repo
stringlengths
7
90
file_url
stringlengths
81
315
file_path
stringlengths
4
228
content
stringlengths
0
32.8k
language
stringclasses
1 value
license
stringclasses
7 values
commit_sha
stringlengths
40
40
retrieved_at
stringdate
2026-01-04 14:38:15
2026-01-05 02:33:18
truncated
bool
2 classes
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/puzzles/singleton_top_layer.py
flax/wallet/puzzles/singleton_top_layer.py
from typing import Iterator, List, Tuple, Optional from flax.types.blockchain_format.coin import Coin from flax.types.blockchain_format.program import Program from flax.types.blockchain_format.sized_bytes import bytes32 from flax.types.condition_opcodes import ConditionOpcode from flax.types.coin_spend import CoinSpend from flax.wallet.puzzles.load_clvm import load_clvm_maybe_recompile from flax.wallet.lineage_proof import LineageProof from flax.util.ints import uint64 from flax.util.hash import std_hash SINGLETON_MOD = load_clvm_maybe_recompile("singleton_top_layer.clvm") SINGLETON_MOD_HASH = SINGLETON_MOD.get_tree_hash() P2_SINGLETON_MOD = load_clvm_maybe_recompile("p2_singleton.clvm") P2_SINGLETON_OR_DELAYED_MOD = load_clvm_maybe_recompile("p2_singleton_or_delayed_puzhash.clvm") SINGLETON_LAUNCHER = load_clvm_maybe_recompile("singleton_launcher.clvm") SINGLETON_LAUNCHER_HASH = SINGLETON_LAUNCHER.get_tree_hash() ESCAPE_VALUE = -113 MELT_CONDITION = [ConditionOpcode.CREATE_COIN, 0, ESCAPE_VALUE] # # An explanation of how this functions from a user's perspective # # Consider that you have some coin A that you want to create a singleton # containing some inner puzzle I from with amount T. We'll call the Launcher # coin, which is created from A "Launcher" and the first iteration of the # singleton, called the "Eve" spend, Eve. When spent, I yields a coin # running I' and so on in a singleton specific way described below. # # The structure of this on the blockchain when done looks like this # # ,------------. # | Coin A | # `------------' # | # ------------------ Atomic Transaction 1 ----------------- # v # .------------. .-------------------------------. # | Launcher |------>| Eve Coin Containing Program I | # `------------' `-------------------------------' # | # -------------------- End Transaction 1 ------------------\ # | > The Eve coin # --------------- (2) Transaction With I ------------------/ may also be # | spent # v simultaneously # .-----------------------------------. # | Running Singleton With Program I' | # `-----------------------------------' # | # --------------------- End Transaction 2 ------------------ # | # --------------- (3) Transaction With I' ------------------ # ... # # # == Practical use of singleton_top_layer.py == # # 1) Designate some coin as coin A # # 2) call puzzle_for_singleton with that coin's name (it is the Parent of the # Launch coin), and the initial inner puzzle I, curried as appropriate for # its own purpose. Adaptations of the program I and its descendants are # required as below. # # 3) call launch_conditions_and_coinsol to get a set of "launch_conditions", # which will be used to spend standard coin A, and a "spend", which spends # the Launcher created by the application of "launch_conditions" to A in a # spend. These actions must be done in the same spend bundle. # # One can create a SpendBundle containing the spend of A giving it the # argument list (() (q . launch_conditions) ()) and then append "spend" onto # its .coin_spends to create a combined spend bundle. # # 4) submit the combine spend bundle. # # 5) Remember the identity of the Launcher coin: # # Coin(A.name(), SINGLETON_LAUNCHER_HASH, amount) # # A singleton has been created like this: # # Coin(Launcher.name(), puzzle_for_singleton(Launcher.name(), I), amount) # # # == To spend the singleton requires some host side setup == # # The singleton adds an ASSERT_MY_COIN_ID to constrain it to the coin that # matches its own conception of itself. It consumes a "LineageProof" object # when spent that must be constructed so. We'll call the singleton we intend # to spend "S". # # Specifically, the required puzzle is the Inner puzzle I for the parent of S # unless S is the Eve coin, in which case it is None. # So to spend S', the second singleton, I is used, and to spend S'', I' is used. # We'll call this puzzle hash (or None) PH. # # If this is the Eve singleton: # # PH = None # L = LineageProof(Launcher, PH, amount) # # - Note: the Eve singleton's .parent_coin_info should match Launcher here. # # Otherwise # # PH = ParentOf(S).inner_puzzle_hash # L = LineageProof(ParentOf(S).name(), PH, amount) # # - Note: ParentOf(S).name is the .parent_coin_info member of the # coin record for S. # # Now the coin S can be spent. # The puzzle to use in the spend is given by # # puzzle_for_singleton(S.name(), I'.puzzle_hash()) # # and the arguments are given by (with the argument list to I designated AI) # # solution_for_singleton(L, amount, AI) # # Note that AI contains dynamic arguments to puzzle I _after_ the singleton # truths. # # # Adapting puzzles to the singleton # # 1) For the puzzle to create a coin from inside the singleton it will need the # following values to be added to its curried in arguments: # # - A way to compute its own puzzle has for each of I' and so on. This can # be accomplished by giving it its uncurried puzzle hash and using # puzzle-hash-of-curried-function to compute it. Although full_puzzle_hash # is used for some arguments, the inputs to all singleton_top_layer # functions is the inner puzzle. # # - the name() of the Launcher coin (which you can compute from a Coin # object) if you're not already using it in I puzzle for some other # reason. # # 2) A non-curried argument called "singleton_truths" will be passed to your # program. It is not required to use anything inside. # # There is little value in not receiving this argument via the adaptations # below as a standard puzzle can't be used anyway. To work the result must # be itself a singleton, and the singleton does not change the puzzle hash # in an outgoing CREATE_COIN to cause it to be one. # # With this modification of the program I done, I and descendants will # continue to produce I', I'' etc. # # The actual CREATE_COIN puzzle hash will be the result of # this. The Launcher ID referred to here is the name() of # the Launcher coin as above. # def match_singleton_puzzle(puzzle: Program) -> Tuple[bool, Iterator[Program]]: mod, curried_args = puzzle.uncurry() if mod == SINGLETON_MOD: return True, curried_args.as_iter() else: return False, iter(()) # Given the parent and amount of the launcher coin, return the launcher coin def generate_launcher_coin(coin: Coin, amount: uint64) -> Coin: return Coin(coin.name(), SINGLETON_LAUNCHER_HASH, amount) # Wrap inner puzzles that are not singleton specific to strip away "truths" def adapt_inner_to_singleton(inner_puzzle: Program) -> Program: # (a (q . inner_puzzle) (r 1)) return Program.to([2, (1, inner_puzzle), [6, 1]]) def adapt_inner_puzzle_hash_to_singleton(inner_puzzle_hash: bytes32) -> bytes32: puzzle = adapt_inner_to_singleton(Program.to(inner_puzzle_hash)) return puzzle.get_tree_hash_precalc(inner_puzzle_hash) def remove_singleton_truth_wrapper(puzzle: Program) -> Program: inner_puzzle = puzzle.rest().first().rest() return inner_puzzle # Take standard coin and amount -> launch conditions & launcher coin solution def launch_conditions_and_coinsol( coin: Coin, inner_puzzle: Program, comment: List[Tuple[str, str]], amount: uint64, ) -> Tuple[List[Program], CoinSpend]: if (amount % 2) == 0: raise ValueError("Coin amount cannot be even. Subtract one mojo.") launcher_coin: Coin = generate_launcher_coin(coin, amount) curried_singleton: Program = SINGLETON_MOD.curry( (SINGLETON_MOD_HASH, (launcher_coin.name(), SINGLETON_LAUNCHER_HASH)), inner_puzzle, ) launcher_solution = Program.to( [ curried_singleton.get_tree_hash(), amount, comment, ] ) create_launcher = Program.to( [ ConditionOpcode.CREATE_COIN, SINGLETON_LAUNCHER_HASH, amount, ], ) assert_launcher_announcement = Program.to( [ ConditionOpcode.ASSERT_COIN_ANNOUNCEMENT, std_hash(launcher_coin.name() + launcher_solution.get_tree_hash()), ], ) conditions = [create_launcher, assert_launcher_announcement] launcher_coin_spend = CoinSpend( launcher_coin, SINGLETON_LAUNCHER, launcher_solution, ) return conditions, launcher_coin_spend # Take a coin solution, return a lineage proof for their child to use in spends def lineage_proof_for_coinsol(coin_spend: CoinSpend) -> LineageProof: parent_name: bytes32 = coin_spend.coin.parent_coin_info inner_puzzle_hash: Optional[bytes32] = None if coin_spend.coin.puzzle_hash != SINGLETON_LAUNCHER_HASH: full_puzzle = Program.from_bytes(bytes(coin_spend.puzzle_reveal)) r = full_puzzle.uncurry() if r is not None: _, args = r _, inner_puzzle = list(args.as_iter()) inner_puzzle_hash = inner_puzzle.get_tree_hash() amount: uint64 = uint64(coin_spend.coin.amount) return LineageProof( parent_name, inner_puzzle_hash, amount, ) # Return the puzzle reveal of a singleton with specific ID and innerpuz def puzzle_for_singleton( launcher_id: bytes32, inner_puz: Program, launcher_hash: bytes32 = SINGLETON_LAUNCHER_HASH ) -> Program: return SINGLETON_MOD.curry( (SINGLETON_MOD_HASH, (launcher_id, launcher_hash)), inner_puz, ) # Return a solution to spend a singleton def solution_for_singleton( lineage_proof: LineageProof, amount: uint64, inner_solution: Program, ) -> Program: if lineage_proof.inner_puzzle_hash is None: parent_info = [ lineage_proof.parent_name, lineage_proof.amount, ] else: parent_info = [ lineage_proof.parent_name, lineage_proof.inner_puzzle_hash, lineage_proof.amount, ] return Program.to([parent_info, amount, inner_solution]) # Create a coin that a singleton can claim def pay_to_singleton_puzzle(launcher_id: bytes32) -> Program: return P2_SINGLETON_MOD.curry(SINGLETON_MOD_HASH, launcher_id, SINGLETON_LAUNCHER_HASH) # Create a coin that a singleton can claim or that can be sent to another puzzle after a specified time def pay_to_singleton_or_delay_puzzle(launcher_id: bytes32, delay_time: uint64, delay_ph: bytes32) -> Program: return P2_SINGLETON_OR_DELAYED_MOD.curry( SINGLETON_MOD_HASH, launcher_id, SINGLETON_LAUNCHER_HASH, delay_time, delay_ph, ) # Solution for EITHER p2_singleton or the claiming spend case for p2_singleton_or_delayed_puzhash def solution_for_p2_singleton(p2_singleton_coin: Coin, singleton_inner_puzhash: bytes32) -> Program: return Program.to([singleton_inner_puzhash, p2_singleton_coin.name()]) # Solution for the delayed spend case for p2_singleton_or_delayed_puzhash def solution_for_p2_delayed_puzzle(output_amount: uint64) -> Program: return Program.to([output_amount, []]) # Get announcement conditions for singleton solution and full CoinSpend for the claimed coin def claim_p2_singleton( p2_singleton_coin: Coin, singleton_inner_puzhash: bytes32, launcher_id: bytes32, delay_time: Optional[uint64] = None, delay_ph: Optional[bytes32] = None, ) -> Tuple[Program, Program, CoinSpend]: assertion = Program.to([ConditionOpcode.ASSERT_COIN_ANNOUNCEMENT, std_hash(p2_singleton_coin.name() + b"$")]) announcement = Program.to([ConditionOpcode.CREATE_PUZZLE_ANNOUNCEMENT, p2_singleton_coin.name()]) if delay_time is None or delay_ph is None: puzzle: Program = pay_to_singleton_puzzle(launcher_id) else: puzzle = pay_to_singleton_or_delay_puzzle( launcher_id, delay_time, delay_ph, ) claim_coinsol = CoinSpend( p2_singleton_coin, puzzle, solution_for_p2_singleton(p2_singleton_coin, singleton_inner_puzhash), ) return assertion, announcement, claim_coinsol # Get the CoinSpend for spending to a delayed puzzle def spend_to_delayed_puzzle( p2_singleton_coin: Coin, output_amount: uint64, launcher_id: bytes32, delay_time: uint64, delay_ph: bytes32, ) -> CoinSpend: claim_coinsol = CoinSpend( p2_singleton_coin, pay_to_singleton_or_delay_puzzle(launcher_id, delay_time, delay_ph), solution_for_p2_delayed_puzzle(output_amount), ) return claim_coinsol
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/puzzles/p2_delegated_puzzle_or_hidden_puzzle.py
flax/wallet/puzzles/p2_delegated_puzzle_or_hidden_puzzle.py
""" Pay to delegated puzzle or hidden puzzle In this puzzle program, the solution must choose either a hidden puzzle or a delegated puzzle on a given public key. The given public key is morphed by adding an offset from the hash of the hidden puzzle and itself, giving a new so-called "synthetic" public key which has the hidden puzzle hidden inside of it. If the hidden puzzle path is taken, the hidden puzzle and original public key will be revealed which proves that it was hidden there in the first place. This roughly corresponds to bitcoin's taproot. Note: p2_delegated_puzzle_or_hidden_puzzle is essentially the "standard coin" in flax. DEFAULT_HIDDEN_PUZZLE_HASH from this puzzle is used with calculate_synthetic_secret_key in the wallet's standard pk_to_sk finder. This is important because it allows sign_coin_spends to function properly via the following mechanism: - A 'standard coin' coin exists in the blockchain with some puzzle hash. - The user's wallet contains a primary sk/pk pair which are used to derive to one level a set of auxiliary sk/pk pairs which are used for specific coins. These can be used for signing in AGG_SIG_ME, but the standard coin uses a key further derived from one of these via calculate_synthetic_secret_key as described in https://flaxlisp.com/docs/standard_transaction. Therefore, when a wallet needs to find a secret key for signing based on a public key, it needs to try repeating this derivation as well and see if the G1Element (pk) associated with any of the derived secret keys matches the pk requested by the coin. - Python code previously appeared which was written like: delegated_puzzle_solution = Program.to((1, condition_args)) solutions = Program.to([[], delgated_puzzle_solution, []]) In context, delegated_puzzle_solution here is any *flaxlisp program*, here one simply quoting a list of conditions, and the following argument is the arguments to this program, which here are unused. Secondly, the actual arguments to the p2_delegated_puzzle_or_hidden_puzzle are given. The first argument determines whether a hidden or revealed puzzle is used. If the puzzle is hidden, then what is required is a signature given a specific synthetic key since the key cannot be derived inline without the puzzle. In that case, the first argument is this key. In most cases, the puzzle will be revealed, and this argument will be the nil object, () (represented here by an empty python list). The second and third arguments are a flaxlisp program and its corresponding arguments, which will be run inside the standard coin puzzle. This interacts with sign_coin_spend in that the AGG_SIG_ME condition added by the inner puzzle asks the surrounding system to provide a signature over the provided program with a synthetic key whose derivation is within. Any wallets which intend to use standard coins in this way must try to resolve a public key to a secret key via this derivation. """ from __future__ import annotations import hashlib from typing import Union from blspy import G1Element, PrivateKey from clvm.casts import int_from_bytes from flax.types.blockchain_format.program import Program from flax.types.blockchain_format.sized_bytes import bytes32 from flax.wallet.util.curry_and_treehash import calculate_hash_of_quoted_mod_hash, curry_and_treehash from .load_clvm import load_clvm_maybe_recompile from .p2_conditions import puzzle_for_conditions DEFAULT_HIDDEN_PUZZLE = Program.from_bytes(bytes.fromhex("ff0980")) DEFAULT_HIDDEN_PUZZLE_HASH = DEFAULT_HIDDEN_PUZZLE.get_tree_hash() # this puzzle `(x)` always fails MOD = load_clvm_maybe_recompile("p2_delegated_puzzle_or_hidden_puzzle.clvm") QUOTED_MOD_HASH = calculate_hash_of_quoted_mod_hash(MOD.get_tree_hash()) PublicKeyProgram = Union[bytes, Program] GROUP_ORDER = 0x73EDA753299D7D483339D80809A1D80553BDA402FFFE5BFEFFFFFFFF00000001 def calculate_synthetic_offset(public_key: G1Element, hidden_puzzle_hash: bytes32) -> int: blob = hashlib.sha256(bytes(public_key) + hidden_puzzle_hash).digest() offset = int_from_bytes(blob) offset %= GROUP_ORDER return offset def calculate_synthetic_public_key(public_key: G1Element, hidden_puzzle_hash: bytes32) -> G1Element: synthetic_offset: PrivateKey = PrivateKey.from_bytes( calculate_synthetic_offset(public_key, hidden_puzzle_hash).to_bytes(32, "big") ) return public_key + synthetic_offset.get_g1() def calculate_synthetic_secret_key(secret_key: PrivateKey, hidden_puzzle_hash: bytes32) -> PrivateKey: secret_exponent = int.from_bytes(bytes(secret_key), "big") public_key = secret_key.get_g1() synthetic_offset = calculate_synthetic_offset(public_key, hidden_puzzle_hash) synthetic_secret_exponent = (secret_exponent + synthetic_offset) % GROUP_ORDER blob = synthetic_secret_exponent.to_bytes(32, "big") synthetic_secret_key = PrivateKey.from_bytes(blob) return synthetic_secret_key def puzzle_for_synthetic_public_key(synthetic_public_key: G1Element) -> Program: return MOD.curry(bytes(synthetic_public_key)) def puzzle_hash_for_synthetic_public_key(synthetic_public_key: G1Element) -> bytes32: public_key_hash = Program.to(bytes(synthetic_public_key)).get_tree_hash() return curry_and_treehash(QUOTED_MOD_HASH, public_key_hash) def puzzle_for_public_key_and_hidden_puzzle_hash(public_key: G1Element, hidden_puzzle_hash: bytes32) -> Program: synthetic_public_key = calculate_synthetic_public_key(public_key, hidden_puzzle_hash) return puzzle_for_synthetic_public_key(synthetic_public_key) def puzzle_hash_for_public_key_and_hidden_puzzle_hash(public_key: G1Element, hidden_puzzle_hash: bytes32) -> bytes32: synthetic_public_key = calculate_synthetic_public_key(public_key, hidden_puzzle_hash) return puzzle_hash_for_synthetic_public_key(synthetic_public_key) def puzzle_for_public_key_and_hidden_puzzle(public_key: G1Element, hidden_puzzle: Program) -> Program: return puzzle_for_public_key_and_hidden_puzzle_hash(public_key, hidden_puzzle.get_tree_hash()) def puzzle_for_pk(public_key: G1Element) -> Program: return puzzle_for_public_key_and_hidden_puzzle_hash(public_key, DEFAULT_HIDDEN_PUZZLE_HASH) def puzzle_hash_for_pk(public_key: G1Element) -> bytes32: return puzzle_hash_for_public_key_and_hidden_puzzle_hash(public_key, DEFAULT_HIDDEN_PUZZLE_HASH) def solution_for_delegated_puzzle(delegated_puzzle: Program, solution: Program) -> Program: return Program.to([[], delegated_puzzle, solution]) def solution_for_hidden_puzzle( hidden_public_key: G1Element, hidden_puzzle: Program, solution_to_hidden_puzzle: Program, ) -> Program: return Program.to([hidden_public_key, hidden_puzzle, solution_to_hidden_puzzle]) def solution_for_conditions(conditions) -> Program: delegated_puzzle = puzzle_for_conditions(conditions) return solution_for_delegated_puzzle(delegated_puzzle, Program.to(0))
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/puzzles/cat_loader.py
flax/wallet/puzzles/cat_loader.py
from __future__ import annotations from flax.wallet.puzzles.load_clvm import load_clvm_maybe_recompile CAT_MOD = load_clvm_maybe_recompile("cat_v2.clvm", package_or_requirement=__name__) LOCK_INNER_PUZZLE = load_clvm_maybe_recompile("lock.inner.puzzle.clvm", package_or_requirement=__name__) CAT_MOD_HASH = CAT_MOD.get_tree_hash()
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/puzzles/load_clvm.py
flax/wallet/puzzles/load_clvm.py
import importlib import inspect import os import sys import tempfile import pathlib from typing import List import pkg_resources from flax.types.blockchain_format.program import Program, SerializedProgram from flax.util.lock import Lockfile from clvm_tools_rs import compile_clvm as compile_clvm_rust compile_clvm_py = None recompile_requested = (os.environ.get("FLAX_DEV_COMPILE_CLVM_ON_IMPORT", "") != "") or ("pytest" in sys.modules) def translate_path(p_): p = str(p_) if os.path.isdir(p): return p else: module_object = importlib.import_module(p) return os.path.dirname(inspect.getfile(module_object)) # Handle optional use of python clvm_tools if available and requested if "CLVM_TOOLS" in os.environ: try: from clvm_tools.clvmc import compile_clvm as compile_clvm_py_candidate compile_clvm_py = compile_clvm_py_candidate finally: pass def compile_clvm_in_lock(full_path: pathlib.Path, output: pathlib.Path, search_paths: List[pathlib.Path]): # Compile using rust (default) # Ensure path translation is done in the idiomatic way currently # expected. It can use either a filesystem path or name a python # module. treated_include_paths = list(map(translate_path, search_paths)) res = compile_clvm_rust(str(full_path), str(output), treated_include_paths) if "CLVM_TOOLS" in os.environ and os.environ["CLVM_TOOLS"] == "check" and compile_clvm_py is not None: # Simple helper to read the compiled output def sha256file(f): import hashlib m = hashlib.sha256() m.update(open(f).read().strip().encode("utf8")) return m.hexdigest() orig = "%s.orig" % output compile_clvm_py(full_path, orig, search_paths=search_paths) orig256 = sha256file(orig) rs256 = sha256file(output) if orig256 != rs256: print("Compiled original %s: %s vs rust %s\n" % (full_path, orig256, rs256)) print("Aborting compilation due to mismatch with rust") assert orig256 == rs256 else: print("Compilation match %s: %s\n" % (full_path, orig256)) return res def compile_clvm(full_path: pathlib.Path, output: pathlib.Path, search_paths: List[pathlib.Path] = []): with Lockfile.create(pathlib.Path(tempfile.gettempdir()) / "flvm_compile" / full_path.name): compile_clvm_in_lock(full_path, output, search_paths) def load_serialized_clvm( clvm_filename, package_or_requirement=__name__, include_standard_libraries: bool = False, recompile: bool = True ) -> SerializedProgram: """ This function takes a .clvm file in the given package and compiles it to a .clvm.hex file if the .hex file is missing or older than the .clvm file, then returns the contents of the .hex file as a `Program`. clvm_filename: file name package_or_requirement: usually `__name__` if the clvm file is in the same package """ hex_filename = f"{clvm_filename}.hex" # Set the FLAX_DEV_COMPILE_CLVM_ON_IMPORT environment variable to anything except # "" or "0" to trigger automatic recompilation of the Flaxlisp on load. if recompile: try: if pkg_resources.resource_exists(package_or_requirement, clvm_filename): # Establish whether the size is zero on entry full_path = pathlib.Path(pkg_resources.resource_filename(package_or_requirement, clvm_filename)) output = full_path.parent / hex_filename search_paths = [full_path.parent] if include_standard_libraries: # we can't get the dir, but we can get a file then get its parent. flax_puzzles_path = pathlib.Path(pkg_resources.resource_filename(__name__, "__init__.py")).parent search_paths.append(flax_puzzles_path) compile_clvm(full_path, output, search_paths=search_paths) except NotImplementedError: # pyinstaller doesn't support `pkg_resources.resource_exists` # so we just fall through to loading the hex clvm pass clvm_hex = pkg_resources.resource_string(package_or_requirement, hex_filename).decode("utf8") assert len(clvm_hex.strip()) != 0 clvm_blob = bytes.fromhex(clvm_hex) return SerializedProgram.from_bytes(clvm_blob) def load_clvm( clvm_filename, package_or_requirement=__name__, include_standard_libraries: bool = False, recompile: bool = True, ) -> Program: return Program.from_bytes( bytes( load_serialized_clvm( clvm_filename, package_or_requirement=package_or_requirement, include_standard_libraries=include_standard_libraries, recompile=recompile, ) ) ) def load_clvm_maybe_recompile( clvm_filename, package_or_requirement=__name__, include_standard_libraries: bool = False, recompile: bool = recompile_requested, ) -> Program: return load_clvm( clvm_filename=clvm_filename, package_or_requirement=package_or_requirement, include_standard_libraries=include_standard_libraries, recompile=recompile, ) def load_serialized_clvm_maybe_recompile( clvm_filename, package_or_requirement=__name__, include_standard_libraries: bool = False, recompile: bool = recompile_requested, ) -> SerializedProgram: return load_serialized_clvm( clvm_filename=clvm_filename, package_or_requirement=package_or_requirement, include_standard_libraries=include_standard_libraries, recompile=recompile, )
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/puzzles/tails.py
flax/wallet/puzzles/tails.py
from typing import Tuple, Dict, List, Optional, Any from flax.types.blockchain_format.program import Program from flax.types.blockchain_format.sized_bytes import bytes32 from flax.types.spend_bundle import SpendBundle from flax.util.ints import uint64 from flax.util.byte_types import hexstr_to_bytes from flax.wallet.cat_wallet.lineage_store import CATLineageStore from flax.wallet.lineage_proof import LineageProof from flax.wallet.puzzles.load_clvm import load_clvm_maybe_recompile from flax.wallet.cat_wallet.cat_utils import ( construct_cat_puzzle, unsigned_spend_bundle_for_spendable_cats, SpendableCAT, ) from flax.wallet.puzzles.cat_loader import CAT_MOD from flax.wallet.cat_wallet.cat_info import CATInfo from flax.wallet.transaction_record import TransactionRecord GENESIS_BY_ID_MOD = load_clvm_maybe_recompile("genesis_by_coin_id.clvm") GENESIS_BY_PUZHASH_MOD = load_clvm_maybe_recompile("genesis_by_puzzle_hash.clvm") EVERYTHING_WITH_SIG_MOD = load_clvm_maybe_recompile("everything_with_signature.clvm") DELEGATED_LIMITATIONS_MOD = load_clvm_maybe_recompile("delegated_tail.clvm") class LimitationsProgram: @staticmethod def match(uncurried_mod: Program, curried_args: Program) -> Tuple[bool, List[Program]]: raise NotImplementedError("Need to implement 'match' on limitations programs") @staticmethod def construct(args: List[Program]) -> Program: raise NotImplementedError("Need to implement 'construct' on limitations programs") @staticmethod def solve(args: List[Program], solution_dict: Dict) -> Program: raise NotImplementedError("Need to implement 'solve' on limitations programs") @classmethod async def generate_issuance_bundle( cls, wallet, cat_tail_info: Dict, amount: uint64 ) -> Tuple[TransactionRecord, SpendBundle]: raise NotImplementedError("Need to implement 'generate_issuance_bundle' on limitations programs") class GenesisById(LimitationsProgram): """ This TAIL allows for coins to be issued only by a specific "genesis" coin ID. There can therefore only be one issuance. There is no minting or melting allowed. """ @staticmethod def match(uncurried_mod: Program, curried_args: Program) -> Tuple[bool, List[Program]]: if uncurried_mod == GENESIS_BY_ID_MOD: genesis_id = curried_args.first() return True, [genesis_id] else: return False, [] @staticmethod def construct(args: List[Program]) -> Program: return GENESIS_BY_ID_MOD.curry(args[0]) @staticmethod def solve(args: List[Program], solution_dict: Dict) -> Program: return Program.to([]) @classmethod async def generate_issuance_bundle(cls, wallet, _: Dict, amount: uint64) -> Tuple[TransactionRecord, SpendBundle]: coins = await wallet.standard_wallet.select_coins(amount) origin = coins.copy().pop() origin_id = origin.name() cat_inner: Program = await wallet.get_new_inner_puzzle() tail: Program = cls.construct([Program.to(origin_id)]) wallet.lineage_store = await CATLineageStore.create( wallet.wallet_state_manager.db_wrapper, tail.get_tree_hash().hex() ) await wallet.add_lineage(origin_id, LineageProof()) minted_cat_puzzle_hash: bytes32 = construct_cat_puzzle(CAT_MOD, tail.get_tree_hash(), cat_inner).get_tree_hash() tx_record: TransactionRecord = await wallet.standard_wallet.generate_signed_transaction( amount, minted_cat_puzzle_hash, uint64(0), origin_id, coins ) assert tx_record.spend_bundle is not None inner_solution = wallet.standard_wallet.add_condition_to_solution( Program.to([51, 0, -113, tail, []]), wallet.standard_wallet.make_solution( primaries=[{"puzzlehash": cat_inner.get_tree_hash(), "amount": amount}], ), ) eve_spend = unsigned_spend_bundle_for_spendable_cats( CAT_MOD, [ SpendableCAT( list(filter(lambda a: a.amount == amount, tx_record.additions))[0], tail.get_tree_hash(), cat_inner, inner_solution, limitations_program_reveal=tail, ) ], ) signed_eve_spend = await wallet.sign(eve_spend) if wallet.cat_info.my_tail is None: await wallet.save_info(CATInfo(tail.get_tree_hash(), tail)) return tx_record, SpendBundle.aggregate([tx_record.spend_bundle, signed_eve_spend]) class GenesisByPuzhash(LimitationsProgram): """ This TAIL allows for issuance of a certain coin only by a specific puzzle hash. There is no minting or melting allowed. """ @staticmethod def match(uncurried_mod: Program, curried_args: Program) -> Tuple[bool, List[Program]]: if uncurried_mod == GENESIS_BY_PUZHASH_MOD: genesis_puzhash = curried_args.first() return True, [genesis_puzhash] else: return False, [] @staticmethod def construct(args: List[Program]) -> Program: return GENESIS_BY_PUZHASH_MOD.curry(args[0]) @staticmethod def solve(args: List[Program], solution_dict: Dict) -> Program: pid = hexstr_to_bytes(solution_dict["parent_coin_info"]) return Program.to([pid, solution_dict["amount"]]) class EverythingWithSig(LimitationsProgram): """ This TAIL allows for issuance, minting, and melting as long as you provide a signature with the spend. """ @staticmethod def match(uncurried_mod: Program, curried_args: Program) -> Tuple[bool, List[Program]]: if uncurried_mod == EVERYTHING_WITH_SIG_MOD: pubkey = curried_args.first() return True, [pubkey] else: return False, [] @staticmethod def construct(args: List[Program]) -> Program: return EVERYTHING_WITH_SIG_MOD.curry(args[0]) @staticmethod def solve(args: List[Program], solution_dict: Dict) -> Program: return Program.to([]) class DelegatedLimitations(LimitationsProgram): """ This TAIL allows for another TAIL to be used, as long as a signature of that TAIL's puzzlehash is included. """ @staticmethod def match(uncurried_mod: Program, curried_args: Program) -> Tuple[bool, List[Program]]: if uncurried_mod == DELEGATED_LIMITATIONS_MOD: pubkey = curried_args.first() return True, [pubkey] else: return False, [] @staticmethod def construct(args: List[Program]) -> Program: return DELEGATED_LIMITATIONS_MOD.curry(args[0]) @staticmethod def solve(args: List[Program], solution_dict: Dict) -> Program: signed_program = ALL_LIMITATIONS_PROGRAMS[solution_dict["signed_program"]["identifier"]] inner_program_args = [Program.fromhex(item) for item in solution_dict["signed_program"]["args"]] inner_solution_dict = solution_dict["program_arguments"] return Program.to( [ signed_program.construct(inner_program_args), signed_program.solve(inner_program_args, inner_solution_dict), ] ) # This should probably be much more elegant than just a dictionary with strings as identifiers # Right now this is small and experimental so it can stay like this ALL_LIMITATIONS_PROGRAMS: Dict[str, Any] = { "genesis_by_id": GenesisById, "genesis_by_puzhash": GenesisByPuzhash, "everything_with_signature": EverythingWithSig, "delegated_limitations": DelegatedLimitations, } def match_limitations_program(limitations_program: Program) -> Tuple[Optional[LimitationsProgram], List[Program]]: uncurried_mod, curried_args = limitations_program.uncurry() for key, lp in ALL_LIMITATIONS_PROGRAMS.items(): matched, args = lp.match(uncurried_mod, curried_args) if matched: return lp, args return None, []
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/puzzles/p2_puzzle_hash.py
flax/wallet/puzzles/p2_puzzle_hash.py
""" Pay to puzzle hash In this puzzle program, the solution must be a reveal of the puzzle with the given hash along with its solution. """ from __future__ import annotations from flax.types.blockchain_format.program import Program from flax.types.blockchain_format.sized_bytes import bytes32 from .load_clvm import load_clvm_maybe_recompile MOD = load_clvm_maybe_recompile("p2_puzzle_hash.clvm") def puzzle_for_inner_puzzle_hash(inner_puzzle_hash: bytes32) -> Program: program = MOD.curry(inner_puzzle_hash) return program def puzzle_for_inner_puzzle(inner_puzzle: Program) -> Program: return puzzle_for_inner_puzzle_hash(inner_puzzle.get_tree_hash()) def solution_for_inner_puzzle_and_inner_solution(inner_puzzle: Program, inner_puzzle_solution: Program) -> Program: return Program.to([inner_puzzle, inner_puzzle_solution])
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/puzzles/rom_bootstrap_generator.py
flax/wallet/puzzles/rom_bootstrap_generator.py
from __future__ import annotations from flax.types.blockchain_format.program import SerializedProgram from .load_clvm import load_serialized_clvm_maybe_recompile MOD = load_serialized_clvm_maybe_recompile("rom_bootstrap_generator.clvm") def get_generator() -> SerializedProgram: return MOD
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/puzzles/singleton_top_layer_v1_1.py
flax/wallet/puzzles/singleton_top_layer_v1_1.py
