom/meta');
|
|
||||||
const userDir = path.join(dataDir, 'custom/new');
|
|
||||||
let count = 0;
|
|
||||||
let batchCount = 0;
|
|
||||||
|
|
||||||
|
|
||||||
function importMetaCustom(keystore) {
|
|
||||||
let err;
|
|
||||||
let files;
|
|
||||||
|
|
||||||
try {
|
|
||||||
err, files = fs.readdirSync(workDir);
|
|
||||||
} catch {
|
|
||||||
console.error('source directory not yet ready', workDir);
|
|
||||||
setTimeout(importMetaPhone, batchDelay, keystore);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
let limit = batchSize;
|
|
||||||
if (files.length < limit) {
|
|
||||||
limit = files.length;
|
|
||||||
}
|
|
||||||
for (let i = 0; i < limit; i++) {
|
|
||||||
const file = files[i];
|
|
||||||
if (file.length < 3) {
|
|
||||||
console.debug('skipping file', file);
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
//const identifier = file.substr(0,file.length-5);
|
|
||||||
const identifier = file;
|
|
||||||
const filePath = path.join(workDir, file);
|
|
||||||
console.log(filePath);
|
|
||||||
|
|
||||||
//const address = fs.readFileSync(filePath).toString().substring(2).toUpperCase();
|
|
||||||
const custom = JSON.parse(fs.readFileSync(filePath).toString());
|
|
||||||
const customFilePath = path.join(
|
|
||||||
userDir,
|
|
||||||
identifier.substring(0, 2),
|
|
||||||
identifier.substring(2, 4),
|
|
||||||
identifier + '.json',
|
|
||||||
);
|
|
||||||
|
|
||||||
doOne(keystore, filePath, identifier);
|
|
||||||
fs.unlinkSync(filePath);
|
|
||||||
count++;
|
|
||||||
batchCount++;
|
|
||||||
if (batchCount == batchSize) {
|
|
||||||
console.debug('reached batch size, breathing');
|
|
||||||
batchCount=0;
|
|
||||||
setTimeout(importMeta, batchDelay, keystore);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (count == total) {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
setTimeout(importMetaCustom, 100, keystore);
|
|
||||||
}
|
|
||||||
@@ -4,10 +4,11 @@ const http = require('http');
|
|||||||
|
|
||||||
const cic = require('cic-client-meta');
|
const cic = require('cic-client-meta');
|
||||||
const vcfp = require('vcard-parser');
|
const vcfp = require('vcard-parser');
|
||||||
|
const crdt = require('crdt-meta');
|
||||||
|
|
||||||
//const conf = JSON.parse(fs.readFileSync('./cic.conf'));
|
//const conf = JSON.parse(fs.readFileSync('./cic.conf'));
|
||||||
|
|
||||||
const config = new cic.Config('./config');
|
const config = new crdt.Config('./config');
|
||||||
config.process();
|
config.process();
|
||||||
console.log(config);
|
console.log(config);
|
||||||
|
|
||||||
@@ -42,7 +43,7 @@ function sendit(uid, envelope) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
function doOne(keystore, filePath, address) {
|
function doOne(keystore, filePath, address) {
|
||||||
const signer = new cic.PGPSigner(keystore);
|
const signer = new crdt.PGPSigner(keystore);
|
||||||
|
|
||||||
const j = JSON.parse(fs.readFileSync(filePath).toString());
|
const j = JSON.parse(fs.readFileSync(filePath).toString());
|
||||||
const b = Buffer.from(j['vcard'], 'base64');
|
const b = Buffer.from(j['vcard'], 'base64');
|
||||||
@@ -51,9 +52,8 @@ function doOne(keystore, filePath, address) {
|
|||||||
const phone = o.tel[0].value;
|
const phone = o.tel[0].value;
|
||||||
|
|
||||||
cic.Phone.toKey(phone).then((uid) => {
|
cic.Phone.toKey(phone).then((uid) => {
|
||||||
const o = fs.readFileSync(filePath, 'utf-8');
|
|
||||||
|
|
||||||
const s = new cic.Syncable(uid, o);
|
const s = new crdt.Syncable(uid, address);
|
||||||
s.setSigner(signer);
|
s.setSigner(signer);
|
||||||
s.onwrap = (env) => {
|
s.onwrap = (env) => {
|
||||||
sendit(uid, env);
|
sendit(uid, env);
|
||||||
@@ -67,7 +67,7 @@ const publicKeyPath = path.join(config.get('PGP_EXPORTS_DIR'), config.get('PGP_P
|
|||||||
pk = fs.readFileSync(privateKeyPath);
|
pk = fs.readFileSync(privateKeyPath);
|
||||||
pubk = fs.readFileSync(publicKeyPath);
|
pubk = fs.readFileSync(publicKeyPath);
|
||||||
|
|
||||||
new cic.PGPKeyStore(
|
new crdt.PGPKeyStore(
|
||||||
config.get('PGP_PASSPHRASE'),
|
config.get('PGP_PASSPHRASE'),
|
||||||
pk,
|
pk,
|
||||||
pubk,
|
pubk,
|
||||||
@@ -123,7 +123,7 @@ function importMetaPhone(keystore) {
|
|||||||
if (batchCount == batchSize) {
|
if (batchCount == batchSize) {
|
||||||
console.debug('reached batch size, breathing');
|
console.debug('reached batch size, breathing');
|
||||||
batchCount=0;
|
batchCount=0;
|
||||||
setTimeout(importMeta, batchDelay, keystore);
|
setTimeout(importMetaPhone, batchDelay, keystore);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -37,7 +37,6 @@ config_dir = os.environ.get('CONFINI_DIR', os.path.join(script_dir, 'config'))