from __future__ import annotations from typing import Iterator, List, Optional, Tuple from flax.types.blockchain_format.coin import Coin from flax.types.blockchain_format.program import Program from flax.types.blockchain_format.sized_bytes import bytes32 from flax.types.coin_spend import CoinSpend from flax.types.condition_opcodes import ConditionOpcode from flax.util.hash import std_hash from flax.util.ints import uint64 from flax.wallet.lineage_proof import LineageProof from flax.wallet.puzzles.load_clvm import load_clvm_maybe_recompile from flax.wallet.uncurried_puzzle import UncurriedPuzzle SINGLETON_MOD = load_clvm_maybe_recompile("singleton_top_layer_v1_1.clvm") SINGLETON_MOD_HASH = SINGLETON_MOD.get_tree_hash() P2_SINGLETON_MOD = load_clvm_maybe_recompile("p2_singleton.clvm") P2_SINGLETON_OR_DELAYED_MOD = load_clvm_maybe_recompile("p2_singleton_or_delayed_puzhash.clvm") SINGLETON_LAUNCHER = load_clvm_maybe_recompile("singleton_launcher.clvm") SINGLETON_LAUNCHER_HASH = SINGLETON_LAUNCHER.get_tree_hash() ESCAPE_VALUE = -113 MELT_CONDITION = [ConditionOpcode.CREATE_COIN, 0, ESCAPE_VALUE] # # An explanation of how this functions from a user's perspective # # Consider that you have some coin A that you want to create a singleton # containing some inner puzzle I from with amount T. We'll call the Launcher # coin, which is created from A "Launcher" and the first iteration of the # singleton, called the "Eve" spend, Eve. When spent, I yields a coin # running I' and so on in a singleton specific way described below. # # The structure of this on the blockchain when done looks like this # # ,------------. # | Coin A | # `------------' # | # ------------------ Atomic Transaction 1 ----------------- # v # .------------. .-------------------------------. # | Launcher |------>| Eve Coin Containing Program I | # `------------' `-------------------------------' # | # -------------------- End Transaction 1 ------------------\ # | > The Eve coin # --------------- (2) Transaction With I ------------------/ may also be # | spent # v simultaneously # .-----------------------------------. # | Running Singleton With Program I' | # `-----------------------------------' # | # --------------------- End Transaction 2 ------------------ # | # --------------- (3) Transaction With I' ------------------ # ... # # # == Practical use of singleton_top_layer.py == # # 1) Designate some coin as coin A # # 2) call puzzle_for_singleton with that coin's name (it is the Parent of the # Launch coin), and the initial inner puzzle I, curried as appropriate for # its own purpose. Adaptations of the program I and its descendants are # required as below. # # 3) call launch_conditions_and_coinsol to get a set of "launch_conditions", # which will be used to spend standard coin A, and a "spend", which spends # the Launcher created by the application of "launch_conditions" to A in a # spend. These actions must be done in the same spend bundle. # # One can create a SpendBundle containing the spend of A giving it the # argument list (() (q . launch_conditions) ()) and then append "spend" onto # its .coin_spends to create a combined spend bundle. # # 4) submit the combine spend bundle. # # 5) Remember the identity of the Launcher coin: # # Coin(A.name(), SINGLETON_LAUNCHER_HASH, amount) # # A singleton has been created like this: # # Coin(Launcher.name(), puzzle_for_singleton(Launcher.name(), I), amount) # # # == To spend the singleton requires some host side setup == # # The singleton adds an ASSERT_MY_COIN_ID to constrain it to the coin that # matches its own conception of itself. It consumes a "LineageProof" object # when spent that must be constructed so. We'll call the singleton we intend # to spend "S". # # Specifically, the required puzzle is the Inner puzzle I for the parent of S # unless S is the Eve coin, in which case it is None. # So to spend S', the second singleton, I is used, and to spend S'', I' is used. # We'll call this puzzle hash (or None) PH. # # If this is the Eve singleton: # # PH = None # L = LineageProof(Launcher, PH, amount) # # - Note: the Eve singleton's .parent_coin_info should match Launcher here. # # Otherwise # # PH = ParentOf(S).inner_puzzle_hash # L = LineageProof(ParentOf(S).name(), PH, amount) # # - Note: ParentOf(S).name is the .parent_coin_info member of the # coin record for S. # # Now the coin S can be spent. # The puzzle to use in the spend is given by # # puzzle_for_singleton(S.name(), I'.puzzle_hash()) # # and the arguments are given by (with the argument list to I designated AI) # # solution_for_singleton(L, amount, AI) # # Note that AI contains dynamic arguments to puzzle I _after_ the singleton # truths. # # # Adapting puzzles to the singleton # # 1) For the puzzle to create a coin from inside the singleton it will need the # following values to be added to its curried in arguments: # # - A way to compute its own puzzle has for each of I' and so on. This can # be accomplished by giving it its uncurried puzzle hash and using # puzzle-hash-of-curried-function to compute it. Although full_puzzle_hash # is used for some arguments, the inputs to all singleton_top_layer # functions is the inner puzzle. # # - the name() of the Launcher coin (which you can compute from a Coin # object) if you're not already using it in I puzzle for some other # reason. # # 2) A non-curried argument called "singleton_truths" will be passed to your # program. It is not required to use anything inside. # # There is little value in not receiving this argument via the adaptations # below as a standard puzzle can't be used anyway. To work the result must # be itself a singleton, and the singleton does not change the puzzle hash # in an outgoing CREATE_COIN to cause it to be one. # # With this modification of the program I done, I and descendants will # continue to produce I', I'' etc. # # The actual CREATE_COIN puzzle hash will be the result of # this. The Launcher ID referred to here is the name() of # the Launcher coin as above. # def match_singleton_puzzle(puzzle: UncurriedPuzzle) -> Tuple[bool, Iterator[Program]]: if puzzle.mod == SINGLETON_MOD: return True, puzzle.args.as_iter() else: return False, iter(()) # Given the parent and amount of the launcher coin, return the launcher coin def generate_launcher_coin(coin: Coin, amount: uint64) -> Coin: return Coin(coin.name(), SINGLETON_LAUNCHER_HASH, amount) def remove_singleton_truth_wrapper(puzzle: Program) -> Program: inner_puzzle: Program = puzzle.rest().first().rest() return inner_puzzle # Take standard coin and amount -> launch conditions & launcher coin solution def launch_conditions_and_coinsol( coin: Coin, inner_puzzle: Program, comment: List[Tuple[str, str]], amount: uint64, ) -> Tuple[List[Program], CoinSpend]: if (amount % 2) == 0: raise ValueError("Coin amount cannot be even. Subtract one mojo.") launcher_coin: Coin = generate_launcher_coin(coin, amount) curried_singleton: Program = SINGLETON_MOD.curry( (SINGLETON_MOD_HASH, (launcher_coin.name(), SINGLETON_LAUNCHER_HASH)), inner_puzzle, ) launcher_solution = Program.to( [ curried_singleton.get_tree_hash(), amount, comment, ] ) create_launcher = Program.to( [ ConditionOpcode.CREATE_COIN, SINGLETON_LAUNCHER_HASH, amount, ], ) assert_launcher_announcement = Program.to( [ ConditionOpcode.ASSERT_COIN_ANNOUNCEMENT, std_hash(launcher_coin.name() + launcher_solution.get_tree_hash()), ], ) conditions = [create_launcher, assert_launcher_announcement] launcher_coin_spend = CoinSpend( launcher_coin, SINGLETON_LAUNCHER, launcher_solution, ) return conditions, launcher_coin_spend # Take a coin solution, return a lineage proof for their child to use in spends def lineage_proof_for_coinsol(coin_spend: CoinSpend) -> LineageProof: parent_name: bytes32 = coin_spend.coin.parent_coin_info inner_puzzle_hash: Optional[bytes32] = None if coin_spend.coin.puzzle_hash != SINGLETON_LAUNCHER_HASH: full_puzzle = Program.from_bytes(bytes(coin_spend.puzzle_reveal)) r = full_puzzle.uncurry() if r is not None: _, args = r _, inner_puzzle = list(args.as_iter()) inner_puzzle_hash = inner_puzzle.get_tree_hash() amount: uint64 = uint64(coin_spend.coin.amount) return LineageProof( parent_name, inner_puzzle_hash, amount, ) # Return the puzzle reveal of a singleton with specific ID and innerpuz def puzzle_for_singleton( launcher_id: bytes32, inner_puz: Program, launcher_hash: bytes32 = SINGLETON_LAUNCHER_HASH ) -> Program: return SINGLETON_MOD.curry( (SINGLETON_MOD_HASH, (launcher_id, launcher_hash)), inner_puz, ) # Return a solution to spend a singleton def solution_for_singleton( lineage_proof: LineageProof, amount: uint64, inner_solution: Program, ) -> Program: if lineage_proof.inner_puzzle_hash is None: parent_info = [ lineage_proof.parent_name, lineage_proof.amount, ] else: parent_info = [ lineage_proof.parent_name, lineage_proof.inner_puzzle_hash, lineage_proof.amount, ] solution: Program = Program.to([parent_info, amount, inner_solution]) return solution # Create a coin that a singleton can claim def pay_to_singleton_puzzle(launcher_id: bytes32) -> Program: return P2_SINGLETON_MOD.curry(SINGLETON_MOD_HASH, launcher_id, SINGLETON_LAUNCHER_HASH) # Create a coin that a singleton can claim or that can be sent to another puzzle after a specified time def pay_to_singleton_or_delay_puzzle(launcher_id: bytes32, delay_time: uint64, delay_ph: bytes32) -> Program: return P2_SINGLETON_OR_DELAYED_MOD.curry( SINGLETON_MOD_HASH, launcher_id, SINGLETON_LAUNCHER_HASH, delay_time, delay_ph, ) # Solution for EITHER p2_singleton or the claiming spend case for p2_singleton_or_delayed_puzhash def solution_for_p2_singleton(p2_singleton_coin: Coin, singleton_inner_puzhash: bytes32) -> Program: solution: Program = Program.to([singleton_inner_puzhash, p2_singleton_coin.name()]) return solution # Solution for the delayed spend case for p2_singleton_or_delayed_puzhash def solution_for_p2_delayed_puzzle(output_amount: uint64) -> Program: solution: Program = Program.to([output_amount, []]) return solution # Get announcement conditions for singleton solution and full CoinSpend for the claimed coin def claim_p2_singleton( p2_singleton_coin: Coin, singleton_inner_puzhash: bytes32, launcher_id: bytes32, delay_time: Optional[uint64] = None, delay_ph: Optional[bytes32] = None, ) -> Tuple[Program, Program, CoinSpend]: assertion = Program.to([ConditionOpcode.ASSERT_COIN_ANNOUNCEMENT, std_hash(p2_singleton_coin.name() + b"$")]) announcement = Program.to([ConditionOpcode.CREATE_PUZZLE_ANNOUNCEMENT, p2_singleton_coin.name()]) if delay_time is None or delay_ph is None: puzzle: Program = pay_to_singleton_puzzle(launcher_id) else: puzzle = pay_to_singleton_or_delay_puzzle( launcher_id, delay_time, delay_ph, ) claim_coinsol = CoinSpend( p2_singleton_coin, puzzle, solution_for_p2_singleton(p2_singleton_coin, singleton_inner_puzhash), ) return assertion, announcement, claim_coinsol # Get the CoinSpend for spending to a delayed puzzle def spend_to_delayed_puzzle( p2_singleton_coin: Coin, output_amount: uint64, launcher_id: bytes32, delay_time: uint64, delay_ph: bytes32, ) -> CoinSpend: claim_coinsol = CoinSpend( p2_singleton_coin, pay_to_singleton_or_delay_puzzle(launcher_id, delay_time, delay_ph), solution_for_p2_delayed_puzzle(output_amount), ) return claim_coinsol
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/puzzles/__init__.py
flax/wallet/puzzles/__init__.py
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/puzzles/puzzle_utils.py
flax/wallet/puzzles/puzzle_utils.py
from typing import Optional, List from flax.types.condition_opcodes import ConditionOpcode def make_create_coin_condition(puzzle_hash, amount, memos: Optional[List[bytes]]) -> List: if memos is not None: return [ConditionOpcode.CREATE_COIN, puzzle_hash, amount, memos] return [ConditionOpcode.CREATE_COIN, puzzle_hash, amount] def make_assert_aggsig_condition(pubkey): return [ConditionOpcode.AGG_SIG_UNSAFE, pubkey] def make_assert_my_coin_id_condition(coin_name): return [ConditionOpcode.ASSERT_MY_COIN_ID, coin_name] def make_assert_absolute_height_exceeds_condition(block_index): return [ConditionOpcode.ASSERT_HEIGHT_ABSOLUTE, block_index] def make_assert_relative_height_exceeds_condition(block_index): return [ConditionOpcode.ASSERT_HEIGHT_RELATIVE, block_index] def make_assert_absolute_seconds_exceeds_condition(time): return [ConditionOpcode.ASSERT_SECONDS_ABSOLUTE, time] def make_assert_relative_seconds_exceeds_condition(time): return [ConditionOpcode.ASSERT_SECONDS_RELATIVE, time] def make_reserve_fee_condition(fee): return [ConditionOpcode.RESERVE_FEE, fee] def make_assert_coin_announcement(announcement_hash): return [ConditionOpcode.ASSERT_COIN_ANNOUNCEMENT, announcement_hash] def make_assert_puzzle_announcement(announcement_hash): return [ConditionOpcode.ASSERT_PUZZLE_ANNOUNCEMENT, announcement_hash] def make_create_coin_announcement(message): return [ConditionOpcode.CREATE_COIN_ANNOUNCEMENT, message] def make_create_puzzle_announcement(message): return [ConditionOpcode.CREATE_PUZZLE_ANNOUNCEMENT, message] def make_assert_my_parent_id(parent_id): return [ConditionOpcode.ASSERT_MY_PARENT_ID, parent_id] def make_assert_my_puzzlehash(puzzlehash): return [ConditionOpcode.ASSERT_MY_PUZZLEHASH, puzzlehash] def make_assert_my_amount(amount): return [ConditionOpcode.ASSERT_MY_AMOUNT, amount]
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/puzzles/p2_delegated_puzzle.py
flax/wallet/puzzles/p2_delegated_puzzle.py
""" Pay to delegated puzzle In this puzzle program, the solution must be a signed delegated puzzle, along with its (unsigned) solution. The delegated puzzle is executed, passing in the solution. This obviously could be done recursively, arbitrarily deep (as long as the maximum cost is not exceeded). If you want to specify the conditions directly (thus terminating the potential recursion), you can use p2_conditions. This roughly corresponds to bitcoin's graftroot. """ from __future__ import annotations from flax.types.blockchain_format.program import Program from . import p2_conditions from .load_clvm import load_clvm_maybe_recompile MOD = load_clvm_maybe_recompile("p2_delegated_puzzle.clvm") def puzzle_for_pk(public_key: bytes) -> Program: return MOD.curry(public_key) def solution_for_conditions(conditions) -> Program: delegated_puzzle = p2_conditions.puzzle_for_conditions(conditions) return solution_for_delegated_puzzle(delegated_puzzle, Program.to(0)) def solution_for_delegated_puzzle(delegated_puzzle: Program, delegated_solution: Program) -> Program: return delegated_puzzle.to([delegated_puzzle, delegated_solution])
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/puzzles/p2_m_of_n_delegate_direct.py
flax/wallet/puzzles/p2_m_of_n_delegate_direct.py
""" Pay to m of n direct This puzzle program is like p2_delegated_puzzle except instead of one public key, it includes N public keys, any M of which needs to sign the delegated puzzle. """ from __future__ import annotations from flax.types.blockchain_format.program import Program from .load_clvm import load_clvm_maybe_recompile MOD = load_clvm_maybe_recompile("p2_m_of_n_delegate_direct.clvm") def puzzle_for_m_of_public_key_list(m, public_key_list) -> Program: return MOD.curry(m, public_key_list) def solution_for_delegated_puzzle(m, selectors, puzzle, solution) -> Program: return Program.to([selectors, puzzle, solution])
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/puzzles/p2_conditions.py
flax/wallet/puzzles/p2_conditions.py
""" Pay to conditions In this puzzle program, the solution is ignored. The reveal of the puzzle returns a fixed list of conditions. This roughly corresponds to OP_SECURETHEBAG in bitcoin. This is a pretty useless most of the time. But some (most?) solutions require a delegated puzzle program, so in those cases, this is just what the doctor ordered. """ from __future__ import annotations from flax.types.blockchain_format.program import Program from .load_clvm import load_clvm_maybe_recompile MOD = load_clvm_maybe_recompile("p2_conditions.clvm") def puzzle_for_conditions(conditions) -> Program: return MOD.run([conditions]) def solution_for_conditions(conditions) -> Program: return Program.to([puzzle_for_conditions(conditions), 0])
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/puzzles/decompress_block_spends.py
flax/wallet/puzzles/decompress_block_spends.py
from __future__ import annotations from flax.wallet.puzzles.load_clvm import load_serialized_clvm_maybe_recompile DECOMPRESS_BLOCK_SPENDS = load_serialized_clvm_maybe_recompile( "decompress_block_spends.clvm", package_or_requirement=__name__ )
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/puzzles/prefarm/spend_prefarm.py
flax/wallet/puzzles/prefarm/spend_prefarm.py
import asyncio from blspy import G2Element from clvm_tools import binutils from flax.consensus.block_rewards import calculate_base_farmer_reward, calculate_pool_reward from flax.rpc.full_node_rpc_client import FullNodeRpcClient from flax.types.blockchain_format.program import Program from flax.types.coin_spend import CoinSpend from flax.types.condition_opcodes import ConditionOpcode from flax.types.spend_bundle import SpendBundle from flax.util.bech32m import decode_puzzle_hash from flax.util.condition_tools import parse_sexp_to_conditions from flax.util.config import load_config from flax.util.default_root import DEFAULT_ROOT_PATH from flax.util.ints import uint32, uint16 def print_conditions(spend_bundle: SpendBundle): print("\nConditions:") for coin_spend in spend_bundle.coin_spends: result = Program.from_bytes(bytes(coin_spend.puzzle_reveal)).run(Program.from_bytes(bytes(coin_spend.solution))) error, result_human = parse_sexp_to_conditions(result) assert error is None assert result_human is not None for cvp in result_human: print(f"{ConditionOpcode(cvp.opcode).name}: {[var.hex() for var in cvp.vars]}") print("") async def main() -> None: rpc_port: uint16 = uint16(8555) self_hostname = "localhost" path = DEFAULT_ROOT_PATH config = load_config(path, "config.yaml") client = await FullNodeRpcClient.create(self_hostname, rpc_port, path, config) try: farmer_prefarm = (await client.get_block_record_by_height(1)).reward_claims_incorporated[1] pool_prefarm = (await client.get_block_record_by_height(1)).reward_claims_incorporated[0] pool_amounts = int(calculate_pool_reward(uint32(0)) / 2) farmer_amounts = int(calculate_base_farmer_reward(uint32(0)) / 2) print(farmer_prefarm.amount, farmer_amounts) assert farmer_amounts == farmer_prefarm.amount // 2 assert pool_amounts == pool_prefarm.amount // 2 address1 = "xfx1rdatypul5c642jkeh4yp933zu3hw8vv8tfup8ta6zfampnyhjnusxdgns6" # Key 1 address2 = "xfx1duvy5ur5eyj7lp5geetfg84cj2d7xgpxt7pya3lr2y6ke3696w9qvda66e" # Key 2 ph1 = decode_puzzle_hash(address1) ph2 = decode_puzzle_hash(address2) p_farmer_2 = Program.to( binutils.assemble(f"(q . ((51 0x{ph1.hex()} {farmer_amounts}) (51 0x{ph2.hex()} {farmer_amounts})))") ) p_pool_2 = Program.to( binutils.assemble(f"(q . ((51 0x{ph1.hex()} {pool_amounts}) (51 0x{ph2.hex()} {pool_amounts})))") ) print(f"Ph1: {ph1.hex()}") print(f"Ph2: {ph2.hex()}") assert ph1.hex() == "1b7ab2079fa635554ad9bd4812c622e46ee3b1875a7813afba127bb0cc9794f9" assert ph2.hex() == "6f184a7074c925ef8688ce56941eb8929be320265f824ec7e351356cc745d38a" p_solution = Program.to(binutils.assemble("()")) sb_farmer = SpendBundle([CoinSpend(farmer_prefarm, p_farmer_2, p_solution)], G2Element()) sb_pool = SpendBundle([CoinSpend(pool_prefarm, p_pool_2, p_solution)], G2Element()) print("\n\n\nConditions") print_conditions(sb_pool) print("\n\n\n") print("Farmer to spend") print(sb_pool) print(sb_farmer) print("\n\n\n") # res = await client.push_tx(sb_farmer) # res = await client.push_tx(sb_pool) # print(res) up = await client.get_coin_records_by_puzzle_hash(farmer_prefarm.puzzle_hash, True) uf = await client.get_coin_records_by_puzzle_hash(pool_prefarm.puzzle_hash, True) print(up) print(uf) finally: client.close() asyncio.run(main())
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/puzzles/prefarm/make_prefarm_ph.py
flax/wallet/puzzles/prefarm/make_prefarm_ph.py
from clvm.casts import int_from_bytes from clvm_tools import binutils from flax.consensus.block_rewards import calculate_base_farmer_reward, calculate_pool_reward from flax.types.blockchain_format.program import Program from flax.types.condition_opcodes import ConditionOpcode from flax.util.bech32m import decode_puzzle_hash, encode_puzzle_hash from flax.util.condition_tools import parse_sexp_to_conditions from flax.util.ints import uint32 from flax.types.blockchain_format.sized_bytes import bytes32 address1 = "txfx15gx26ndmacfaqlq8m0yajeggzceu7cvmaz4df0hahkukes695rss6lej7h" # Gene wallet (m/12381/8444/2/42): address2 = "txfx1c2cguswhvmdyz9hr3q6hak2h6p9dw4rz82g4707k2xy2sarv705qcce4pn" # Mariano address (m/12381/8444/2/0) ph1 = decode_puzzle_hash(address1) ph2 = decode_puzzle_hash(address2) pool_amounts = int(calculate_pool_reward(uint32(0)) / 2) farmer_amounts = int(calculate_base_farmer_reward(uint32(0)) / 2) assert pool_amounts * 2 == calculate_pool_reward(uint32(0)) assert farmer_amounts * 2 == calculate_base_farmer_reward(uint32(0)) def make_puzzle(amount: int) -> int: puzzle = f"(q . ((51 0x{ph1.hex()} {amount}) (51 0x{ph2.hex()} {amount})))" # print(puzzle) # TODO: properly type hint clvm_tools assembled_puzzle = binutils.assemble(puzzle) # type: ignore[no-untyped-call] puzzle_prog = Program.to(assembled_puzzle) print("Program: ", puzzle_prog) puzzle_hash = puzzle_prog.get_tree_hash() solution = "()" prefix = "xfx" print("PH", puzzle_hash) print(f"Address: {encode_puzzle_hash(puzzle_hash, prefix)}") result = puzzle_prog.run(solution) error, result_human = parse_sexp_to_conditions(result) total_flax = 0 if error: print(f"Error: {error}") else: assert result_human is not None for cvp in result_human: assert len(cvp.vars) == 2 total_flax += int_from_bytes(cvp.vars[1]) print( f"{ConditionOpcode(cvp.opcode).name}: {encode_puzzle_hash(bytes32(cvp.vars[0]), prefix)}," f" amount: {int_from_bytes(cvp.vars[1])}" ) return total_flax total_flax = 0 print("Pool address: ") total_flax += make_puzzle(pool_amounts) print("\nFarmer address: ") total_flax += make_puzzle(farmer_amounts) assert total_flax == calculate_base_farmer_reward(uint32(0)) + calculate_pool_reward(uint32(0))
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/puzzles/prefarm/__init__.py
flax/wallet/puzzles/prefarm/__init__.py
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/nft_wallet/nft_puzzles.py
flax/wallet/nft_wallet/nft_puzzles.py
from __future__ import annotations import logging from typing import Any, Dict, List, Optional, Tuple from clvm.casts import int_from_bytes from clvm_tools.binutils import disassemble from flax.types.blockchain_format.program import Program, SerializedProgram from flax.types.blockchain_format.sized_bytes import bytes32 from flax.util.ints import uint16, uint64 from flax.wallet.nft_wallet.nft_info import NFTCoinInfo, NFTInfo from flax.wallet.nft_wallet.uncurry_nft import UncurriedNFT from flax.wallet.puzzles.load_clvm import load_clvm_maybe_recompile from flax.wallet.puzzles.p2_delegated_puzzle_or_hidden_puzzle import solution_for_conditions log = logging.getLogger(__name__) SINGLETON_TOP_LAYER_MOD = load_clvm_maybe_recompile("singleton_top_layer_v1_1.clvm") LAUNCHER_PUZZLE = load_clvm_maybe_recompile("singleton_launcher.clvm") NFT_STATE_LAYER_MOD = load_clvm_maybe_recompile("nft_state_layer.clvm") LAUNCHER_PUZZLE_HASH = LAUNCHER_PUZZLE.get_tree_hash() SINGLETON_MOD_HASH = SINGLETON_TOP_LAYER_MOD.get_tree_hash() NFT_STATE_LAYER_MOD_HASH = NFT_STATE_LAYER_MOD.get_tree_hash() NFT_METADATA_UPDATER = load_clvm_maybe_recompile("nft_metadata_updater_default.clvm") NFT_OWNERSHIP_LAYER = load_clvm_maybe_recompile("nft_ownership_layer.clvm") NFT_OWNERSHIP_LAYER_HASH = NFT_OWNERSHIP_LAYER.get_tree_hash() NFT_TRANSFER_PROGRAM_DEFAULT = load_clvm_maybe_recompile( "nft_ownership_transfer_program_one_way_claim_with_royalties.clvm", ) STANDARD_PUZZLE_MOD = load_clvm_maybe_recompile("p2_delegated_puzzle_or_hidden_puzzle.clvm") INTERMEDIATE_LAUNCHER_MOD = load_clvm_maybe_recompile("nft_intermediate_launcher.clvm") def create_nft_layer_puzzle_with_curry_params( metadata: Program, metadata_updater_hash: bytes32, inner_puzzle: Program ) -> Program: """Curries params into nft_state_layer.clvm Args to curry: NFT_STATE_LAYER_MOD_HASH METADATA METADATA_UPDATER_PUZZLE_HASH INNER_PUZZLE""" return NFT_STATE_LAYER_MOD.curry(NFT_STATE_LAYER_MOD_HASH, metadata, metadata_updater_hash, inner_puzzle) def create_full_puzzle_with_nft_puzzle(singleton_id: bytes32, inner_puzzle: Program) -> Program: if log.isEnabledFor(logging.DEBUG): log.debug( "Creating full NFT puzzle with inner puzzle: \n%r\n%r", singleton_id, inner_puzzle.get_tree_hash(), ) singleton_struct = Program.to((SINGLETON_MOD_HASH, (singleton_id, LAUNCHER_PUZZLE_HASH))) full_puzzle = SINGLETON_TOP_LAYER_MOD.curry(singleton_struct, inner_puzzle) if log.isEnabledFor(logging.DEBUG): log.debug("Created NFT full puzzle with inner: %s", full_puzzle.get_tree_hash()) return full_puzzle def create_full_puzzle( singleton_id: bytes32, metadata: Program, metadata_updater_puzhash: bytes32, inner_puzzle: Program ) -> Program: if log.isEnabledFor(logging.DEBUG): log.debug( "Creating full NFT puzzle with: \n%r\n%r\n%r\n%r", singleton_id, metadata.get_tree_hash(), metadata_updater_puzhash, inner_puzzle.get_tree_hash(), ) singleton_struct = Program.to((SINGLETON_MOD_HASH, (singleton_id, LAUNCHER_PUZZLE_HASH))) singleton_inner_puzzle = create_nft_layer_puzzle_with_curry_params(metadata, metadata_updater_puzhash, inner_puzzle) full_puzzle = SINGLETON_TOP_LAYER_MOD.curry(singleton_struct, singleton_inner_puzzle) if log.isEnabledFor(logging.DEBUG): log.debug("Created NFT full puzzle: %s", full_puzzle.get_tree_hash()) return full_puzzle async def get_nft_info_from_puzzle( nft_coin_info: NFTCoinInfo, config: Dict = None, ignore_size_limit: bool = False ) -> NFTInfo: """ Extract NFT info from a full puzzle :param nft_coin_info NFTCoinInfo in local database :param config Wallet config :param ignore_size_limit Ignore the off-chain metadata loading size limit :return: NFTInfo """ uncurried_nft: Optional[UncurriedNFT] = UncurriedNFT.uncurry(*nft_coin_info.full_puzzle.uncurry()) assert uncurried_nft is not None data_uris: List[str] = [] for uri in uncurried_nft.data_uris.as_python(): # pylint: disable=E1133 data_uris.append(str(uri, "utf-8")) meta_uris: List[str] = [] for uri in uncurried_nft.meta_uris.as_python(): # pylint: disable=E1133 meta_uris.append(str(uri, "utf-8")) license_uris: List[str] = [] for uri in uncurried_nft.license_uris.as_python(): # pylint: disable=E1133 license_uris.append(str(uri, "utf-8")) off_chain_metadata: Optional[str] = None nft_info = NFTInfo( uncurried_nft.singleton_launcher_id, nft_coin_info.coin.name(), uncurried_nft.owner_did, uncurried_nft.trade_price_percentage, uncurried_nft.royalty_address, data_uris, uncurried_nft.data_hash.as_python(), meta_uris, uncurried_nft.meta_hash.as_python(), license_uris, uncurried_nft.license_hash.as_python(), uint64(uncurried_nft.edition_total.as_int()), uint64(uncurried_nft.edition_number.as_int()), uncurried_nft.metadata_updater_hash.as_python(), disassemble(uncurried_nft.metadata), nft_coin_info.mint_height, uncurried_nft.supports_did, uncurried_nft.p2_puzzle.get_tree_hash(), nft_coin_info.pending_transaction, nft_coin_info.minter_did, off_chain_metadata=off_chain_metadata, ) return nft_info def metadata_to_program(metadata: Dict[bytes, Any]) -> Program: """ Convert the metadata dict to a Flaxlisp program :param metadata: User defined metadata :return: Flaxlisp program """ kv_list = [] for key, value in metadata.items(): kv_list.append((key, value)) program: Program = Program.to(kv_list) return program def program_to_metadata(program: Program) -> Dict[bytes, Any]: """ Convert a program to a metadata dict :param program: Flaxlisp program contains the metadata :return: Metadata dict """ metadata = {} for kv_pair in program.as_iter(): metadata[kv_pair.first().as_atom()] = kv_pair.rest().as_python() return metadata def prepend_value(key: bytes, value: Program, metadata: Dict[bytes, Any]) -> None: """ Prepend a value to a list in the metadata :param key: Key of the field :param value: Value want to add :param metadata: Metadata :return: """ if value != Program.to(0): if metadata[key] == b"": metadata[key] = [value.as_python()] else: metadata[key].insert(0, value.as_python()) def update_metadata(metadata: Program, update_condition: Program) -> Program: """ Apply conditions of metadata updater to the previous metadata :param metadata: Previous metadata :param update_condition: Update metadata conditions :return: Updated metadata """ new_metadata: Dict[bytes, Any] = program_to_metadata(metadata) uri: Program = update_condition.rest().rest().first() prepend_value(uri.first().as_python(), uri.rest(), new_metadata) return metadata_to_program(new_metadata) def construct_ownership_layer( current_owner: Optional[bytes32], transfer_program: Program, inner_puzzle: Program, ) -> Program: return NFT_OWNERSHIP_LAYER.curry( NFT_OWNERSHIP_LAYER_HASH, current_owner, transfer_program, inner_puzzle, ) def create_ownership_layer_puzzle( nft_id: bytes32, did_id: bytes, p2_puzzle: Program, percentage: uint16, royalty_puzzle_hash: Optional[bytes32] = None, ) -> Program: log.debug( "Creating ownership layer puzzle with NFT_ID: %s DID_ID: %s Royalty_Percentage: %d P2_puzzle: %s", nft_id.hex(), did_id, percentage, p2_puzzle, ) singleton_struct = Program.to((SINGLETON_MOD_HASH, (nft_id, LAUNCHER_PUZZLE_HASH))) if not royalty_puzzle_hash: royalty_puzzle_hash = p2_puzzle.get_tree_hash() transfer_program = NFT_TRANSFER_PROGRAM_DEFAULT.curry( singleton_struct, royalty_puzzle_hash, percentage, ) nft_inner_puzzle = p2_puzzle nft_ownership_layer_puzzle = construct_ownership_layer( bytes32(did_id) if did_id else None, transfer_program, nft_inner_puzzle ) return nft_ownership_layer_puzzle def create_ownership_layer_transfer_solution( new_did: bytes, new_did_inner_hash: bytes, trade_prices_list: List[List[int]], new_puzhash: bytes32, ) -> Program: log.debug( "Creating a transfer solution with: DID:%s Inner_puzhash:%s trade_price:%s puzhash:%s", new_did.hex(), new_did_inner_hash.hex(), str(trade_prices_list), new_puzhash.hex(), ) condition_list = [ [ 51, new_puzhash, 1, [new_puzhash], ], [-10, new_did, trade_prices_list, new_did_inner_hash], ] log.debug("Condition list raw: %r", condition_list) solution = Program.to( [ [solution_for_conditions(condition_list)], ] ) log.debug("Generated transfer solution: %s", solution) return solution def get_metadata_and_phs(unft: UncurriedNFT, solution: SerializedProgram) -> Tuple[Program, bytes32]: conditions = unft.p2_puzzle.run(unft.get_innermost_solution(solution.to_program())) metadata = unft.metadata puzhash_for_derivation: Optional[bytes32] = None for condition in conditions.as_iter(): if condition.list_len() < 2: # invalid condition continue condition_code = condition.first().as_int() log.debug("Checking condition code: %r", condition_code) if condition_code == -24: # metadata update metadata = update_metadata(metadata, condition) metadata = Program.to(metadata) elif condition_code == 51 and int_from_bytes(condition.rest().rest().first().atom) == 1: # destination puzhash if puzhash_for_derivation is not None: # ignore duplicated create coin conditions continue memo = bytes32(condition.as_python()[-1][0]) puzhash_for_derivation = memo log.debug("Got back puzhash from solution: %s", puzhash_for_derivation) assert puzhash_for_derivation return metadata, puzhash_for_derivation def recurry_nft_puzzle(unft: UncurriedNFT, solution: Program, new_inner_puzzle: Program) -> Program: log.debug("Generating NFT puzzle with ownership support: %s", disassemble(solution)) conditions = unft.p2_puzzle.run(unft.get_innermost_solution(solution)) new_did_id = unft.owner_did new_puzhash = None for condition in conditions.as_iter(): if condition.first().as_int() == -10: # this is the change owner magic condition new_did_id = condition.at("rf").atom elif condition.first().as_int() == 51: new_puzhash = condition.at("rf").atom # assert new_puzhash and new_did_id log.debug(f"Found NFT puzzle details: {new_did_id} {new_puzhash}") assert unft.transfer_program new_ownership_puzzle = construct_ownership_layer(new_did_id, unft.transfer_program, new_inner_puzzle) return new_ownership_puzzle def get_new_owner_did(unft: UncurriedNFT, solution: Program) -> Optional[bytes32]: conditions = unft.p2_puzzle.run(unft.get_innermost_solution(solution)) new_did_id = None for condition in conditions.as_iter(): if condition.first().as_int() == -10: # this is the change owner magic condition new_did_id = condition.at("rf").atom return new_did_id
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/nft_wallet/metadata_outer_puzzle.py
flax/wallet/nft_wallet/metadata_outer_puzzle.py
from __future__ import annotations from dataclasses import dataclass from typing import Callable, List, Optional, Tuple from clvm_tools.binutils import disassemble from flax.types.blockchain_format.coin import Coin from flax.types.blockchain_format.program import Program from flax.types.blockchain_format.sized_bytes import bytes32 from flax.util.ints import uint64 from flax.wallet.puzzle_drivers import PuzzleInfo, Solver from flax.wallet.puzzles.load_clvm import load_clvm_maybe_recompile from flax.wallet.uncurried_puzzle import UncurriedPuzzle, uncurry_puzzle NFT_STATE_LAYER_MOD = load_clvm_maybe_recompile("nft_state_layer.clvm") NFT_STATE_LAYER_MOD_HASH = NFT_STATE_LAYER_MOD.get_tree_hash() def match_metadata_layer_puzzle(puzzle: UncurriedPuzzle) -> Tuple[bool, List[Program]]: if puzzle.mod == NFT_STATE_LAYER_MOD: return True, list(puzzle.args.as_iter()) return False, [] def puzzle_for_metadata_layer(metadata: Program, updater_hash: bytes32, inner_puzzle: Program) -> Program: return NFT_STATE_LAYER_MOD.curry(NFT_STATE_LAYER_MOD_HASH, metadata, updater_hash, inner_puzzle) def solution_for_metadata_layer(amount: uint64, inner_solution: Program) -> Program: return Program.to([inner_solution, amount]) # type: ignore @dataclass(frozen=True) class MetadataOuterPuzzle: _match: Callable[[UncurriedPuzzle], Optional[PuzzleInfo]] _construct: Callable[[PuzzleInfo, Program], Program] _solve: Callable[[PuzzleInfo, Solver, Program, Program], Program] _get_inner_puzzle: Callable[[PuzzleInfo, UncurriedPuzzle], Optional[Program]] _get_inner_solution: Callable[[PuzzleInfo, Program], Optional[Program]] def match(self, puzzle: UncurriedPuzzle) -> Optional[PuzzleInfo]: matched, curried_args = match_metadata_layer_puzzle(puzzle) if matched: _, metadata, updater_hash, inner_puzzle = curried_args constructor_dict = { "type": "metadata", "metadata": disassemble(metadata), # type: ignore "updater_hash": "0x" + updater_hash.as_python().hex(), } next_constructor = self._match(uncurry_puzzle(inner_puzzle)) if next_constructor is not None: constructor_dict["also"] = next_constructor.info return PuzzleInfo(constructor_dict) else: return None return None # Uncomment above when match_metadata_layer_puzzle works def asset_id(self, constructor: PuzzleInfo) -> Optional[bytes32]: return bytes32(constructor["updater_hash"]) def construct(self, constructor: PuzzleInfo, inner_puzzle: Program) -> Program: also = constructor.also() if also is not None: inner_puzzle = self._construct(also, inner_puzzle) return puzzle_for_metadata_layer(constructor["metadata"], constructor["updater_hash"], inner_puzzle) def get_inner_puzzle(self, constructor: PuzzleInfo, puzzle_reveal: UncurriedPuzzle) -> Optional[Program]: matched, curried_args = match_metadata_layer_puzzle(puzzle_reveal) if matched: _, _, _, inner_puzzle = curried_args also = constructor.also() if also is not None: deep_inner_puzzle: Optional[Program] = self._get_inner_puzzle(also, uncurry_puzzle(inner_puzzle)) return deep_inner_puzzle else: return inner_puzzle else: raise ValueError("This driver is not for the specified puzzle reveal") def get_inner_solution(self, constructor: PuzzleInfo, solution: Program) -> Optional[Program]: my_inner_solution: Program = solution.first() also = constructor.also() if also: deep_inner_solution: Optional[Program] = self._get_inner_solution(also, my_inner_solution) return deep_inner_solution else: return my_inner_solution def solve(self, constructor: PuzzleInfo, solver: Solver, inner_puzzle: Program, inner_solution: Program) -> Program: coin_bytes: bytes = solver["coin"] coin: Coin = Coin(bytes32(coin_bytes[0:32]), bytes32(coin_bytes[32:64]), uint64.from_bytes(coin_bytes[64:72])) also = constructor.also() if also is not None: inner_solution = self._solve(also, solver, inner_puzzle, inner_solution) return solution_for_metadata_layer( uint64(coin.amount), inner_solution, )
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/nft_wallet/ownership_outer_puzzle.py
flax/wallet/nft_wallet/ownership_outer_puzzle.py
from __future__ import annotations from dataclasses import dataclass from typing import Callable, List, Optional, Tuple, Union from clvm_tools.binutils import disassemble from flax.types.blockchain_format.program import Program from flax.types.blockchain_format.sized_bytes import bytes32 from flax.wallet.puzzle_drivers import PuzzleInfo, Solver from flax.wallet.puzzles.load_clvm import load_clvm_maybe_recompile from flax.wallet.uncurried_puzzle import UncurriedPuzzle, uncurry_puzzle OWNERSHIP_LAYER_MOD = load_clvm_maybe_recompile("nft_ownership_layer.clvm") def match_ownership_layer_puzzle(puzzle: UncurriedPuzzle) -> Tuple[bool, List[Program]]: if puzzle.mod == OWNERSHIP_LAYER_MOD: return True, list(puzzle.args.as_iter()) return False, [] def puzzle_for_ownership_layer( current_owner: Union[Program, bytes], transfer_program: Program, inner_puzzle: Program ) -> Program: return OWNERSHIP_LAYER_MOD.curry(OWNERSHIP_LAYER_MOD.get_tree_hash(), current_owner, transfer_program, inner_puzzle) def solution_for_ownership_layer(inner_solution: Program) -> Program: return Program.to([inner_solution]) # type: ignore @dataclass(frozen=True) class OwnershipOuterPuzzle: _match: Callable[[UncurriedPuzzle], Optional[PuzzleInfo]] _construct: Callable[[PuzzleInfo, Program], Program] _solve: Callable[[PuzzleInfo, Solver, Program, Program], Program] _get_inner_puzzle: Callable[[PuzzleInfo, UncurriedPuzzle], Optional[Program]] _get_inner_solution: Callable[[PuzzleInfo, Program], Optional[Program]] def match(self, puzzle: UncurriedPuzzle) -> Optional[PuzzleInfo]: matched, curried_args = match_ownership_layer_puzzle(puzzle) if matched: _, current_owner, transfer_program, inner_puzzle = curried_args owner_bytes: bytes = current_owner.as_python() tp_match: Optional[PuzzleInfo] = self._match(uncurry_puzzle(transfer_program)) constructor_dict = { "type": "ownership", "owner": "()" if owner_bytes == b"" else "0x" + owner_bytes.hex(), "transfer_program": ( disassemble(transfer_program) if tp_match is None else tp_match.info # type: ignore ), } next_constructor = self._match(uncurry_puzzle(inner_puzzle)) if next_constructor is not None: constructor_dict["also"] = next_constructor.info return PuzzleInfo(constructor_dict) else: return None def asset_id(self, constructor: PuzzleInfo) -> Optional[bytes32]: return None def construct(self, constructor: PuzzleInfo, inner_puzzle: Program) -> Program: also = constructor.also() if also is not None: inner_puzzle = self._construct(also, inner_puzzle) transfer_program_info: Union[PuzzleInfo, Program] = constructor["transfer_program"] if isinstance(transfer_program_info, Program): transfer_program: Program = transfer_program_info else: transfer_program = self._construct(transfer_program_info, inner_puzzle) return puzzle_for_ownership_layer(constructor["owner"], transfer_program, inner_puzzle) def get_inner_puzzle(self, constructor: PuzzleInfo, puzzle_reveal: UncurriedPuzzle) -> Optional[Program]: matched, curried_args = match_ownership_layer_puzzle(puzzle_reveal) if matched: _, _, _, inner_puzzle = curried_args also = constructor.also() if also is not None: deep_inner_puzzle: Optional[Program] = self._get_inner_puzzle(also, uncurry_puzzle(inner_puzzle)) return deep_inner_puzzle else: return inner_puzzle else: raise ValueError("This driver is not for the specified puzzle reveal") def get_inner_solution(self, constructor: PuzzleInfo, solution: Program) -> Optional[Program]: my_inner_solution: Program = solution.first() also = constructor.also() if also: deep_inner_solution: Optional[Program] = self._get_inner_solution(also, my_inner_solution) return deep_inner_solution else: return my_inner_solution def solve(self, constructor: PuzzleInfo, solver: Solver, inner_puzzle: Program, inner_solution: Program) -> Program: also = constructor.also() if also is not None: inner_solution = self._solve(also, solver, inner_puzzle, inner_solution) return solution_for_ownership_layer(inner_solution)
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/nft_wallet/nft_info.py
flax/wallet/nft_wallet/nft_info.py