|
|||||||
|
|
||||||
argparser = argparse.ArgumentParser()
|
argparser = argparse.ArgumentParser()
|
||||||
argparser.add_argument('-c', type=str, default=config_dir, help='Config dir')
|
argparser.add_argument('-c', type=str, default=config_dir, help='Config dir')
|
||||||
argparser.add_argument('--tag', type=str, action='append', help='Tags to add to record')
|
|
||||||
argparser.add_argument('--gift-threshold', type=int, help='If set, users will be funded with additional random balance (in token integer units)')
|
argparser.add_argument('--gift-threshold', type=int, help='If set, users will be funded with additional random balance (in token integer units)')
|
||||||
argparser.add_argument('-v', action='store_true', help='Be verbose')
|
argparser.add_argument('-v', action='store_true', help='Be verbose')
|
||||||
argparser.add_argument('-vv', action='store_true', help='Be more verbose')
|
argparser.add_argument('-vv', action='store_true', help='Be more verbose')
|
||||||
@@ -82,10 +81,6 @@ phone_idx = []
|
|||||||
user_dir = args.dir
|
user_dir = args.dir
|
||||||
user_count = args.user_count
|
user_count = args.user_count
|
||||||
|
|
||||||
tags = args.tag
|
|
||||||
if tags == None or len(tags) == 0:
|
|
||||||
tags = ['individual']
|
|
||||||
|
|
||||||
random.seed()
|
random.seed()
|
||||||
|
|
||||||
def genPhoneIndex(phone):
|
def genPhoneIndex(phone):
|
||||||
@@ -194,7 +189,6 @@ if __name__ == '__main__':
|
|||||||
os.makedirs(base_dir, exist_ok=True)
|
os.makedirs(base_dir, exist_ok=True)
|
||||||
|
|
||||||
fa = open(os.path.join(user_dir, 'balances.csv'), 'w')
|
fa = open(os.path.join(user_dir, 'balances.csv'), 'w')
|
||||||
ft = open(os.path.join(user_dir, 'tags.csv'), 'w')
|
|
||||||
|
|
||||||
i = 0
|
i = 0
|
||||||
while i < user_count:
|
while i < user_count:
|
||||||
@@ -221,12 +215,10 @@ if __name__ == '__main__':
|
|||||||
f.write(eth)
|
f.write(eth)
|
||||||
f.close()
|
f.close()
|
||||||
|
|
||||||
ft.write('{}:{}\n'.format(eth, ','.join(tags)))
|
|
||||||
amount = genAmount()
|
amount = genAmount()
|
||||||
fa.write('{},{}\n'.format(eth,amount))
|
fa.write('{},{}\n'.format(eth,amount))
|
||||||
logg.debug('pidx {}, uid {}, eth {}, amount {}, phone {}'.format(pidx, uid, eth, amount, phone))
|
logg.debug('pidx {}, uid {}, eth {}, amount {}, phone {}'.format(pidx, uid, eth, amount, phone))
|
||||||
|
|
||||||
i += 1
|
i += 1
|
||||||
|
|
||||||
ft.close()
|
|
||||||
fa.close()
|
fa.close()
|
||||||
|
|||||||
@@ -38,7 +38,6 @@ argparser = argparse.ArgumentParser()
|
|||||||
argparser.add_argument('-p', '--provider', dest='p', default='http://localhost:8545', type=str, help='Web3 provider url (http only)')
|
argparser.add_argument('-p', '--provider', dest='p', default='http://localhost:8545', type=str, help='Web3 provider url (http only)')
|
||||||
argparser.add_argument('-y', '--key-file', dest='y', type=str, help='Ethereum keystore file to use for signing')
|
argparser.add_argument('-y', '--key-file', dest='y', type=str, help='Ethereum keystore file to use for signing')
|
||||||
argparser.add_argument('-c', type=str, default=default_config_dir, help='config file')
|
argparser.add_argument('-c', type=str, default=default_config_dir, help='config file')
|
||||||
argparser.add_argument('--old-chain-spec', type=str, dest='old_chain_spec', default='evm:oldchain:1', help='chain spec')
|
|
||||||
argparser.add_argument('-i', '--chain-spec', dest='i', type=str, help='Chain specification string')
|
argparser.add_argument('-i', '--chain-spec', dest='i', type=str, help='Chain specification string')
|
||||||
argparser.add_argument('-r', '--registry', dest='r', type=str, help='Contract registry address')
|
argparser.add_argument('-r', '--registry', dest='r', type=str, help='Contract registry address')
|
||||||
argparser.add_argument('--batch-size', dest='batch_size', default=50, type=int, help='burst size of sending transactions to node')
|
argparser.add_argument('--batch-size', dest='batch_size', default=50, type=int, help='burst size of sending transactions to node')
|
||||||
@@ -69,11 +68,6 @@ os.makedirs(user_new_dir)
|
|||||||
meta_dir = os.path.join(args.user_dir, 'meta')
|
meta_dir = os.path.join(args.user_dir, 'meta')
|
||||||
os.makedirs(meta_dir)
|
os.makedirs(meta_dir)
|
||||||
|
|
||||||
custom_dir = os.path.join(args.user_dir, 'custom')
|
|
||||||
os.makedirs(custom_dir)
|
|
||||||
os.makedirs(os.path.join(custom_dir, 'new'))
|
|
||||||
os.makedirs(os.path.join(custom_dir, 'meta'))
|
|
||||||
|
|
||||||
phone_dir = os.path.join(args.user_dir, 'phone')
|
phone_dir = os.path.join(args.user_dir, 'phone')
|
||||||
os.makedirs(os.path.join(phone_dir, 'meta'))
|
os.makedirs(os.path.join(phone_dir, 'meta'))
|
||||||
|
|
||||||
@@ -83,14 +77,9 @@ os.stat(user_old_dir)
|
|||||||
txs_dir = os.path.join(args.user_dir, 'txs')
|
txs_dir = os.path.join(args.user_dir, 'txs')
|
||||||
os.makedirs(txs_dir)
|
os.makedirs(txs_dir)
|
||||||
|
|
||||||
user_dir = args.user_dir
|
|
||||||
|
|
||||||
chain_spec = ChainSpec.from_chain_str(config.get('CIC_CHAIN_SPEC'))
|
chain_spec = ChainSpec.from_chain_str(config.get('CIC_CHAIN_SPEC'))
|
||||||
chain_str = str(chain_spec)
|
chain_str = str(chain_spec)
|
||||||
|
|
||||||
old_chain_spec = ChainSpec.from_chain_str(args.old_chain_spec)
|
|
||||||
old_chain_str = str(old_chain_spec)
|
|
||||||
|
|
||||||
batch_size = args.batch_size
|
batch_size = args.batch_size
|
||||||
batch_delay = args.batch_delay
|
batch_delay = args.batch_delay
|
||||||
|
|
||||||
@@ -138,18 +127,12 @@ def register_eth(i, u):
|
|||||||
return address
|
return address
|
||||||
|
|
||||||
|
|
||||||
|
def register_ussd(u):
|
||||||
|
pass
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
|
|
||||||
user_tags = {}
|
|
||||||
f = open(os.path.join(user_dir, 'tags.csv'), 'r')
|
|
||||||
while True:
|
|
||||||
r = f.readline().rstrip()
|
|
||||||
if len(r) == 0:
|
|
||||||
break
|
|
||||||
(old_address, tags_csv) = r.split(':')
|
|
||||||
old_address = strip_0x(old_address)
|
|
||||||
user_tags[old_address] = tags_csv.split(',')
|
|
||||||
logg.debug('read tags {} for old address {}'.format(user_tags[old_address], old_address))
|
|
||||||
|
|
||||||
i = 0
|
i = 0
|
||||||
j = 0
|
j = 0
|
||||||
@@ -167,7 +150,6 @@ if __name__ == '__main__':
|
|||||||
continue
|
continue
|
||||||
f.close()
|
f.close()
|
||||||
u = Person.deserialize(o)
|
u = Person.deserialize(o)
|
||||||
logg.debug('u {}'.format(o))
|
|
||||||
|
|
||||||
new_address = register_eth(i, u)
|
new_address = register_eth(i, u)
|
||||||
if u.identities.get('evm') == None:
|
if u.identities.get('evm') == None:
|
||||||
@@ -175,6 +157,8 @@ if __name__ == '__main__':
|
|||||||
sub_chain_str = '{}:{}'.format(chain_spec.common_name(), chain_spec.network_id())
|
sub_chain_str = '{}:{}'.format(chain_spec.common_name(), chain_spec.network_id())
|
||||||
u.identities['evm'][sub_chain_str] = [new_address]
|
u.identities['evm'][sub_chain_str] = [new_address]
|
||||||
|
|
||||||
|
register_ussd(u)
|
||||||
|
|
||||||
new_address_clean = strip_0x(new_address)
|
new_address_clean = strip_0x(new_address)
|
||||||
filepath = os.path.join(
|
filepath = os.path.join(
|
||||||
user_new_dir,
|
user_new_dir,
|
||||||
@@ -214,29 +198,6 @@ if __name__ == '__main__':
|
|||||||
|
|
||||||
os.symlink(os.path.realpath(filepath), meta_phone_filepath)
|
os.symlink(os.path.realpath(filepath), meta_phone_filepath)
|
||||||
|
|
||||||
|
|
||||||
# custom data
|
|
||||||
custom_key = generate_metadata_pointer(phone.encode('utf-8'), ':cic.custom')
|
|
||||||
custom_filepath = os.path.join(custom_dir, 'meta', custom_key)
|
|
||||||
|
|
||||||
filepath = os.path.join(
|
|
||||||
custom_dir,
|
|
||||||
'new',
|
|
||||||
custom_key[:2].upper(),
|
|
||||||
custom_key[2:4].upper(),
|
|
||||||
custom_key.upper() + '.json',
|
|
||||||
)
|
|
||||||
os.makedirs(os.path.dirname(filepath), exist_ok=True)
|
|
||||||
|
|
||||||
sub_old_chain_str = '{}:{}'.format(old_chain_spec.common_name(), old_chain_spec.network_id())
|
|
||||||
f = open(filepath, 'w')
|
|
||||||
k = u.identities['evm'][sub_old_chain_str][0]
|
|
||||||
tag_data = {'tags': user_tags[strip_0x(k)]}
|
|
||||||
f.write(json.dumps(tag_data))
|
|
||||||
f.close()
|
|
||||||
|
|
||||||
os.symlink(os.path.realpath(filepath), custom_filepath)
|
|
||||||
|
|
||||||
i += 1
|
i += 1
|
||||||
sys.stdout.write('imported {} {}'.format(i, u).ljust(200) + "\r")
|
sys.stdout.write('imported {} {}'.format(i, u).ljust(200) + "\r")
|
||||||
|
|
||||||
|
|||||||
2128
apps/contract-migration/scripts/package-lock.json
generated
2128
apps/contract-migration/scripts/package-lock.json
generated
File diff suppressed because it is too large
Load Diff
@@ -1,6 +1,7 @@
|
|||||||
{
|
{
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"cic-client-meta": "0.0.7-alpha.6",
|
"cic-client-meta": "^0.0.7-alpha.8",
|
||||||
|
"crdt-meta": "0.0.8",
|
||||||
"vcard-parser": "^1.0.0"
|
"vcard-parser": "^1.0.0"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -345,12 +345,11 @@ class Verifier:
|
|||||||
address_recovered = address_recovered.replace('"', '')
|
address_recovered = address_recovered.replace('"', '')
|
||||||
|
|
||||||
try:
|
try:
|
||||||
address = strip_0x(address)
|
upper_address_recovered = strip_0x(address_recovered).upper()