from __future__ import annotations from dataclasses import dataclass from typing import List, Optional from flax.types.blockchain_format.coin import Coin from flax.types.blockchain_format.program import Program from flax.types.blockchain_format.sized_bytes import bytes32 from flax.util.ints import uint16, uint32, uint64 from flax.util.streamable import Streamable, streamable from flax.wallet.lineage_proof import LineageProof from flax.wallet.puzzles.load_clvm import load_clvm_maybe_recompile LAUNCHER_PUZZLE = load_clvm_maybe_recompile("singleton_launcher.clvm") IN_TRANSACTION_STATUS = "IN_TRANSACTION" DEFAULT_STATUS = "DEFAULT" @streamable @dataclass(frozen=True) class NFTInfo(Streamable): """NFT Info for displaying NFT on the UI""" launcher_id: bytes32 """Launcher coin ID""" nft_coin_id: bytes32 """Current NFT coin ID""" owner_did: Optional[bytes32] """Owner DID""" royalty_percentage: Optional[uint16] """Percentage of the transaction fee paid to the author, e.g. 1000 = 1%""" royalty_puzzle_hash: Optional[bytes32] """Puzzle hash where royalty will be sent to""" data_uris: List[str] """ A list of content URIs""" data_hash: bytes """Hash of the content""" metadata_uris: List[str] """A list of metadata URIs""" metadata_hash: bytes """Hash of the metadata""" license_uris: List[str] """A list of license URIs""" license_hash: bytes """Hash of the license""" edition_total: uint64 """How many NFTs in the current edition""" edition_number: uint64 """Number of the current NFT in the edition""" updater_puzhash: bytes32 """Puzzle hash of the metadata updater in hex""" chain_info: str """Information saved on the chain in hex""" mint_height: uint32 """Block height of the NFT minting""" supports_did: bool """If the inner puzzle supports DID""" p2_address: bytes32 """The innermost puzzle hash of the NFT""" pending_transaction: bool = False """Indicate if the NFT is pending for a transaction""" minter_did: Optional[bytes32] = None """DID of the NFT minter""" launcher_puzhash: bytes32 = LAUNCHER_PUZZLE.get_tree_hash() """Puzzle hash of the singleton launcher in hex""" off_chain_metadata: Optional[str] = None """Serialized off-chain metadata""" @streamable @dataclass(frozen=True) class NFTCoinInfo(Streamable): """The launcher coin ID of the NFT""" nft_id: bytes32 """The latest coin of the NFT""" coin: Coin """NFT lineage proof""" lineage_proof: Optional[LineageProof] """NFT full puzzle""" full_puzzle: Program """NFT minting block height""" mint_height: uint32 """The DID of the NFT minter""" minter_did: Optional[bytes32] = None """The block height of the latest coin""" latest_height: uint32 = uint32(0) """If the NFT is in the transaction""" pending_transaction: bool = False @streamable @dataclass(frozen=True) class NFTWalletInfo(Streamable): did_id: Optional[bytes32] = None
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/nft_wallet/transfer_program_puzzle.py
flax/wallet/nft_wallet/transfer_program_puzzle.py
from __future__ import annotations from dataclasses import dataclass from typing import Callable, List, Optional, Tuple from flax.types.blockchain_format.program import Program from flax.types.blockchain_format.sized_bytes import bytes32 from flax.util.ints import uint16 from flax.wallet.puzzle_drivers import PuzzleInfo, Solver from flax.wallet.puzzles.load_clvm import load_clvm_maybe_recompile from flax.wallet.puzzles.singleton_top_layer_v1_1 import SINGLETON_LAUNCHER_HASH, SINGLETON_MOD_HASH from flax.wallet.uncurried_puzzle import UncurriedPuzzle TRANSFER_PROGRAM_MOD = load_clvm_maybe_recompile("nft_ownership_transfer_program_one_way_claim_with_royalties.clvm") def match_transfer_program_puzzle(puzzle: UncurriedPuzzle) -> Tuple[bool, List[Program]]: if puzzle.mod == TRANSFER_PROGRAM_MOD: return True, list(puzzle.args.as_iter()) return False, [] def puzzle_for_transfer_program(launcher_id: bytes32, royalty_puzzle_hash: bytes32, percentage: uint16) -> Program: singleton_struct = Program.to((SINGLETON_MOD_HASH, (launcher_id, SINGLETON_LAUNCHER_HASH))) return TRANSFER_PROGRAM_MOD.curry( singleton_struct, royalty_puzzle_hash, percentage, ) def solution_for_transfer_program( conditions: Program, current_owner: Optional[bytes32], new_did: bytes32, new_did_inner_hash: bytes32, trade_prices_list: Program, ) -> Program: return Program.to([conditions, current_owner, [new_did, trade_prices_list, new_did_inner_hash]]) # type: ignore @dataclass(frozen=True) class TransferProgramPuzzle: _match: Callable[[UncurriedPuzzle], Optional[PuzzleInfo]] _construct: Callable[[PuzzleInfo, Program], Program] _solve: Callable[[PuzzleInfo, Solver, Program, Program], Program] _get_inner_puzzle: Callable[[PuzzleInfo, UncurriedPuzzle], Optional[Program]] _get_inner_solution: Callable[[PuzzleInfo, Program], Optional[Program]] def match(self, puzzle: UncurriedPuzzle) -> Optional[PuzzleInfo]: matched, curried_args = match_transfer_program_puzzle(puzzle) if matched: singleton_struct, royalty_puzzle_hash, percentage = curried_args constructor_dict = { "type": "royalty transfer program", "launcher_id": "0x" + singleton_struct.rest().first().as_python().hex(), "royalty_address": "0x" + royalty_puzzle_hash.as_python().hex(), "royalty_percentage": str(percentage.as_int()), } return PuzzleInfo(constructor_dict) else: return None def asset_id(self, constructor: PuzzleInfo) -> Optional[bytes32]: return None def construct(self, constructor: PuzzleInfo, inner_puzzle: Program) -> Program: return puzzle_for_transfer_program( constructor["launcher_id"], constructor["royalty_address"], constructor["royalty_percentage"] ) def get_inner_puzzle(self, constructor: PuzzleInfo, puzzle_reveal: UncurriedPuzzle) -> Optional[Program]: return None def get_inner_solution(self, constructor: PuzzleInfo, solution: Program) -> Optional[Program]: return None def solve(self, constructor: PuzzleInfo, solver: Solver, inner_puzzle: Program, inner_solution: Program) -> Program: return Program.to(None) # type: ignore
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/nft_wallet/__init__.py
flax/wallet/nft_wallet/__init__.py
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/nft_wallet/nft_wallet.py
flax/wallet/nft_wallet/nft_wallet.py
from __future__ import annotations import dataclasses import json import logging import math import time from typing import TYPE_CHECKING, Any, Dict, List, Optional, Set, Tuple, Type, TypeVar, Union from blspy import AugSchemeMPL, G1Element, G2Element from clvm.casts import int_from_bytes, int_to_bytes from flax.protocols.wallet_protocol import CoinState from flax.server.ws_connection import WSFlaxConnection from flax.types.announcement import Announcement from flax.types.blockchain_format.coin import Coin from flax.types.blockchain_format.program import Program from flax.types.blockchain_format.sized_bytes import bytes32 from flax.types.coin_spend import CoinSpend from flax.types.spend_bundle import SpendBundle from flax.util.condition_tools import conditions_dict_for_solution, pkm_pairs_for_conditions_dict from flax.util.hash import std_hash from flax.util.ints import uint8, uint16, uint32, uint64, uint128 from flax.wallet.derivation_record import DerivationRecord from flax.wallet.did_wallet import did_wallet_puzzles from flax.wallet.lineage_proof import LineageProof from flax.wallet.nft_wallet import nft_puzzles from flax.wallet.nft_wallet.nft_info import NFTCoinInfo, NFTWalletInfo from flax.wallet.nft_wallet.nft_puzzles import NFT_METADATA_UPDATER, create_ownership_layer_puzzle, get_metadata_and_phs from flax.wallet.nft_wallet.uncurry_nft import UncurriedNFT from flax.wallet.outer_puzzles import AssetType, construct_puzzle, match_puzzle, solve_puzzle from flax.wallet.payment import Payment from flax.wallet.puzzle_drivers import PuzzleInfo, Solver from flax.wallet.puzzles.p2_delegated_puzzle_or_hidden_puzzle import ( DEFAULT_HIDDEN_PUZZLE_HASH, calculate_synthetic_secret_key, puzzle_for_pk, ) from flax.wallet.trading.offer import OFFER_MOD, OFFER_MOD_HASH, NotarizedPayment, Offer from flax.wallet.transaction_record import TransactionRecord from flax.wallet.uncurried_puzzle import uncurry_puzzle from flax.wallet.util.compute_memos import compute_memos from flax.wallet.util.debug_spend_bundle import disassemble from flax.wallet.util.transaction_type import TransactionType from flax.wallet.util.wallet_types import AmountWithPuzzlehash, WalletType from flax.wallet.wallet import Wallet from flax.wallet.wallet_coin_record import WalletCoinRecord from flax.wallet.wallet_info import WalletInfo from flax.wallet.wallet_nft_store import WalletNftStore _T_NFTWallet = TypeVar("_T_NFTWallet", bound="NFTWallet") class NFTWallet: wallet_state_manager: Any log: logging.Logger wallet_info: WalletInfo nft_wallet_info: NFTWalletInfo standard_wallet: Wallet wallet_id: int nft_store: WalletNftStore @property def did_id(self) -> Optional[bytes32]: return self.nft_wallet_info.did_id @classmethod async def create_new_nft_wallet( cls: Type[_T_NFTWallet], wallet_state_manager: Any, wallet: Wallet, did_id: Optional[bytes32] = None, name: Optional[str] = None, ) -> _T_NFTWallet: """ This must be called under the wallet state manager lock """ self = cls() self.standard_wallet = wallet if name is None: name = "NFT Wallet" self.log = logging.getLogger(name if name else __name__) self.wallet_state_manager = wallet_state_manager self.nft_wallet_info = NFTWalletInfo(did_id) info_as_string = json.dumps(self.nft_wallet_info.to_json_dict()) self.wallet_info = await wallet_state_manager.user_store.create_wallet( name, uint32(WalletType.NFT.value), info_as_string ) self.wallet_id = self.wallet_info.id self.nft_store = wallet_state_manager.nft_store self.log.debug("NFT wallet id: %r and standard wallet id: %r", self.wallet_id, self.standard_wallet.wallet_id) await self.wallet_state_manager.add_new_wallet(self, self.wallet_info.id) self.log.debug("Generated a new NFT wallet: %s", self.__dict__) return self @classmethod async def create( cls: Type[_T_NFTWallet], wallet_state_manager: Any, wallet: Wallet, wallet_info: WalletInfo, name: Optional[str] = None, ) -> _T_NFTWallet: self = cls() self.log = logging.getLogger(name if name else __name__) self.wallet_state_manager = wallet_state_manager self.wallet_info = wallet_info self.wallet_id = wallet_info.id self.standard_wallet = wallet self.wallet_info = wallet_info self.nft_store = wallet_state_manager.nft_store self.nft_wallet_info = NFTWalletInfo.from_json_dict(json.loads(wallet_info.data)) return self @classmethod def type(cls) -> uint8: return uint8(WalletType.NFT) def id(self) -> uint32: return self.wallet_info.id def get_did(self) -> Optional[bytes32]: return self.did_id async def get_confirmed_balance(self, record_list: Optional[Set[WalletCoinRecord]] = None) -> uint128: """The NFT wallet doesn't really have a balance.""" return uint128(0) async def get_unconfirmed_balance(self, record_list: Optional[Set[WalletCoinRecord]] = None) -> uint128: """The NFT wallet doesn't really have a balance.""" return uint128(0) async def get_spendable_balance(self, unspent_records: Optional[Set[WalletCoinRecord]] = None) -> uint128: """The NFT wallet doesn't really have a balance.""" return uint128(0) async def get_pending_change_balance(self) -> uint64: return uint64(0) async def get_max_send_amount(self, records: Optional[Set[WalletCoinRecord]] = None) -> uint128: """This is the confirmed balance, which we set to 0 as the NFT wallet doesn't have one.""" return uint128(0) async def get_nft_coin_by_id(self, nft_coin_id: bytes32) -> NFTCoinInfo: nft_coin = await self.nft_store.get_nft_by_coin_id(nft_coin_id) if nft_coin is None: raise KeyError(f"Couldn't find coin with id: {nft_coin_id}") return nft_coin async def coin_added(self, coin: Coin, height: uint32, peer: WSFlaxConnection) -> None: """Notification from wallet state manager that wallet has been received.""" self.log.info(f"NFT wallet %s has been notified that {coin} was added", self.wallet_info.name) if await self.nft_store.exists(coin.name()): # already added return wallet_node = self.wallet_state_manager.wallet_node cs: Optional[CoinSpend] = None coin_states: Optional[List[CoinState]] = await wallet_node.get_coin_state([coin.parent_coin_info], peer=peer) if not coin_states: # farm coin return assert coin_states parent_coin = coin_states[0].coin cs = await wallet_node.fetch_puzzle_solution(height, parent_coin, peer) assert cs is not None await self.puzzle_solution_received(cs, peer) async def puzzle_solution_received(self, coin_spend: CoinSpend, peer: WSFlaxConnection) -> None: self.log.debug("Puzzle solution received to wallet: %s", self.wallet_info) coin_name = coin_spend.coin.name() puzzle: Program = Program.from_bytes(bytes(coin_spend.puzzle_reveal)) # At this point, the puzzle must be a NFT puzzle. # This method will be called only when the wallet state manager uncurried this coin as a NFT puzzle. uncurried_nft = UncurriedNFT.uncurry(*puzzle.uncurry()) assert uncurried_nft is not None self.log.debug( "found the info for NFT coin %s %s %s", coin_name.hex(), uncurried_nft.inner_puzzle, uncurried_nft.singleton_struct, ) singleton_id = uncurried_nft.singleton_launcher_id parent_inner_puzhash = uncurried_nft.nft_state_layer.get_tree_hash() metadata, p2_puzzle_hash = get_metadata_and_phs(uncurried_nft, coin_spend.solution) self.log.debug("Got back puzhash from solution: %s", p2_puzzle_hash) self.log.debug("Got back updated metadata: %s", metadata) derivation_record: Optional[ DerivationRecord ] = await self.wallet_state_manager.puzzle_store.get_derivation_record_for_puzzle_hash(p2_puzzle_hash) self.log.debug("Record for %s is: %s", p2_puzzle_hash, derivation_record) if derivation_record is None: self.log.debug("Not our NFT, pointing to %s, skipping", p2_puzzle_hash) return p2_puzzle = puzzle_for_pk(derivation_record.pubkey) launcher_coin_states: List[CoinState] = await self.wallet_state_manager.wallet_node.get_coin_state( [singleton_id], peer=peer ) assert ( launcher_coin_states is not None and len(launcher_coin_states) == 1 and launcher_coin_states[0].spent_height is not None ) mint_height: uint32 = uint32(launcher_coin_states[0].spent_height) minter_did = None if uncurried_nft.supports_did: inner_puzzle = nft_puzzles.recurry_nft_puzzle(uncurried_nft, coin_spend.solution.to_program(), p2_puzzle) minter_did = await self.wallet_state_manager.get_minter_did(launcher_coin_states[0].coin, peer) else: inner_puzzle = p2_puzzle child_puzzle: Program = nft_puzzles.create_full_puzzle( singleton_id, Program.to(metadata), bytes32(uncurried_nft.metadata_updater_hash.atom), inner_puzzle, ) self.log.debug( "Created NFT full puzzle with inner: %s", nft_puzzles.create_full_puzzle_with_nft_puzzle(singleton_id, uncurried_nft.inner_puzzle), ) child_puzzle_hash = child_puzzle.get_tree_hash() for new_coin in coin_spend.additions(): self.log.debug( "Comparing addition: %s with %s, amount: %s ", new_coin.puzzle_hash, child_puzzle_hash, new_coin.amount, ) if new_coin.puzzle_hash == child_puzzle_hash: child_coin = new_coin break else: raise ValueError("Couldn't generate child puzzle for NFT") self.log.info("Adding a new NFT to wallet: %s", child_coin) # all is well, lets add NFT to our local db parent_coin = None confirmed_height = None coin_states: Optional[List[CoinState]] = await self.wallet_state_manager.wallet_node.get_coin_state( [coin_name], peer=peer ) if coin_states is not None: parent_coin = coin_states[0].coin confirmed_height = None if coin_states[0].spent_height is None else uint32(coin_states[0].spent_height) if parent_coin is None or confirmed_height is None: raise ValueError("Error finding parent") await self.add_coin( child_coin, singleton_id, child_puzzle, LineageProof(parent_coin.parent_coin_info, parent_inner_puzhash, uint64(parent_coin.amount)), mint_height, minter_did, confirmed_height, ) async def add_coin( self, coin: Coin, nft_id: bytes32, puzzle: Program, lineage_proof: LineageProof, mint_height: uint32, minter_did: Optional[bytes32], confirmed_height: uint32, ) -> None: new_nft = NFTCoinInfo(nft_id, coin, lineage_proof, puzzle, mint_height, minter_did, confirmed_height) await self.wallet_state_manager.nft_store.save_nft(self.id(), self.get_did(), new_nft) await self.wallet_state_manager.add_interested_coin_ids([coin.name()]) self.wallet_state_manager.state_changed("nft_coin_added", self.wallet_info.id) async def remove_coin(self, coin: Coin, height: uint32) -> None: nft_coin_info = await self.nft_store.get_nft_by_coin_id(coin.name()) if nft_coin_info: await self.nft_store.delete_nft_by_coin_id(coin.name(), height) self.wallet_state_manager.state_changed("nft_coin_removed", self.wallet_info.id) else: self.log.info("Tried removing NFT coin that doesn't exist: %s", coin.name()) async def get_did_approval_info( self, nft_id: bytes32, did_id: Optional[bytes32] = None, ) -> Tuple[bytes32, SpendBundle]: """Get DID spend with announcement created we need to transfer NFT with did with current inner hash of DID We also store `did_id` and then iterate to find the did wallet as we'd otherwise have to subscribe to any changes to DID wallet and storing wallet_id is not guaranteed to be consistent on wallet crash/reset. """ if did_id is None: did_id = self.did_id for _, wallet in self.wallet_state_manager.wallets.items(): self.log.debug("Checking wallet type %s", wallet.type()) if wallet.type() == WalletType.DECENTRALIZED_ID: self.log.debug("Found a DID wallet, checking did: %r == %r", wallet.get_my_DID(), did_id) if bytes32.fromhex(wallet.get_my_DID()) == did_id: self.log.debug("Creating announcement from DID for nft_id: %s", nft_id) did_bundle = await wallet.create_message_spend(puzzle_announcements=[nft_id]) self.log.debug("Sending DID announcement from puzzle: %s", did_bundle.removals()) did_inner_hash = wallet.did_info.current_inner.get_tree_hash() break else: raise ValueError(f"Missing DID Wallet for did_id: {did_id}") return did_inner_hash, did_bundle async def generate_new_nft( self, metadata: Program, target_puzzle_hash: Optional[bytes32] = None, royalty_puzzle_hash: Optional[bytes32] = None, percentage: uint16 = uint16(0), did_id: Optional[bytes] = None, fee: uint64 = uint64(0), push_tx: bool = True, ) -> Optional[SpendBundle]: """ This must be called under the wallet state manager lock """ if self.did_id is not None and did_id is None: # For a DID enabled NFT wallet it cannot mint NFT0. Mint NFT1 instead. did_id = self.did_id amount = uint64(1) coins = await self.standard_wallet.select_coins(uint64(amount + fee)) if coins is None: return None origin = coins.copy().pop() genesis_launcher_puz = nft_puzzles.LAUNCHER_PUZZLE # nft_id == singleton_id == launcher_id == launcher_coin.name() launcher_coin = Coin(origin.name(), nft_puzzles.LAUNCHER_PUZZLE_HASH, uint64(amount)) self.log.debug("Generating NFT with launcher coin %s and metadata: %s", launcher_coin, metadata) p2_inner_puzzle = await self.standard_wallet.get_new_puzzle() if not target_puzzle_hash: target_puzzle_hash = p2_inner_puzzle.get_tree_hash() self.log.debug("Attempt to generate a new NFT to %s", target_puzzle_hash.hex()) if did_id is not None: self.log.debug("Creating provenant NFT") # eve coin DID can be set to whatever so we keep it empty # WARNING: wallets should always ignore DID value for eve coins as they can be set # to any DID without approval inner_puzzle = create_ownership_layer_puzzle( launcher_coin.name(), b"", p2_inner_puzzle, percentage, royalty_puzzle_hash=royalty_puzzle_hash ) self.log.debug("Got back ownership inner puzzle: %s", disassemble(inner_puzzle)) else: self.log.debug("Creating standard NFT") inner_puzzle = p2_inner_puzzle # singleton eve puzzle eve_fullpuz = nft_puzzles.create_full_puzzle( launcher_coin.name(), metadata, NFT_METADATA_UPDATER.get_tree_hash(), inner_puzzle ) eve_fullpuz_hash = eve_fullpuz.get_tree_hash() # launcher announcement announcement_set: Set[Announcement] = set() announcement_message = Program.to([eve_fullpuz_hash, amount, []]).get_tree_hash() announcement_set.add(Announcement(launcher_coin.name(), announcement_message)) self.log.debug( "Creating transaction for launcher: %s and other coins: %s (%s)", origin, coins, announcement_set ) # store the launcher transaction in the wallet state tx_record: Optional[TransactionRecord] = await self.standard_wallet.generate_signed_transaction( uint64(amount), nft_puzzles.LAUNCHER_PUZZLE_HASH, fee, origin.name(), coins, None, False, announcement_set, ) genesis_launcher_solution = Program.to([eve_fullpuz_hash, amount, []]) # launcher spend to generate the singleton launcher_cs = CoinSpend(launcher_coin, genesis_launcher_puz, genesis_launcher_solution) launcher_sb = SpendBundle([launcher_cs], AugSchemeMPL.aggregate([])) eve_coin = Coin(launcher_coin.name(), eve_fullpuz_hash, uint64(amount)) if tx_record is None or tx_record.spend_bundle is None: self.log.error("Couldn't produce a launcher spend") return None bundles_to_agg = [tx_record.spend_bundle, launcher_sb] # Create inner solution for eve spend did_inner_hash = b"" if did_id is not None: if did_id != b"": did_inner_hash, did_bundle = await self.get_did_approval_info(launcher_coin.name()) bundles_to_agg.append(did_bundle) nft_coin = NFTCoinInfo( nft_id=launcher_coin.name(), coin=eve_coin, lineage_proof=LineageProof(parent_name=launcher_coin.parent_coin_info, amount=uint64(launcher_coin.amount)), full_puzzle=eve_fullpuz, mint_height=uint32(0), minter_did=bytes32(did_id) if did_id is not None and did_id != b"" else None, ) # Don't set fee, it is covered in the tx_record txs = await self.generate_signed_transaction( [uint64(eve_coin.amount)], [target_puzzle_hash], nft_coin=nft_coin, new_owner=did_id, new_did_inner_hash=did_inner_hash, additional_bundles=bundles_to_agg, memos=[[target_puzzle_hash]], ) txs.append(dataclasses.replace(tx_record, spend_bundle=None)) if push_tx: for tx in txs: await self.wallet_state_manager.add_pending_transaction(tx) return SpendBundle.aggregate([x.spend_bundle for x in txs if x.spend_bundle is not None]) async def sign(self, spend_bundle: SpendBundle, puzzle_hashes: Optional[List[bytes32]] = None) -> SpendBundle: if puzzle_hashes is None: puzzle_hashes = [] sigs: List[G2Element] = [] for spend in spend_bundle.coin_spends: pks = {} if not puzzle_hashes: uncurried_nft = UncurriedNFT.uncurry(*spend.puzzle_reveal.to_program().uncurry()) if uncurried_nft is not None: self.log.debug("Found a NFT state layer to sign") puzzle_hashes.append(uncurried_nft.p2_puzzle.get_tree_hash()) for ph in puzzle_hashes: keys = await self.wallet_state_manager.get_keys(ph) assert keys pks[bytes(keys[0])] = private = keys[1] synthetic_secret_key = calculate_synthetic_secret_key(private, DEFAULT_HIDDEN_PUZZLE_HASH) synthetic_pk = synthetic_secret_key.get_g1() pks[bytes(synthetic_pk)] = synthetic_secret_key error, conditions, cost = conditions_dict_for_solution( spend.puzzle_reveal.to_program(), spend.solution.to_program(), self.wallet_state_manager.constants.MAX_BLOCK_COST_CLVM, ) if conditions is not None: for pk, msg in pkm_pairs_for_conditions_dict( conditions, spend.coin.name(), self.wallet_state_manager.constants.AGG_SIG_ME_ADDITIONAL_DATA ): try: sk = pks.get(pk) if sk: self.log.debug("Found key, signing for pk: %s", pk) sigs.append(AugSchemeMPL.sign(sk, msg)) else: self.log.warning("Couldn't find key for: %s", pk) except AssertionError: raise ValueError("This spend bundle cannot be signed by the NFT wallet") agg_sig = AugSchemeMPL.aggregate(sigs) return SpendBundle.aggregate([spend_bundle, SpendBundle([], agg_sig)]) async def update_metadata( self, nft_coin_info: NFTCoinInfo, key: str, uri: str, fee: uint64 = uint64(0) ) -> Optional[SpendBundle]: uncurried_nft = UncurriedNFT.uncurry(*nft_coin_info.full_puzzle.uncurry()) assert uncurried_nft is not None puzzle_hash = uncurried_nft.p2_puzzle.get_tree_hash() self.log.info( "Attempting to add urls to NFT coin %s in the metadata: %s", nft_coin_info.coin.name(), uncurried_nft.metadata, ) txs = await self.generate_signed_transaction( [uint64(nft_coin_info.coin.amount)], [puzzle_hash], fee, {nft_coin_info.coin}, metadata_update=(key, uri) ) for tx in txs: await self.wallet_state_manager.add_pending_transaction(tx) await self.update_coin_status(nft_coin_info.coin.name(), True) self.wallet_state_manager.state_changed("nft_coin_updated", self.wallet_info.id) return SpendBundle.aggregate([x.spend_bundle for x in txs if x.spend_bundle is not None]) async def get_current_nfts(self) -> List[NFTCoinInfo]: return await self.nft_store.get_nft_list(wallet_id=self.id()) async def get_nft_count(self) -> int: return await self.nft_store.count(wallet_id=self.id()) async def update_coin_status(self, coin_id: bytes32, pending_transaction: bool) -> None: await self.nft_store.update_pending_transaction(coin_id, pending_transaction) async def save_info(self, nft_info: NFTWalletInfo) -> None: self.nft_wallet_info = nft_info current_info = self.wallet_info data_str = json.dumps(nft_info.to_json_dict()) wallet_info = WalletInfo(current_info.id, current_info.name, current_info.type, data_str) self.wallet_info = wallet_info await self.wallet_state_manager.user_store.update_wallet(wallet_info) async def convert_puzzle_hash(self, puzhash: bytes32) -> bytes32: return puzhash async def get_nft(self, launcher_id: bytes32) -> Optional[NFTCoinInfo]: return await self.nft_store.get_nft_by_id(launcher_id) async def get_puzzle_info(self, nft_id: bytes32) -> PuzzleInfo: nft_coin: Optional[NFTCoinInfo] = await self.get_nft(nft_id) if nft_coin is None: raise ValueError("An asset ID was specified that this wallet doesn't track") puzzle_info: Optional[PuzzleInfo] = match_puzzle(uncurry_puzzle(nft_coin.full_puzzle)) if puzzle_info is None: raise ValueError("Internal Error: NFT wallet is tracking a non NFT coin") else: return puzzle_info async def sign_message(self, message: str, nft: NFTCoinInfo) -> Tuple[G1Element, G2Element]: uncurried_nft = UncurriedNFT.uncurry(*nft.full_puzzle.uncurry()) if uncurried_nft is not None: p2_puzzle = uncurried_nft.p2_puzzle puzzle_hash = p2_puzzle.get_tree_hash() pubkey, private = await self.wallet_state_manager.get_keys(puzzle_hash) synthetic_secret_key = calculate_synthetic_secret_key(private, DEFAULT_HIDDEN_PUZZLE_HASH) synthetic_pk = synthetic_secret_key.get_g1() puzzle: Program = Program.to(("Flax Signed Message", message)) return synthetic_pk, AugSchemeMPL.sign(synthetic_secret_key, puzzle.get_tree_hash()) else: raise ValueError("Invalid NFT puzzle.") async def get_coins_to_offer( self, nft_id: bytes32, amount: uint64, min_coin_amount: Optional[uint64] = None ) -> Set[Coin]: nft_coin: Optional[NFTCoinInfo] = await self.get_nft(nft_id) if nft_coin is None: raise ValueError("An asset ID was specified that this wallet doesn't track") return {nft_coin.coin} async def match_puzzle_info(self, puzzle_driver: PuzzleInfo) -> bool: return ( AssetType(puzzle_driver.type()) == AssetType.SINGLETON and puzzle_driver.also() is not None and AssetType(puzzle_driver.also().type()) == AssetType.METADATA # type: ignore and puzzle_driver.also().also() is None # type: ignore and await self.get_nft(puzzle_driver["launcher_id"]) is not None ) @classmethod async def create_from_puzzle_info( cls: Any, wallet_state_manager: Any, wallet: Wallet, puzzle_driver: PuzzleInfo, name: Optional[str] = None, ) -> Any: # Off the bat we don't support multiple profile but when we do this will have to change for wallet in wallet_state_manager.wallets.values(): if wallet.type() == WalletType.NFT.value: return wallet # TODO: These are not the arguments to this function yet but they will be return await cls.create_new_nft_wallet( wallet_state_manager, wallet, None, name, ) async def create_tandem_xfx_tx( self, fee: uint64, announcement_to_assert: Optional[Announcement] = None ) -> TransactionRecord: flax_coins = await self.standard_wallet.select_coins(fee) flax_tx = await self.standard_wallet.generate_signed_transaction( uint64(0), (await self.standard_wallet.get_new_puzzlehash()), fee=fee, coins=flax_coins, coin_announcements_to_consume={announcement_to_assert} if announcement_to_assert is not None else None, ) assert flax_tx.spend_bundle is not None return flax_tx async def generate_signed_transaction( self, amounts: List[uint64], puzzle_hashes: List[bytes32], fee: uint64 = uint64(0), coins: Optional[Set[Coin]] = None, nft_coin: Optional[NFTCoinInfo] = None, memos: Optional[List[List[bytes]]] = None, coin_announcements_to_consume: Optional[Set[Announcement]] = None, puzzle_announcements_to_consume: Optional[Set[Announcement]] = None, ignore_max_send_amount: bool = False, new_owner: Optional[bytes] = None, new_did_inner_hash: Optional[bytes] = None, trade_prices_list: Optional[Program] = None, additional_bundles: List[SpendBundle] = [], metadata_update: Optional[Tuple[str, str]] = None, ) -> List[TransactionRecord]: if memos is None: memos = [[] for _ in range(len(puzzle_hashes))] if not (len(memos) == len(puzzle_hashes) == len(amounts)): raise ValueError("Memos, puzzle_hashes, and amounts must have the same length") payments = [] for amount, puzhash, memo_list in zip(amounts, puzzle_hashes, memos): memos_with_hint: List[bytes] = [puzhash] memos_with_hint.extend(memo_list) payments.append(Payment(puzhash, amount, memos_with_hint)) payment_sum = sum([p.amount for p in payments]) unsigned_spend_bundle, flax_tx = await self.generate_unsigned_spendbundle( payments, fee, coins=coins, nft_coin=nft_coin, coin_announcements_to_consume=coin_announcements_to_consume, puzzle_announcements_to_consume=puzzle_announcements_to_consume, new_owner=new_owner, new_did_inner_hash=new_did_inner_hash, trade_prices_list=trade_prices_list, metadata_update=metadata_update, ) spend_bundle = await self.sign(unsigned_spend_bundle) spend_bundle = SpendBundle.aggregate([spend_bundle] + additional_bundles) if flax_tx is not None and flax_tx.spend_bundle is not None: spend_bundle = SpendBundle.aggregate([spend_bundle, flax_tx.spend_bundle]) flax_tx = dataclasses.replace(flax_tx, spend_bundle=None) tx_list = [ TransactionRecord( confirmed_at_height=uint32(0), created_at_time=uint64(int(time.time())), to_puzzle_hash=puzzle_hashes[0], amount=uint64(payment_sum), fee_amount=fee, confirmed=False, sent=uint32(0), spend_bundle=spend_bundle, additions=spend_bundle.additions(), removals=spend_bundle.removals(), wallet_id=self.id(), sent_to=[], trade_id=None, type=uint32(TransactionType.OUTGOING_TX.value), name=spend_bundle.name(), memos=list(compute_memos(spend_bundle).items()), ), ] if flax_tx is not None: tx_list.append(flax_tx) return tx_list async def generate_unsigned_spendbundle( self, payments: List[Payment], fee: uint64 = uint64(0), coins: Optional[Set[Coin]] = None, coin_announcements_to_consume: Optional[Set[Announcement]] = None, puzzle_announcements_to_consume: Optional[Set[Announcement]] = None, new_owner: Optional[bytes] = None, new_did_inner_hash: Optional[bytes] = None, trade_prices_list: Optional[Program] = None, metadata_update: Optional[Tuple[str, str]] = None, nft_coin: Optional[NFTCoinInfo] = None, ) -> Tuple[SpendBundle, Optional[TransactionRecord]]: if nft_coin is None: if coins is None or not len(coins) == 1: # Make sure the user is specifying which specific NFT coin to use raise ValueError("NFT spends require a single selected coin") elif len(payments) > 1: raise ValueError("NFTs can only be sent to one party") nft_coin = await self.nft_store.get_nft_by_coin_id(coins.pop().name()) assert nft_coin if coin_announcements_to_consume is not None: coin_announcements_bytes: Optional[Set[bytes32]] = {a.name() for a in coin_announcements_to_consume} else: coin_announcements_bytes = None if puzzle_announcements_to_consume is not None: puzzle_announcements_bytes: Optional[Set[bytes32]] = {a.name() for a in puzzle_announcements_to_consume} else: puzzle_announcements_bytes = None primaries: List[AmountWithPuzzlehash] = [] for payment in payments: primaries.append({"puzzlehash": payment.puzzle_hash, "amount": payment.amount, "memos": payment.memos}) if fee > 0: announcement_to_make = nft_coin.coin.name() flax_tx = await self.create_tandem_xfx_tx(fee, Announcement(nft_coin.coin.name(), announcement_to_make)) else: announcement_to_make = None flax_tx = None innersol: Program = self.standard_wallet.make_solution( primaries=primaries, coin_announcements=None if announcement_to_make is None else set((announcement_to_make,)), coin_announcements_to_assert=coin_announcements_bytes, puzzle_announcements_to_assert=puzzle_announcements_bytes, ) unft = UncurriedNFT.uncurry(*nft_coin.full_puzzle.uncurry()) assert unft is not None magic_condition = None if unft.supports_did: if new_owner is None: # If no new owner was specified and we're sending this to ourselves, let's not reset the DID derivation_record: Optional[ DerivationRecord ] = await self.wallet_state_manager.puzzle_store.get_derivation_record_for_puzzle_hash( payments[0].puzzle_hash ) if derivation_record is not None: new_owner = unft.owner_did
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
true
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/nft_wallet/uncurry_nft.py
flax/wallet/nft_wallet/uncurry_nft.py
from __future__ import annotations import logging from dataclasses import dataclass from typing import Optional, Type, TypeVar from flax.types.blockchain_format.program import Program from flax.types.blockchain_format.sized_bytes import bytes32 from flax.util.ints import uint16 from flax.wallet.puzzles.load_clvm import load_clvm_maybe_recompile log = logging.getLogger(__name__) SINGLETON_TOP_LAYER_MOD = load_clvm_maybe_recompile("singleton_top_layer_v1_1.clvm") NFT_MOD = load_clvm_maybe_recompile("nft_state_layer.clvm") NFT_OWNERSHIP_LAYER = load_clvm_maybe_recompile("nft_ownership_layer.clvm") _T_UncurriedNFT = TypeVar("_T_UncurriedNFT", bound="UncurriedNFT") @dataclass(frozen=True) class UncurriedNFT: """ A simple solution for uncurry NFT puzzle. Initial the class with a full NFT puzzle, it will do a deep uncurry. This is the only place you need to change after modified the Flaxlisp curried parameters. """ nft_mod_hash: bytes32 """NFT module hash""" nft_state_layer: Program """NFT state layer puzzle""" singleton_struct: Program """ Singleton struct [singleton_mod_hash, singleton_launcher_id, launcher_puzhash] """ singleton_mod_hash: Program singleton_launcher_id: bytes32 launcher_puzhash: Program metadata_updater_hash: Program """Metadata updater puzzle hash""" metadata: Program """ NFT metadata [("u", data_uris), ("h", data_hash)] """ data_uris: Program data_hash: Program meta_uris: Program meta_hash: Program license_uris: Program license_hash: Program edition_number: Program edition_total: Program inner_puzzle: Program """NFT state layer inner puzzle""" p2_puzzle: Program """p2 puzzle of the owner, either for ownership layer or standard""" # ownership layer fields owner_did: Optional[bytes32] """Owner's DID""" supports_did: bool """If the inner puzzle support the DID""" nft_inner_puzzle_hash: Optional[bytes32] """Puzzle hash of the ownership layer inner puzzle """ transfer_program: Optional[Program] """Puzzle hash of the transfer program""" transfer_program_curry_params: Optional[Program] """ Curried parameters of the transfer program [royalty_address, trade_price_percentage, settlement_mod_hash, cat_mod_hash] """ royalty_address: Optional[bytes32] trade_price_percentage: Optional[uint16] @classmethod def uncurry(cls: Type[_T_UncurriedNFT], mod: Program, curried_args: Program) -> Optional[_T_UncurriedNFT]: """ Try to uncurry a NFT puzzle :param cls UncurriedNFT class :param mod: uncurried Puzzle program :param uncurried_args: uncurried arguments to program :return Uncurried NFT """ if mod != SINGLETON_TOP_LAYER_MOD: log.debug("Cannot uncurry NFT puzzle, failed on singleton top layer: Mod %s", mod) return None try: (singleton_struct, nft_state_layer) = curried_args.as_iter() singleton_mod_hash = singleton_struct.first() singleton_launcher_id = singleton_struct.rest().first() launcher_puzhash = singleton_struct.rest().rest() except ValueError as e: log.debug("Cannot uncurry singleton top layer: Args %s error: %s", curried_args, e) return None mod, curried_args = curried_args.rest().first().uncurry() if mod != NFT_MOD: log.debug("Cannot uncurry NFT puzzle, failed on NFT state layer: Mod %s", mod) return None try: # Set nft parameters nft_mod_hash, metadata, metadata_updater_hash, inner_puzzle = curried_args.as_iter() data_uris = Program.to([]) data_hash = Program.to(0) meta_uris = Program.to([]) meta_hash = Program.to(0) license_uris = Program.to([]) license_hash = Program.to(0) edition_number = Program.to(1) edition_total = Program.to(1) # Set metadata for kv_pair in metadata.as_iter(): if kv_pair.first().as_atom() == b"u": data_uris = kv_pair.rest() if kv_pair.first().as_atom() == b"h": data_hash = kv_pair.rest() if kv_pair.first().as_atom() == b"mu": meta_uris = kv_pair.rest() if kv_pair.first().as_atom() == b"mh": meta_hash = kv_pair.rest() if kv_pair.first().as_atom() == b"lu": license_uris = kv_pair.rest() if kv_pair.first().as_atom() == b"lh": license_hash = kv_pair.rest() if kv_pair.first().as_atom() == b"sn": edition_number = kv_pair.rest() if kv_pair.first().as_atom() == b"st": edition_total = kv_pair.rest() current_did = None transfer_program = None transfer_program_args = None royalty_address = None royalty_percentage = None nft_inner_puzzle_mod = None mod, ol_args = inner_puzzle.uncurry() supports_did = False if mod == NFT_OWNERSHIP_LAYER: supports_did = True log.debug("Parsing ownership layer") _, current_did, transfer_program, p2_puzzle = ol_args.as_iter() transfer_program_mod, transfer_program_args = transfer_program.uncurry() _, royalty_address_p, royalty_percentage = transfer_program_args.as_iter() royalty_percentage = uint16(royalty_percentage.as_int()) royalty_address = royalty_address_p.atom current_did = current_did.atom if current_did == b"": # For unassigned NFT, set owner DID to None current_did = None else: log.debug("Creating a standard NFT puzzle") p2_puzzle = inner_puzzle except Exception as e: log.debug("Cannot uncurry NFT state layer: Args %s Error: %s", curried_args, e) return None return cls( nft_mod_hash=nft_mod_hash, nft_state_layer=nft_state_layer, singleton_struct=singleton_struct, singleton_mod_hash=singleton_mod_hash, singleton_launcher_id=singleton_launcher_id.atom, launcher_puzhash=launcher_puzhash, metadata=metadata, data_uris=data_uris, data_hash=data_hash, p2_puzzle=p2_puzzle, metadata_updater_hash=metadata_updater_hash, meta_uris=meta_uris, meta_hash=meta_hash, license_uris=license_uris, license_hash=license_hash, edition_number=edition_number, edition_total=edition_total, inner_puzzle=inner_puzzle, owner_did=current_did, supports_did=supports_did, transfer_program=transfer_program, transfer_program_curry_params=transfer_program_args, royalty_address=royalty_address, trade_price_percentage=royalty_percentage, nft_inner_puzzle_hash=nft_inner_puzzle_mod, ) def get_innermost_solution(self, solution: Program) -> Program: state_layer_inner_solution: Program = solution.at("rrff") if self.supports_did: return state_layer_inner_solution.first() # type: ignore else: return state_layer_inner_solution
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/nft_wallet/singleton_outer_puzzle.py
flax/wallet/nft_wallet/singleton_outer_puzzle.py
from __future__ import annotations from dataclasses import dataclass from typing import Callable, Optional from flax.types.blockchain_format.coin import Coin from flax.types.blockchain_format.program import Program from flax.types.blockchain_format.sized_bytes import bytes32 from flax.types.coin_spend import CoinSpend from flax.util.ints import uint64 from flax.wallet.lineage_proof import LineageProof from flax.wallet.puzzle_drivers import PuzzleInfo, Solver from flax.wallet.puzzles.singleton_top_layer_v1_1 import ( SINGLETON_LAUNCHER_HASH, match_singleton_puzzle, puzzle_for_singleton, solution_for_singleton, ) from flax.wallet.uncurried_puzzle import UncurriedPuzzle, uncurry_puzzle @dataclass(frozen=True) class SingletonOuterPuzzle: _match: Callable[[UncurriedPuzzle], Optional[PuzzleInfo]] _construct: Callable[[PuzzleInfo, Program], Program] _solve: Callable[[PuzzleInfo, Solver, Program, Program], Program] _get_inner_puzzle: Callable[[PuzzleInfo, UncurriedPuzzle], Optional[Program]] _get_inner_solution: Callable[[PuzzleInfo, Program], Optional[Program]] def match(self, puzzle: UncurriedPuzzle) -> Optional[PuzzleInfo]: matched, curried_args = match_singleton_puzzle(puzzle) if matched: singleton_struct, inner_puzzle = curried_args constructor_dict = { "type": "singleton", "launcher_id": "0x" + singleton_struct.as_python()[1].hex(), "launcher_ph": "0x" + singleton_struct.as_python()[2].hex(), } next_constructor = self._match(uncurry_puzzle(inner_puzzle)) if next_constructor is not None: constructor_dict["also"] = next_constructor.info return PuzzleInfo(constructor_dict) else: return None def asset_id(self, constructor: PuzzleInfo) -> Optional[bytes32]: return bytes32(constructor["launcher_id"]) def construct(self, constructor: PuzzleInfo, inner_puzzle: Program) -> Program: also = constructor.also() if also is not None: inner_puzzle = self._construct(also, inner_puzzle) launcher_hash = constructor["launcher_ph"] if "launcher_ph" in constructor else SINGLETON_LAUNCHER_HASH return puzzle_for_singleton(constructor["launcher_id"], inner_puzzle, launcher_hash) def get_inner_puzzle(self, constructor: PuzzleInfo, puzzle_reveal: UncurriedPuzzle) -> Optional[Program]: matched, curried_args = match_singleton_puzzle(puzzle_reveal) if matched: _, inner_puzzle = curried_args also = constructor.also() if also is not None: deep_inner_puzzle: Optional[Program] = self._get_inner_puzzle(also, uncurry_puzzle(inner_puzzle)) return deep_inner_puzzle else: return inner_puzzle else: raise ValueError("This driver is not for the specified puzzle reveal") def get_inner_solution(self, constructor: PuzzleInfo, solution: Program) -> Optional[Program]: my_inner_solution: Program = solution.at("rrf") also = constructor.also() if also: deep_inner_solution: Optional[Program] = self._get_inner_solution(also, my_inner_solution) return deep_inner_solution else: return my_inner_solution def solve(self, constructor: PuzzleInfo, solver: Solver, inner_puzzle: Program, inner_solution: Program) -> Program: coin_bytes: bytes = solver["coin"] coin: Coin = Coin(bytes32(coin_bytes[0:32]), bytes32(coin_bytes[32:64]), uint64.from_bytes(coin_bytes[64:72])) parent_spend: CoinSpend = CoinSpend.from_bytes(solver["parent_spend"]) parent_coin: Coin = parent_spend.coin also = constructor.also() if also is not None: inner_solution = self._solve(also, solver, inner_puzzle, inner_solution) matched, curried_args = match_singleton_puzzle(uncurry_puzzle(parent_spend.puzzle_reveal.to_program())) assert matched _, parent_inner_puzzle = curried_args return solution_for_singleton( LineageProof(parent_coin.parent_coin_info, parent_inner_puzzle.get_tree_hash(), uint64(parent_coin.amount)), uint64(coin.amount), inner_solution, )
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/db_wallet/db_wallet_puzzles.py
flax/wallet/db_wallet/db_wallet_puzzles.py
from __future__ import annotations from typing import Iterator, List, Tuple, Union from flax.types.blockchain_format.program import Program from flax.types.blockchain_format.sized_bytes import bytes32 from flax.types.condition_opcodes import ConditionOpcode from flax.util.ints import uint64 from flax.wallet.nft_wallet.nft_puzzles import NFT_STATE_LAYER_MOD, create_nft_layer_puzzle_with_curry_params from flax.wallet.puzzles.load_clvm import load_clvm_maybe_recompile # from flax.types.condition_opcodes import ConditionOpcode # from flax.wallet.util.merkle_tree import MerkleTree, TreeType ACS_MU = Program.to(11) # returns the third argument a.k.a the full solution ACS_MU_PH = ACS_MU.get_tree_hash() SINGLETON_TOP_LAYER_MOD = load_clvm_maybe_recompile("singleton_top_layer_v1_1.clvm") SINGLETON_LAUNCHER = load_clvm_maybe_recompile("singleton_launcher.clvm") GRAFTROOT_DL_OFFERS = load_clvm_maybe_recompile("graftroot_dl_offers.clvm") P2_PARENT = load_clvm_maybe_recompile("p2_parent.clvm") def create_host_fullpuz(innerpuz: Union[Program, bytes32], current_root: bytes32, genesis_id: bytes32) -> Program: db_layer = create_host_layer_puzzle(innerpuz, current_root) mod_hash = SINGLETON_TOP_LAYER_MOD.get_tree_hash() singleton_struct = Program.to((mod_hash, (genesis_id, SINGLETON_LAUNCHER.get_tree_hash()))) return SINGLETON_TOP_LAYER_MOD.curry(singleton_struct, db_layer) def create_host_layer_puzzle(innerpuz: Union[Program, bytes32], current_root: bytes32) -> Program: # some hard coded metadata formatting and metadata updater for now return create_nft_layer_puzzle_with_curry_params( Program.to((current_root, None)), ACS_MU_PH, # TODO: the nft driver doesn't like the Union yet, but changing that is out of scope for me rn - Quex innerpuz, # type: ignore ) def match_dl_singleton(puzzle: Program) -> Tuple[bool, Iterator[Program]]: """ Given a puzzle test if it's a CAT and, if it is, return the curried arguments """ mod, singleton_curried_args = puzzle.uncurry() if mod == SINGLETON_TOP_LAYER_MOD: mod, dl_curried_args = singleton_curried_args.at("rf").uncurry() if mod == NFT_STATE_LAYER_MOD and dl_curried_args.at("rrf") == ACS_MU_PH: launcher_id = singleton_curried_args.at("frf") root = dl_curried_args.at("rff") innerpuz = dl_curried_args.at("rrrf") return True, iter((innerpuz, root, launcher_id)) return False, iter(()) def launch_solution_to_singleton_info(launch_solution: Program) -> Tuple[bytes32, uint64, bytes32, bytes32]: solution = launch_solution.as_python() try: full_puzzle_hash = bytes32(solution[0]) amount = uint64(int.from_bytes(solution[1], "big")) root = bytes32(solution[2][0]) inner_puzzle_hash = bytes32(solution[2][1]) except (IndexError, TypeError): raise ValueError("Launcher is not a data layer launcher") return full_puzzle_hash, amount, root, inner_puzzle_hash def launcher_to_struct(launcher_id: bytes32) -> Program: struct: Program = Program.to( (SINGLETON_TOP_LAYER_MOD.get_tree_hash(), (launcher_id, SINGLETON_LAUNCHER.get_tree_hash())) ) return struct def create_graftroot_offer_puz( launcher_ids: List[bytes32], values_to_prove: List[List[bytes32]], inner_puzzle: Program ) -> Program: return GRAFTROOT_DL_OFFERS.curry( inner_puzzle, [launcher_to_struct(launcher) for launcher in launcher_ids], [NFT_STATE_LAYER_MOD.get_tree_hash()] * len(launcher_ids), values_to_prove, ) def create_mirror_puzzle() -> Program: return P2_PARENT.curry(Program.to(1)) MIRROR_PUZZLE_HASH = create_mirror_puzzle().get_tree_hash() def get_mirror_info(parent_puzzle: Program, parent_solution: Program) -> Tuple[bytes32, List[bytes]]: conditions = parent_puzzle.run(parent_solution) for condition in conditions.as_iter(): if ( condition.first().as_python() == ConditionOpcode.CREATE_COIN and condition.at("rf").as_python() == create_mirror_puzzle().get_tree_hash() ): memos: List[bytes] = condition.at("rrrf").as_python() launcher_id = bytes32(memos[0]) return launcher_id, [url for url in memos[1:]] raise ValueError("The provided puzzle and solution do not create a mirror coin")
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/db_wallet/__init__.py
flax/wallet/db_wallet/__init__.py
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/cat_wallet/cat_constants.py
flax/wallet/cat_wallet/cat_constants.py
from __future__ import annotations DEFAULT_CATS = { }
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/cat_wallet/cat_wallet.py
flax/wallet/cat_wallet/cat_wallet.py
from __future__ import annotations import dataclasses import logging import time import traceback from secrets import token_bytes from typing import Any, Dict, List, Optional, Set, Tuple, TYPE_CHECKING from blspy import AugSchemeMPL, G2Element, G1Element from flax.consensus.cost_calculator import NPCResult from flax.full_node.bundle_tools import simple_solution_generator from flax.full_node.mempool_check_conditions import get_name_puzzle_conditions from flax.server.ws_connection import WSFlaxConnection from flax.types.announcement import Announcement from flax.types.blockchain_format.coin import Coin from flax.types.blockchain_format.program import Program from flax.types.blockchain_format.sized_bytes import bytes32 from flax.types.coin_spend import CoinSpend from flax.types.condition_opcodes import ConditionOpcode from flax.types.generator_types import BlockGenerator from flax.types.spend_bundle import SpendBundle from flax.util.byte_types import hexstr_to_bytes from flax.util.condition_tools import conditions_dict_for_solution, pkm_pairs_for_conditions_dict from flax.util.hash import std_hash from flax.util.ints import uint8, uint32, uint64, uint128 from flax.wallet.cat_wallet.cat_constants import DEFAULT_CATS from flax.wallet.cat_wallet.cat_info import CATInfo, LegacyCATInfo from flax.wallet.cat_wallet.cat_utils import ( SpendableCAT, construct_cat_puzzle, match_cat_puzzle, unsigned_spend_bundle_for_spendable_cats, ) from flax.wallet.puzzles.cat_loader import CAT_MOD from flax.wallet.cat_wallet.lineage_store import CATLineageStore from flax.wallet.coin_selection import select_coins from flax.wallet.derivation_record import DerivationRecord from flax.wallet.lineage_proof import LineageProof from flax.wallet.outer_puzzles import AssetType from flax.wallet.puzzle_drivers import PuzzleInfo from flax.wallet.payment import Payment from flax.wallet.puzzles.tails import ALL_LIMITATIONS_PROGRAMS from flax.wallet.puzzles.p2_delegated_puzzle_or_hidden_puzzle import ( DEFAULT_HIDDEN_PUZZLE_HASH, calculate_synthetic_secret_key, ) from flax.wallet.transaction_record import TransactionRecord from flax.wallet.util.compute_memos import compute_memos from flax.wallet.util.curry_and_treehash import calculate_hash_of_quoted_mod_hash, curry_and_treehash from flax.wallet.util.transaction_type import TransactionType from flax.wallet.util.wallet_types import AmountWithPuzzlehash, WalletType from flax.wallet.wallet import Wallet from flax.wallet.wallet_coin_record import WalletCoinRecord from flax.wallet.wallet_info import WalletInfo from flax.wallet.uncurried_puzzle import uncurry_puzzle if TYPE_CHECKING: from flax.wallet.wallet_state_manager import WalletStateManager # This should probably not live in this file but it's for experimental right now CAT_MOD_HASH = CAT_MOD.get_tree_hash() CAT_MOD_HASH_HASH = Program.to(CAT_MOD_HASH).get_tree_hash() QUOTED_MOD_HASH = calculate_hash_of_quoted_mod_hash(CAT_MOD_HASH) class CATWallet: wallet_state_manager: WalletStateManager log: logging.Logger wallet_info: WalletInfo cat_info: CATInfo standard_wallet: Wallet cost_of_single_tx: Optional[int] lineage_store: CATLineageStore @staticmethod def default_wallet_name_for_unknown_cat(limitations_program_hash_hex: str) -> str: return f"CAT {limitations_program_hash_hex[:16]}..." @staticmethod async def create_new_cat_wallet( wallet_state_manager: WalletStateManager, wallet: Wallet, cat_tail_info: Dict[str, Any], amount: uint64, name: Optional[str] = None, ) -> "CATWallet": self = CATWallet() self.cost_of_single_tx = None self.standard_wallet = wallet self.log = logging.getLogger(__name__) std_wallet_id = self.standard_wallet.wallet_id bal = await wallet_state_manager.get_confirmed_balance_for_wallet(std_wallet_id) if amount > bal: raise ValueError("Not enough balance") self.wallet_state_manager = wallet_state_manager # We use 00 bytes because it's not optional. We must check this is overridden during issuance. empty_bytes = bytes32(32 * b"\0") self.cat_info = CATInfo(empty_bytes, None) info_as_string = bytes(self.cat_info).hex() # If the name is not provided, it will be autogenerated based on the resulting tail hash. # For now, give the wallet a temporary name "CAT WALLET" until we get the tail hash original_name = name if name is None: name = "CAT WALLET" self.wallet_info = await wallet_state_manager.user_store.create_wallet(name, WalletType.CAT, info_as_string) try: flax_tx, spend_bundle = await ALL_LIMITATIONS_PROGRAMS[ cat_tail_info["identifier"] ].generate_issuance_bundle( self, cat_tail_info, amount, ) assert self.cat_info.limitations_program_hash != empty_bytes except Exception: await wallet_state_manager.user_store.delete_wallet(self.id()) raise if spend_bundle is None: await wallet_state_manager.user_store.delete_wallet(self.id()) raise ValueError("Failed to create spend.") await self.wallet_state_manager.add_new_wallet(self, self.id()) # If the new CAT name wasn't originally provided, we used a temporary name before issuance # since we didn't yet know the TAIL. Now we know the TAIL, we can update the name # according to the template name for unknown/new CATs. if original_name is None: name = self.default_wallet_name_for_unknown_cat(self.cat_info.limitations_program_hash.hex()) await self.set_name(name) # Change and actual CAT coin non_ephemeral_coins: List[Coin] = spend_bundle.not_ephemeral_additions() cat_coin = None puzzle_store = self.wallet_state_manager.puzzle_store for c in non_ephemeral_coins: info = await puzzle_store.wallet_info_for_puzzle_hash(c.puzzle_hash) if info is None: raise ValueError("Internal Error") id, wallet_type = info if id == self.id(): cat_coin = c if cat_coin is None: raise ValueError("Internal Error, unable to generate new CAT coin") cat_pid: bytes32 = cat_coin.parent_coin_info cat_record = TransactionRecord( confirmed_at_height=uint32(0), created_at_time=uint64(int(time.time())), to_puzzle_hash=(await self.convert_puzzle_hash(cat_coin.puzzle_hash)), amount=uint64(cat_coin.amount), fee_amount=uint64(0), confirmed=False, sent=uint32(10), spend_bundle=None, additions=[cat_coin], removals=list(filter(lambda rem: rem.name() == cat_pid, spend_bundle.removals())), wallet_id=self.id(), sent_to=[], trade_id=None, type=uint32(TransactionType.INCOMING_TX.value), name=bytes32(token_bytes()), memos=[], ) flax_tx = dataclasses.replace(flax_tx, spend_bundle=spend_bundle) await self.standard_wallet.push_transaction(flax_tx) await self.standard_wallet.push_transaction(cat_record) return self @staticmethod async def create_wallet_for_cat( wallet_state_manager: WalletStateManager, wallet: Wallet, limitations_program_hash_hex: str, name: Optional[str] = None, ) -> CATWallet: self = CATWallet() self.cost_of_single_tx = None self.standard_wallet = wallet self.log = logging.getLogger(__name__) limitations_program_hash_hex = bytes32.from_hexstr(limitations_program_hash_hex).hex() # Normalize the format for id, w in wallet_state_manager.wallets.items(): if w.type() == CATWallet.type(): assert isinstance(w, CATWallet) if w.get_asset_id() == limitations_program_hash_hex: self.log.warning("Not creating wallet for already existing CAT wallet") raise ValueError("Wallet already exists") self.wallet_state_manager = wallet_state_manager if limitations_program_hash_hex in DEFAULT_CATS: cat_info = DEFAULT_CATS[limitations_program_hash_hex] name = cat_info["name"] elif name is None: name = self.default_wallet_name_for_unknown_cat(limitations_program_hash_hex) limitations_program_hash = bytes32(hexstr_to_bytes(limitations_program_hash_hex)) self.cat_info = CATInfo(limitations_program_hash, None) info_as_string = bytes(self.cat_info).hex() self.wallet_info = await wallet_state_manager.user_store.create_wallet(name, WalletType.CAT, info_as_string) self.lineage_store = await CATLineageStore.create(self.wallet_state_manager.db_wrapper, self.get_asset_id()) await self.wallet_state_manager.add_new_wallet(self, self.id()) return self @classmethod async def create_from_puzzle_info( cls, wallet_state_manager: WalletStateManager, wallet: Wallet, puzzle_driver: PuzzleInfo, name: Optional[str] = None, ) -> CATWallet: return await cls.create_wallet_for_cat( wallet_state_manager, wallet, puzzle_driver["tail"].hex(), name, ) @staticmethod async def create( wallet_state_manager: WalletStateManager, wallet: Wallet, wallet_info: WalletInfo, ) -> CATWallet: self = CATWallet() self.log = logging.getLogger(__name__) self.cost_of_single_tx = None self.wallet_state_manager = wallet_state_manager self.wallet_info = wallet_info self.standard_wallet = wallet try: self.cat_info = CATInfo.from_bytes(hexstr_to_bytes(self.wallet_info.data)) self.lineage_store = await CATLineageStore.create(self.wallet_state_manager.db_wrapper, self.get_asset_id()) except AssertionError: # Do a migration of the lineage proofs cat_info = LegacyCATInfo.from_bytes(hexstr_to_bytes(self.wallet_info.data)) self.cat_info = CATInfo(cat_info.limitations_program_hash, cat_info.my_tail) self.lineage_store = await CATLineageStore.create(self.wallet_state_manager.db_wrapper, self.get_asset_id()) for coin_id, lineage in cat_info.lineage_proofs: await self.add_lineage(coin_id, lineage) await self.save_info(self.cat_info) return self @classmethod def type(cls) -> uint8: return uint8(WalletType.CAT) def id(self) -> uint32: return self.wallet_info.id async def get_confirmed_balance(self, record_list: Optional[Set[WalletCoinRecord]] = None) -> uint128: if record_list is None: record_list = await self.wallet_state_manager.coin_store.get_unspent_coins_for_wallet(self.id()) amount: uint128 = uint128(0) for record in record_list: lineage = await self.get_lineage_proof_for_coin(record.coin) if lineage is not None: amount = uint128(amount + record.coin.amount) self.log.info(f"Confirmed balance for cat wallet {self.id()} is {amount}") return uint128(amount) async def get_unconfirmed_balance(self, unspent_records: Optional[Set[WalletCoinRecord]] = None) -> uint128: return await self.wallet_state_manager.get_unconfirmed_balance(self.id(), unspent_records) async def get_max_send_amount(self, records: Optional[Set[WalletCoinRecord]] = None) -> uint128: spendable: List[WalletCoinRecord] = list(await self.get_cat_spendable_coins()) if len(spendable) == 0: return uint128(0) spendable.sort(reverse=True, key=lambda record: record.coin.amount) if self.cost_of_single_tx is None: coin = spendable[0].coin txs = await self.generate_signed_transaction( [uint64(coin.amount)], [coin.puzzle_hash], coins={coin}, ignore_max_send_amount=True ) assert txs[0].spend_bundle program: BlockGenerator = simple_solution_generator(txs[0].spend_bundle) # npc contains names of the coins removed, puzzle_hashes and their spend conditions result: NPCResult = get_name_puzzle_conditions( program, self.wallet_state_manager.constants.MAX_BLOCK_COST_CLVM, cost_per_byte=self.wallet_state_manager.constants.COST_PER_BYTE, mempool_mode=True, ) self.cost_of_single_tx = result.cost self.log.info(f"Cost of a single tx for CAT wallet: {self.cost_of_single_tx}") max_cost = self.wallet_state_manager.constants.MAX_BLOCK_COST_CLVM / 2 # avoid full block TXs current_cost = 0 total_amount = 0 total_coin_count = 0 for record in spendable: current_cost += self.cost_of_single_tx total_amount += record.coin.amount total_coin_count += 1 if current_cost + self.cost_of_single_tx > max_cost: break return uint128(total_amount) async def get_name(self) -> str: return self.wallet_info.name async def set_name(self, new_name: str) -> None: new_info = dataclasses.replace(self.wallet_info, name=new_name) self.wallet_info = new_info await self.wallet_state_manager.user_store.update_wallet(self.wallet_info) def get_asset_id(self) -> str: return bytes(self.cat_info.limitations_program_hash).hex() async def set_tail_program(self, tail_program: str) -> None: assert Program.fromhex(tail_program).get_tree_hash() == self.cat_info.limitations_program_hash await self.save_info( CATInfo( self.cat_info.limitations_program_hash, Program.fromhex(tail_program), ) ) async def coin_added(self, coin: Coin, height: uint32, peer: WSFlaxConnection) -> None: """Notification from wallet state manager that wallet has been received.""" self.log.info(f"CAT wallet has been notified that {coin} was added") inner_puzzle = await self.inner_puzzle_for_cat_puzhash(coin.puzzle_hash) lineage_proof = LineageProof(coin.parent_coin_info, inner_puzzle.get_tree_hash(), uint64(coin.amount)) await self.add_lineage(coin.name(), lineage_proof) lineage = await self.get_lineage_proof_for_coin(coin) if lineage is None: try: coin_state = await self.wallet_state_manager.wallet_node.get_coin_state( [coin.parent_coin_info], peer=peer ) assert coin_state[0].coin.name() == coin.parent_coin_info coin_spend = await self.wallet_state_manager.wallet_node.fetch_puzzle_solution( coin_state[0].spent_height, coin_state[0].coin, peer ) await self.puzzle_solution_received(coin_spend, parent_coin=coin_state[0].coin) except Exception as e: self.log.debug(f"Exception: {e}, traceback: {traceback.format_exc()}") async def puzzle_solution_received(self, coin_spend: CoinSpend, parent_coin: Coin) -> None: coin_name = coin_spend.coin.name() puzzle: Program = Program.from_bytes(bytes(coin_spend.puzzle_reveal)) args = match_cat_puzzle(uncurry_puzzle(puzzle)) if args is not None: mod_hash, genesis_coin_checker_hash, inner_puzzle = args self.log.info(f"parent: {coin_name.hex()} inner_puzzle for parent is {inner_puzzle}") await self.add_lineage( coin_name, LineageProof(parent_coin.parent_coin_info, inner_puzzle.get_tree_hash(), uint64(parent_coin.amount)), ) else: # The parent is not a CAT which means we need to scrub all of its children from our DB child_coin_records = await self.wallet_state_manager.coin_store.get_coin_records_by_parent_id(coin_name) if len(child_coin_records) > 0: for record in child_coin_records: if record.wallet_id == self.id(): await self.wallet_state_manager.coin_store.delete_coin_record(record.coin.name()) await self.remove_lineage(record.coin.name()) # We also need to make sure there's no record of the transaction await self.wallet_state_manager.tx_store.delete_transaction_record(record.coin.name()) async def get_new_inner_hash(self) -> bytes32: puzzle = await self.get_new_inner_puzzle() return puzzle.get_tree_hash() async def get_new_inner_puzzle(self) -> Program: return await self.standard_wallet.get_new_puzzle() async def get_new_puzzlehash(self) -> bytes32: return await self.standard_wallet.get_new_puzzlehash() def require_derivation_paths(self) -> bool: return True def puzzle_for_pk(self, pubkey: G1Element) -> Program: inner_puzzle = self.standard_wallet.puzzle_for_pk(pubkey) cat_puzzle: Program = construct_cat_puzzle(CAT_MOD, self.cat_info.limitations_program_hash, inner_puzzle) return cat_puzzle def puzzle_hash_for_pk(self, pubkey: G1Element) -> bytes32: inner_puzzle_hash = self.standard_wallet.puzzle_hash_for_pk(pubkey) limitations_program_hash_hash = Program.to(self.cat_info.limitations_program_hash).get_tree_hash() return curry_and_treehash(QUOTED_MOD_HASH, CAT_MOD_HASH_HASH, limitations_program_hash_hash, inner_puzzle_hash) async def get_new_cat_puzzle_hash(self) -> bytes32: return (await self.wallet_state_manager.get_unused_derivation_record(self.id())).puzzle_hash async def get_spendable_balance(self, records: Optional[Set[WalletCoinRecord]] = None) -> uint128: coins = await self.get_cat_spendable_coins(records) amount = 0 for record in coins: amount += record.coin.amount return uint128(amount) async def get_pending_change_balance(self) -> uint64: unconfirmed_tx = await self.wallet_state_manager.tx_store.get_unconfirmed_for_wallet(self.id()) addition_amount = 0 for record in unconfirmed_tx: if not record.is_in_mempool(): continue our_spend = False for coin in record.removals: if await self.wallet_state_manager.does_coin_belong_to_wallet(coin, self.id()): our_spend = True break if our_spend is not True: continue for coin in record.additions: if await self.wallet_state_manager.does_coin_belong_to_wallet(coin, self.id()): addition_amount += coin.amount return uint64(addition_amount) async def get_cat_spendable_coins(self, records: Optional[Set[WalletCoinRecord]] = None) -> List[WalletCoinRecord]: result: List[WalletCoinRecord] = [] record_list: Set[WalletCoinRecord] = await self.wallet_state_manager.get_spendable_coins_for_wallet( self.id(), records ) for record in record_list: lineage = await self.get_lineage_proof_for_coin(record.coin) if lineage is not None and not lineage.is_none(): result.append(record) return result async def select_coins( self, amount: uint64, exclude: Optional[List[Coin]] = None, min_coin_amount: Optional[uint64] = None, max_coin_amount: Optional[uint64] = None, ) -> Set[Coin]: """ Returns a set of coins that can be used for generating a new transaction. Note: Must be called under wallet state manager lock """ spendable_amount: uint128 = await self.get_spendable_balance() spendable_coins: List[WalletCoinRecord] = await self.get_cat_spendable_coins() # Try to use coins from the store, if there isn't enough of "unused" # coins use change coins that are not confirmed yet unconfirmed_removals: Dict[bytes32, Coin] = await self.wallet_state_manager.unconfirmed_removals_for_wallet( self.id() ) if max_coin_amount is None: max_coin_amount = uint64(self.wallet_state_manager.constants.MAX_COIN_AMOUNT) coins = await select_coins( spendable_amount, max_coin_amount, spendable_coins, unconfirmed_removals, self.log, uint128(amount), exclude, min_coin_amount, ) assert sum(c.amount for c in coins) >= amount return coins async def sign(self, spend_bundle: SpendBundle) -> SpendBundle: sigs: List[G2Element] = [] for spend in spend_bundle.coin_spends: args = match_cat_puzzle(uncurry_puzzle(spend.puzzle_reveal.to_program())) if args is not None: _, _, inner_puzzle = args puzzle_hash = inner_puzzle.get_tree_hash() ret = await self.wallet_state_manager.get_keys(puzzle_hash) if ret is None: # Abort signing the entire SpendBundle - sign all or none raise RuntimeError(f"Failed to get keys for puzzle_hash {puzzle_hash}") pubkey, private = ret synthetic_secret_key = calculate_synthetic_secret_key(private, DEFAULT_HIDDEN_PUZZLE_HASH) error, conditions, cost = conditions_dict_for_solution( spend.puzzle_reveal.to_program(), spend.solution.to_program(), self.wallet_state_manager.constants.MAX_BLOCK_COST_CLVM, ) if conditions is not None: synthetic_pk = synthetic_secret_key.get_g1() for pk, msg in pkm_pairs_for_conditions_dict( conditions, spend.coin.name(), self.wallet_state_manager.constants.AGG_SIG_ME_ADDITIONAL_DATA ): try: assert bytes(synthetic_pk) == pk sigs.append(AugSchemeMPL.sign(synthetic_secret_key, msg)) except AssertionError: raise ValueError("This spend bundle cannot be signed by the CAT wallet") agg_sig = AugSchemeMPL.aggregate(sigs) return SpendBundle.aggregate([spend_bundle, SpendBundle([], agg_sig)]) async def inner_puzzle_for_cat_puzhash(self, cat_hash: bytes32) -> Program: record: Optional[ DerivationRecord ] = await self.wallet_state_manager.puzzle_store.get_derivation_record_for_puzzle_hash(cat_hash) if record is None: raise RuntimeError(f"Missing Derivation Record for CAT puzzle_hash {cat_hash}") inner_puzzle: Program = self.standard_wallet.puzzle_for_pk(record.pubkey) return inner_puzzle async def convert_puzzle_hash(self, puzzle_hash: bytes32) -> bytes32: record: Optional[ DerivationRecord ] = await self.wallet_state_manager.puzzle_store.get_derivation_record_for_puzzle_hash(puzzle_hash) if record is None: return puzzle_hash # TODO: check if we have a test for this case! else: return (await self.inner_puzzle_for_cat_puzhash(puzzle_hash)).get_tree_hash() async def get_lineage_proof_for_coin(self, coin: Coin) -> Optional[LineageProof]: return await self.lineage_store.get_lineage_proof(coin.parent_coin_info) async def create_tandem_xfx_tx( self, fee: uint64, amount_to_claim: uint64, announcement_to_assert: Optional[Announcement] = None, min_coin_amount: Optional[uint64] = None, ) -> Tuple[TransactionRecord, Optional[Announcement]]: """ This function creates a non-CAT transaction to pay fees, contribute funds for issuance, and absorb melt value. It is meant to be called in `generate_unsigned_spendbundle` and as such should be called under the wallet_state_manager lock """ announcement = None if fee > amount_to_claim: flax_coins = await self.standard_wallet.select_coins(fee, min_coin_amount=min_coin_amount) origin_id = list(flax_coins)[0].name() flax_tx = await self.standard_wallet.generate_signed_transaction( uint64(0), (await self.standard_wallet.get_new_puzzlehash()), fee=uint64(fee - amount_to_claim), coins=flax_coins, origin_id=origin_id, # We specify this so that we know the coin that is making the announcement negative_change_allowed=False, coin_announcements_to_consume={announcement_to_assert} if announcement_to_assert is not None else None, ) assert flax_tx.spend_bundle is not None message = None for spend in flax_tx.spend_bundle.coin_spends: if spend.coin.name() == origin_id: conditions = spend.puzzle_reveal.to_program().run(spend.solution.to_program()).as_python() for condition in conditions: if condition[0] == ConditionOpcode.CREATE_COIN_ANNOUNCEMENT: message = condition[1] assert message is not None announcement = Announcement(origin_id, message) else: flax_coins = await self.standard_wallet.select_coins(fee, min_coin_amount=min_coin_amount) selected_amount = sum([c.amount for c in flax_coins]) flax_tx = await self.standard_wallet.generate_signed_transaction( uint64(selected_amount + amount_to_claim - fee), (await self.standard_wallet.get_new_puzzlehash()), coins=flax_coins, negative_change_allowed=True, coin_announcements_to_consume={announcement_to_assert} if announcement_to_assert is not None else None, ) assert flax_tx.spend_bundle is not None return flax_tx, announcement async def generate_unsigned_spendbundle( self, payments: List[Payment], fee: uint64 = uint64(0), cat_discrepancy: Optional[Tuple[int, Program]] = None, # (extra_delta, limitations_solution) coins: Optional[Set[Coin]] = None, coin_announcements_to_consume: Optional[Set[Announcement]] = None, puzzle_announcements_to_consume: Optional[Set[Announcement]] = None, min_coin_amount: Optional[uint64] = None, ) -> Tuple[SpendBundle, Optional[TransactionRecord]]: if coin_announcements_to_consume is not None: coin_announcements_bytes: Optional[Set[bytes32]] = {a.name() for a in coin_announcements_to_consume} else: coin_announcements_bytes = None if puzzle_announcements_to_consume is not None: puzzle_announcements_bytes: Optional[Set[bytes32]] = {a.name() for a in puzzle_announcements_to_consume} else: puzzle_announcements_bytes = None if cat_discrepancy is not None: extra_delta, limitations_solution = cat_discrepancy else: extra_delta, limitations_solution = 0, Program.to([]) payment_amount: int = sum([p.amount for p in payments]) starting_amount: int = payment_amount - extra_delta if coins is None: cat_coins = await self.select_coins(uint64(starting_amount), min_coin_amount=min_coin_amount) else: cat_coins = coins selected_cat_amount = sum([c.amount for c in cat_coins]) assert selected_cat_amount >= starting_amount # Figure out if we need to absorb/melt some XFX as part of this regular_flax_to_claim: int = 0 if payment_amount > starting_amount: fee = uint64(fee + payment_amount - starting_amount) elif payment_amount < starting_amount: regular_flax_to_claim = payment_amount need_flax_transaction = (fee > 0 or regular_flax_to_claim > 0) and (fee - regular_flax_to_claim != 0) # Calculate standard puzzle solutions change = selected_cat_amount - starting_amount primaries: List[AmountWithPuzzlehash] = [] for payment in payments: primaries.append({"puzzlehash": payment.puzzle_hash, "amount": payment.amount, "memos": payment.memos}) if change > 0: changepuzzlehash = await self.get_new_inner_hash() primaries.append({"puzzlehash": changepuzzlehash, "amount": uint64(change), "memos": []}) limitations_program_reveal = Program.to([]) if self.cat_info.my_tail is None: assert cat_discrepancy is None elif cat_discrepancy is not None: limitations_program_reveal = self.cat_info.my_tail # Loop through the coins we've selected and gather the information we need to spend them spendable_cat_list = [] flax_tx = None first = True announcement: Announcement for coin in cat_coins: if first: first = False announcement = Announcement(coin.name(), std_hash(b"".join([c.name() for c in cat_coins]))) if need_flax_transaction: if fee > regular_flax_to_claim: flax_tx, _ = await self.create_tandem_xfx_tx( fee, uint64(regular_flax_to_claim), announcement_to_assert=announcement, min_coin_amount=min_coin_amount, ) innersol = self.standard_wallet.make_solution( primaries=primaries, coin_announcements={announcement.message}, coin_announcements_to_assert=coin_announcements_bytes, puzzle_announcements_to_assert=puzzle_announcements_bytes, ) elif regular_flax_to_claim > fee: flax_tx, _ = await self.create_tandem_xfx_tx( fee, uint64(regular_flax_to_claim), min_coin_amount=min_coin_amount ) innersol = self.standard_wallet.make_solution( primaries=primaries, coin_announcements={announcement.message}, coin_announcements_to_assert={announcement.name()}, ) else: innersol = self.standard_wallet.make_solution( primaries=primaries, coin_announcements={announcement.message}, coin_announcements_to_assert=coin_announcements_bytes, puzzle_announcements_to_assert=puzzle_announcements_bytes, ) else: innersol = self.standard_wallet.make_solution( primaries=[], coin_announcements_to_assert={announcement.name()}, ) inner_puzzle = await self.inner_puzzle_for_cat_puzhash(coin.puzzle_hash) lineage_proof = await self.get_lineage_proof_for_coin(coin) assert lineage_proof is not None new_spendable_cat = SpendableCAT( coin, self.cat_info.limitations_program_hash, inner_puzzle, innersol, limitations_solution=limitations_solution, extra_delta=extra_delta, lineage_proof=lineage_proof, limitations_program_reveal=limitations_program_reveal, ) spendable_cat_list.append(new_spendable_cat) cat_spend_bundle = unsigned_spend_bundle_for_spendable_cats(CAT_MOD, spendable_cat_list) flax_spend_bundle = SpendBundle([], G2Element()) if flax_tx is not None and flax_tx.spend_bundle is not None: flax_spend_bundle = flax_tx.spend_bundle return ( SpendBundle.aggregate( [
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
true
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/cat_wallet/lineage_store.py
flax/wallet/cat_wallet/lineage_store.py
from __future__ import annotations import logging from typing import Dict, Optional from flax.types.blockchain_format.sized_bytes import bytes32 from flax.util.db_wrapper import DBWrapper2 from flax.wallet.lineage_proof import LineageProof log = logging.getLogger(__name__) class CATLineageStore: """ WalletPuzzleStore keeps track of all generated puzzle_hashes and their derivation path / wallet. This is only used for HD wallets where each address is derived from a public key. Otherwise, use the WalletInterestedStore to keep track of puzzle hashes which we are interested in. """ db_wrapper: DBWrapper2 table_name: str @classmethod async def create(cls, db_wrapper: DBWrapper2, asset_id: str) -> "CATLineageStore": self = cls() self.table_name = f"lineage_proofs_{asset_id}" self.db_wrapper = db_wrapper async with self.db_wrapper.writer_maybe_transaction() as conn: await conn.execute( (f"CREATE TABLE IF NOT EXISTS {self.table_name}(" " coin_id text PRIMARY KEY," " lineage blob)") ) return self async def add_lineage_proof(self, coin_id: bytes32, lineage: LineageProof) -> None: async with self.db_wrapper.writer_maybe_transaction() as conn: cursor = await conn.execute( f"INSERT OR REPLACE INTO {self.table_name} VALUES(?, ?)", (coin_id.hex(), bytes(lineage)), ) await cursor.close() async def remove_lineage_proof(self, coin_id: bytes32) -> None: async with self.db_wrapper.writer_maybe_transaction() as conn: cursor = await conn.execute( f"DELETE FROM {self.table_name} WHERE coin_id=?;", (coin_id.hex(),), ) await cursor.close() async def get_lineage_proof(self, coin_id: bytes32) -> Optional[LineageProof]: async with self.db_wrapper.reader_no_transaction() as conn: cursor = await conn.execute( f"SELECT * FROM {self.table_name} WHERE coin_id=?;", (coin_id.hex(),), ) row = await cursor.fetchone() await cursor.close() if row is not None and row[0] is not None: ret: LineageProof = LineageProof.from_bytes(row[1]) return ret return None async def get_all_lineage_proofs(self) -> Dict[bytes32, LineageProof]: async with self.db_wrapper.reader_no_transaction() as conn: cursor = await conn.execute(f"SELECT * FROM {self.table_name}") rows = await cursor.fetchall() await cursor.close() lineage_dict = {} for row in rows: lineage_dict[bytes32.from_hexstr(row[0])] = LineageProof.from_bytes(row[1]) return lineage_dict