|
||||||
address_recovered = strip_0x(address_recovered)
|
|
||||||
except ValueError:
|
except ValueError:
|
||||||
raise VerifierError(address_recovered, 'metadata (phone) address {} address recovered {}'.format(address, address_recovered))
|
raise VerifierError(address_recovered, 'metadata (phone) address {} address recovered {}'.format(address, address_recovered))
|
||||||
|
|
||||||
if address != address_recovered:
|
if upper_address != upper_address_recovered:
|
||||||
raise VerifierError(address_recovered, 'metadata (phone)')
|
raise VerifierError(address_recovered, 'metadata (phone)')
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
@@ -13,12 +13,6 @@ DEV_PIP_EXTRA_INDEX_URL=${DEV_PIP_EXTRA_INDEX_URL:-https://pip.grassrootseconomi
|
|||||||
DEV_DATABASE_NAME_CIC_ETH=${DEV_DATABASE_NAME_CIC_ETH:-"cic-eth"}
|
DEV_DATABASE_NAME_CIC_ETH=${DEV_DATABASE_NAME_CIC_ETH:-"cic-eth"}
|
||||||
CIC_DATA_DIR=${CIC_DATA_DIR:-/tmp/cic}
|
CIC_DATA_DIR=${CIC_DATA_DIR:-/tmp/cic}
|
||||||
ETH_PASSPHRASE=''
|
ETH_PASSPHRASE=''
|
||||||
DEV_TOKEN_TYPE=${DEV_TOKEN_TYPE:-giftable}
|
|
||||||
if [ $DEV_TOKEN_TYPE = 'giftable' ]; then
|
|
||||||
token_symbol='GFT'
|
|
||||||
else
|
|
||||||
token_symbol='SRF'
|
|
||||||
fi
|
|
||||||
|
|
||||||
# Debug flag
|
# Debug flag
|
||||||
DEV_ETH_ACCOUNT_CONTRACT_DEPLOYER=0xEb3907eCad74a0013c259D5874AE7f22DcBcC95C
|
DEV_ETH_ACCOUNT_CONTRACT_DEPLOYER=0xEb3907eCad74a0013c259D5874AE7f22DcBcC95C
|
||||||
@@ -39,11 +33,11 @@ set -a
|
|||||||
# get required addresses from registries
|
# get required addresses from registries
|
||||||
DEV_TOKEN_INDEX_ADDRESS=`eth-contract-registry-list -i $CIC_CHAIN_SPEC -p $ETH_PROVIDER -r $CIC_REGISTRY_ADDRESS -f brief TokenRegistry`
|
DEV_TOKEN_INDEX_ADDRESS=`eth-contract-registry-list -i $CIC_CHAIN_SPEC -p $ETH_PROVIDER -r $CIC_REGISTRY_ADDRESS -f brief TokenRegistry`
|
||||||
DEV_ACCOUNT_INDEX_ADDRESS=`eth-contract-registry-list -i $CIC_CHAIN_SPEC -p $ETH_PROVIDER -r $CIC_REGISTRY_ADDRESS -f brief AccountRegistry`
|
DEV_ACCOUNT_INDEX_ADDRESS=`eth-contract-registry-list -i $CIC_CHAIN_SPEC -p $ETH_PROVIDER -r $CIC_REGISTRY_ADDRESS -f brief AccountRegistry`
|
||||||
DEV_RESERVE_ADDRESS=`eth-token-index-list -i $CIC_CHAIN_SPEC -p $ETH_PROVIDER -a $DEV_TOKEN_INDEX_ADDRESS -f brief $CIC_DEFAULT_TOKEN_SYMBOL`
|
DEV_RESERVE_ADDRESS=`eth-token-index-list -i $CIC_CHAIN_SPEC -p $ETH_PROVIDER -a $DEV_TOKEN_INDEX_ADDRESS -f brief SRF`
|
||||||
cat <<EOF
|
cat <<EOF
|
||||||
Token registry: $DEV_TOKEN_INDEX_ADDRESS
|
Token registry: $DEV_TOKEN_INDEX_ADDRESS
|
||||||
Account reigstry: $DEV_ACCOUNT_INDEX_ADDRESS
|
Account reigstry: $DEV_ACCOUNT_INDEX_ADDRESS
|
||||||
Reserve address: $DEV_RESERVE_ADDRESS ($CIC_DEFAULT_TOKEN_SYMBOL)
|
Reserve address: $DEV_RESERVE_ADDRESS
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
>&2 echo "create account for gas gifter"
|
>&2 echo "create account for gas gifter"
|
||||||
@@ -52,7 +46,6 @@ DEV_ETH_ACCOUNT_GAS_GIFTER=`cic-eth-create $debug --redis-host-callback=$REDIS_H
|
|||||||
echo DEV_ETH_ACCOUNT_GAS_GIFTER=$DEV_ETH_ACCOUNT_GAS_GIFTER >> $env_out_file
|
echo DEV_ETH_ACCOUNT_GAS_GIFTER=$DEV_ETH_ACCOUNT_GAS_GIFTER >> $env_out_file
|
||||||
cic-eth-tag -i $CIC_CHAIN_SPEC GAS_GIFTER $DEV_ETH_ACCOUNT_GAS_GIFTER
|
cic-eth-tag -i $CIC_CHAIN_SPEC GAS_GIFTER $DEV_ETH_ACCOUNT_GAS_GIFTER
|
||||||
|
|
||||||
|
|
||||||
>&2 echo "create account for sarafu gifter"
|
>&2 echo "create account for sarafu gifter"
|
||||||
DEV_ETH_ACCOUNT_SARAFU_GIFTER=`cic-eth-create $debug --redis-host-callback=$REDIS_HOST --redis-port-callback=$REDIS_PORT --no-register`
|
DEV_ETH_ACCOUNT_SARAFU_GIFTER=`cic-eth-create $debug --redis-host-callback=$REDIS_HOST --redis-port-callback=$REDIS_PORT --no-register`
|
||||||
echo DEV_ETH_ACCOUNT_SARAFU_GIFTER=$DEV_ETH_ACCOUNT_SARAFU_GIFTER >> $env_out_file
|
echo DEV_ETH_ACCOUNT_SARAFU_GIFTER=$DEV_ETH_ACCOUNT_SARAFU_GIFTER >> $env_out_file
|
||||||
@@ -104,10 +97,5 @@ export DEV_ETH_SARAFU_TOKEN_ADDRESS=$DEV_ETH_RESERVE_ADDRESS
|
|||||||
|
|
||||||
#echo -n 0 > $init_level_file
|
#echo -n 0 > $init_level_file
|
||||||
|
|
||||||
# Remove the SEND (8), QUEUE (16) and INIT (2) locks (or'ed), set by default at migration
|
|
||||||
cic-eth-ctl -i :: unlock INIT
|
|
||||||
cic-eth-ctl -i :: unlock SEND
|
|
||||||
cic-eth-ctl -i :: unlock QUEUE
|
|
||||||
|
|
||||||
set +a
|
set +a
|
||||||
set +e
|
set +e
|
||||||
|
|||||||
@@ -1 +0,0 @@
|
|||||||
include *health*.sh
|
|
||||||
@@ -1,10 +0,0 @@
|
|||||||
docs:
|
|
||||||
mkdir -p doc/texinfo/html
|
|
||||||
makeinfo doc/texinfo/index.texi --html -o doc/texinfo/html/
|
|
||||||
|
|
||||||