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/cat_wallet/cat_outer_puzzle.py
flax/wallet/cat_wallet/cat_outer_puzzle.py
from __future__ import annotations from dataclasses import dataclass from typing import Callable, List, Optional from flax.types.blockchain_format.coin import Coin from flax.types.blockchain_format.program import Program from flax.types.blockchain_format.sized_bytes import bytes32 from flax.types.coin_spend import CoinSpend from flax.util.ints import uint64 from flax.wallet.cat_wallet.cat_utils import ( SpendableCAT, construct_cat_puzzle, match_cat_puzzle, unsigned_spend_bundle_for_spendable_cats, ) from flax.wallet.lineage_proof import LineageProof from flax.wallet.puzzle_drivers import PuzzleInfo, Solver from flax.wallet.puzzles.cat_loader import CAT_MOD from flax.wallet.uncurried_puzzle import UncurriedPuzzle, uncurry_puzzle @dataclass(frozen=True) class CATOuterPuzzle: _match: Callable[[UncurriedPuzzle], Optional[PuzzleInfo]] _construct: Callable[[PuzzleInfo, Program], Program] _solve: Callable[[PuzzleInfo, Solver, Program, Program], Program] _get_inner_puzzle: Callable[[PuzzleInfo, UncurriedPuzzle], Optional[Program]] _get_inner_solution: Callable[[PuzzleInfo, Program], Optional[Program]] def match(self, puzzle: UncurriedPuzzle) -> Optional[PuzzleInfo]: args = match_cat_puzzle(puzzle) if args is None: return None _, tail_hash, inner_puzzle = args constructor_dict = { "type": "CAT", "tail": "0x" + tail_hash.as_python().hex(), } next_constructor = self._match(uncurry_puzzle(inner_puzzle)) if next_constructor is not None: constructor_dict["also"] = next_constructor.info return PuzzleInfo(constructor_dict) def get_inner_puzzle(self, constructor: PuzzleInfo, puzzle_reveal: UncurriedPuzzle) -> Optional[Program]: args = match_cat_puzzle(puzzle_reveal) if args is None: raise ValueError("This driver is not for the specified puzzle reveal") _, _, inner_puzzle = args also = constructor.also() if also is not None: deep_inner_puzzle: Optional[Program] = self._get_inner_puzzle(also, uncurry_puzzle(inner_puzzle)) return deep_inner_puzzle else: return inner_puzzle def get_inner_solution(self, constructor: PuzzleInfo, solution: Program) -> Optional[Program]: my_inner_solution: Program = solution.first() also = constructor.also() if also: deep_inner_solution: Optional[Program] = self._get_inner_solution(also, my_inner_solution) return deep_inner_solution else: return my_inner_solution def asset_id(self, constructor: PuzzleInfo) -> Optional[bytes32]: return bytes32(constructor["tail"]) def construct(self, constructor: PuzzleInfo, inner_puzzle: Program) -> Program: also = constructor.also() if also is not None: inner_puzzle = self._construct(also, inner_puzzle) return construct_cat_puzzle(CAT_MOD, constructor["tail"], inner_puzzle) def solve(self, constructor: PuzzleInfo, solver: Solver, inner_puzzle: Program, inner_solution: Program) -> Program: tail_hash: bytes32 = constructor["tail"] spendable_cats: List[SpendableCAT] = [] target_coin: Coin ring = [ *zip( solver["siblings"].as_iter(), solver["sibling_spends"].as_iter(), solver["sibling_puzzles"].as_iter(), solver["sibling_solutions"].as_iter(), ), ( Program.to(solver["coin"]), Program.to(solver["parent_spend"]), inner_puzzle, inner_solution, ), ] ring.sort(key=lambda c: bytes(c[0])) # deterministic sort to make sure all spends have the same ring order for coin_prog, spend_prog, puzzle, solution in ring: coin_bytes: bytes = coin_prog.as_python() coin = Coin(bytes32(coin_bytes[0:32]), bytes32(coin_bytes[32:64]), uint64.from_bytes(coin_bytes[64:72])) if coin_bytes == solver["coin"]: target_coin = coin parent_spend: CoinSpend = CoinSpend.from_bytes(spend_prog.as_python()) parent_coin: Coin = parent_spend.coin also = constructor.also() if also is not None: puzzle = self._construct(also, puzzle) solution = self._solve(also, solver, inner_puzzle, inner_solution) args = match_cat_puzzle(uncurry_puzzle(parent_spend.puzzle_reveal.to_program())) assert args is not None _, _, parent_inner_puzzle = args spendable_cats.append( SpendableCAT( coin, tail_hash, puzzle, solution, lineage_proof=LineageProof( parent_coin.parent_coin_info, parent_inner_puzzle.get_tree_hash(), uint64(parent_coin.amount) ), ) ) bundle = unsigned_spend_bundle_for_spendable_cats(CAT_MOD, spendable_cats) return next(cs.solution.to_program() for cs in bundle.coin_spends if cs.coin == target_coin)
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/cat_wallet/__init__.py
flax/wallet/cat_wallet/__init__.py
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/cat_wallet/cat_utils.py
flax/wallet/cat_wallet/cat_utils.py
import dataclasses from typing import List, Iterator, Optional from blspy import G2Element from flax.types.blockchain_format.coin import Coin, coin_as_list from flax.types.blockchain_format.program import Program, INFINITE_COST from flax.types.blockchain_format.sized_bytes import bytes32 from flax.types.condition_opcodes import ConditionOpcode from flax.types.spend_bundle import CoinSpend, SpendBundle from flax.util.condition_tools import conditions_dict_for_solution from flax.wallet.lineage_proof import LineageProof from flax.wallet.puzzles.cat_loader import CAT_MOD from flax.wallet.uncurried_puzzle import UncurriedPuzzle NULL_SIGNATURE = G2Element() ANYONE_CAN_SPEND_PUZZLE = Program.to(1) # simply return the conditions # information needed to spend a cc @dataclasses.dataclass class SpendableCAT: coin: Coin limitations_program_hash: bytes32 inner_puzzle: Program inner_solution: Program limitations_solution: Program = Program.to([]) lineage_proof: LineageProof = LineageProof() extra_delta: int = 0 limitations_program_reveal: Program = Program.to([]) def match_cat_puzzle(puzzle: UncurriedPuzzle) -> Optional[Iterator[Program]]: """ Given the curried puzzle and args, test if it's a CAT and, if it is, return the curried arguments """ if puzzle.mod == CAT_MOD: ret: Iterator[Program] = puzzle.args.as_iter() return ret else: return None def get_innerpuzzle_from_puzzle(puzzle: Program) -> Program: mod, curried_args = puzzle.uncurry() if mod == CAT_MOD: return curried_args.at("rrf") else: raise ValueError("Not a CAT puzzle") def construct_cat_puzzle( mod_code: Program, limitations_program_hash: bytes32, inner_puzzle: Program, mod_code_hash: Optional[bytes32] = None ) -> Program: """ Given an inner puzzle hash and tail hash calculate a puzzle program for a specific cc. """ if mod_code_hash is None: mod_code_hash = mod_code.get_tree_hash() return mod_code.curry(mod_code_hash, limitations_program_hash, inner_puzzle) def subtotals_for_deltas(deltas: List[int]) -> List[int]: """ Given a list of deltas corresponding to input coins, create the "subtotals" list needed in solutions spending those coins. """ subtotals = [] subtotal = 0 for delta in deltas: subtotals.append(subtotal) subtotal += delta # tweak the subtotals so the smallest value is 0 subtotal_offset = min(subtotals) subtotals = [_ - subtotal_offset for _ in subtotals] return subtotals def next_info_for_spendable_cat(spendable_cat: SpendableCAT) -> Program: c = spendable_cat.coin list = [c.parent_coin_info, spendable_cat.inner_puzzle.get_tree_hash(), c.amount] # ignoring hint error here for: # https://github.com/Flax-Network/clvm/pull/102 return Program.to(list) # type: ignore[no-any-return] # This should probably return UnsignedSpendBundle if that type ever exists def unsigned_spend_bundle_for_spendable_cats(mod_code: Program, spendable_cat_list: List[SpendableCAT]) -> SpendBundle: """ Given a list of `SpendableCAT` objects, create a `SpendBundle` that spends all those coins. Note that no signing is done here, so it falls on the caller to sign the resultant bundle. """ N = len(spendable_cat_list) # figure out what the deltas are by running the inner puzzles & solutions deltas: List[int] = [] for spend_info in spendable_cat_list: error, conditions, cost = conditions_dict_for_solution( spend_info.inner_puzzle, spend_info.inner_solution, INFINITE_COST ) total = spend_info.extra_delta * -1 if conditions: for _ in conditions.get(ConditionOpcode.CREATE_COIN, []): if _.vars[1] != b"\x8f": # -113 in bytes total += Program.to(_.vars[1]).as_int() deltas.append(spend_info.coin.amount - total) if sum(deltas) != 0: raise ValueError("input and output amounts don't match") subtotals = subtotals_for_deltas(deltas) infos_for_next = [] infos_for_me = [] ids = [] for _ in spendable_cat_list: infos_for_next.append(next_info_for_spendable_cat(_)) infos_for_me.append(Program.to(coin_as_list(_.coin))) ids.append(_.coin.name()) coin_spends = [] for index in range(N): spend_info = spendable_cat_list[index] puzzle_reveal = construct_cat_puzzle(mod_code, spend_info.limitations_program_hash, spend_info.inner_puzzle) prev_index = (index - 1) % N next_index = (index + 1) % N prev_id = ids[prev_index] my_info = infos_for_me[index] next_info = infos_for_next[next_index] solution = [ spend_info.inner_solution, spend_info.lineage_proof.to_program(), prev_id, my_info, next_info, subtotals[index], spend_info.extra_delta, ] coin_spend = CoinSpend(spend_info.coin, puzzle_reveal, Program.to(solution)) coin_spends.append(coin_spend) return SpendBundle(coin_spends, NULL_SIGNATURE)
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/cat_wallet/cat_info.py
flax/wallet/cat_wallet/cat_info.py
from dataclasses import dataclass from typing import List, Optional, Tuple from flax.types.blockchain_format.program import Program from flax.types.blockchain_format.sized_bytes import bytes32 from flax.wallet.lineage_proof import LineageProof from flax.util.streamable import Streamable, streamable @streamable @dataclass(frozen=True) class CATInfo(Streamable): limitations_program_hash: bytes32 my_tail: Optional[Program] # this is the program # We used to store all of the lineage proofs here but it was very slow to serialize for a lot of transactions # so we moved it to CATLineageStore. We keep this around for migration purposes. @streamable @dataclass(frozen=True) class LegacyCATInfo(Streamable): limitations_program_hash: bytes32 my_tail: Optional[Program] # this is the program lineage_proofs: List[Tuple[bytes32, Optional[LineageProof]]] # {coin.name(): lineage_proof}
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/did_wallet/__init__.py
flax/wallet/did_wallet/__init__.py
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/did_wallet/did_wallet.py
flax/wallet/did_wallet/did_wallet.py
import dataclasses import logging import time import json import re from typing import Dict, Optional, List, Any, Set, Tuple, TYPE_CHECKING from blspy import AugSchemeMPL, G1Element, G2Element from secrets import token_bytes from flax.protocols import wallet_protocol from flax.protocols.wallet_protocol import CoinState from flax.server.ws_connection import WSFlaxConnection from flax.types.announcement import Announcement from flax.types.blockchain_format.coin import Coin from flax.types.blockchain_format.program import Program from flax.types.blockchain_format.sized_bytes import bytes32 from flax.types.coin_spend import CoinSpend from flax.types.spend_bundle import SpendBundle from flax.util.ints import uint64, uint32, uint8, uint128 from flax.wallet.util.transaction_type import TransactionType from flax.util.condition_tools import conditions_dict_for_solution, pkm_pairs_for_conditions_dict from flax.wallet.did_wallet.did_info import DIDInfo from flax.wallet.lineage_proof import LineageProof from flax.wallet.transaction_record import TransactionRecord from flax.wallet.util.wallet_types import WalletType from flax.wallet.util.compute_memos import compute_memos from flax.wallet.wallet import Wallet from flax.wallet.wallet_coin_record import WalletCoinRecord from flax.wallet.wallet_info import WalletInfo from flax.wallet.derivation_record import DerivationRecord from flax.wallet.did_wallet import did_wallet_puzzles from flax.wallet.derive_keys import master_sk_to_wallet_sk_unhardened from flax.wallet.coin_selection import select_coins from flax.wallet.puzzles.p2_delegated_puzzle_or_hidden_puzzle import ( puzzle_for_pk, puzzle_hash_for_pk, DEFAULT_HIDDEN_PUZZLE_HASH, calculate_synthetic_secret_key, ) class DIDWallet: wallet_state_manager: Any log: logging.Logger wallet_info: WalletInfo did_info: DIDInfo standard_wallet: Wallet base_puzzle_program: Optional[bytes] base_inner_puzzle_hash: Optional[bytes32] wallet_id: int @staticmethod async def create_new_did_wallet( wallet_state_manager: Any, wallet: Wallet, amount: uint64, backups_ids: List = [], num_of_backup_ids_needed: uint64 = None, metadata: Dict[str, str] = {}, name: Optional[str] = None, fee: uint64 = uint64(0), ): """ Create a brand new DID wallet This must be called under the wallet state manager lock :param wallet_state_manager: Wallet state manager :param wallet: Standard wallet :param amount: Amount of the DID coin :param backups_ids: A list of DIDs used for recovery this DID :param num_of_backup_ids_needed: Needs how many recovery DIDs at least :param metadata: Metadata saved in the DID :param name: Wallet name :param fee: transaction fee :return: DID wallet """ self = DIDWallet() self.wallet_state_manager = wallet_state_manager if name is None: name = self.generate_wallet_name() self.base_puzzle_program = None self.base_inner_puzzle_hash = None self.standard_wallet = wallet self.log = logging.getLogger(name if name else __name__) std_wallet_id = self.standard_wallet.wallet_id bal = await wallet_state_manager.get_confirmed_balance_for_wallet(std_wallet_id) if amount > bal: raise ValueError("Not enough balance") if amount & 1 == 0: raise ValueError("DID amount must be odd number") if num_of_backup_ids_needed is None: num_of_backup_ids_needed = uint64(len(backups_ids)) if num_of_backup_ids_needed > len(backups_ids): raise ValueError("Cannot require more IDs than are known.") self.did_info = DIDInfo( None, backups_ids, num_of_backup_ids_needed, [], None, None, None, None, False, json.dumps(metadata) ) info_as_string = json.dumps(self.did_info.to_json_dict()) self.wallet_info = await wallet_state_manager.user_store.create_wallet( name, WalletType.DECENTRALIZED_ID.value, info_as_string ) self.wallet_id = self.wallet_info.id std_wallet_id = self.standard_wallet.wallet_id bal = await wallet_state_manager.get_confirmed_balance_for_wallet(std_wallet_id) if amount > bal: raise ValueError("Not enough balance") try: spend_bundle = await self.generate_new_decentralised_id(amount, fee) except Exception: await wallet_state_manager.user_store.delete_wallet(self.id()) raise if spend_bundle is None: await wallet_state_manager.user_store.delete_wallet(self.id()) raise ValueError("Failed to create spend.") await self.wallet_state_manager.add_new_wallet(self, self.wallet_info.id) return self @staticmethod async def create_new_did_wallet_from_recovery( wallet_state_manager: Any, wallet: Wallet, backup_data: str, name: Optional[str] = None, ): """ Create a DID wallet from a backup file :param wallet_state_manager: Wallet state manager :param wallet: Standard wallet :param backup_data: A serialized backup data :param name: Wallet name :return: DID wallet """ self = DIDWallet() self.wallet_state_manager = wallet_state_manager if name is None: name = self.generate_wallet_name() self.base_puzzle_program = None self.base_inner_puzzle_hash = None self.standard_wallet = wallet self.log = logging.getLogger(name if name else __name__) self.log.info("Creating DID wallet from recovery file ...") # load backup will also set our DIDInfo self.did_info = DIDWallet.deserialize_backup_data(backup_data) self.check_existed_did() info_as_string = json.dumps(self.did_info.to_json_dict()) self.wallet_info = await wallet_state_manager.user_store.create_wallet( name, WalletType.DECENTRALIZED_ID.value, info_as_string ) await self.wallet_state_manager.add_new_wallet(self, self.wallet_info.id) await self.save_info(self.did_info) await self.wallet_state_manager.update_wallet_puzzle_hashes(self.wallet_info.id) await self.load_parent(self.did_info) if self.wallet_info is None: raise ValueError("Internal Error") self.wallet_id = self.wallet_info.id return self @staticmethod async def create_new_did_wallet_from_coin_spend( wallet_state_manager: Any, wallet: Wallet, launch_coin: Coin, inner_puzzle: Program, coin_spend: CoinSpend, name: Optional[str] = None, ): """ Create a DID wallet from a transfer :param wallet_state_manager: Wallet state manager :param wallet: Main wallet :param launch_coin: The launch coin of the DID :param inner_puzzle: DID inner puzzle :param coin_spend: DID transfer spend :param name: Wallet name :return: DID wallet """ self = DIDWallet() self.wallet_state_manager = wallet_state_manager if name is None: name = self.generate_wallet_name() self.base_puzzle_program = None self.base_inner_puzzle_hash = None self.standard_wallet = wallet self.log = logging.getLogger(name if name else __name__) self.log.info(f"Creating DID wallet from a coin spend {launch_coin} ...") # Create did info from the coin spend args = did_wallet_puzzles.uncurry_innerpuz(inner_puzzle) if args is None: raise ValueError("Cannot uncurry the DID puzzle.") _, recovery_list_hash, num_verification, _, metadata = args full_solution: Program = Program.from_bytes(bytes(coin_spend.solution)) inner_solution: Program = full_solution.rest().rest().first() recovery_list: List[bytes32] = [] backup_required: int = num_verification.as_int() if recovery_list_hash != Program.to([]).get_tree_hash(): for did in inner_solution.rest().rest().rest().rest().rest().as_python(): recovery_list.append(did[0]) self.did_info = DIDInfo( launch_coin, recovery_list, uint64(backup_required), [], inner_puzzle, None, None, None, False, json.dumps(did_wallet_puzzles.program_to_metadata(metadata)), ) self.check_existed_did() info_as_string = json.dumps(self.did_info.to_json_dict()) self.wallet_info = await wallet_state_manager.user_store.create_wallet( name, WalletType.DECENTRALIZED_ID.value, info_as_string ) await self.wallet_state_manager.add_new_wallet(self, self.wallet_info.id) await self.wallet_state_manager.update_wallet_puzzle_hashes(self.wallet_info.id) await self.load_parent(self.did_info) self.log.info(f"New DID wallet created {info_as_string}.") if self.wallet_info is None: raise ValueError("Internal Error") self.wallet_id = self.wallet_info.id return self @staticmethod async def create( wallet_state_manager: Any, wallet: Wallet, wallet_info: WalletInfo, name: str = None, ): """ Create a DID wallet based on the local database :param wallet_state_manager: Wallet state manager :param wallet: Standard wallet :param wallet_info: Serialized WalletInfo :param name: Wallet name :return: """ self = DIDWallet() self.log = logging.getLogger(name if name else __name__) self.wallet_state_manager = wallet_state_manager self.wallet_info = wallet_info self.wallet_id = wallet_info.id self.standard_wallet = wallet self.wallet_info = wallet_info self.did_info = DIDInfo.from_json_dict(json.loads(wallet_info.data)) self.base_puzzle_program = None self.base_inner_puzzle_hash = None return self @classmethod def type(cls) -> uint8: return uint8(WalletType.DECENTRALIZED_ID) def id(self) -> uint32: return self.wallet_info.id async def get_confirmed_balance(self, record_list=None) -> uint128: if record_list is None: record_list = await self.wallet_state_manager.coin_store.get_unspent_coins_for_wallet(self.id()) amount: uint128 = uint128(0) for record in record_list: parent = self.get_parent_for_coin(record.coin) if parent is not None: amount = uint128(amount + record.coin.amount) self.log.info(f"Confirmed balance for did wallet is {amount}") return uint128(amount) async def get_pending_change_balance(self) -> uint64: unconfirmed_tx = await self.wallet_state_manager.tx_store.get_unconfirmed_for_wallet(self.id()) addition_amount = 0 for record in unconfirmed_tx: our_spend = False for coin in record.removals: if await self.wallet_state_manager.does_coin_belong_to_wallet(coin, self.id()): our_spend = True break if our_spend is not True: continue for coin in record.additions: if await self.wallet_state_manager.does_coin_belong_to_wallet(coin, self.id()): addition_amount += coin.amount return uint64(addition_amount) async def get_unconfirmed_balance(self, record_list=None) -> uint128: return await self.wallet_state_manager.get_unconfirmed_balance(self.id(), record_list) async def select_coins( self, amount: uint64, exclude: Optional[List[Coin]] = None, min_coin_amount: Optional[uint64] = None, max_coin_amount: Optional[uint64] = None, ) -> Set[Coin]: """ Returns a set of coins that can be used for generating a new transaction. Note: Must be called under wallet state manager lock """ spendable_amount: uint128 = await self.get_spendable_balance() if amount > spendable_amount: error_msg = f"Can't select {amount}, from spendable {spendable_amount} for wallet id {self.id()}" self.log.warning(error_msg) raise ValueError(error_msg) spendable_coins: List[WalletCoinRecord] = list( await self.wallet_state_manager.get_spendable_coins_for_wallet(self.wallet_info.id) ) # Try to use coins from the store, if there isn't enough of "unused" # coins use change coins that are not confirmed yet unconfirmed_removals: Dict[bytes32, Coin] = await self.wallet_state_manager.unconfirmed_removals_for_wallet( self.wallet_info.id ) if max_coin_amount is None: max_coin_amount = uint64(self.wallet_state_manager.constants.MAX_COIN_AMOUNT) coins = await select_coins( spendable_amount, max_coin_amount, spendable_coins, unconfirmed_removals, self.log, uint128(amount), exclude, min_coin_amount, ) assert sum(c.amount for c in coins) >= amount return coins # This will be used in the recovery case where we don't have the parent info already async def coin_added(self, coin: Coin, _: uint32, peer: WSFlaxConnection): """Notification from wallet state manager that wallet has been received.""" parent = self.get_parent_for_coin(coin) if parent is None: # this is the first time we received it, check it's a DID coin parent_state: CoinState = ( await self.wallet_state_manager.wallet_node.get_coin_state([coin.parent_coin_info], peer=peer) )[0] assert parent_state.spent_height is not None puzzle_solution_request = wallet_protocol.RequestPuzzleSolution( coin.parent_coin_info, uint32(parent_state.spent_height) ) response = await peer.request_puzzle_solution(puzzle_solution_request) req_puz_sol = response.response assert req_puz_sol.puzzle is not None parent_innerpuz = did_wallet_puzzles.get_innerpuzzle_from_puzzle(req_puz_sol.puzzle.to_program()) if parent_innerpuz: parent_info = LineageProof( parent_state.coin.parent_coin_info, parent_innerpuz.get_tree_hash(), uint64(parent_state.coin.amount), ) await self.add_parent(coin.parent_coin_info, parent_info) else: self.log.warning("Parent coin is not a DID, skipping: %s -> %s", coin.name(), coin) return self.log.info(f"DID wallet has been notified that coin was added: {coin.name()}:{coin}") inner_puzzle = await self.inner_puzzle_for_did_puzzle(coin.puzzle_hash) if self.did_info.temp_coin is not None: self.wallet_state_manager.state_changed("did_coin_added", self.wallet_info.id) new_info = DIDInfo( self.did_info.origin_coin, self.did_info.backup_ids, self.did_info.num_of_backup_ids_needed, self.did_info.parent_info, inner_puzzle, None, None, None, False, self.did_info.metadata, ) await self.save_info(new_info) future_parent = LineageProof( coin.parent_coin_info, inner_puzzle.get_tree_hash(), uint64(coin.amount), ) await self.add_parent(coin.name(), future_parent) def create_backup(self) -> str: """ Create a serialized backup data for DIDInfo :return: Serialized backup data """ assert self.did_info.current_inner is not None assert self.did_info.origin_coin is not None output_str = f"{self.did_info.origin_coin.parent_coin_info.hex()}:" output_str += f"{self.did_info.origin_coin.puzzle_hash.hex()}:" output_str += f"{self.did_info.origin_coin.amount}:" if len(self.did_info.backup_ids) > 0: for did in self.did_info.backup_ids: output_str = output_str + did.hex() + "," output_str = output_str[:-1] output_str += f":{bytes(self.did_info.current_inner).hex()}:{self.did_info.num_of_backup_ids_needed}" output_str += f":{self.did_info.metadata}" return output_str async def load_parent(self, did_info: DIDInfo): """ Load the parent info when importing a DID :param did_info: DID info :return: """ # full_puz = did_wallet_puzzles.create_fullpuz(innerpuz, origin.name()) # All additions in this block here: new_pubkey = (await self.wallet_state_manager.get_unused_derivation_record(self.wallet_info.id)).pubkey new_puzhash = puzzle_for_pk(new_pubkey).get_tree_hash() parent_info = None assert did_info.origin_coin is not None assert did_info.current_inner is not None new_did_inner_puzhash = did_wallet_puzzles.get_inner_puzhash_by_p2( new_puzhash, did_info.backup_ids, did_info.num_of_backup_ids_needed, did_info.origin_coin.name(), did_wallet_puzzles.metadata_to_program(json.loads(self.did_info.metadata)), ) wallet_node = self.wallet_state_manager.wallet_node peer: WSFlaxConnection = wallet_node.get_full_node_peer() if peer is None: raise ValueError("Could not find any peers to request puzzle and solution from") parent_coin: Coin = did_info.origin_coin while True: children = await wallet_node.fetch_children(parent_coin.name(), peer) if len(children) == 0: break children_state: CoinState = children[0] child_coin = children_state.coin future_parent = LineageProof( child_coin.parent_coin_info, did_info.current_inner.get_tree_hash(), uint64(child_coin.amount), ) await self.add_parent(child_coin.name(), future_parent) if children_state.spent_height != children_state.created_height: did_info = DIDInfo( did_info.origin_coin, did_info.backup_ids, did_info.num_of_backup_ids_needed, self.did_info.parent_info, did_info.current_inner, child_coin, new_did_inner_puzhash, bytes(new_pubkey), False, did_info.metadata, ) await self.save_info(did_info) assert children_state.created_height parent_spend = await wallet_node.fetch_puzzle_solution(children_state.created_height, parent_coin, peer) assert parent_spend is not None parent_innerpuz = did_wallet_puzzles.get_innerpuzzle_from_puzzle( parent_spend.puzzle_reveal.to_program() ) assert parent_innerpuz is not None parent_info = LineageProof( parent_coin.parent_coin_info, parent_innerpuz.get_tree_hash(), uint64(parent_coin.amount), ) await self.add_parent(child_coin.parent_coin_info, parent_info) parent_coin = child_coin assert parent_info is not None async def create_tandem_xfx_tx( self, fee: uint64, announcement_to_assert: Optional[Announcement] = None ) -> TransactionRecord: flax_coins = await self.standard_wallet.select_coins(fee) flax_tx = await self.standard_wallet.generate_signed_transaction( uint64(0), (await self.standard_wallet.get_new_puzzlehash()), fee=fee, coins=flax_coins, coin_announcements_to_consume={announcement_to_assert} if announcement_to_assert is not None else None, ) assert flax_tx.spend_bundle is not None return flax_tx def puzzle_for_pk(self, pubkey: G1Element) -> Program: if self.did_info.origin_coin is not None: innerpuz = did_wallet_puzzles.create_innerpuz( puzzle_for_pk(pubkey), self.did_info.backup_ids, self.did_info.num_of_backup_ids_needed, self.did_info.origin_coin.name(), did_wallet_puzzles.metadata_to_program(json.loads(self.did_info.metadata)), ) return did_wallet_puzzles.create_fullpuz(innerpuz, self.did_info.origin_coin.name()) else: innerpuz = Program.to((8, 0)) return did_wallet_puzzles.create_fullpuz(innerpuz, bytes32([0] * 32)) def puzzle_hash_for_pk(self, pubkey: G1Element) -> bytes32: if self.did_info.origin_coin is None: # TODO: this seem dumb. Why bother with this case? Is it ever used? return puzzle_for_pk(pubkey).get_tree_hash() origin_coin_name = self.did_info.origin_coin.name() innerpuz_hash = did_wallet_puzzles.get_inner_puzhash_by_p2( puzzle_hash_for_pk(pubkey), self.did_info.backup_ids, self.did_info.num_of_backup_ids_needed, origin_coin_name, did_wallet_puzzles.metadata_to_program(json.loads(self.did_info.metadata)), ) return did_wallet_puzzles.create_fullpuz_hash(innerpuz_hash, origin_coin_name) async def get_new_puzzle(self) -> Program: return self.puzzle_for_pk( (await self.wallet_state_manager.get_unused_derivation_record(self.wallet_info.id)).pubkey ) def get_my_DID(self) -> str: assert self.did_info.origin_coin is not None core = self.did_info.origin_coin.name() assert core is not None return core.hex() async def set_name(self, new_name: str): import dataclasses new_info = dataclasses.replace(self.wallet_info, name=new_name) self.wallet_info = new_info await self.wallet_state_manager.user_store.update_wallet(self.wallet_info) async def get_name(self): return self.wallet_info.name async def create_update_spend(self, fee: uint64 = uint64(0)): assert self.did_info.current_inner is not None assert self.did_info.origin_coin is not None coins = await self.select_coins(uint64(1)) assert coins is not None coin = coins.pop() new_puzhash = await self.get_new_did_inner_hash() # innerpuz solution is (mode, p2_solution) p2_solution = self.standard_wallet.make_solution( primaries=[{"puzzlehash": new_puzhash, "amount": uint64(coin.amount), "memos": [new_puzhash]}], coin_announcements={coin.name()}, ) innersol: Program = Program.to([1, p2_solution]) # full solution is (corehash parent_info my_amount innerpuz_reveal solution) innerpuz: Program = self.did_info.current_inner full_puzzle: Program = did_wallet_puzzles.create_fullpuz( innerpuz, self.did_info.origin_coin.name(), ) parent_info = self.get_parent_for_coin(coin) assert parent_info is not None fullsol = Program.to( [ [ parent_info.parent_name, parent_info.inner_puzzle_hash, parent_info.amount, ], coin.amount, innersol, ] ) list_of_coinspends = [CoinSpend(coin, full_puzzle, fullsol)] unsigned_spend_bundle = SpendBundle(list_of_coinspends, G2Element()) spend_bundle = await self.sign(unsigned_spend_bundle) if fee > 0: announcement_to_make = coin.name() flax_tx = await self.create_tandem_xfx_tx(fee, Announcement(coin.name(), announcement_to_make)) else: announcement_to_make = None flax_tx = None if flax_tx is not None and flax_tx.spend_bundle is not None: spend_bundle = SpendBundle.aggregate([spend_bundle, flax_tx.spend_bundle]) flax_tx = dataclasses.replace(flax_tx, spend_bundle=None) await self.wallet_state_manager.add_pending_transaction(flax_tx) did_record = TransactionRecord( confirmed_at_height=uint32(0), created_at_time=uint64(int(time.time())), to_puzzle_hash=await self.standard_wallet.get_puzzle_hash(False), amount=uint64(coin.amount), fee_amount=uint64(0), confirmed=False, sent=uint32(0), spend_bundle=spend_bundle, additions=spend_bundle.additions(), removals=spend_bundle.removals(), wallet_id=self.wallet_info.id, sent_to=[], trade_id=None, type=uint32(TransactionType.OUTGOING_TX.value), name=bytes32(token_bytes()), memos=list(compute_memos(spend_bundle).items()), ) await self.wallet_state_manager.add_pending_transaction(did_record) return spend_bundle async def transfer_did(self, new_puzhash: bytes32, fee: uint64, with_recovery: bool) -> TransactionRecord: """ Transfer the current DID to another owner :param new_puzhash: New owner's p2_puzzle :param fee: Transaction fee :param with_recovery: A boolean indicates if the recovery info will be sent through the blockchain :return: Spend bundle """ assert self.did_info.current_inner is not None assert self.did_info.origin_coin is not None coins = await self.select_coins(uint64(1)) assert coins is not None coin = coins.pop() backup_ids = [] backup_required = uint64(0) if with_recovery: backup_ids = self.did_info.backup_ids backup_required = self.did_info.num_of_backup_ids_needed new_did_puzhash = did_wallet_puzzles.get_inner_puzhash_by_p2( new_puzhash, backup_ids, backup_required, self.did_info.origin_coin.name(), did_wallet_puzzles.metadata_to_program(json.loads(self.did_info.metadata)), ) p2_solution = self.standard_wallet.make_solution( primaries=[ { "puzzlehash": new_did_puzhash, "amount": uint64(coin.amount), "memos": [new_puzhash], } ], coin_announcements={coin.name()}, ) # Need to include backup list reveal here, even we are don't recover # innerpuz solution is # (mode, p2_solution) innersol: Program = Program.to([2, p2_solution]) if with_recovery: innersol = Program.to([2, p2_solution, [], [], [], self.did_info.backup_ids]) # full solution is (corehash parent_info my_amount innerpuz_reveal solution) full_puzzle: Program = did_wallet_puzzles.create_fullpuz( self.did_info.current_inner, self.did_info.origin_coin.name(), ) parent_info = self.get_parent_for_coin(coin) assert parent_info is not None fullsol = Program.to( [ [ parent_info.parent_name, parent_info.inner_puzzle_hash, parent_info.amount, ], coin.amount, innersol, ] ) list_of_coinspends = [CoinSpend(coin, full_puzzle, fullsol)] unsigned_spend_bundle = SpendBundle(list_of_coinspends, G2Element()) spend_bundle = await self.sign(unsigned_spend_bundle) if fee > 0: announcement_to_make = coin.name() flax_tx = await self.create_tandem_xfx_tx(fee, Announcement(coin.name(), announcement_to_make)) else: flax_tx = None if flax_tx is not None and flax_tx.spend_bundle is not None: spend_bundle = SpendBundle.aggregate([spend_bundle, flax_tx.spend_bundle]) flax_tx = dataclasses.replace(flax_tx, spend_bundle=None) await self.wallet_state_manager.add_pending_transaction(flax_tx) did_record = TransactionRecord( confirmed_at_height=uint32(0), created_at_time=uint64(int(time.time())), to_puzzle_hash=await self.standard_wallet.get_puzzle_hash(False), amount=uint64(coin.amount), fee_amount=fee, confirmed=False, sent=uint32(0), spend_bundle=spend_bundle, additions=spend_bundle.additions(), removals=spend_bundle.removals(), wallet_id=self.wallet_info.id, sent_to=[], trade_id=None, type=uint32(TransactionType.OUTGOING_TX.value), name=bytes32(token_bytes()), memos=list(compute_memos(spend_bundle).items()), ) await self.wallet_state_manager.add_pending_transaction(did_record) return did_record # The message spend can tests\wallet\rpc\test_wallet_rpc.py send messages and also change your innerpuz async def create_message_spend( self, coin_announcements: Optional[Set[bytes]] = None, puzzle_announcements: Optional[Set[bytes]] = None, new_innerpuzhash: Optional[bytes32] = None, ): assert self.did_info.current_inner is not None assert self.did_info.origin_coin is not None coins = await self.select_coins(uint64(1)) assert coins is not None coin = coins.pop() innerpuz: Program = self.did_info.current_inner # Quote message puzzle & solution if new_innerpuzhash is None: new_innerpuzhash = innerpuz.get_tree_hash() p2_solution = self.standard_wallet.make_solution( primaries=[{"puzzlehash": new_innerpuzhash, "amount": uint64(coin.amount), "memos": [new_innerpuzhash]}], puzzle_announcements=puzzle_announcements, coin_announcements=coin_announcements, ) # innerpuz solution is (mode p2_solution) innersol: Program = Program.to([1, p2_solution]) # full solution is (corehash parent_info my_amount innerpuz_reveal solution) full_puzzle: Program = did_wallet_puzzles.create_fullpuz( innerpuz, self.did_info.origin_coin.name(), ) parent_info = self.get_parent_for_coin(coin) assert parent_info is not None fullsol = Program.to( [ [ parent_info.parent_name, parent_info.inner_puzzle_hash, parent_info.amount, ], coin.amount, innersol, ] ) list_of_coinspends = [CoinSpend(coin, full_puzzle, fullsol)] unsigned_spend_bundle = SpendBundle(list_of_coinspends, G2Element()) return await self.sign(unsigned_spend_bundle) # This is used to cash out, or update the id_list async def create_exit_spend(self, puzhash: bytes32): assert self.did_info.current_inner is not None assert self.did_info.origin_coin is not None coins = await self.select_coins(uint64(1)) assert coins is not None coin = coins.pop() message_puz = Program.to((1, [[51, puzhash, coin.amount - 1, [puzhash]], [51, 0x00, -113]])) # innerpuz solution is (mode p2_solution) innersol: Program = Program.to([1, [[], message_puz, []]]) # full solution is (corehash parent_info my_amount innerpuz_reveal solution) innerpuz: Program = self.did_info.current_inner full_puzzle: Program = did_wallet_puzzles.create_fullpuz( innerpuz, self.did_info.origin_coin.name(), ) parent_info = self.get_parent_for_coin(coin) assert parent_info is not None fullsol = Program.to( [ [ parent_info.parent_name, parent_info.inner_puzzle_hash,
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
true
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/did_wallet/did_wallet_puzzles.py
flax/wallet/did_wallet/did_wallet_puzzles.py