markdown: doc
|
|
||||||
pandoc -f html -t markdown --standalone doc/texinfo/html/liveness.html -o README.md
|
|
||||||
|
|
||||||
|
|
||||||
.PHONY dist:
|
|
||||||
python setup.py sdist
|
|
||||||
@@ -1,105 +0,0 @@
|
|||||||
---
|
|
||||||
description: liveness (Untitled Document)
|
|
||||||
distribution: global
|
|
||||||
Generator: makeinfo
|
|
||||||
keywords: liveness (Untitled Document)
|
|
||||||
lang: en
|
|
||||||
resource-type: document
|
|
||||||
title: liveness (Untitled Document)
|
|
||||||
---
|
|
||||||
|
|
||||||
[]{#liveness}[]{#liveness-1}
|
|
||||||
|
|
||||||
## 1 liveness {#liveness .chapter}
|
|
||||||
|
|
||||||
[]{#ilveness_005foverview}[]{#Overview}
|
|
||||||
|
|
||||||
### 1.1 Overview {#overview .section}
|
|
||||||
|
|
||||||
This is a cluster-specific convenience setup for enabling a
|
|
||||||
Kubernetes-style liveness/readiness test as outlined in
|
|
||||||
<https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/>.
|
|
||||||
|
|
||||||
Conceptually, it provides an application with means to:
|
|
||||||
|
|
||||||
- Run a collection of functions to validate sanity of the environment
|
|
||||||
- Set a no-error state before execution of the main routine
|
|
||||||
- Modify the error state during execution
|
|
||||||
- Invalidating all state when execution ends
|
|
||||||
|
|
||||||
[]{#Python-module}
|
|
||||||
|
|
||||||
### 1.2 Python module {#python-module .section}
|
|
||||||
|
|
||||||
Three python methods are provided.
|
|
||||||
|
|
||||||
[]{#load}
|
|
||||||
|
|
||||||
#### 1.2.1 load {#load .subsection}
|
|
||||||
|
|
||||||
This is meant to be called after configurations and environment has been
|
|
||||||
set up, but before the execution logic has commenced.
|
|
||||||
|
|
||||||
It receives a list of externally defined fully-qualified python modules.
|
|
||||||
Each of these modules must implement the method `health(*args,**kwargs)`
|
|
||||||
in its global namespace.
|
|
||||||
|
|
||||||
Any module returning `False` will cause a `RuntimeException`.
|
|
||||||
|
|
||||||
The component will not trap any other exception from the modules.
|
|
||||||
|
|
||||||
If successful, it will write the `pid` of the application to the
|
|
||||||
specified run data folder. By default this is `/run/<HOSTNAME>`, but the
|
|
||||||
path can be modified if desired.
|
|
||||||
|
|
||||||
[]{#set}
|
|
||||||
|
|
||||||
#### 1.2.2 set {#set .subsection}
|
|
||||||
|
|
||||||
This is meant to be called during the execution of the main program
|
|
||||||
routine begins.
|
|
||||||
|
|
||||||
[]{#at-startup}
|
|
||||||
|
|
||||||
#### 1.2.2.1 at startup {#at-startup .subsubsection}
|
|
||||||
|
|
||||||
It should be called once at the *start* of execution of the main program
|
|
||||||
routine.
|
|
||||||
|
|
||||||
For one-shot routines, this would mean the start of any code only run
|
|
||||||
when the module name is `__main__`.
|
|
||||||
|
|
||||||
For daemons, it would be just before handing over execution to the main
|
|
||||||
loop.
|
|
||||||
|
|
||||||
[]{#during-execution}
|
|
||||||
|
|
||||||
#### 1.2.2.2 during execution {#during-execution .subsubsection}
|
|
||||||
|
|
||||||
Call `set(error_code=<error>, ...` any time the health state temporarily
|
|
||||||
changes. Any `error` value other than `0` is considered an unhealthy
|
|
||||||
state.
|
|
||||||
|
|
||||||
[]{#at-shutdown}
|
|
||||||
|
|
||||||
#### 1.2.2.3 at shutdown {#at-shutdown .subsubsection}
|
|
||||||
|
|
||||||
Call `reset(...)`, which will indicate that the state is to be
|
|
||||||
considered the same as at startup.
|
|
||||||
|
|
||||||
[]{#shell}
|
|
||||||
|
|
||||||
### 1.3 shell {#shell .section}
|
|
||||||
|
|
||||||
A bash script is provided for *Kubernetes* to perform the health check.
|
|
||||||
|
|
||||||
It performs the following checks:
|
|
||||||
|
|
||||||
1. A numeric value exists in `<rundir>/<unitname>/pid`{.sample}.
|
|
||||||
2. The numeric value is a directory in `/proc`{.sample} (a valid pid)
|
|
||||||
3. The file `<rundir>/<unitname>/error`{.sample} contains \"0\"
|
|
||||||
|
|
||||||
If any of these checks fail should inditcate that the container is
|
|
||||||
unhealthy.
|
|
||||||
|
|
||||||
------------------------------------------------------------------------
|
|
||||||
@@ -1,71 +0,0 @@
|
|||||||
@node liveness
|
|
||||||
@chapter liveness
|
|
||||||
|
|
||||||
@anchor{ilveness_overview}
|
|
||||||
@section Overview
|
|
||||||
|
|
||||||
This is a cluster-specific convenience setup for enabling a Kubernetes-style liveness/readiness test as outlined in @url{https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/}.