from flax.types.blockchain_format.sized_bytes import bytes32 from flax.types.blockchain_format.program import Program from typing import List, Optional, Tuple, Iterator, Dict from blspy import G1Element from flax.types.blockchain_format.coin import Coin from flax.types.coin_spend import CoinSpend from flax.util.ints import uint64 from flax.wallet.puzzles.load_clvm import load_clvm_maybe_recompile from flax.types.condition_opcodes import ConditionOpcode from flax.wallet.util.curry_and_treehash import calculate_hash_of_quoted_mod_hash, curry_and_treehash SINGLETON_TOP_LAYER_MOD = load_clvm_maybe_recompile("singleton_top_layer_v1_1.clvm") SINGLETON_TOP_LAYER_MOD_HASH = SINGLETON_TOP_LAYER_MOD.get_tree_hash() SINGLETON_TOP_LAYER_MOD_HASH_QUOTED = calculate_hash_of_quoted_mod_hash(SINGLETON_TOP_LAYER_MOD_HASH) LAUNCHER_PUZZLE = load_clvm_maybe_recompile("singleton_launcher.clvm") DID_INNERPUZ_MOD = load_clvm_maybe_recompile("did_innerpuz.clvm") LAUNCHER_PUZZLE_HASH = LAUNCHER_PUZZLE.get_tree_hash() DID_INNERPUZ_MOD_HASH = DID_INNERPUZ_MOD.get_tree_hash() INTERMEDIATE_LAUNCHER_MOD = load_clvm_maybe_recompile("nft_intermediate_launcher.clvm") def create_innerpuz( p2_puzzle: Program, recovery_list: List[bytes32], num_of_backup_ids_needed: uint64, launcher_id: bytes32, metadata: Program = Program.to([]), ) -> Program: """ Create DID inner puzzle :param p2_puzzle: Standard P2 puzzle :param recovery_list: A list of DIDs used for the recovery :param num_of_backup_ids_needed: Need how many DIDs for the recovery :param launcher_id: ID of the launch coin :param metadata: DID customized metadata :return: DID inner puzzle """ backup_ids_hash = Program(Program.to(recovery_list)).get_tree_hash() singleton_struct = Program.to((SINGLETON_TOP_LAYER_MOD_HASH, (launcher_id, LAUNCHER_PUZZLE_HASH))) return DID_INNERPUZ_MOD.curry(p2_puzzle, backup_ids_hash, num_of_backup_ids_needed, singleton_struct, metadata) def get_inner_puzhash_by_p2( p2_puzhash: bytes32, recovery_list: List[bytes32], num_of_backup_ids_needed: uint64, launcher_id: bytes32, metadata: Program = Program.to([]), ) -> bytes32: """ Calculate DID inner puzzle hash based on a P2 puzzle hash :param p2_puzhash: P2 puzzle hash :param recovery_list: A list of DIDs used for the recovery :param num_of_backup_ids_needed: Need how many DIDs for the recovery :param launcher_id: ID of the launch coin :param metadata: DID customized metadata :return: DID inner puzzle hash """ backup_ids_hash = Program(Program.to(recovery_list)).get_tree_hash() singleton_struct = Program.to((SINGLETON_TOP_LAYER_MOD_HASH, (launcher_id, LAUNCHER_PUZZLE_HASH))) quoted_mod_hash = calculate_hash_of_quoted_mod_hash(DID_INNERPUZ_MOD_HASH) return curry_and_treehash( quoted_mod_hash, p2_puzhash, Program.to(backup_ids_hash).get_tree_hash(), Program.to(num_of_backup_ids_needed).get_tree_hash(), Program.to(singleton_struct).get_tree_hash(), metadata.get_tree_hash(), ) def create_fullpuz(innerpuz: Program, launcher_id: bytes32) -> Program: """ Create a full puzzle of DID :param innerpuz: DID inner puzzle :param launcher_id: :return: DID full puzzle """ # singleton_struct = (MOD_HASH . (LAUNCHER_ID . LAUNCHER_PUZZLE_HASH)) singleton_struct = Program.to((SINGLETON_TOP_LAYER_MOD_HASH, (launcher_id, LAUNCHER_PUZZLE_HASH))) return SINGLETON_TOP_LAYER_MOD.curry(singleton_struct, innerpuz) def create_fullpuz_hash(innerpuz_hash: bytes32, launcher_id: bytes32) -> bytes32: """ Create a full puzzle of DID :param innerpuz_hash: DID inner puzzle tree hash :param launcher_id: launcher coin name :return: DID full puzzle hash """ # singleton_struct = (MOD_HASH . (LAUNCHER_ID . LAUNCHER_PUZZLE_HASH)) singleton_struct = Program.to((SINGLETON_TOP_LAYER_MOD_HASH, (launcher_id, LAUNCHER_PUZZLE_HASH))) return curry_and_treehash(SINGLETON_TOP_LAYER_MOD_HASH_QUOTED, singleton_struct.get_tree_hash(), innerpuz_hash) def is_did_innerpuz(inner_f: Program) -> bool: """ Check if a puzzle is a DID inner mode :param inner_f: puzzle :return: Boolean """ return inner_f == DID_INNERPUZ_MOD def is_did_core(inner_f: Program) -> bool: """ Check if a puzzle is a singleton mod :param inner_f: puzzle :return: Boolean """ return inner_f == SINGLETON_TOP_LAYER_MOD def uncurry_innerpuz(puzzle: Program) -> Optional[Tuple[Program, Program, Program, Program, Program]]: """ Uncurry a DID inner puzzle :param puzzle: DID puzzle :return: Curried parameters """ r = puzzle.uncurry() if r is None: return r inner_f, args = r if not is_did_innerpuz(inner_f): return None p2_puzzle, id_list, num_of_backup_ids_needed, singleton_struct, metadata = list(args.as_iter()) return p2_puzzle, id_list, num_of_backup_ids_needed, singleton_struct, metadata def get_innerpuzzle_from_puzzle(puzzle: Program) -> Optional[Program]: """ Extract the inner puzzle of a singleton :param puzzle: Singleton puzzle :return: Inner puzzle """ r = puzzle.uncurry() if r is None: return None inner_f, args = r if not is_did_core(inner_f): return None SINGLETON_STRUCT, INNER_PUZZLE = list(args.as_iter()) return INNER_PUZZLE def create_recovery_message_puzzle(recovering_coin_id: bytes32, newpuz: bytes32, pubkey: G1Element) -> Program: """ Create attestment message puzzle :param recovering_coin_id: ID of the DID coin needs to recover :param newpuz: New wallet puzzle hash :param pubkey: New wallet pubkey :return: Message puzzle """ return Program.to( ( 1, [ [ConditionOpcode.CREATE_COIN_ANNOUNCEMENT, recovering_coin_id], [ConditionOpcode.AGG_SIG_UNSAFE, bytes(pubkey), newpuz], ], ) ) def create_spend_for_message( parent_of_message: bytes32, recovering_coin: bytes32, newpuz: bytes32, pubkey: G1Element ) -> CoinSpend: """ Create a CoinSpend for a atestment :param parent_of_message: Parent coin ID :param recovering_coin: ID of the DID coin needs to recover :param newpuz: New wallet puzzle hash :param pubkey: New wallet pubkey :return: CoinSpend """ puzzle = create_recovery_message_puzzle(recovering_coin, newpuz, pubkey) coin = Coin(parent_of_message, puzzle.get_tree_hash(), uint64(0)) solution = Program.to([]) coinsol = CoinSpend(coin, puzzle, solution) return coinsol def match_did_puzzle(mod: Program, curried_args: Program) -> Optional[Iterator[Program]]: """ Given a puzzle test if it's a DID, if it is, return the curried arguments :param puzzle: Puzzle :return: Curried parameters """ try: if mod == SINGLETON_TOP_LAYER_MOD: mod, curried_args = curried_args.rest().first().uncurry() if mod == DID_INNERPUZ_MOD: return curried_args.as_iter() except Exception: import traceback print(f"exception: {traceback.format_exc()}") return None def check_is_did_puzzle(puzzle: Program) -> bool: """ Check if a puzzle is a DID puzzle :param puzzle: Puzzle :return: Boolean """ r = puzzle.uncurry() if r is None: return r inner_f, args = r return is_did_core(inner_f) def metadata_to_program(metadata: Dict) -> Program: """ Convert the metadata dict to a Flaxlisp program :param metadata: User defined metadata :return: Flaxlisp program """ kv_list = [] for key, value in metadata.items(): kv_list.append((key, value)) return Program.to(kv_list) def program_to_metadata(program: Program) -> Dict: """ Convert a program to a metadata dict :param program: Flaxlisp program contains the metadata :return: Metadata dict """ metadata = {} for key, val in program.as_python(): metadata[str(key, "utf-8")] = str(val, "utf-8") return metadata
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/wallet/did_wallet/did_info.py
flax/wallet/did_wallet/did_info.py
from dataclasses import dataclass from typing import List, Optional, Tuple from flax.types.blockchain_format.sized_bytes import bytes32 from flax.util.ints import uint64 from flax.util.streamable import streamable, Streamable from flax.wallet.lineage_proof import LineageProof from flax.types.blockchain_format.program import Program from flax.types.blockchain_format.coin import Coin @streamable @dataclass(frozen=True) class DIDInfo(Streamable): origin_coin: Optional[Coin] # Coin ID of this coin is our DID backup_ids: List[bytes32] num_of_backup_ids_needed: uint64 parent_info: List[Tuple[bytes32, Optional[LineageProof]]] # {coin.name(): LineageProof} current_inner: Optional[Program] # represents a Program as bytes temp_coin: Optional[Coin] # partially recovered wallet uses these to hold info temp_puzhash: Optional[bytes32] temp_pubkey: Optional[bytes] sent_recovery_transaction: bool metadata: str # JSON of the user defined metadata
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/data_layer/data_store.py
flax/data_layer/data_store.py
from __future__ import annotations import logging from collections import defaultdict from contextlib import asynccontextmanager from dataclasses import dataclass, replace from pathlib import Path from typing import Any, AsyncIterator, Awaitable, BinaryIO, Callable, Dict, List, Optional, Set, Tuple, Union import aiosqlite from flax.data_layer.data_layer_errors import KeyNotFoundError, NodeHashError, TreeGenerationIncrementingError from flax.data_layer.data_layer_util import ( DiffData, InternalNode, Node, NodeType, OperationType, ProofOfInclusion, ProofOfInclusionLayer, Root, SerializedNode, ServerInfo, Side, Status, Subscription, TerminalNode, internal_hash, leaf_hash, row_to_node, ) from flax.types.blockchain_format.program import Program from flax.types.blockchain_format.sized_bytes import bytes32 from flax.util.db_wrapper import DBWrapper2 log = logging.getLogger(__name__) # TODO: review exceptions for values that shouldn't be displayed # TODO: pick exception types other than Exception @dataclass class DataStore: """A key/value store with the pairs being terminal nodes in a CLVM object tree.""" db_wrapper: DBWrapper2 @classmethod async def create(cls, database: Union[str, Path], uri: bool = False) -> "DataStore": db_wrapper = await DBWrapper2.create( database=database, uri=uri, journal_mode="WAL", # Setting to FULL despite other locations being configurable. If there are # performance issues we can consider other the implications of other options. synchronous="FULL", # If foreign key checking gets turned off, please add corresponding check # methods and enable foreign key checking in the tests. foreign_keys=True, row_factory=aiosqlite.Row, ) self = cls(db_wrapper=db_wrapper) async with db_wrapper.writer() as writer: await writer.execute( f""" CREATE TABLE IF NOT EXISTS node( hash BLOB PRIMARY KEY NOT NULL CHECK(length(hash) == 32), node_type INTEGER NOT NULL CHECK( ( node_type == {int(NodeType.INTERNAL)} AND left IS NOT NULL AND right IS NOT NULL AND key IS NULL AND value IS NULL ) OR ( node_type == {int(NodeType.TERMINAL)} AND left IS NULL AND right IS NULL AND key IS NOT NULL AND value IS NOT NULL ) ), left BLOB REFERENCES node, right BLOB REFERENCES node, key BLOB, value BLOB ) """ ) await writer.execute( """ CREATE TRIGGER IF NOT EXISTS no_node_updates BEFORE UPDATE ON node BEGIN SELECT RAISE(FAIL, 'updates not allowed to the node table'); END """ ) await writer.execute( f""" CREATE TABLE IF NOT EXISTS root( tree_id BLOB NOT NULL CHECK(length(tree_id) == 32), generation INTEGER NOT NULL CHECK(generation >= 0), node_hash BLOB, status INTEGER NOT NULL CHECK( {" OR ".join(f"status == {status}" for status in Status)} ), PRIMARY KEY(tree_id, generation), FOREIGN KEY(node_hash) REFERENCES node(hash) ) """ ) # TODO: Add ancestor -> hash relationship, this might involve temporarily # deferring the foreign key enforcement due to the insertion order # and the node table also enforcing a similar relationship in the # other direction. # FOREIGN KEY(ancestor) REFERENCES ancestors(ancestor) await writer.execute( """ CREATE TABLE IF NOT EXISTS ancestors( hash BLOB NOT NULL REFERENCES node, ancestor BLOB CHECK(length(ancestor) == 32), tree_id BLOB NOT NULL CHECK(length(tree_id) == 32), generation INTEGER NOT NULL, PRIMARY KEY(hash, tree_id, generation), FOREIGN KEY(ancestor) REFERENCES node(hash) ) """ ) await writer.execute( """ CREATE TABLE IF NOT EXISTS subscriptions( tree_id BLOB NOT NULL CHECK(length(tree_id) == 32), url TEXT, ignore_till INTEGER, num_consecutive_failures INTEGER, from_wallet tinyint CHECK(from_wallet == 0 OR from_wallet == 1), PRIMARY KEY(tree_id, url) ) """ ) await writer.execute( """ CREATE INDEX IF NOT EXISTS node_hash ON root(node_hash) """ ) return self async def close(self) -> None: await self.db_wrapper.close() @asynccontextmanager async def transaction(self) -> AsyncIterator[None]: async with self.db_wrapper.writer(): yield async def _insert_root( self, tree_id: bytes32, node_hash: Optional[bytes32], status: Status, generation: Optional[int] = None, ) -> None: # This should be replaced by an SQLite schema level check. # https://github.com/Flax-Network/flax-blockchain/pull/9284 tree_id = bytes32(tree_id) async with self.db_wrapper.writer() as writer: if generation is None: existing_generation = await self.get_tree_generation(tree_id=tree_id) if existing_generation is None: generation = 0 else: generation = existing_generation + 1 await writer.execute( """ INSERT INTO root(tree_id, generation, node_hash, status) VALUES(:tree_id, :generation, :node_hash, :status) """, { "tree_id": tree_id, "generation": generation, "node_hash": None if node_hash is None else node_hash, "status": status.value, }, ) # `node_hash` is now a root, so it has no ancestor. # Don't change the ancestor table unless the root is committed. if node_hash is not None and status == Status.COMMITTED: values = { "hash": node_hash, "tree_id": tree_id, "generation": generation, } await writer.execute( """ INSERT INTO ancestors(hash, ancestor, tree_id, generation) VALUES (:hash, NULL, :tree_id, :generation) """, values, ) async def _insert_node( self, node_hash: bytes32, node_type: NodeType, left_hash: Optional[bytes32], right_hash: Optional[bytes32], key: Optional[bytes], value: Optional[bytes], ) -> None: # TODO: can we get sqlite to do this check? values = { "hash": node_hash, "node_type": node_type, "left": left_hash, "right": right_hash, "key": key, "value": value, } async with self.db_wrapper.writer() as writer: cursor = await writer.execute("SELECT * FROM node WHERE hash == :hash", {"hash": node_hash}) result = await cursor.fetchone() if result is None: await writer.execute( """ INSERT INTO node(hash, node_type, left, right, key, value) VALUES(:hash, :node_type, :left, :right, :key, :value) """, values, ) else: result_dict = dict(result) if result_dict != values: raise Exception( f"Requested insertion of node with matching hash but other values differ: {node_hash}" ) async def insert_node(self, node_type: NodeType, value1: bytes, value2: bytes) -> None: if node_type == NodeType.INTERNAL: left_hash = bytes32(value1) right_hash = bytes32(value2) node_hash = internal_hash(left_hash, right_hash) await self._insert_node(node_hash, node_type, bytes32(value1), bytes32(value2), None, None) else: node_hash = leaf_hash(key=value1, value=value2) await self._insert_node(node_hash, node_type, None, None, value1, value2) async def _insert_internal_node(self, left_hash: bytes32, right_hash: bytes32) -> bytes32: node_hash: bytes32 = internal_hash(left_hash=left_hash, right_hash=right_hash) await self._insert_node( node_hash=node_hash, node_type=NodeType.INTERNAL, left_hash=left_hash, right_hash=right_hash, key=None, value=None, ) return node_hash async def _insert_ancestor_table( self, left_hash: bytes32, right_hash: bytes32, tree_id: bytes32, generation: int, ) -> None: node_hash = internal_hash(left_hash=left_hash, right_hash=right_hash) async with self.db_wrapper.writer() as writer: for hash in (left_hash, right_hash): values = { "hash": hash, "ancestor": node_hash, "tree_id": tree_id, "generation": generation, } cursor = await writer.execute( "SELECT * FROM ancestors WHERE hash == :hash AND generation == :generation AND tree_id == :tree_id", {"hash": hash, "generation": generation, "tree_id": tree_id}, ) result = await cursor.fetchone() if result is None: await writer.execute( """ INSERT INTO ancestors(hash, ancestor, tree_id, generation) VALUES (:hash, :ancestor, :tree_id, :generation) """, values, ) else: result_dict = dict(result) if result_dict != values: raise Exception( "Requested insertion of ancestor, where ancestor differ, but other values are identical: " f"{hash} {generation} {tree_id}" ) async def _insert_terminal_node(self, key: bytes, value: bytes) -> bytes32: # forcing type hint here for: # https://github.com/Flax-Network/clvm/pull/102 # https://github.com/Flax-Network/clvm/pull/106 node_hash: bytes32 = Program.to((key, value)).get_tree_hash() await self._insert_node( node_hash=node_hash, node_type=NodeType.TERMINAL, left_hash=None, right_hash=None, key=key, value=value, ) return node_hash async def get_pending_root(self, tree_id: bytes32) -> Optional[Root]: async with self.db_wrapper.reader() as reader: cursor = await reader.execute( "SELECT * FROM root WHERE tree_id == :tree_id AND status == :status", {"tree_id": tree_id, "status": Status.PENDING.value}, ) row = await cursor.fetchone() if row is None: return None maybe_extra_result = await cursor.fetchone() if maybe_extra_result is not None: raise Exception(f"multiple pending roots found for id: {tree_id.hex()}") return Root.from_row(row=row) async def clear_pending_roots(self, tree_id: bytes32) -> None: async with self.db_wrapper.writer() as writer: await writer.execute( "DELETE FROM root WHERE tree_id == :tree_id AND status == :status", {"tree_id": tree_id, "status": Status.PENDING.value}, ) async def shift_root_generations(self, tree_id: bytes32, shift_size: int) -> None: async with self.db_wrapper.writer(): root = await self.get_tree_root(tree_id=tree_id) for _ in range(shift_size): await self._insert_root(tree_id=tree_id, node_hash=root.node_hash, status=Status.COMMITTED) async def change_root_status(self, root: Root, status: Status = Status.PENDING) -> None: async with self.db_wrapper.writer() as writer: await writer.execute( "UPDATE root SET status = ? WHERE tree_id=? and generation = ?", ( status.value, root.tree_id, root.generation, ), ) # `node_hash` is now a root, so it has no ancestor. # Don't change the ancestor table unless the root is committed. if root.node_hash is not None and status == Status.COMMITTED: values = { "hash": root.node_hash, "tree_id": root.tree_id, "generation": root.generation, } await writer.execute( """ INSERT INTO ancestors(hash, ancestor, tree_id, generation) VALUES (:hash, NULL, :tree_id, :generation) """, values, ) async def check(self) -> None: for check in self._checks: # pylint seems to think these are bound methods not unbound methods. await check(self) # pylint: disable=too-many-function-args async def _check_roots_are_incrementing(self) -> None: async with self.db_wrapper.reader() as reader: cursor = await reader.execute("SELECT * FROM root ORDER BY tree_id, generation") roots = [Root.from_row(row=row) async for row in cursor] roots_by_tree: Dict[bytes32, List[Root]] = defaultdict(list) for root in roots: roots_by_tree[root.tree_id].append(root) bad_trees = [] for tree_id, roots in roots_by_tree.items(): current_generation = roots[-1].generation expected_generations = list(range(current_generation + 1)) actual_generations = [root.generation for root in roots] if actual_generations != expected_generations: bad_trees.append(tree_id) if len(bad_trees) > 0: raise TreeGenerationIncrementingError(tree_ids=bad_trees) async def _check_hashes(self) -> None: async with self.db_wrapper.reader() as reader: cursor = await reader.execute("SELECT * FROM node") bad_node_hashes: List[bytes32] = [] async for row in cursor: node = row_to_node(row=row) if isinstance(node, InternalNode): expected_hash = internal_hash(left_hash=node.left_hash, right_hash=node.right_hash) elif isinstance(node, TerminalNode): expected_hash = Program.to((node.key, node.value)).get_tree_hash() if node.hash != expected_hash: bad_node_hashes.append(node.hash) if len(bad_node_hashes) > 0: raise NodeHashError(node_hashes=bad_node_hashes) _checks: Tuple[Callable[["DataStore"], Awaitable[None]], ...] = ( _check_roots_are_incrementing, _check_hashes, ) async def create_tree(self, tree_id: bytes32, status: Status = Status.PENDING) -> bool: await self._insert_root(tree_id=tree_id, node_hash=None, status=status) return True async def table_is_empty(self, tree_id: bytes32) -> bool: tree_root = await self.get_tree_root(tree_id=tree_id) return tree_root.node_hash is None async def get_tree_ids(self) -> Set[bytes32]: async with self.db_wrapper.reader() as reader: cursor = await reader.execute("SELECT DISTINCT tree_id FROM root") tree_ids = {bytes32(row["tree_id"]) async for row in cursor} return tree_ids async def get_tree_generation(self, tree_id: bytes32) -> int: async with self.db_wrapper.reader() as reader: cursor = await reader.execute( "SELECT MAX(generation) FROM root WHERE tree_id == :tree_id AND status == :status", {"tree_id": tree_id, "status": Status.COMMITTED.value}, ) row = await cursor.fetchone() if row is None: raise Exception(f"No generations found for tree ID: {tree_id.hex()}") generation: int = row["MAX(generation)"] return generation async def get_tree_root(self, tree_id: bytes32, generation: Optional[int] = None) -> Root: async with self.db_wrapper.reader() as reader: if generation is None: generation = await self.get_tree_generation(tree_id=tree_id) cursor = await reader.execute( "SELECT * FROM root WHERE tree_id == :tree_id AND generation == :generation AND status == :status", {"tree_id": tree_id, "generation": generation, "status": Status.COMMITTED.value}, ) row = await cursor.fetchone() if row is None: raise Exception(f"unable to find root for id, generation: {tree_id.hex()}, {generation}") maybe_extra_result = await cursor.fetchone() if maybe_extra_result is not None: raise Exception(f"multiple roots found for id, generation: {tree_id.hex()}, {generation}") return Root.from_row(row=row) async def tree_id_exists(self, tree_id: bytes32) -> bool: async with self.db_wrapper.reader() as reader: cursor = await reader.execute( "SELECT 1 FROM root WHERE tree_id == :tree_id AND status == :status", {"tree_id": tree_id, "status": Status.COMMITTED.value}, ) row = await cursor.fetchone() if row is None: return False return True async def get_roots_between(self, tree_id: bytes32, generation_begin: int, generation_end: int) -> List[Root]: async with self.db_wrapper.reader() as reader: cursor = await reader.execute( "SELECT * FROM root WHERE tree_id == :tree_id " "AND generation >= :generation_begin AND generation < :generation_end ORDER BY generation ASC", {"tree_id": tree_id, "generation_begin": generation_begin, "generation_end": generation_end}, ) roots = [Root.from_row(row=row) async for row in cursor] return roots async def get_last_tree_root_by_hash( self, tree_id: bytes32, hash: Optional[bytes32], max_generation: Optional[int] = None ) -> Optional[Root]: async with self.db_wrapper.reader() as reader: max_generation_str = f"AND generation < {max_generation} " if max_generation is not None else "" node_hash_str = "AND node_hash == :node_hash " if hash is not None else "AND node_hash is NULL " cursor = await reader.execute( "SELECT * FROM root WHERE tree_id == :tree_id " f"{max_generation_str}" f"{node_hash_str}" "ORDER BY generation DESC LIMIT 1", {"tree_id": tree_id, "node_hash": None if hash is None else hash}, ) row = await cursor.fetchone() if row is None: return None return Root.from_row(row=row) async def get_ancestors( self, node_hash: bytes32, tree_id: bytes32, root_hash: Optional[bytes32] = None, ) -> List[InternalNode]: async with self.db_wrapper.reader() as reader: if root_hash is None: root = await self.get_tree_root(tree_id=tree_id) root_hash = root.node_hash if root_hash is None: raise Exception(f"Root hash is unspecified for tree ID: {tree_id.hex()}") cursor = await reader.execute( """ WITH RECURSIVE tree_from_root_hash(hash, node_type, left, right, key, value, depth) AS ( SELECT node.*, 0 AS depth FROM node WHERE node.hash == :root_hash UNION ALL SELECT node.*, tree_from_root_hash.depth + 1 AS depth FROM node, tree_from_root_hash WHERE node.hash == tree_from_root_hash.left OR node.hash == tree_from_root_hash.right ), ancestors(hash, node_type, left, right, key, value, depth) AS ( SELECT node.*, NULL AS depth FROM node WHERE node.left == :reference_hash OR node.right == :reference_hash UNION ALL SELECT node.*, NULL AS depth FROM node, ancestors WHERE node.left == ancestors.hash OR node.right == ancestors.hash ) SELECT * FROM tree_from_root_hash INNER JOIN ancestors WHERE tree_from_root_hash.hash == ancestors.hash ORDER BY tree_from_root_hash.depth DESC """, {"reference_hash": node_hash, "root_hash": root_hash}, ) # The resulting rows must represent internal nodes. InternalNode.from_row() # does some amount of validation in the sense that it will fail if left # or right can't turn into a bytes32 as expected. There is room for more # validation here if desired. ancestors = [InternalNode.from_row(row=row) async for row in cursor] return ancestors async def get_ancestors_optimized( self, node_hash: bytes32, tree_id: bytes32, generation: Optional[int] = None ) -> List[InternalNode]: async with self.db_wrapper.reader(): nodes = [] root = await self.get_tree_root(tree_id=tree_id, generation=generation) if root.node_hash is None: return [] while True: internal_node = await self._get_one_ancestor(node_hash, tree_id, generation) if internal_node is None: break nodes.append(internal_node) node_hash = internal_node.hash if len(nodes) > 0: if root.node_hash != nodes[-1].hash: raise RuntimeError("Ancestors list didn't produce the root as top result.") return nodes async def get_internal_nodes(self, tree_id: bytes32, root_hash: Optional[bytes32] = None) -> List[InternalNode]: async with self.db_wrapper.reader() as reader: if root_hash is None: root = await self.get_tree_root(tree_id=tree_id) root_hash = root.node_hash cursor = await reader.execute( """ WITH RECURSIVE tree_from_root_hash(hash, node_type, left, right, key, value) AS ( SELECT node.* FROM node WHERE node.hash == :root_hash UNION ALL SELECT node.* FROM node, tree_from_root_hash WHERE node.hash == tree_from_root_hash.left OR node.hash == tree_from_root_hash.right ) SELECT * FROM tree_from_root_hash WHERE node_type == :node_type """, {"root_hash": None if root_hash is None else root_hash, "node_type": NodeType.INTERNAL}, ) internal_nodes: List[InternalNode] = [] async for row in cursor: node = row_to_node(row=row) if not isinstance(node, InternalNode): raise Exception(f"Unexpected internal node found: {node.hash.hex()}") internal_nodes.append(node) return internal_nodes async def get_keys_values(self, tree_id: bytes32, root_hash: Optional[bytes32] = None) -> List[TerminalNode]: async with self.db_wrapper.reader() as reader: if root_hash is None: root = await self.get_tree_root(tree_id=tree_id) root_hash = root.node_hash cursor = await reader.execute( """ WITH RECURSIVE tree_from_root_hash(hash, node_type, left, right, key, value, depth, rights) AS ( SELECT node.*, 0 AS depth, 0 AS rights FROM node WHERE node.hash == :root_hash UNION ALL SELECT node.*, tree_from_root_hash.depth + 1 AS depth, CASE WHEN node.hash == tree_from_root_hash.right THEN tree_from_root_hash.rights + (1 << (62 - tree_from_root_hash.depth)) ELSE tree_from_root_hash.rights END AS rights FROM node, tree_from_root_hash WHERE node.hash == tree_from_root_hash.left OR node.hash == tree_from_root_hash.right ) SELECT * FROM tree_from_root_hash WHERE node_type == :node_type ORDER BY depth ASC, rights ASC """, {"root_hash": None if root_hash is None else root_hash, "node_type": NodeType.TERMINAL}, ) terminal_nodes: List[TerminalNode] = [] async for row in cursor: if row["depth"] > 62: # TODO: Review the value and implementation of left-to-right order # reporting. Initial use is for balanced insertion with the # work done in the query. # This is limited based on the choice of 63 for the maximum left # shift in the query. This is in turn based on the SQLite integers # ranging in size up to signed 8 bytes, 64 bits. If we exceed this then # we no longer guarantee the left-to-right ordering of the node # list. While 63 allows for a lot of nodes in a balanced tree, in # the worst case it allows only 62 terminal nodes. raise Exception("Tree depth exceeded 62, unable to guarantee left-to-right node order.") node = row_to_node(row=row) if not isinstance(node, TerminalNode): raise Exception(f"Unexpected internal node found: {node.hash.hex()}") terminal_nodes.append(node) return terminal_nodes async def get_node_type(self, node_hash: bytes32) -> NodeType: async with self.db_wrapper.reader() as reader: cursor = await reader.execute("SELECT node_type FROM node WHERE hash == :hash", {"hash": node_hash}) raw_node_type = await cursor.fetchone() if raw_node_type is None: raise Exception(f"No node found for specified hash: {node_hash.hex()}") return NodeType(raw_node_type["node_type"]) async def get_terminal_node_for_seed(self, tree_id: bytes32, seed: bytes32) -> Optional[bytes32]: path = int.from_bytes(seed, byteorder="big") async with self.db_wrapper.reader(): root = await self.get_tree_root(tree_id) if root is None or root.node_hash is None: return None node_hash = root.node_hash while True: node = await self.get_node(node_hash) assert node is not None if isinstance(node, TerminalNode): break if path % 2 == 0: node_hash = node.left_hash else: node_hash = node.right_hash path = path // 2 return node_hash def get_side_for_seed(self, seed: bytes32) -> Side: side_seed = bytes(seed)[0] return Side.LEFT if side_seed < 128 else Side.RIGHT async def autoinsert( self, key: bytes, value: bytes, tree_id: bytes32, hint_keys_values: Optional[Dict[bytes, bytes]] = None, use_optimized: bool = True, status: Status = Status.PENDING, ) -> bytes32: async with self.db_wrapper.writer(): was_empty = await self.table_is_empty(tree_id=tree_id) if was_empty: reference_node_hash = None side = None else: seed = leaf_hash(key=key, value=value) reference_node_hash = await self.get_terminal_node_for_seed(tree_id, seed) side = self.get_side_for_seed(seed) return await self.insert( key=key, value=value, tree_id=tree_id, reference_node_hash=reference_node_hash, side=side, hint_keys_values=hint_keys_values, use_optimized=use_optimized, status=status, ) async def get_keys_values_dict(self, tree_id: bytes32) -> Dict[bytes, bytes]: pairs = await self.get_keys_values(tree_id=tree_id) return {node.key: node.value for node in pairs} async def get_keys(self, tree_id: bytes32, root_hash: Optional[bytes32] = None) -> List[bytes]: async with self.db_wrapper.reader() as reader: if root_hash is None: root = await self.get_tree_root(tree_id=tree_id) root_hash = root.node_hash cursor = await reader.execute( """ WITH RECURSIVE tree_from_root_hash(hash, node_type, left, right, key) AS ( SELECT node.hash, node.node_type, node.left, node.right, node.key FROM node WHERE node.hash == :root_hash UNION ALL SELECT node.hash, node.node_type, node.left, node.right, node.key FROM node, tree_from_root_hash WHERE node.hash == tree_from_root_hash.left OR node.hash == tree_from_root_hash.right ) SELECT key FROM tree_from_root_hash WHERE node_type == :node_type """, {"root_hash": None if root_hash is None else root_hash, "node_type": NodeType.TERMINAL}, ) keys: List[bytes] = [row["key"] async for row in cursor] return keys async def insert( self, key: bytes, value: bytes, tree_id: bytes32, reference_node_hash: Optional[bytes32], side: Optional[Side], hint_keys_values: Optional[Dict[bytes, bytes]] = None, use_optimized: bool = True, status: Status = Status.PENDING, ) -> bytes32: async with self.db_wrapper.writer(): was_empty = await self.table_is_empty(tree_id=tree_id) root = await self.get_tree_root(tree_id=tree_id) if not was_empty: if hint_keys_values is None: # TODO: is there any way the db can enforce this? pairs = await self.get_keys_values(tree_id=tree_id) if any(key == node.key for node in pairs): raise Exception(f"Key already present: {key.hex()}")
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
true
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/data_layer/data_layer_api.py
flax/data_layer/data_layer_api.py
from __future__ import annotations import logging from flax.data_layer.data_layer import DataLayer from flax.server.server import FlaxServer class DataLayerAPI: data_layer: DataLayer def __init__(self, data_layer: DataLayer) -> None: self.data_layer = data_layer # def _set_state_changed_callback(self, callback: Callable): # self.full_node.state_changed_callback = callback @property def server(self) -> FlaxServer: return self.data_layer.server @property def log(self) -> logging.Logger: return self.data_layer.log @property def api_ready(self) -> bool: return self.data_layer.initialized
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/data_layer/dl_wallet_store.py
flax/data_layer/dl_wallet_store.py