|
|
||||||
|
|
||||||
Conceptually, it provides an application with means to:
|
|
||||||
|
|
||||||
@itemize
|
|
||||||
@item Run a collection of functions to validate sanity of the environment
|
|
||||||
@item Set a no-error state before execution of the main routine
|
|
||||||
@item Modify the error state during execution
|
|
||||||
@item Invalidating all state when execution ends
|
|
||||||
@end itemize
|
|
||||||
|
|
||||||
|
|
||||||
@section Python module
|
|
||||||
|
|
||||||
Three python methods are provided.
|
|
||||||
|
|
||||||
@subsection load
|
|
||||||
|
|
||||||
This is meant to be called after configurations and environment has been set up, but before the execution logic has commenced.
|
|
||||||
|
|
||||||
It receives a list of externally defined fully-qualified python modules. Each of these modules must implement the method @code{health(*args,**kwargs)} in its global namespace.
|
|
||||||
|
|
||||||
Any module returning @code{False} will cause a @code{RuntimeException}.
|
|
||||||
|
|
||||||
The component will not trap any other exception from the modules.
|
|
||||||
|
|
||||||
If successful, it will write the @code{pid} of the application to the specified run data folder. By default this is @code{/run/<HOSTNAME>}, but the path can be modified if desired.
|
|
||||||
|
|
||||||
|
|
||||||
@subsection set
|
|
||||||
|
|
||||||
This is meant to be called during the execution of the main program routine begins.
|
|
||||||
|
|
||||||
@subsubsection at startup
|
|
||||||
|
|
||||||
It should be called once at the @emph{start} of execution of the main program routine.
|
|
||||||
|
|
||||||
For one-shot routines, this would mean the start of any code only run when the module name is @code{__main__}.
|
|
||||||
|
|
||||||
For daemons, it would be just before handing over execution to the main loop.
|
|
||||||
|
|
||||||
|
|
||||||
@subsubsection during execution
|
|
||||||
|
|
||||||
Call @code{set(error_code=<error>, ...} any time the health state temporarily changes. Any @code{error} value other than @code{0} is considered an unhealthy state.
|
|
||||||
|
|
||||||
|
|
||||||
@subsubsection at shutdown
|
|
||||||
|
|
||||||
Call @code{reset(...)}, which will indicate that the state is to be considered the same as at startup.
|
|
||||||
|
|
||||||
|
|
||||||
@section shell
|
|
||||||
|
|
||||||
A bash script is provided for @emph{Kubernetes} to perform the health check.
|
|
||||||
|
|
||||||
It performs the following checks:
|
|
||||||
|
|
||||||
@enumerate
|
|
||||||
@item A numeric value exists in @file{<rundir>/<unitname>/pid}.
|
|
||||||
@item The numeric value is a directory in @file{/proc} (a valid pid)
|
|
||||||
@item The file @file{<rundir>/<unitname>/error} contains "0"
|
|
||||||
@end enumerate
|
|
||||||
|
|
||||||
If any of these checks fail should inditcate that the container is unhealthy.
|
|
||||||
@@ -1,35 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
|
|
||||||
rundir=${CIC_RUNDIR:-/run}
|
|
||||||
unit=${CIC_UNIT:-$HOSTNAME}
|
|
||||||
|
|
||||||
read p < $rundir/$unit/pid
|
|
||||||
|
|
||||||
if [ -z $p ]; then
|
|
||||||
>&2 echo unit $unit has no pid
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
if [ ! -d /proc/$p ]; then
|
|
||||||
>&2 echo unit $unit reports non-existent pid $p
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
>&2 echo unit $unit has pid $p
|
|
||||||
|
|
||||||
if [ ! -f $rundir/$unit/error ]; then
|
|
||||||
>&2 echo unit $unit has unspecified state
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
read e 2> /dev/null < $rundir/$unit/error
|
|
||||||
if [ -z $e ]; then
|
|
||||||
>&2 echo unit $unit has unspecified state
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
>&2 echo unit $unit has error $e
|
|
||||||
|
|
||||||
if [ $e -gt 0 ]; then
|
|
||||||
exit 1;
|
|
||||||
fi
|
|
||||||
@@ -1,54 +0,0 @@
|
|||||||
# standard imports
|
|
||||||
import importlib
|
|
||||||
import sys
|
|
||||||
import os
|
|
||||||
import logging
|
|
||||||
|
|
||||||
logg = logging.getLogger().getChild(__name__)
|
|
||||||
|
|
||||||
pid = os.getpid()
|
|
||||||
|
|
||||||
default_namespace = os.environ.get('LIVENESS_UNIT_NAME')
|
|
||||||
if default_namespace == None:
|
|
||||||
import socket
|
|
||||||
default_namespace = socket.gethostname()
|
|
||||||
|
|
||||||
|
|
||||||
def load(check_strs, namespace=default_namespace, rundir='/run', *args, **kwargs):
|
|
||||||
|
|
||||||
if namespace == None:
|
|
||||||