from __future__ import annotations import dataclasses from typing import List, Optional, Type, TypeVar, Union from aiosqlite import Row from flax.data_layer.data_layer_wallet import Mirror, SingletonRecord from flax.types.blockchain_format.coin import Coin from flax.types.blockchain_format.sized_bytes import bytes32 from flax.util.db_wrapper import DBWrapper2 from flax.util.ints import uint16, uint32, uint64 from flax.wallet.lineage_proof import LineageProof _T_DataLayerStore = TypeVar("_T_DataLayerStore", bound="DataLayerStore") def _row_to_singleton_record(row: Row) -> SingletonRecord: return SingletonRecord( bytes32(row[0]), bytes32(row[1]), bytes32(row[2]), bytes32(row[3]), bool(row[4]), uint32(row[5]), LineageProof.from_bytes(row[6]), uint32(row[7]), uint64(row[8]), ) def _row_to_mirror(row: Row) -> Mirror: urls: List[bytes] = [] byte_list: bytes = row[3] while byte_list != b"": length = uint16.from_bytes(byte_list[0:2]) url = byte_list[2 : length + 2] byte_list = byte_list[length + 2 :] urls.append(url) return Mirror(bytes32(row[0]), bytes32(row[1]), uint64.from_bytes(row[2]), urls, bool(row[4])) class DataLayerStore: """ WalletUserStore keeps track of all user created wallets and necessary smart-contract data """ db_wrapper: DBWrapper2 @classmethod async def create(cls: Type[_T_DataLayerStore], db_wrapper: DBWrapper2) -> _T_DataLayerStore: self = cls() self.db_wrapper = db_wrapper async with self.db_wrapper.writer_maybe_transaction() as conn: await conn.execute( ( "CREATE TABLE IF NOT EXISTS singleton_records(" "coin_id blob PRIMARY KEY," " launcher_id blob," " root blob," " inner_puzzle_hash blob," " confirmed tinyint," " confirmed_at_height int," " proof blob," " generation int," # This first singleton will be 0, then 1, and so on. This is handled by the DB. " timestamp int)" ) ) await conn.execute( ( "CREATE TABLE IF NOT EXISTS mirrors(" "coin_id blob PRIMARY KEY," "launcher_id blob," "amount blob," "urls blob," "ours tinyint)" ) ) await conn.execute("CREATE INDEX IF NOT EXISTS coin_id on singleton_records(coin_id)") await conn.execute("CREATE INDEX IF NOT EXISTS launcher_id on singleton_records(launcher_id)") await conn.execute("CREATE INDEX IF NOT EXISTS root on singleton_records(root)") await conn.execute("CREATE INDEX IF NOT EXISTS inner_puzzle_hash on singleton_records(inner_puzzle_hash)") await conn.execute("CREATE INDEX IF NOT EXISTS confirmed_at_height on singleton_records(root)") await conn.execute("CREATE INDEX IF NOT EXISTS generation on singleton_records(generation)") await conn.execute(("CREATE TABLE IF NOT EXISTS launchers(id blob PRIMARY KEY, coin blob)")) await conn.execute("CREATE INDEX IF NOT EXISTS id on launchers(id)") return self async def _clear_database(self) -> None: async with self.db_wrapper.writer_maybe_transaction() as conn: await (await conn.execute("DELETE FROM singleton_records")).close() async def add_singleton_record(self, record: SingletonRecord) -> None: """ Store SingletonRecord in DB. """ async with self.db_wrapper.writer_maybe_transaction() as conn: await conn.execute_insert( "INSERT OR REPLACE INTO singleton_records VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?)", ( record.coin_id, record.launcher_id, record.root, record.inner_puzzle_hash, int(record.confirmed), record.confirmed_at_height, bytes(record.lineage_proof), record.generation, record.timestamp, ), ) async def get_all_singletons_for_launcher( self, launcher_id: bytes32, min_generation: Optional[uint32] = None, max_generation: Optional[uint32] = None, num_results: Optional[uint32] = None, ) -> List[SingletonRecord]: """ Returns stored singletons with a specific launcher ID. """ query_params: List[Union[bytes32, uint32]] = [launcher_id] for optional_param in (min_generation, max_generation, num_results): if optional_param is not None: query_params.append(optional_param) async with self.db_wrapper.reader_no_transaction() as conn: cursor = await conn.execute( "SELECT * from singleton_records WHERE launcher_id=? " f"{'AND generation >=? ' if min_generation is not None else ''}" f"{'AND generation <=? ' if max_generation is not None else ''}" "ORDER BY generation DESC" f"{' LIMIT ?' if num_results is not None else ''}", tuple(query_params), ) rows = await cursor.fetchall() await cursor.close() records = [] for row in rows: records.append(_row_to_singleton_record(row)) return records async def get_singleton_record(self, coin_id: bytes32) -> Optional[SingletonRecord]: """ Checks DB for SingletonRecord with coin_id: coin_id and returns it. """ # if tx_id in self.tx_record_cache: # return self.tx_record_cache[tx_id] async with self.db_wrapper.reader_no_transaction() as conn: cursor = await conn.execute("SELECT * from singleton_records WHERE coin_id=?", (coin_id,)) row = await cursor.fetchone() await cursor.close() if row is not None: return _row_to_singleton_record(row) return None async def get_latest_singleton( self, launcher_id: bytes32, only_confirmed: bool = False ) -> Optional[SingletonRecord]: """ Checks DB for SingletonRecords with launcher_id: launcher_id and returns the most recent. """ # if tx_id in self.tx_record_cache: # return self.tx_record_cache[tx_id] async with self.db_wrapper.reader_no_transaction() as conn: if only_confirmed: # get latest confirmed root cursor = await conn.execute( "SELECT * from singleton_records WHERE launcher_id=? and confirmed = 1 " "ORDER BY generation DESC LIMIT 1", (launcher_id,), ) else: cursor = await conn.execute( "SELECT * from singleton_records WHERE launcher_id=? ORDER BY generation DESC LIMIT 1", (launcher_id,), ) row = await cursor.fetchone() await cursor.close() if row is not None: return _row_to_singleton_record(row) return None async def get_unconfirmed_singletons(self, launcher_id: bytes32) -> List[SingletonRecord]: """ Returns all singletons with a specific launcher id that have not yet been marked confirmed """ async with self.db_wrapper.reader_no_transaction() as conn: cursor = await conn.execute( "SELECT * from singleton_records WHERE launcher_id=? AND confirmed=0", (launcher_id,) ) rows = await cursor.fetchall() await cursor.close() records = [_row_to_singleton_record(row) for row in rows] return records async def get_singletons_by_root(self, launcher_id: bytes32, root: bytes32) -> List[SingletonRecord]: async with self.db_wrapper.reader_no_transaction() as conn: cursor = await conn.execute( "SELECT * from singleton_records WHERE launcher_id=? AND root=? ORDER BY generation DESC", (launcher_id, root), ) rows = await cursor.fetchall() await cursor.close() records = [] for row in rows: records.append(_row_to_singleton_record(row)) return records async def set_confirmed(self, coin_id: bytes32, height: uint32, timestamp: uint64) -> None: """ Updates singleton record to be confirmed. """ current: Optional[SingletonRecord] = await self.get_singleton_record(coin_id) if current is None or current.confirmed_at_height == height: return await self.add_singleton_record( dataclasses.replace(current, confirmed=True, confirmed_at_height=height, timestamp=timestamp) ) async def delete_singleton_record(self, coin_id: bytes32) -> None: async with self.db_wrapper.writer_maybe_transaction() as conn: await (await conn.execute("DELETE FROM singleton_records WHERE coin_id=?", (coin_id,))).close() async def delete_singleton_records_by_launcher_id(self, launcher_id: bytes32) -> None: async with self.db_wrapper.writer_maybe_transaction() as conn: await (await conn.execute("DELETE FROM singleton_records WHERE launcher_id=?", (launcher_id,))).close() async def add_launcher(self, launcher: Coin) -> None: """ Add a new launcher coin's information to the DB """ launcher_bytes: bytes = launcher.parent_coin_info + launcher.puzzle_hash + bytes(uint64(launcher.amount)) async with self.db_wrapper.writer_maybe_transaction() as conn: await conn.execute_insert( "INSERT OR REPLACE INTO launchers VALUES (?, ?)", (launcher.name(), launcher_bytes), ) async def get_launcher(self, launcher_id: bytes32) -> Optional[Coin]: """ Checks DB for a launcher with the specified ID and returns it. """ async with self.db_wrapper.reader_no_transaction() as conn: cursor = await conn.execute("SELECT * from launchers WHERE id=?", (launcher_id,)) row = await cursor.fetchone() await cursor.close() if row is not None: return Coin(bytes32(row[1][0:32]), bytes32(row[1][32:64]), uint64(int.from_bytes(row[1][64:72], "big"))) return None async def get_all_launchers(self) -> List[bytes32]: """ Checks DB for all launchers. """ async with self.db_wrapper.reader_no_transaction() as conn: cursor = await conn.execute("SELECT id from launchers") rows = await cursor.fetchall() await cursor.close() return [bytes32(row[0]) for row in rows] async def is_launcher_tracked(self, launcher_id: bytes32) -> bool: async with self.db_wrapper.reader_no_transaction() as conn: cursor = await conn.execute("SELECT COUNT(*) from singleton_records WHERE launcher_id=?", (launcher_id,)) row = await cursor.fetchone() await cursor.close() if row is not None: count: int = row[0] return count > 0 else: return False async def delete_launcher(self, launcher_id: bytes32) -> None: async with self.db_wrapper.writer_maybe_transaction() as conn: await (await conn.execute("DELETE FROM launchers WHERE id=?", (launcher_id,))).close() async def add_mirror(self, mirror: Mirror) -> None: """ Add a mirror coin to the DB """ async with self.db_wrapper.writer_maybe_transaction() as conn: await conn.execute_insert( "INSERT OR REPLACE INTO mirrors VALUES (?, ?, ?, ?, ?)", ( mirror.coin_id, mirror.launcher_id, bytes(mirror.amount), b"".join([bytes(uint16(len(url))) + url for url in mirror.urls]), # prefix each item with a length 1 if mirror.ours else 0, ), ) async def get_mirrors(self, launcher_id: bytes32) -> List[Mirror]: async with self.db_wrapper.reader_no_transaction() as conn: cursor = await conn.execute( "SELECT * from mirrors WHERE launcher_id=?", (launcher_id,), ) rows = await cursor.fetchall() await cursor.close() mirrors: List[Mirror] = [] for row in rows: mirrors.append(_row_to_mirror(row)) return mirrors async def get_mirror(self, coin_id: bytes32) -> Mirror: async with self.db_wrapper.reader_no_transaction() as conn: cursor = await conn.execute( "SELECT * from mirrors WHERE coin_id=?", (coin_id,), ) row = await cursor.fetchone() await cursor.close() assert row is not None return _row_to_mirror(row) async def delete_mirror(self, coin_id: bytes32) -> None: async with self.db_wrapper.writer_maybe_transaction() as conn: await (await conn.execute("DELETE FROM mirrors WHERE coin_id=?", (coin_id,))).close()
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/data_layer/data_layer_errors.py
flax/data_layer/data_layer_errors.py
from __future__ import annotations from typing import Iterable, List from flax.types.blockchain_format.sized_bytes import bytes32 class IntegrityError(Exception): pass def build_message_with_hashes(message: str, bytes_objects: Iterable[bytes]) -> str: return "\n".join([message, *[f" {b.hex()}" for b in bytes_objects]]) class TreeGenerationIncrementingError(IntegrityError): def __init__(self, tree_ids: List[bytes32]) -> None: super().__init__( build_message_with_hashes( message="Found trees with generations not properly incrementing:", bytes_objects=tree_ids, ) ) class NodeHashError(IntegrityError): def __init__(self, node_hashes: List[bytes32]) -> None: super().__init__( build_message_with_hashes( message="Found nodes with incorrect hashes:", bytes_objects=node_hashes, ) ) class KeyNotFoundError(Exception): def __init__(self, key: bytes) -> None: super().__init__(f"Key not found: {key.hex()}") class OfferIntegrityError(Exception): pass
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/data_layer/download_data.py
flax/data_layer/download_data.py
from __future__ import annotations import asyncio import logging import os import time from pathlib import Path from typing import List, Optional import aiohttp from typing_extensions import Literal from flax.data_layer.data_layer_util import NodeType, Root, SerializedNode, ServerInfo, Status from flax.data_layer.data_store import DataStore from flax.types.blockchain_format.sized_bytes import bytes32 def get_full_tree_filename(tree_id: bytes32, node_hash: bytes32, generation: int) -> str: return f"{tree_id}-{node_hash}-full-{generation}-v1.0.dat" def get_delta_filename(tree_id: bytes32, node_hash: bytes32, generation: int) -> str: return f"{tree_id}-{node_hash}-delta-{generation}-v1.0.dat" def is_filename_valid(filename: str) -> bool: split = filename.split("-") try: raw_tree_id, raw_node_hash, file_type, raw_generation, raw_version, *rest = split tree_id = bytes32(bytes.fromhex(raw_tree_id)) node_hash = bytes32(bytes.fromhex(raw_node_hash)) generation = int(raw_generation) except ValueError: return False if len(rest) > 0: return False # TODO: versions should probably be centrally defined if raw_version != "v1.0.dat": return False if file_type not in {"delta", "full"}: return False generate_file_func = get_delta_filename if file_type == "delta" else get_full_tree_filename reformatted = generate_file_func(tree_id=tree_id, node_hash=node_hash, generation=generation) return reformatted == filename async def insert_into_data_store_from_file( data_store: DataStore, tree_id: bytes32, root_hash: Optional[bytes32], filename: Path, ) -> None: with open(filename, "rb") as reader: while True: chunk = b"" while len(chunk) < 4: size_to_read = 4 - len(chunk) cur_chunk = reader.read(size_to_read) if cur_chunk is None or cur_chunk == b"": if size_to_read < 4: raise Exception("Incomplete read of length.") break chunk += cur_chunk if chunk == b"": break size = int.from_bytes(chunk, byteorder="big") serialize_nodes_bytes = b"" while len(serialize_nodes_bytes) < size: size_to_read = size - len(serialize_nodes_bytes) cur_chunk = reader.read(size_to_read) if cur_chunk is None or cur_chunk == b"": raise Exception("Incomplete read of blob.") serialize_nodes_bytes += cur_chunk serialized_node = SerializedNode.from_bytes(serialize_nodes_bytes) node_type = NodeType.TERMINAL if serialized_node.is_terminal else NodeType.INTERNAL await data_store.insert_node(node_type, serialized_node.value1, serialized_node.value2) await data_store.insert_root_with_ancestor_table(tree_id=tree_id, node_hash=root_hash, status=Status.COMMITTED) async def write_files_for_root( data_store: DataStore, tree_id: bytes32, root: Root, foldername: Path, overwrite: bool = False, ) -> bool: if root.node_hash is not None: node_hash = root.node_hash else: node_hash = bytes32([0] * 32) # todo change filename_full_tree = foldername.joinpath(get_full_tree_filename(tree_id, node_hash, root.generation)) filename_diff_tree = foldername.joinpath(get_delta_filename(tree_id, node_hash, root.generation)) written = False mode: Literal["wb", "xb"] = "wb" if overwrite else "xb" try: with open(filename_full_tree, mode) as writer: await data_store.write_tree_to_file(root, node_hash, tree_id, False, writer) written = True except FileExistsError: pass try: last_seen_generation = await data_store.get_last_tree_root_by_hash( tree_id, root.node_hash, max_generation=root.generation ) if last_seen_generation is None: with open(filename_diff_tree, mode) as writer: await data_store.write_tree_to_file(root, node_hash, tree_id, True, writer) else: open(filename_diff_tree, mode).close() written = True except FileExistsError: pass return written async def insert_from_delta_file( data_store: DataStore, tree_id: bytes32, existing_generation: int, root_hashes: List[bytes32], server_info: ServerInfo, client_foldername: Path, timeout: int, log: logging.Logger, ) -> bool: for root_hash in root_hashes: timestamp = int(time.time()) existing_generation += 1 filename = get_delta_filename(tree_id, root_hash, existing_generation) try: async with aiohttp.ClientSession() as session: async with session.get(server_info.url + "/" + filename, timeout=timeout) as resp: resp.raise_for_status() target_filename = client_foldername.joinpath(filename) text = await resp.read() target_filename.write_bytes(text) except Exception: await data_store.server_misses_file(tree_id, server_info, timestamp) raise log.info(f"Successfully downloaded delta file {filename}.") try: await insert_into_data_store_from_file( data_store, tree_id, None if root_hash == bytes32([0] * 32) else root_hash, client_foldername.joinpath(filename), ) log.info( f"Successfully inserted hash {root_hash} from delta file. " f"Generation: {existing_generation}. Tree id: {tree_id}." ) filename_full_tree = client_foldername.joinpath( get_full_tree_filename(tree_id, root_hash, existing_generation) ) root = await data_store.get_tree_root(tree_id=tree_id) with open(filename_full_tree, "wb") as writer: await data_store.write_tree_to_file(root, root_hash, tree_id, False, writer) log.info(f"Successfully written full tree filename {filename_full_tree}.") await data_store.received_correct_file(tree_id, server_info) except asyncio.CancelledError: raise except Exception: target_filename = client_foldername.joinpath(filename) os.remove(target_filename) await data_store.received_incorrect_file(tree_id, server_info, timestamp) await data_store.rollback_to_generation(tree_id, existing_generation - 1) raise return True
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/data_layer/data_layer_server.py
flax/data_layer/data_layer_server.py
from __future__ import annotations import asyncio import functools import logging import signal import sys from dataclasses import dataclass, field from pathlib import Path from typing import Any, Dict, Optional import click from aiohttp import web from flax.data_layer.download_data import is_filename_valid from flax.server.upnp import UPnP from flax.util.flax_logging import initialize_logging from flax.util.config import load_config from flax.util.default_root import DEFAULT_ROOT_PATH from flax.util.network import WebServer from flax.util.path import path_from_root from flax.util.setproctitle import setproctitle # from flax.cmds.flax import monkey_patch_click # See: https://bugs.python.org/issue29288 "".encode("idna") SERVICE_NAME = "data_layer" log = logging.getLogger(__name__) @dataclass class DataLayerServer: root_path: Path config: Dict[str, Any] log: logging.Logger shutdown_event: asyncio.Event webserver: Optional[WebServer] = None upnp: UPnP = field(default_factory=UPnP) async def start(self) -> None: if self.webserver is not None: raise RuntimeError("DataLayerServer already started") if sys.platform == "win32" or sys.platform == "cygwin": # pylint: disable=E1101 signal.signal(signal.SIGBREAK, self._accept_signal) signal.signal(signal.SIGINT, self._accept_signal) signal.signal(signal.SIGTERM, self._accept_signal) else: loop = asyncio.get_running_loop() loop.add_signal_handler( signal.SIGINT, functools.partial(self._accept_signal, signal_number=signal.SIGINT), ) loop.add_signal_handler( signal.SIGTERM, functools.partial(self._accept_signal, signal_number=signal.SIGTERM), ) self.log.info("Starting Data Layer HTTP Server.") self.host_ip = self.config["host_ip"] self.port = self.config["host_port"] # Setup UPnP for the data_layer_service port self.upnp.setup() self.upnp.remap(self.port) server_files_replaced: str = self.config.get( "server_files_location", "data_layer/db/server_files_location_CHALLENGE" ).replace("CHALLENGE", self.config["selected_network"]) self.server_dir = path_from_root(self.root_path, server_files_replaced) self.webserver = await WebServer.create( hostname=self.host_ip, port=self.port, routes=[web.get("/{filename}", self.file_handler)] ) self.log.info("Started Data Layer HTTP Server.") def close(self) -> None: self.shutdown_event.set() self.upnp.release(self.port) # UPnP.shutdown() is a blocking call, waiting for the UPnP thread to exit self.upnp.shutdown() if self.webserver is not None: self.webserver.close() self.log.info("Stop triggered for Data Layer HTTP Server.") async def await_closed(self) -> None: self.log.info("Wait for Data Layer HTTP Server shutdown.") if self.webserver is not None: await self.webserver.await_closed() self.webserver = None async def file_handler(self, request: web.Request) -> web.Response: filename = request.match_info["filename"] if not is_filename_valid(filename): raise Exception("Invalid file format requested.") file_path = self.server_dir.joinpath(filename) with open(file_path, "rb") as reader: content = reader.read() response = web.Response( content_type="application/octet-stream", headers={"Content-Disposition": "attachment;filename={}".format(filename)}, body=content, ) return response def _accept_signal(self, signal_number: int, stack_frame: Any = None) -> None: self.log.info("Got SIGINT or SIGTERM signal - stopping") self.close() async def async_start(root_path: Path) -> int: shutdown_event = asyncio.Event() dl_config = load_config( root_path=root_path, filename="config.yaml", sub_config=SERVICE_NAME, fill_missing_services=True, ) setproctitle("data_layer_http") initialize_logging( service_name="data_layer_http", logging_config=dl_config["logging"], root_path=root_path, ) data_layer_server = DataLayerServer(root_path, dl_config, log, shutdown_event) await data_layer_server.start() await shutdown_event.wait() await data_layer_server.await_closed() return 0 @click.command() @click.option( "-r", "--root-path", type=click.Path(exists=True, writable=True, file_okay=False), default=DEFAULT_ROOT_PATH, show_default=True, help="Config file root", ) def main(root_path: str = str(DEFAULT_ROOT_PATH)) -> int: return asyncio.run(async_start(Path(root_path))) if __name__ == "__main__": sys.exit(main())
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/data_layer/data_layer_wallet.py
flax/data_layer/data_layer_wallet.py
from __future__ import annotations import dataclasses import logging import time from operator import attrgetter from typing import TYPE_CHECKING, Any, Dict, List, Optional, Set, Tuple, Type, TypeVar from blspy import G1Element, G2Element from clvm.EvalError import EvalError from flax.consensus.block_record import BlockRecord from flax.data_layer.data_layer_errors import OfferIntegrityError from flax.data_layer.data_layer_util import OfferStore, ProofOfInclusion, ProofOfInclusionLayer, StoreProofs, leaf_hash from flax.protocols.wallet_protocol import CoinState from flax.server.ws_connection import WSFlaxConnection from flax.types.announcement import Announcement from flax.types.blockchain_format.coin import Coin from flax.types.blockchain_format.program import Program, SerializedProgram from flax.types.blockchain_format.sized_bytes import bytes32 from flax.types.coin_spend import CoinSpend from flax.types.condition_opcodes import ConditionOpcode from flax.types.spend_bundle import SpendBundle from flax.util.ints import uint8, uint32, uint64, uint128 from flax.util.streamable import Streamable, streamable from flax.wallet.db_wallet.db_wallet_puzzles import ( ACS_MU, ACS_MU_PH, GRAFTROOT_DL_OFFERS, SINGLETON_LAUNCHER, create_graftroot_offer_puz, create_host_fullpuz, create_host_layer_puzzle, create_mirror_puzzle, get_mirror_info, launch_solution_to_singleton_info, launcher_to_struct, match_dl_singleton, ) from flax.wallet.derivation_record import DerivationRecord from flax.wallet.lineage_proof import LineageProof from flax.wallet.outer_puzzles import AssetType from flax.wallet.puzzle_drivers import PuzzleInfo, Solver from flax.wallet.puzzles.singleton_top_layer_v1_1 import SINGLETON_LAUNCHER_HASH from flax.wallet.sign_coin_spends import sign_coin_spends from flax.wallet.trading.offer import NotarizedPayment, Offer from flax.wallet.transaction_record import TransactionRecord from flax.wallet.util.compute_memos import compute_memos from flax.wallet.util.merkle_utils import _simplify_merkle_proof from flax.wallet.util.transaction_type import TransactionType from flax.wallet.util.wallet_types import AmountWithPuzzlehash, WalletType from flax.wallet.wallet import Wallet from flax.wallet.wallet_coin_record import WalletCoinRecord from flax.wallet.wallet_info import WalletInfo if TYPE_CHECKING: from flax.wallet.wallet_state_manager import WalletStateManager @streamable @dataclasses.dataclass(frozen=True) class SingletonRecord(Streamable): coin_id: bytes32 launcher_id: bytes32 root: bytes32 inner_puzzle_hash: bytes32 confirmed: bool confirmed_at_height: uint32 lineage_proof: LineageProof generation: uint32 timestamp: uint64 @dataclasses.dataclass(frozen=True) class Mirror: coin_id: bytes32 launcher_id: bytes32 amount: uint64 urls: List[bytes] ours: bool def to_json_dict(self) -> Dict[str, Any]: return { "coin_id": self.coin_id.hex(), "launcher_id": self.launcher_id.hex(), "amount": self.amount, "urls": [url.decode("utf8") for url in self.urls], "ours": self.ours, } @classmethod def from_json_dict(cls, json_dict: Dict[str, Any]) -> "Mirror": return cls( bytes32.from_hexstr(json_dict["coin_id"]), bytes32.from_hexstr(json_dict["launcher_id"]), json_dict["amount"], [bytes(url, "utf8") for url in json_dict["urls"]], json_dict["ours"], ) _T_DataLayerWallet = TypeVar("_T_DataLayerWallet", bound="DataLayerWallet") class DataLayerWallet: wallet_state_manager: WalletStateManager log: logging.Logger wallet_info: WalletInfo wallet_id: uint8 standard_wallet: Wallet """ interface used by datalayer for interacting with the chain """ @classmethod async def create( cls: Type[_T_DataLayerWallet], wallet_state_manager: WalletStateManager, wallet: Wallet, wallet_info: WalletInfo, name: Optional[str] = None, ) -> _T_DataLayerWallet: self = cls() self.wallet_state_manager = wallet_state_manager self.log = logging.getLogger(name if name else __name__) self.standard_wallet = wallet self.wallet_info = wallet_info self.wallet_id = uint8(self.wallet_info.id) return self @classmethod def type(cls) -> uint8: return uint8(WalletType.DATA_LAYER) def id(self) -> uint32: return self.wallet_info.id @classmethod async def create_new_dl_wallet( cls: Type[_T_DataLayerWallet], wallet_state_manager: WalletStateManager, wallet: Wallet, name: Optional[str] = "DataLayer Wallet", ) -> _T_DataLayerWallet: """ This must be called under the wallet state manager lock """ self = cls() self.wallet_state_manager = wallet_state_manager self.log = logging.getLogger(name if name else __name__) self.standard_wallet = wallet for _, w in self.wallet_state_manager.wallets.items(): if w.type() == uint8(WalletType.DATA_LAYER): raise ValueError("DataLayer Wallet already exists for this key") assert name is not None self.wallet_info = await wallet_state_manager.user_store.create_wallet( name, WalletType.DATA_LAYER.value, "", ) self.wallet_id = uint8(self.wallet_info.id) await self.wallet_state_manager.add_new_wallet(self, self.wallet_info.id) return self ############# # LAUNCHING # ############# @staticmethod async def match_dl_launcher(launcher_spend: CoinSpend) -> Tuple[bool, Optional[bytes32]]: # Sanity check it's a launcher if launcher_spend.puzzle_reveal.to_program() != SINGLETON_LAUNCHER: return False, None # Let's make sure the solution looks how we expect it to try: full_puzhash, amount, root, inner_puzhash = launch_solution_to_singleton_info( launcher_spend.solution.to_program() ) except ValueError: return False, None # Now let's check that the full puzzle is an odd data layer singleton if ( full_puzhash != create_host_fullpuz(inner_puzhash, root, launcher_spend.coin.name()).get_tree_hash_precalc(inner_puzhash) or amount % 2 == 0 ): return False, None return True, inner_puzhash async def get_launcher_coin_state(self, launcher_id: bytes32, peer: WSFlaxConnection) -> CoinState: coin_states: List[CoinState] = await self.wallet_state_manager.wallet_node.get_coin_state( [launcher_id], peer=peer ) if len(coin_states) == 0: raise ValueError(f"Launcher ID {launcher_id} is not a valid coin") if coin_states[0].coin.puzzle_hash != SINGLETON_LAUNCHER.get_tree_hash(): raise ValueError(f"Coin with ID {launcher_id} is not a singleton launcher") if coin_states[0].created_height is None: raise ValueError(f"Launcher with ID {launcher_id} has not been created (maybe reorged)") if coin_states[0].spent_height is None: raise ValueError(f"Launcher with ID {launcher_id} has not been spent") return coin_states[0] # This is the entry point for non-owned singletons async def track_new_launcher_id( self, launcher_id: bytes32, peer: WSFlaxConnection, spend: Optional[CoinSpend] = None, height: Optional[uint32] = None, ) -> None: if await self.wallet_state_manager.dl_store.get_launcher(launcher_id) is not None: self.log.info(f"Spend of launcher {launcher_id} has already been processed") return None if spend is not None and spend.coin.name() == launcher_id: # spend.coin.name() == launcher_id is a sanity check await self.new_launcher_spend(spend, peer, height) else: launcher_state: CoinState = await self.get_launcher_coin_state(launcher_id, peer) launcher_spend: CoinSpend = await self.wallet_state_manager.wallet_node.fetch_puzzle_solution( launcher_state.spent_height, launcher_state.coin, peer ) await self.new_launcher_spend(launcher_spend, peer) async def new_launcher_spend( self, launcher_spend: CoinSpend, peer: WSFlaxConnection, height: Optional[uint32] = None, ) -> None: launcher_id: bytes32 = launcher_spend.coin.name() if height is None: coin_state = await self.get_launcher_coin_state(launcher_id, peer) height = None if coin_state.spent_height is None else uint32(coin_state.spent_height) assert height is not None full_puzhash, amount, root, inner_puzhash = launch_solution_to_singleton_info( launcher_spend.solution.to_program() ) new_singleton = Coin(launcher_id, full_puzhash, amount) singleton_record: Optional[SingletonRecord] = await self.wallet_state_manager.dl_store.get_latest_singleton( launcher_id ) if singleton_record is not None: if ( # This is an unconfirmed singleton that we know about singleton_record.coin_id == new_singleton.name() and not singleton_record.confirmed ): timestamp = await self.wallet_state_manager.wallet_node.get_timestamp_for_height(height) await self.wallet_state_manager.dl_store.set_confirmed(singleton_record.coin_id, height, timestamp) else: self.log.info(f"Spend of launcher {launcher_id} has already been processed") return None else: timestamp = await self.wallet_state_manager.wallet_node.get_timestamp_for_height(height) await self.wallet_state_manager.dl_store.add_singleton_record( SingletonRecord( coin_id=new_singleton.name(), launcher_id=launcher_id, root=root, inner_puzzle_hash=inner_puzhash, confirmed=True, confirmed_at_height=height, timestamp=timestamp, lineage_proof=LineageProof( launcher_id, create_host_layer_puzzle(inner_puzhash, root).get_tree_hash_precalc(inner_puzhash), amount, ), generation=uint32(0), ) ) await self.wallet_state_manager.dl_store.add_launcher(launcher_spend.coin) await self.wallet_state_manager.add_interested_puzzle_hashes([launcher_id], [self.id()]) await self.wallet_state_manager.add_interested_coin_ids([new_singleton.name()]) new_singleton_coin_record: Optional[ WalletCoinRecord ] = await self.wallet_state_manager.coin_store.get_coin_record(new_singleton.name()) while new_singleton_coin_record is not None and new_singleton_coin_record.spent_block_height > 0: # We've already synced this before, so we need to sort of force a resync parent_spend: CoinSpend = await self.wallet_state_manager.wallet_node.fetch_puzzle_solution( new_singleton_coin_record.spent_block_height, new_singleton, peer ) await self.singleton_removed(parent_spend, new_singleton_coin_record.spent_block_height) try: new_singleton = next(coin for coin in parent_spend.additions() if coin.amount % 2 != 0) new_singleton_coin_record = await self.wallet_state_manager.coin_store.get_coin_record( new_singleton.name() ) except StopIteration: new_singleton_coin_record = None ################ # TRANSACTIONS # ################ async def generate_new_reporter( self, initial_root: bytes32, fee: uint64 = uint64(0), ) -> Tuple[TransactionRecord, TransactionRecord, bytes32]: """ Creates the initial singleton, which includes spending an origin coin, the launcher, and creating a singleton """ coins: Set[Coin] = await self.standard_wallet.select_coins(uint64(fee + 1)) if coins is None: raise ValueError("Not enough coins to create new data layer singleton") launcher_parent: Coin = list(coins)[0] launcher_coin: Coin = Coin(launcher_parent.name(), SINGLETON_LAUNCHER.get_tree_hash(), uint64(1)) inner_puzzle: Program = await self.standard_wallet.get_new_puzzle() full_puzzle: Program = create_host_fullpuz(inner_puzzle, initial_root, launcher_coin.name()) genesis_launcher_solution: Program = Program.to( [full_puzzle.get_tree_hash(), 1, [initial_root, inner_puzzle.get_tree_hash()]] ) announcement_message: bytes32 = genesis_launcher_solution.get_tree_hash() announcement = Announcement(launcher_coin.name(), announcement_message) create_launcher_tx_record: Optional[TransactionRecord] = await self.standard_wallet.generate_signed_transaction( amount=uint64(1), puzzle_hash=SINGLETON_LAUNCHER.get_tree_hash(), fee=fee, origin_id=launcher_parent.name(), coins=coins, primaries=None, ignore_max_send_amount=False, coin_announcements_to_consume={announcement}, ) assert create_launcher_tx_record is not None and create_launcher_tx_record.spend_bundle is not None launcher_cs: CoinSpend = CoinSpend( launcher_coin, SerializedProgram.from_program(SINGLETON_LAUNCHER), SerializedProgram.from_program(genesis_launcher_solution), ) launcher_sb: SpendBundle = SpendBundle([launcher_cs], G2Element()) full_spend: SpendBundle = SpendBundle.aggregate([create_launcher_tx_record.spend_bundle, launcher_sb]) # Delete from standard transaction so we don't push duplicate spends std_record: TransactionRecord = dataclasses.replace(create_launcher_tx_record, spend_bundle=None) dl_record = TransactionRecord( confirmed_at_height=uint32(0), created_at_time=uint64(int(time.time())), to_puzzle_hash=bytes32([2] * 32), amount=uint64(1), fee_amount=fee, confirmed=False, sent=uint32(10), spend_bundle=full_spend, additions=full_spend.additions(), removals=full_spend.removals(), memos=list(compute_memos(full_spend).items()), wallet_id=uint32(0), # This is being called before the wallet is created so we're using a temp ID of 0 sent_to=[], trade_id=None, type=uint32(TransactionType.INCOMING_TX.value), name=full_spend.name(), ) singleton_record = SingletonRecord( coin_id=Coin(launcher_coin.name(), full_puzzle.get_tree_hash(), uint64(1)).name(), launcher_id=launcher_coin.name(), root=initial_root, inner_puzzle_hash=inner_puzzle.get_tree_hash(), confirmed=False, confirmed_at_height=uint32(0), timestamp=uint64(0), lineage_proof=LineageProof( launcher_coin.name(), create_host_layer_puzzle(inner_puzzle, initial_root).get_tree_hash(), uint64(1), ), generation=uint32(0), ) await self.wallet_state_manager.dl_store.add_singleton_record(singleton_record) await self.wallet_state_manager.add_interested_puzzle_hashes([singleton_record.launcher_id], [self.id()]) return dl_record, std_record, launcher_coin.name() async def create_tandem_xfx_tx( self, fee: uint64, announcement_to_assert: Announcement, coin_announcement: bool = True, ) -> TransactionRecord: flax_tx = await self.standard_wallet.generate_signed_transaction( amount=uint64(0), puzzle_hash=await self.standard_wallet.get_new_puzzlehash(), fee=fee, negative_change_allowed=False, coin_announcements_to_consume={announcement_to_assert} if coin_announcement else None, puzzle_announcements_to_consume=None if coin_announcement else {announcement_to_assert}, ) assert flax_tx.spend_bundle is not None return flax_tx async def create_update_state_spend( self, launcher_id: bytes32, root_hash: Optional[bytes32], new_puz_hash: Optional[bytes32] = None, new_amount: Optional[uint64] = None, fee: uint64 = uint64(0), coin_announcements_to_consume: Optional[Set[Announcement]] = None, puzzle_announcements_to_consume: Optional[Set[Announcement]] = None, sign: bool = True, add_pending_singleton: bool = True, announce_new_state: bool = False, ) -> List[TransactionRecord]: singleton_record, parent_lineage = await self.get_spendable_singleton_info(launcher_id) if root_hash is None: root_hash = singleton_record.root inner_puzzle_derivation: Optional[ DerivationRecord ] = await self.wallet_state_manager.puzzle_store.get_derivation_record_for_puzzle_hash( singleton_record.inner_puzzle_hash ) if inner_puzzle_derivation is None: raise ValueError(f"DL Wallet does not have permission to update Singleton with launcher ID {launcher_id}") # Make the child's puzzles if new_puz_hash is None: new_puz_hash = (await self.standard_wallet.get_new_puzzle()).get_tree_hash() assert new_puz_hash is not None next_full_puz_hash: bytes32 = create_host_fullpuz(new_puz_hash, root_hash, launcher_id).get_tree_hash_precalc( new_puz_hash ) # Construct the current puzzles current_inner_puzzle: Program = self.standard_wallet.puzzle_for_pk(inner_puzzle_derivation.pubkey) current_full_puz = create_host_fullpuz( current_inner_puzzle, singleton_record.root, launcher_id, ) assert singleton_record.lineage_proof.parent_name is not None assert singleton_record.lineage_proof.amount is not None current_coin = Coin( singleton_record.lineage_proof.parent_name, current_full_puz.get_tree_hash(), singleton_record.lineage_proof.amount, ) new_singleton_record = SingletonRecord( coin_id=Coin(current_coin.name(), next_full_puz_hash, singleton_record.lineage_proof.amount).name(), launcher_id=launcher_id, root=root_hash, inner_puzzle_hash=new_puz_hash, confirmed=False, confirmed_at_height=uint32(0), timestamp=uint64(0), lineage_proof=LineageProof( singleton_record.coin_id, new_puz_hash, singleton_record.lineage_proof.amount, ), generation=uint32(singleton_record.generation + 1), ) # Optionally add an ephemeral spend to announce if announce_new_state: announce_only: Program = Program.to( ( 1, [ [ 51, new_puz_hash, singleton_record.lineage_proof.amount, [launcher_id, root_hash, new_puz_hash], ], [62, b"$"], ], ) ) second_full_puz: Program = create_host_fullpuz( announce_only, root_hash, launcher_id, ) second_coin = Coin( current_coin.name(), second_full_puz.get_tree_hash(), singleton_record.lineage_proof.amount ) second_coin_spend = CoinSpend( second_coin, second_full_puz.to_serialized_program(), Program.to( [ LineageProof( current_coin.parent_coin_info, create_host_layer_puzzle(current_inner_puzzle, singleton_record.root).get_tree_hash(), singleton_record.lineage_proof.amount, ).to_program(), singleton_record.lineage_proof.amount, [[]], ] ), ) root_announce = Announcement(second_full_puz.get_tree_hash(), b"$") if puzzle_announcements_to_consume is None: puzzle_announcements_to_consume = set((root_announce,)) else: puzzle_announcements_to_consume.add(root_announce) second_singleton_record = SingletonRecord( coin_id=second_coin.name(), launcher_id=launcher_id, root=root_hash, inner_puzzle_hash=announce_only.get_tree_hash(), confirmed=False, confirmed_at_height=uint32(0), timestamp=uint64(0), lineage_proof=LineageProof( second_coin.parent_coin_info, announce_only.get_tree_hash(), singleton_record.lineage_proof.amount, ), generation=uint32(singleton_record.generation + 1), ) new_singleton_record = dataclasses.replace( new_singleton_record, coin_id=Coin(second_coin.name(), next_full_puz_hash, singleton_record.lineage_proof.amount).name(), lineage_proof=LineageProof( second_coin.name(), next_full_puz_hash, singleton_record.lineage_proof.amount, ), generation=uint32(second_singleton_record.generation + 1), ) # Create the solution primaries: List[AmountWithPuzzlehash] = [ { "puzzlehash": announce_only.get_tree_hash() if announce_new_state else new_puz_hash, "amount": singleton_record.lineage_proof.amount if new_amount is None else new_amount, "memos": [ launcher_id, root_hash, announce_only.get_tree_hash() if announce_new_state else new_puz_hash, ], } ] inner_sol: Program = self.standard_wallet.make_solution( primaries=primaries, coin_announcements={b"$"} if fee > 0 else None, coin_announcements_to_assert={a.name() for a in coin_announcements_to_consume} if coin_announcements_to_consume is not None else None, puzzle_announcements_to_assert={a.name() for a in puzzle_announcements_to_consume} if puzzle_announcements_to_consume is not None else None, ) if root_hash != singleton_record.root: magic_condition = Program.to([-24, ACS_MU, [[Program.to((root_hash, None)), ACS_MU_PH], None]]) # TODO: This line is a hack, make_solution should allow us to pass extra conditions to it inner_sol = Program.to([[], (1, magic_condition.cons(inner_sol.at("rfr"))), []]) db_layer_sol = Program.to([inner_sol]) full_sol = Program.to( [ parent_lineage.to_program(), singleton_record.lineage_proof.amount, db_layer_sol, ] ) # Create the spend coin_spend = CoinSpend( current_coin, SerializedProgram.from_program(current_full_puz), SerializedProgram.from_program(full_sol), ) await self.standard_wallet.hack_populate_secret_key_for_puzzle_hash(current_inner_puzzle.get_tree_hash()) if sign: spend_bundle = await self.sign(coin_spend) else: spend_bundle = SpendBundle([coin_spend], G2Element()) if announce_new_state: spend_bundle = dataclasses.replace(spend_bundle, coin_spends=[coin_spend, second_coin_spend]) dl_tx = TransactionRecord( confirmed_at_height=uint32(0), created_at_time=uint64(int(time.time())), to_puzzle_hash=new_puz_hash, amount=uint64(singleton_record.lineage_proof.amount), fee_amount=fee, confirmed=False, sent=uint32(10), spend_bundle=spend_bundle, additions=spend_bundle.additions(), removals=spend_bundle.removals(), memos=list(compute_memos(spend_bundle).items()), wallet_id=self.id(), sent_to=[], trade_id=None, type=uint32(TransactionType.OUTGOING_TX.value), name=singleton_record.coin_id, ) if fee > 0: flax_tx = await self.create_tandem_xfx_tx( fee, Announcement(current_coin.name(), b"$"), coin_announcement=True ) aggregate_bundle = SpendBundle.aggregate([dl_tx.spend_bundle, flax_tx.spend_bundle]) dl_tx = dataclasses.replace(dl_tx, spend_bundle=aggregate_bundle) flax_tx = dataclasses.replace(flax_tx, spend_bundle=None) txs: List[TransactionRecord] = [dl_tx, flax_tx] else: txs = [dl_tx] if add_pending_singleton: await self.wallet_state_manager.dl_store.add_singleton_record( new_singleton_record, ) if announce_new_state: await self.wallet_state_manager.dl_store.add_singleton_record( second_singleton_record, ) return txs async def generate_signed_transaction( self, amounts: List[uint64], puzzle_hashes: List[bytes32], fee: uint64 = uint64(0), coins: Set[Coin] = set(), memos: Optional[List[List[bytes]]] = None, # ignored coin_announcements_to_consume: Optional[Set[Announcement]] = None, puzzle_announcements_to_consume: Optional[Set[Announcement]] = None, ignore_max_send_amount: bool = False, # ignored # This wallet only launcher_id: Optional[bytes32] = None, new_root_hash: Optional[bytes32] = None, sign: bool = True, # This only prevent signing of THIS wallet's part of the tx (fee will still be signed) add_pending_singleton: bool = True, announce_new_state: bool = False, ) -> List[TransactionRecord]: # Figure out the launcher ID if len(coins) == 0: if launcher_id is None: raise ValueError("Not enough info to know which DL coin to send") else: if len(coins) != 1: raise ValueError("The wallet can only send one DL coin at a time") else: record = await self.wallet_state_manager.dl_store.get_singleton_record(next(iter(coins)).name()) if record is None: raise ValueError("The specified coin is not a tracked DL") else: launcher_id = record.launcher_id if len(amounts) != 1 or len(puzzle_hashes) != 1: raise ValueError("The wallet can only send one DL coin to one place at a time") return await self.create_update_state_spend( launcher_id, new_root_hash, puzzle_hashes[0], amounts[0], fee, coin_announcements_to_consume, puzzle_announcements_to_consume, sign, add_pending_singleton, announce_new_state, ) async def get_spendable_singleton_info(self, launcher_id: bytes32) -> Tuple[SingletonRecord, LineageProof]: # First, let's make sure this is a singleton that we track and that we can spend singleton_record: Optional[SingletonRecord] = await self.get_latest_singleton(launcher_id) if singleton_record is None: raise ValueError(f"Singleton with launcher ID {launcher_id} is not tracked by DL Wallet") # Next, the singleton should be confirmed or else we shouldn't be ready to spend it if not singleton_record.confirmed: raise ValueError(f"Singleton with launcher ID {launcher_id} is currently pending") # Next, let's verify we have all of the relevant coin information if singleton_record.lineage_proof.parent_name is None or singleton_record.lineage_proof.amount is None: raise ValueError(f"Singleton with launcher ID {launcher_id} has insufficient information to spend") # Finally, let's get the parent record for its lineage proof parent_singleton: Optional[SingletonRecord] = await self.wallet_state_manager.dl_store.get_singleton_record( singleton_record.lineage_proof.parent_name ) parent_lineage: LineageProof if parent_singleton is None: if singleton_record.lineage_proof.parent_name != launcher_id: raise ValueError(f"Have not found the parent of singleton with launcher ID {launcher_id}") else: launcher_coin: Optional[Coin] = await self.wallet_state_manager.dl_store.get_launcher(launcher_id) if launcher_coin is None: raise ValueError(f"DL Wallet does not have launcher info for id {launcher_id}") else: parent_lineage = LineageProof(launcher_coin.parent_coin_info, None, uint64(launcher_coin.amount)) else: parent_lineage = parent_singleton.lineage_proof return singleton_record, parent_lineage async def get_owned_singletons(self) -> List[SingletonRecord]: launcher_ids = await self.wallet_state_manager.dl_store.get_all_launchers() collected = [] for launcher_id in launcher_ids: singleton_record = await self.wallet_state_manager.dl_store.get_latest_singleton(launcher_id=launcher_id) if singleton_record is None: # this is likely due to a race between getting the list and acquiring the extra data continue inner_puzzle_derivation: Optional[ DerivationRecord ] = await self.wallet_state_manager.puzzle_store.get_derivation_record_for_puzzle_hash( singleton_record.inner_puzzle_hash ) if inner_puzzle_derivation is not None: collected.append(singleton_record) return collected async def create_new_mirror( self, launcher_id: bytes32, amount: uint64, urls: List[bytes], fee: uint64 = uint64(0) ) -> List[TransactionRecord]: create_mirror_tx_record: Optional[TransactionRecord] = await self.standard_wallet.generate_signed_transaction( amount=amount, puzzle_hash=create_mirror_puzzle().get_tree_hash(), fee=fee, primaries=[], memos=[launcher_id, *(url for url in urls)], ignore_max_send_amount=False, ) assert create_mirror_tx_record is not None and create_mirror_tx_record.spend_bundle is not None return [create_mirror_tx_record] async def delete_mirror( self, mirror_id: bytes32, peer: WSFlaxConnection, fee: uint64 = uint64(0) ) -> List[TransactionRecord]: mirror: Mirror = await self.get_mirror(mirror_id) mirror_coin: Coin = (await self.wallet_state_manager.wallet_node.get_coin_state([mirror.coin_id], peer=peer))[ 0 ].coin parent_coin: Coin = ( await self.wallet_state_manager.wallet_node.get_coin_state([mirror_coin.parent_coin_info], peer=peer) )[0].coin inner_puzzle_derivation: Optional[ DerivationRecord ] = await self.wallet_state_manager.puzzle_store.get_derivation_record_for_puzzle_hash(parent_coin.puzzle_hash) if inner_puzzle_derivation is None: raise ValueError(f"DL Wallet does not have permission to delete mirror with ID {mirror_id}")