import socket
|
|
||||||
namespace = socket.gethostname()
|
|
||||||
|
|
||||||
logg.info('pid ' + str(pid))
|
|
||||||
|
|
||||||
checks = []
|
|
||||||
for m in check_strs:
|
|
||||||
logg.debug('added liveness check: {}'.format(str(m)))
|
|
||||||
module = importlib.import_module(m)
|
|
||||||
checks.append(module)
|
|
||||||
|
|
||||||
for check in checks:
|
|
||||||
r = check.health(*args, **kwargs)
|
|
||||||
if r == False:
|
|
||||||
raise RuntimeError('liveness check {} failed'.format(str(check)))
|
|
||||||
logg.info('liveness check passed: {}'.format(str(check)))
|
|
||||||
|
|
||||||
app_rundir = os.path.join(rundir, namespace)
|
|
||||||
os.makedirs(app_rundir, exist_ok=True) # should not already exist
|
|
||||||
f = open(os.path.join(app_rundir, 'pid'), 'w')
|
|
||||||
f.write(str(pid))
|
|
||||||
f.close()
|
|
||||||
|
|
||||||
|
|
||||||
def set(error=0, namespace=default_namespace, rundir='/run'):
|
|
||||||
app_rundir = os.path.join(rundir, namespace)
|
|
||||||
f = open(os.path.join(app_rundir, 'error'), 'w')
|
|
||||||
f.write(str(error))
|
|
||||||
f.close()
|
|
||||||
|
|
||||||
|
|
||||||
def reset(namespace=default_namespace, rundir='/run'):
|
|
||||||
app_rundir = os.path.join(rundir, namespace)
|
|
||||||
os.unlink(os.path.join(app_rundir, 'pid'))
|
|
||||||
os.unlink(os.path.join(app_rundir, 'error'))
|
|
||||||
@@ -1,7 +0,0 @@
|
|||||||
from setuptools import setup
|
|
||||||
setup(
|
|
||||||
name='liveness',
|
|
||||||
version='0.0.1a7',
|
|
||||||
packages=['liveness'],
|
|
||||||
include_package_data=True,
|
|
||||||
)
|
|
||||||
@@ -1,17 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
|
|
||||||
export CIC_RUNDIR=`realpath ./tests/testdata/run`
|
|
||||||
t=`mktemp -d -p $CIC_RUNDIR`
|
|
||||||
export CIC_UNIT=`basename $t`
|
|
||||||
|
|
||||||
>&2 echo test pid $$
|
|
||||||
echo $$ > $t/pid
|
|
||||||
echo 0 > $t/error
|
|
||||||
|
|
||||||
. health.sh
|
|
||||||
|
|
||||||
echo 1 > $t/error
|
|
||||||
#unlink $t/error
|
|
||||||
. health.sh
|
|
||||||
|
|
||||||
echo if error this is not printed
|
|
||||||
@@ -1,8 +0,0 @@
|
|||||||
a = ['foo']
|
|
||||||
kw = {
|
|
||||||
'bar': 42,
|
|
||||||
}
|
|
||||||
|
|
||||||
def health(*args, **kwargs):
|
|
||||||
args[0] == a[0]
|
|
||||||
kwargs['bar'] = kw['bar']
|
|
||||||
@@ -1,2 +0,0 @@
|
|||||||
def health(*args, **kwargs):
|
|
||||||
return False
|
|
||||||
@@ -1,2 +0,0 @@
|
|||||||
def health(*args, **kwargs):
|
|
||||||
return True
|
|
||||||
@@ -1,129 +0,0 @@
|
|||||||
# standard imports
|
|
||||||
import os
|
|
||||||
import unittest
|
|
||||||
import logging
|
|
||||||
import tempfile
|
|
||||||
import socket
|
|
||||||
|
|
||||||
# local imports
|
|
||||||
import liveness.linux
|
|
||||||
|
|
||||||
## test imports
|
|
||||||
import tests.imports
|
|
||||||
|
|
||||||
|
|
||||||
logging.basicConfig(level=logging.DEBUG)
|
|
||||||
logg = logging.getLogger()
|
|
||||||
script_dir = os.path.realpath(os.path.dirname(__file__))
|
|
||||||
data_dir = os.path.join(script_dir, 'testdata')
|
|
||||||
run_base_dir = os.path.join(data_dir, 'run')
|
|
||||||
|
|
||||||
|
|
||||||
class TestImports(unittest.TestCase):
|
|
||||||
|
|
||||||
def setUp(self):
|
|
||||||
os.makedirs(run_base_dir, exist_ok=True)
|
|
||||||
self.run_dir = tempfile.mkdtemp(dir=run_base_dir)
|
|
||||||
self.unit = 'unittest'
|
|
||||||
self.unit_dir = os.path.join(self.run_dir, self.unit)
|
|
||||||
self.pid_path = os.path.join(self.unit_dir, 'pid')
|
|
||||||
self.error_path = os.path.join(self.unit_dir, 'error')
|
|
||||||
self.host_path = os.path.join(self.run_dir, socket.gethostname())
|
|
||||||
|
|
||||||
|
|
||||||
def test_no_import(self):
|
|
||||||
liveness.linux.load([], namespace=self.unit, rundir=self.run_dir)
|
|
||||||
f = open(self.pid_path, 'r')
|
|
||||||
r = f.read()
|
|
||||||
f.close()
|
|
||||||
self.assertEqual(str(os.getpid()), r)
|
|
||||||
|
|
||||||
|
|
||||||
def test_hostname(self):
|
|
||||||
liveness.linux.load([], rundir=self.run_dir)
|
|
||||||
f = open(os.path.join(self.host_path, 'pid'), 'r')
|
|
||||||
r = f.read()
|
|
||||||
f.close()
|
|
||||||
self.assertEqual(str(os.getpid()), r)
|
|
||||||
|
|
||||||
|
|
||||||
def test_import_single_true(self):
|
|
||||||
checks = ['tests.imports.import_true']
|
|
||||||
liveness.linux.load(checks, namespace=self.unit, rundir=self.run_dir)
|
|
||||||
f = open(self.pid_path, 'r')
|
|
||||||
r = f.read()
|
|
||||||
f.close()
|
|
||||||
self.assertEqual(str(os.getpid()), r)
|
|
||||||
|
|
||||||
|
|
||||||
def test_import_single_false(self):
|
|
||||||
checks = ['tests.imports.import_false']
|
|
||||||
with self.assertRaises(RuntimeError):
|
|
||||||
liveness.linux.load(checks, namespace=self.unit, rundir=self.run_dir)
|
|
||||||
with self.assertRaises(FileNotFoundError):
|
|
||||||
os.stat(self.pid_path)
|
|
||||||
|
|
||||||
|
|
||||||
def test_import_false_then_true(self):
|
|
||||||
checks = ['tests.imports.import_false', 'tests.imports.import_true']
|
|
||||||
with self.assertRaises(RuntimeError):
|
|
||||||
liveness.linux.load(checks, namespace=self.unit, rundir=self.run_dir)
|
|
||||||
with self.assertRaises(FileNotFoundError):
|
|
||||||
os.stat(self.pid_path)
|
|
||||||
|
|
||||||
|
|
||||||
def test_import_multiple_true(self):
|
|
||||||
checks = ['tests.imports.import_true', 'tests.imports.import_true']
|
|
||||||
liveness.linux.load(checks, namespace=self.unit, rundir=self.run_dir)
|
|
||||||
f = open(self.pid_path, 'r')
|
|
||||||
r = f.read()
|
|
||||||
f.close()
|
|
||||||
self.assertEqual(str(os.getpid()), r)
|
|
||||||
|
|
||||||
|
|
||||||
def test_set(self):
|
|
||||||
liveness.linux.load([], namespace='unittest', rundir=self.run_dir)
|
|
||||||
liveness.linux.set(namespace='unittest', rundir=self.run_dir)
|
|
||||||
f = open(self.error_path, 'r')
|
|
||||||
r = f.read()
|
|
||||||
f.close()
|
|
||||||
self.assertEqual('0', r)
|
|
||||||
|
|
||||||
liveness.linux.set(error=42, namespace='unittest', rundir=self.run_dir)
|
|
||||||
f = open(self.error_path, 'r')
|
|
||||||
r = f.read()
|
|
||||||
f.close()
|
|
||||||
self.assertEqual('42', r)
|
|
||||||
|
|
||||||
liveness.linux.reset(namespace='unittest', rundir=self.run_dir)
|
|
||||||
with self.assertRaises(FileNotFoundError):
|
|
||||||
os.stat(self.error_path)
|
|
||||||
|
|
||||||
|
|
||||||
def test_set_hostname(self):
|
|
||||||
liveness.linux.load([], rundir=self.run_dir)
|
|
||||||
liveness.linux.set(rundir=self.run_dir)
|
|
||||||
error_path = os.path.join(self.host_path, 'error')
|
|
||||||
f = open(error_path, 'r')
|
|
||||||
r = f.read()
|
|
||||||
f.close()
|
|
||||||
self.assertEqual('0', r)
|
|
||||||
|
|
||||||
liveness.linux.reset(rundir=self.run_dir)
|
|
||||||
with self.assertRaises(FileNotFoundError):
|
|
||||||
os.stat(error_path)
|
|
||||||
|
|
||||||
|
|
||||||
def test_args(self):
|
|
||||||
checks = ['tests.imports.import_args']
|
|
||||||
aargs=['foo']
|
|
||||||
kwaargs={'bar': 42}
|
|
||||||
liveness.linux.load(checks, self.unit, self.run_dir, *aargs, **kwaargs)
|
|
||||||
f = open(self.pid_path, 'r')
|
|
||||||
r = f.read()
|
|
||||||
f.close()
|
|
||||||
self.assertEqual(str(os.getpid()), r)
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
|
||||||
unittest.main()
|
|
||||||
@@ -104,7 +104,7 @@ services:
|
|||||||
DEV_PIP_EXTRA_INDEX_URL: ${DEV_PIP_EXTRA_INDEX_URL:-https://pip.grassrootseconomics.net:8433}
|
DEV_PIP_EXTRA_INDEX_URL: ${DEV_PIP_EXTRA_INDEX_URL:-https://pip.grassrootseconomics.net:8433}
|
||||||
RUN_MASK: ${RUN_MASK:-0} # bit flags; 1: contract migrations 2: seed data
|
RUN_MASK: ${RUN_MASK:-0} # bit flags; 1: contract migrations 2: seed data
|
||||||
DEV_FAUCET_AMOUNT: ${DEV_FAUCET_AMOUNT:-0}
|
DEV_FAUCET_AMOUNT: ${DEV_FAUCET_AMOUNT:-0}
|
||||||
CIC_DEFAULT_TOKEN_SYMBOL: ${CIC_DEFAULT_TOKEN_SYMBOL:-GFT}
|
DEV_TOKEN_TYPE: ${DEV_TOKEN_TYPE:-giftable}
|
||||||
DEV_SARAFU_DEMURRAGE_LEVEL: ${DEV_SARAFU_DEMURRAGE_LEVEL:-196454828847045000000000000000000}
|
DEV_SARAFU_DEMURRAGE_LEVEL: ${DEV_SARAFU_DEMURRAGE_LEVEL:-196454828847045000000000000000000}
|
||||||
DEV_ETH_GAS_PRICE: ${DEV_ETH_GAS_PRICE:-1}
|
DEV_ETH_GAS_PRICE: ${DEV_ETH_GAS_PRICE:-1}
|
||||||
command: ["./run_job.sh"]
|
command: ["./run_job.sh"]
|
||||||
@@ -249,7 +249,6 @@ services:
|
|||||||
SIGNER_SECRET: ${SIGNER_SECRET:-deadbeef}
|
SIGNER_SECRET: ${SIGNER_SECRET:-deadbeef}
|
||||||
ETH_ACCOUNT_ACCOUNTS_INDEX_WRITER: ${DEV_ETH_ACCOUNT_ACCOUNTS_INDEX_WRITER:-0xACB0BC74E1686D62dE7DC6414C999EA60C09F0eA}
|
ETH_ACCOUNT_ACCOUNTS_INDEX_WRITER: ${DEV_ETH_ACCOUNT_ACCOUNTS_INDEX_WRITER:-0xACB0BC74E1686D62dE7DC6414C999EA60C09F0eA}
|
||||||
TASKS_TRACE_QUEUE_STATUS: ${TASKS_TRACE_QUEUE_STATUS:-1}
|
TASKS_TRACE_QUEUE_STATUS: ${TASKS_TRACE_QUEUE_STATUS:-1}
|
||||||
CIC_DEFAULT_TOKEN_SYMBOL: ${CIC_DEFAULT_TOKEN_SYMBOL:-GFT}
|
|
||||||
depends_on:
|
depends_on:
|
||||||
- eth
|
- eth
|
||||||
- postgres
|
- postgres
|
||||||
|
|||||||
Reference in New Issue
Block a user