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
true
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/data_layer/__init__.py
flax/data_layer/__init__.py
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/data_layer/data_layer_util.py
flax/data_layer/data_layer_util.py
from __future__ import annotations import dataclasses from dataclasses import dataclass, field from enum import IntEnum from typing import TYPE_CHECKING, Any, Dict, List, Optional, Tuple, Type, Union # TODO: remove or formalize this import aiosqlite as aiosqlite from typing_extensions import final from flax.types.blockchain_format.program import Program from flax.types.blockchain_format.sized_bytes import bytes32 from flax.util.byte_types import hexstr_to_bytes from flax.util.db_wrapper import DBWrapper2 from flax.util.ints import uint64 from flax.util.streamable import Streamable, streamable if TYPE_CHECKING: from flax.data_layer.data_store import DataStore def internal_hash(left_hash: bytes32, right_hash: bytes32) -> bytes32: # ignoring hint error here for: # https://github.com/Flax-Network/clvm/pull/102 # https://github.com/Flax-Network/clvm/pull/106 return Program.to((left_hash, right_hash)).get_tree_hash_precalc(left_hash, right_hash) # type: ignore[no-any-return] # noqa: E501 def calculate_internal_hash(hash: bytes32, other_hash_side: Side, other_hash: bytes32) -> bytes32: if other_hash_side == Side.LEFT: return internal_hash(left_hash=other_hash, right_hash=hash) elif other_hash_side == Side.RIGHT: return internal_hash(left_hash=hash, right_hash=other_hash) raise Exception(f"Invalid side: {other_hash_side!r}") def leaf_hash(key: bytes, value: bytes) -> bytes32: # ignoring hint error here for: # https://github.com/Flax-Network/clvm/pull/102 # https://github.com/Flax-Network/clvm/pull/106 return Program.to((key, value)).get_tree_hash() # type: ignore[no-any-return] async def _debug_dump(db: DBWrapper2, description: str = "") -> None: async with db.reader() as reader: cursor = await reader.execute("SELECT name FROM sqlite_master WHERE type='table';") print("-" * 50, description, flush=True) for [name] in await cursor.fetchall(): cursor = await reader.execute(f"SELECT * FROM {name}") print(f"\n -- {name} ------", flush=True) async for row in cursor: print(f" {dict(row)}") async def _dot_dump(data_store: DataStore, store_id: bytes32, root_hash: bytes32) -> str: terminal_nodes = await data_store.get_keys_values(tree_id=store_id, root_hash=root_hash) internal_nodes = await data_store.get_internal_nodes(tree_id=store_id, root_hash=root_hash) n = 8 dot_nodes: List[str] = [] dot_connections: List[str] = [] dot_pair_boxes: List[str] = [] for terminal_node in terminal_nodes: hash = terminal_node.hash.hex() key = terminal_node.key.hex() value = terminal_node.value.hex() dot_nodes.append(f"""node_{hash} [shape=box, label="{hash[:n]}\\nkey: {key}\\nvalue: {value}"];""") for internal_node in internal_nodes: hash = internal_node.hash.hex() left = internal_node.left_hash.hex() right = internal_node.right_hash.hex() dot_nodes.append(f"""node_{hash} [label="{hash[:n]}"]""") dot_connections.append(f"""node_{hash} -> node_{left} [label="L"];""") dot_connections.append(f"""node_{hash} -> node_{right} [label="R"];""") dot_pair_boxes.append( f"node [shape = box]; " f"{{rank = same; node_{left}->node_{right}[style=invis]; rankdir = LR}}" ) lines = [ "digraph {", *dot_nodes, *dot_connections, *dot_pair_boxes, "}", ] return "\n".join(lines) def row_to_node(row: aiosqlite.Row) -> Node: cls = node_type_to_class[row["node_type"]] return cls.from_row(row=row) class Status(IntEnum): PENDING = 1 COMMITTED = 2 class NodeType(IntEnum): INTERNAL = 1 TERMINAL = 2 @final class Side(IntEnum): LEFT = 0 RIGHT = 1 def other(self) -> "Side": if self == Side.LEFT: return Side.RIGHT return Side.LEFT @classmethod def unmarshal(cls, o: str) -> Side: return getattr(cls, o.upper()) # type: ignore[no-any-return] def marshal(self) -> str: return self.name.lower() class OperationType(IntEnum): INSERT = 0 DELETE = 1 class CommitState(IntEnum): OPEN = 0 FINALIZED = 1 ROLLED_BACK = 2 Node = Union["TerminalNode", "InternalNode"] @dataclass(frozen=True) class TerminalNode: hash: bytes32 # generation: int key: bytes value: bytes atom: None = field(init=False, default=None) @property def pair(self) -> Tuple[bytes32, bytes32]: return Program.to(self.key), Program.to(self.value) @classmethod def from_row(cls, row: aiosqlite.Row) -> "TerminalNode": return cls( hash=bytes32(row["hash"]), # generation=row["generation"], key=row["key"], value=row["value"], ) @final @dataclass(frozen=True) class ProofOfInclusionLayer: other_hash_side: Side other_hash: bytes32 combined_hash: bytes32 @classmethod def from_internal_node( cls, internal_node: "InternalNode", traversal_child_hash: bytes32, ) -> "ProofOfInclusionLayer": return ProofOfInclusionLayer( other_hash_side=internal_node.other_child_side(hash=traversal_child_hash), other_hash=internal_node.other_child_hash(hash=traversal_child_hash), combined_hash=internal_node.hash, ) @classmethod def from_hashes(cls, primary_hash: bytes32, other_hash_side: Side, other_hash: bytes32) -> "ProofOfInclusionLayer": combined_hash = calculate_internal_hash( hash=primary_hash, other_hash_side=other_hash_side, other_hash=other_hash, ) return cls(other_hash_side=other_hash_side, other_hash=other_hash, combined_hash=combined_hash) other_side_to_bit = {Side.LEFT: 1, Side.RIGHT: 0} @dataclass(frozen=True) class ProofOfInclusion: node_hash: bytes32 # children before parents layers: List[ProofOfInclusionLayer] @property def root_hash(self) -> bytes32: if len(self.layers) == 0: return self.node_hash return self.layers[-1].combined_hash def sibling_sides_integer(self) -> int: return sum(other_side_to_bit[layer.other_hash_side] << index for index, layer in enumerate(self.layers)) def sibling_hashes(self) -> List[bytes32]: return [layer.other_hash for layer in self.layers] def as_program(self) -> Program: # https://github.com/Flax-Network/clvm/pull/102 # https://github.com/Flax-Network/clvm/pull/106 return Program.to([self.sibling_sides_integer(), self.sibling_hashes()]) # type: ignore[no-any-return] def valid(self) -> bool: existing_hash = self.node_hash for layer in self.layers: calculated_hash = calculate_internal_hash( hash=existing_hash, other_hash_side=layer.other_hash_side, other_hash=layer.other_hash ) if calculated_hash != layer.combined_hash: return False existing_hash = calculated_hash if existing_hash != self.root_hash: return False return True @dataclass(frozen=True) class InternalNode: hash: bytes32 # generation: int left_hash: bytes32 right_hash: bytes32 pair: Optional[Tuple[Node, Node]] = None atom: None = None @classmethod def from_row(cls, row: aiosqlite.Row) -> "InternalNode": return cls( hash=bytes32(row["hash"]), # generation=row["generation"], left_hash=bytes32(row["left"]), right_hash=bytes32(row["right"]), ) def other_child_hash(self, hash: bytes32) -> bytes32: if self.left_hash == hash: return self.right_hash elif self.right_hash == hash: return self.left_hash # TODO: real exception considerations raise Exception("provided hash not present") def other_child_side(self, hash: bytes32) -> Side: if self.left_hash == hash: return Side.RIGHT elif self.right_hash == hash: return Side.LEFT # TODO: real exception considerations raise Exception("provided hash not present") @dataclass(frozen=True) class Root: tree_id: bytes32 node_hash: Optional[bytes32] generation: int status: Status @classmethod def from_row(cls, row: aiosqlite.Row) -> "Root": raw_node_hash = row["node_hash"] if raw_node_hash is None: node_hash = None else: node_hash = bytes32(raw_node_hash) return cls( tree_id=bytes32(row["tree_id"]), node_hash=node_hash, generation=row["generation"], status=Status(row["status"]), ) node_type_to_class: Dict[NodeType, Union[Type[InternalNode], Type[TerminalNode]]] = { NodeType.INTERNAL: InternalNode, NodeType.TERMINAL: TerminalNode, } @dataclass(frozen=True) class ServerInfo: url: str num_consecutive_failures: int ignore_till: int @dataclass(frozen=True) class Subscription: tree_id: bytes32 servers_info: List[ServerInfo] @dataclass(frozen=True) class DiffData: type: OperationType key: bytes value: bytes @streamable @dataclass(frozen=True) class SerializedNode(Streamable): is_terminal: bool value1: bytes value2: bytes @final @dataclasses.dataclass(frozen=True) class KeyValue: key: bytes value: bytes @classmethod def unmarshal(cls, marshalled: Dict[str, Any]) -> KeyValue: return cls( key=hexstr_to_bytes(marshalled["key"]), value=hexstr_to_bytes(marshalled["value"]), ) def marshal(self) -> Dict[str, Any]: return { "key": self.key.hex(), "value": self.value.hex(), } @dataclasses.dataclass(frozen=True) class OfferStore: store_id: bytes32 inclusions: Tuple[KeyValue, ...] @classmethod def unmarshal(cls, marshalled: Dict[str, Any]) -> OfferStore: return cls( store_id=bytes32.from_hexstr(marshalled["store_id"]), inclusions=tuple(KeyValue.unmarshal(key_value) for key_value in marshalled["inclusions"]), ) def marshal(self) -> Dict[str, Any]: return { "store_id": self.store_id.hex(), "inclusions": [key_value.marshal() for key_value in self.inclusions], } @dataclasses.dataclass(frozen=True) class Layer: # This class is similar to flax.data_layer.data_layer_util.ProofOfInclusionLayer # but is being retained for now to keep the API schema definition localized here. other_hash_side: Side other_hash: bytes32 combined_hash: bytes32 @classmethod def unmarshal(cls, marshalled: Dict[str, Any]) -> Layer: return cls( other_hash_side=Side.unmarshal(marshalled["other_hash_side"]), other_hash=bytes32.from_hexstr(marshalled["other_hash"]), combined_hash=bytes32.from_hexstr(marshalled["combined_hash"]), ) def marshal(self) -> Dict[str, Any]: return { "other_hash_side": self.other_hash_side.marshal(), "other_hash": self.other_hash.hex(), "combined_hash": self.combined_hash.hex(), } @dataclasses.dataclass(frozen=True) class MakeOfferRequest: maker: Tuple[OfferStore, ...] taker: Tuple[OfferStore, ...] fee: Optional[uint64] @classmethod def unmarshal(cls, marshalled: Dict[str, Any]) -> MakeOfferRequest: return cls( maker=tuple(OfferStore.unmarshal(offer_store) for offer_store in marshalled["maker"]), taker=tuple(OfferStore.unmarshal(offer_store) for offer_store in marshalled["taker"]), fee=None if marshalled["fee"] is None else uint64(marshalled["fee"]), ) def marshal(self) -> Dict[str, Any]: return { "maker": [offer_store.marshal() for offer_store in self.maker], "taker": [offer_store.marshal() for offer_store in self.taker], "fee": None if self.fee is None else int(self.fee), } @dataclasses.dataclass(frozen=True) class Proof: key: bytes value: bytes node_hash: bytes32 layers: Tuple[Layer, ...] @classmethod def unmarshal(cls, marshalled: Dict[str, Any]) -> Proof: return cls( key=hexstr_to_bytes(marshalled["key"]), value=hexstr_to_bytes(marshalled["value"]), node_hash=bytes32.from_hexstr(marshalled["node_hash"]), layers=tuple(Layer.unmarshal(layer) for layer in marshalled["layers"]), ) def root(self) -> bytes32: if len(self.layers) == 0: return self.node_hash return self.layers[-1].combined_hash def marshal(self) -> Dict[str, Any]: return { "key": self.key.hex(), "value": self.value.hex(), "node_hash": self.node_hash.hex(), "layers": [layer.marshal() for layer in self.layers], } @dataclasses.dataclass(frozen=True) class StoreProofs: store_id: bytes32 proofs: Tuple[Proof, ...] @classmethod def unmarshal(cls, marshalled: Dict[str, Any]) -> StoreProofs: return cls( store_id=bytes32.from_hexstr(marshalled["store_id"]), proofs=tuple(Proof.unmarshal(proof) for proof in marshalled["proofs"]), ) def marshal(self) -> Dict[str, Any]: return { "store_id": self.store_id.hex(), "proofs": [proof.marshal() for proof in self.proofs], } @dataclasses.dataclass(frozen=True) class Offer: trade_id: bytes offer: bytes taker: Tuple[OfferStore, ...] maker: Tuple[StoreProofs, ...] @classmethod def unmarshal(cls, marshalled: Dict[str, Any]) -> Offer: return cls( trade_id=bytes32.from_hexstr(marshalled["trade_id"]), offer=hexstr_to_bytes(marshalled["offer"]), taker=tuple(OfferStore.unmarshal(offer_store) for offer_store in marshalled["taker"]), maker=tuple(StoreProofs.unmarshal(store_proof) for store_proof in marshalled["maker"]), ) def marshal(self) -> Dict[str, Any]: return { "trade_id": self.trade_id.hex(), "offer": self.offer.hex(), "taker": [offer_store.marshal() for offer_store in self.taker], "maker": [store_proofs.marshal() for store_proofs in self.maker], } @dataclasses.dataclass(frozen=True) class MakeOfferResponse: success: bool offer: Offer @classmethod def unmarshal(cls, marshalled: Dict[str, Any]) -> MakeOfferResponse: return cls( success=marshalled["success"], offer=Offer.unmarshal(marshalled["offer"]), ) def marshal(self) -> Dict[str, Any]: return { "success": self.success, "offer": self.offer.marshal(), } @dataclasses.dataclass(frozen=True) class TakeOfferRequest: offer: Offer fee: Optional[uint64] @classmethod def unmarshal(cls, marshalled: Dict[str, Any]) -> TakeOfferRequest: return cls( offer=Offer.unmarshal(marshalled["offer"]), fee=None if marshalled["fee"] is None else uint64(marshalled["fee"]), ) def marshal(self) -> Dict[str, Any]: return { "offer": self.offer.marshal(), "fee": None if self.fee is None else int(self.fee), } @dataclasses.dataclass(frozen=True) class TakeOfferResponse: success: bool trade_id: bytes32 @classmethod def unmarshal(cls, marshalled: Dict[str, Any]) -> TakeOfferResponse: return cls( success=marshalled["success"], trade_id=bytes32.from_hexstr(marshalled["trade_id"]), ) def marshal(self) -> Dict[str, Any]: return { "success": self.success, "trade_id": self.trade_id.hex(), } @final @dataclasses.dataclass(frozen=True) class VerifyOfferResponse: success: bool valid: bool error: Optional[str] = None fee: Optional[uint64] = None @classmethod def unmarshal(cls, marshalled: Dict[str, Any]) -> VerifyOfferResponse: return cls( success=marshalled["success"], valid=marshalled["valid"], error=marshalled["error"], fee=None if marshalled["fee"] is None else uint64(marshalled["fee"]), ) def marshal(self) -> Dict[str, Any]: return { "success": self.success, "valid": self.valid, "error": self.error, "fee": None if self.fee is None else int(self.fee), } @dataclasses.dataclass(frozen=True) class CancelOfferRequest: trade_id: bytes32 # cancel on chain (secure) vs. just locally secure: bool fee: Optional[uint64] @classmethod def unmarshal(cls, marshalled: Dict[str, Any]) -> CancelOfferRequest: return cls( trade_id=bytes32.from_hexstr(marshalled["trade_id"]), secure=marshalled["secure"], fee=None if marshalled["fee"] is None else uint64(marshalled["fee"]), ) def marshal(self) -> Dict[str, Any]: return { "trade_id": self.trade_id.hex(), "secure": self.secure, "fee": None if self.fee is None else int(self.fee), } @dataclasses.dataclass(frozen=True) class CancelOfferResponse: success: bool @classmethod def unmarshal(cls, marshalled: Dict[str, Any]) -> CancelOfferResponse: return cls( success=marshalled["success"], ) def marshal(self) -> Dict[str, Any]: return { "success": self.success, }
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/data_layer/data_layer.py
flax/data_layer/data_layer.py
from __future__ import annotations import asyncio import logging import random import time import traceback from pathlib import Path from typing import Any, Awaitable, Callable, Dict, List, Optional, Set, Tuple, Union import aiohttp from flax.data_layer.data_layer_errors import KeyNotFoundError from flax.data_layer.data_layer_util import ( DiffData, InternalNode, KeyValue, Layer, Offer, OfferStore, Proof, ProofOfInclusion, ProofOfInclusionLayer, Root, ServerInfo, Status, StoreProofs, Subscription, TerminalNode, leaf_hash, ) from flax.data_layer.data_layer_wallet import DataLayerWallet, Mirror, SingletonRecord, verify_offer from flax.data_layer.data_store import DataStore from flax.data_layer.download_data import insert_from_delta_file, write_files_for_root from flax.rpc.rpc_server import default_get_connections from flax.rpc.wallet_rpc_client import WalletRpcClient from flax.server.outbound_message import NodeType from flax.server.server import FlaxServer from flax.server.ws_connection import WSFlaxConnection from flax.types.blockchain_format.sized_bytes import bytes32 from flax.util.ints import uint32, uint64 from flax.util.path import path_from_root from flax.wallet.trade_record import TradeRecord from flax.wallet.trading.offer import Offer as TradingOffer from flax.wallet.transaction_record import TransactionRecord class DataLayer: data_store: DataStore db_path: Path config: Dict[str, Any] log: logging.Logger wallet_rpc_init: Awaitable[WalletRpcClient] state_changed_callback: Optional[Callable[..., object]] wallet_id: uint64 initialized: bool none_bytes: bytes32 lock: asyncio.Lock _server: Optional[FlaxServer] @property def server(self) -> FlaxServer: # This is a stop gap until the class usage is refactored such the values of # integral attributes are known at creation of the instance. if self._server is None: raise RuntimeError("server not assigned") return self._server def __init__( self, config: Dict[str, Any], root_path: Path, wallet_rpc_init: Awaitable[WalletRpcClient], name: Optional[str] = None, ): if name == "": # TODO: If no code depends on "" counting as 'unspecified' then we do not # need this. name = None self.initialized = False self.config = config self.connection = None self.wallet_rpc_init = wallet_rpc_init self.log = logging.getLogger(name if name is None else __name__) self._shut_down: bool = False db_path_replaced: str = config["database_path"].replace("CHALLENGE", config["selected_network"]) self.db_path = path_from_root(root_path, db_path_replaced) self.db_path.parent.mkdir(parents=True, exist_ok=True) server_files_replaced: str = config.get( "server_files_location", "data_layer/db/server_files_location_CHALLENGE" ).replace("CHALLENGE", config["selected_network"]) self.server_files_location = path_from_root(root_path, server_files_replaced) self.server_files_location.mkdir(parents=True, exist_ok=True) self.none_bytes = bytes32([0] * 32) self.lock = asyncio.Lock() self._server = None def _set_state_changed_callback(self, callback: Callable[..., object]) -> None: self.state_changed_callback = callback async def on_connect(self, connection: WSFlaxConnection) -> None: pass def get_connections(self, request_node_type: Optional[NodeType]) -> List[Dict[str, Any]]: return default_get_connections(server=self.server, request_node_type=request_node_type) def set_server(self, server: FlaxServer) -> None: self._server = server async def _start(self) -> None: self.data_store = await DataStore.create(database=self.db_path) self.wallet_rpc = await self.wallet_rpc_init self.subscription_lock: asyncio.Lock = asyncio.Lock() self.periodically_manage_data_task: asyncio.Task[Any] = asyncio.create_task(self.periodically_manage_data()) def _close(self) -> None: # TODO: review for anything else we need to do here self._shut_down = True async def _await_closed(self) -> None: if self.connection is not None: await self.connection.close() try: self.periodically_manage_data_task.cancel() except asyncio.CancelledError: pass await self.data_store.close() async def create_store( self, fee: uint64, root: bytes32 = bytes32([0] * 32) ) -> Tuple[List[TransactionRecord], bytes32]: txs, tree_id = await self.wallet_rpc.create_new_dl(root, fee) res = await self.data_store.create_tree(tree_id=tree_id) if res is None: self.log.fatal("failed creating store") self.initialized = True return txs, tree_id async def batch_update( self, tree_id: bytes32, changelist: List[Dict[str, Any]], fee: uint64, ) -> TransactionRecord: await self.batch_insert(tree_id=tree_id, changelist=changelist) return await self.publish_update(tree_id=tree_id, fee=fee) async def batch_insert( self, tree_id: bytes32, changelist: List[Dict[str, Any]], ) -> bytes32: async with self.data_store.transaction(): # Make sure we update based on the latest confirmed root. async with self.lock: await self._update_confirmation_status(tree_id=tree_id) pending_root: Optional[Root] = await self.data_store.get_pending_root(tree_id=tree_id) if pending_root is not None: raise Exception("Already have a pending root waiting for confirmation.") # check before any DL changes that this singleton is currently owned by this wallet singleton_records: List[SingletonRecord] = await self.get_owned_stores() if not any(tree_id == singleton.launcher_id for singleton in singleton_records): raise ValueError(f"Singleton with launcher ID {tree_id} is not owned by DL Wallet") t1 = time.monotonic() batch_hash = await self.data_store.insert_batch(tree_id, changelist) t2 = time.monotonic() self.log.info(f"Data store batch update process time: {t2 - t1}.") # todo return empty node hash from get_tree_root if batch_hash is not None: node_hash = batch_hash else: node_hash = self.none_bytes # todo change return node_hash async def publish_update( self, tree_id: bytes32, fee: uint64, ) -> TransactionRecord: # Make sure we update based on the latest confirmed root. async with self.lock: await self._update_confirmation_status(tree_id=tree_id) pending_root: Optional[Root] = await self.data_store.get_pending_root(tree_id=tree_id) if pending_root is None: raise Exception("Latest root is already confirmed.") root_hash = self.none_bytes if pending_root.node_hash is None else pending_root.node_hash transaction_record = await self.wallet_rpc.dl_update_root( launcher_id=tree_id, new_root=root_hash, fee=fee, ) return transaction_record async def get_key_value_hash( self, store_id: bytes32, key: bytes, root_hash: Optional[bytes32] = None, ) -> bytes32: async with self.data_store.transaction(): async with self.lock: await self._update_confirmation_status(tree_id=store_id) node = await self.data_store.get_node_by_key(tree_id=store_id, key=key, root_hash=root_hash) return node.hash async def get_value(self, store_id: bytes32, key: bytes, root_hash: Optional[bytes32] = None) -> Optional[bytes]: async with self.data_store.transaction(): async with self.lock: await self._update_confirmation_status(tree_id=store_id) res = await self.data_store.get_node_by_key(tree_id=store_id, key=key, root_hash=root_hash) if res is None: self.log.error("Failed to fetch key") return None return res.value async def get_keys_values(self, store_id: bytes32, root_hash: Optional[bytes32]) -> List[TerminalNode]: async with self.lock: await self._update_confirmation_status(tree_id=store_id) res = await self.data_store.get_keys_values(store_id, root_hash) if res is None: self.log.error("Failed to fetch keys values") return res async def get_keys(self, store_id: bytes32, root_hash: Optional[bytes32]) -> List[bytes]: async with self.lock: await self._update_confirmation_status(tree_id=store_id) res = await self.data_store.get_keys(store_id, root_hash) return res async def get_ancestors(self, node_hash: bytes32, store_id: bytes32) -> List[InternalNode]: async with self.lock: await self._update_confirmation_status(tree_id=store_id) res = await self.data_store.get_ancestors(node_hash=node_hash, tree_id=store_id) if res is None: self.log.error("Failed to get ancestors") return res async def get_root(self, store_id: bytes32) -> Optional[SingletonRecord]: latest = await self.wallet_rpc.dl_latest_singleton(store_id, True) if latest is None: self.log.error(f"Failed to get root for {store_id.hex()}") return latest async def get_local_root(self, store_id: bytes32) -> Optional[bytes32]: async with self.lock: await self._update_confirmation_status(tree_id=store_id) res = await self.data_store.get_tree_root(tree_id=store_id) if res is None: self.log.error(f"Failed to get root for {store_id.hex()}") return None return res.node_hash async def get_root_history(self, store_id: bytes32) -> List[SingletonRecord]: records = await self.wallet_rpc.dl_history(store_id) if records is None: self.log.error(f"Failed to get root history for {store_id.hex()}") root_history = [] prev: Optional[SingletonRecord] = None for record in records: if prev is None or record.root != prev.root: root_history.append(record) prev = record return root_history async def _update_confirmation_status(self, tree_id: bytes32) -> None: async with self.data_store.transaction(): try: root = await self.data_store.get_tree_root(tree_id=tree_id) except asyncio.CancelledError: raise except Exception: root = None singleton_record: Optional[SingletonRecord] = await self.wallet_rpc.dl_latest_singleton(tree_id, True) if singleton_record is None: return if root is None: pending_root = await self.data_store.get_pending_root(tree_id=tree_id) if pending_root is not None: if pending_root.generation == 0 and pending_root.node_hash is None: await self.data_store.change_root_status(pending_root, Status.COMMITTED) await self.data_store.clear_pending_roots(tree_id=tree_id) return else: root = None if root is None: self.log.info(f"Don't have pending root for {tree_id}.") return if root.generation == singleton_record.generation: return if root.generation > singleton_record.generation: self.log.info( f"Local root ahead of chain root: {root.generation} {singleton_record.generation}. " "Maybe we're doing a batch update." ) return wallet_history = await self.wallet_rpc.dl_history( launcher_id=tree_id, min_generation=uint32(root.generation + 1), max_generation=singleton_record.generation, ) new_hashes = [record.root for record in reversed(wallet_history)] root_hash = self.none_bytes if root.node_hash is None else root.node_hash generation_shift = 0 while len(new_hashes) > 0 and new_hashes[0] == root_hash: generation_shift += 1 new_hashes.pop(0) if generation_shift > 0: await self.data_store.clear_pending_roots(tree_id=tree_id) await self.data_store.shift_root_generations(tree_id=tree_id, shift_size=generation_shift) else: expected_root_hash = None if new_hashes[0] == self.none_bytes else new_hashes[0] pending_root = await self.data_store.get_pending_root(tree_id=tree_id) if ( pending_root is not None and pending_root.generation == root.generation + 1 and pending_root.node_hash == expected_root_hash ): await self.data_store.change_root_status(pending_root, Status.COMMITTED) await self.data_store.build_ancestor_table_for_latest_root(tree_id=tree_id) await self.data_store.clear_pending_roots(tree_id=tree_id) async def fetch_and_validate(self, tree_id: bytes32) -> None: singleton_record: Optional[SingletonRecord] = await self.wallet_rpc.dl_latest_singleton(tree_id, True) if singleton_record is None: self.log.info(f"Fetch data: No singleton record for {tree_id}.") return if singleton_record.generation == uint32(0): self.log.info(f"Fetch data: No data on chain for {tree_id}.") return async with self.lock: await self._update_confirmation_status(tree_id=tree_id) if not await self.data_store.tree_id_exists(tree_id=tree_id): await self.data_store.create_tree(tree_id=tree_id, status=Status.COMMITTED) timestamp = int(time.time()) servers_info = await self.data_store.get_available_servers_for_store(tree_id, timestamp) # TODO: maybe append a random object to the whole DataLayer class? random.shuffle(servers_info) for server_info in servers_info: url = server_info.url root = await self.data_store.get_tree_root(tree_id=tree_id) if root.generation > singleton_record.generation: self.log.info( "Fetch data: local DL store is ahead of chain generation. " f"Local root: {root}. Singleton: {singleton_record}" ) break if root.generation == singleton_record.generation: self.log.info(f"Fetch data: wallet generation matching on-chain generation: {tree_id}.") break self.log.info( f"Downloading files {tree_id}. " f"Current wallet generation: {root.generation}. " f"Target wallet generation: {singleton_record.generation}. " f"Server used: {url}." ) to_download = await self.wallet_rpc.dl_history( launcher_id=tree_id, min_generation=uint32(root.generation + 1), max_generation=singleton_record.generation, ) try: timeout = self.config.get("client_timeout", 15) success = await insert_from_delta_file( self.data_store, tree_id, root.generation, [record.root for record in reversed(to_download)], server_info, self.server_files_location, timeout, self.log, ) if success: self.log.info( f"Finished downloading and validating {tree_id}. " f"Wallet generation saved: {singleton_record.generation}. " f"Root hash saved: {singleton_record.root}." ) break except asyncio.CancelledError: raise except aiohttp.client_exceptions.ClientConnectorError: self.log.warning(f"Server {url} unavailable for {tree_id}.") except Exception as e: self.log.warning(f"Exception while downloading files for {tree_id}: {e} {traceback.format_exc()}.") async def upload_files(self, tree_id: bytes32) -> None: singleton_record: Optional[SingletonRecord] = await self.wallet_rpc.dl_latest_singleton(tree_id, True) if singleton_record is None: self.log.info(f"Upload files: no on-chain record for {tree_id}.") return async with self.lock: await self._update_confirmation_status(tree_id=tree_id) root = await self.data_store.get_tree_root(tree_id=tree_id) publish_generation = min(singleton_record.generation, 0 if root is None else root.generation) # If we make some batch updates, which get confirmed to the chain, we need to create the files. # We iterate back and write the missing files, until we find the files already written. root = await self.data_store.get_tree_root(tree_id=tree_id, generation=publish_generation) while publish_generation > 0 and await write_files_for_root( self.data_store, tree_id, root, self.server_files_location, ): publish_generation -= 1 root = await self.data_store.get_tree_root(tree_id=tree_id, generation=publish_generation) async def add_missing_files(self, store_id: bytes32, overwrite: bool, foldername: Optional[Path]) -> None: root = await self.data_store.get_tree_root(tree_id=store_id) singleton_record: Optional[SingletonRecord] = await self.wallet_rpc.dl_latest_singleton(store_id, True) if singleton_record is None: self.log.error(f"No singleton record found for: {store_id}") return max_generation = min(singleton_record.generation, 0 if root is None else root.generation) server_files_location = foldername if foldername is not None else self.server_files_location for generation in range(1, max_generation + 1): root = await self.data_store.get_tree_root(tree_id=store_id, generation=generation) await write_files_for_root(self.data_store, store_id, root, server_files_location, overwrite) async def subscribe(self, store_id: bytes32, urls: List[str]) -> None: parsed_urls = [url.rstrip("/") for url in urls] subscription = Subscription(store_id, [ServerInfo(url, 0, 0) for url in parsed_urls]) await self.wallet_rpc.dl_track_new(subscription.tree_id) async with self.subscription_lock: await self.data_store.subscribe(subscription) self.log.info(f"Done adding subscription: {subscription.tree_id}") async def remove_subscriptions(self, store_id: bytes32, urls: List[str]) -> None: parsed_urls = [url.rstrip("/") for url in urls] async with self.subscription_lock: await self.data_store.remove_subscriptions(store_id, parsed_urls) async def unsubscribe(self, tree_id: bytes32) -> None: subscriptions = await self.get_subscriptions() if tree_id not in (subscription.tree_id for subscription in subscriptions): raise RuntimeError("No subscription found for the given tree_id.") async with self.subscription_lock: await self.data_store.unsubscribe(tree_id) await self.wallet_rpc.dl_stop_tracking(tree_id) self.log.info(f"Unsubscribed to {tree_id}") async def get_subscriptions(self) -> List[Subscription]: async with self.subscription_lock: return await self.data_store.get_subscriptions() async def add_mirror(self, store_id: bytes32, urls: List[str], amount: uint64, fee: uint64) -> None: bytes_urls = [bytes(url, "utf8") for url in urls] await self.wallet_rpc.dl_new_mirror(store_id, amount, bytes_urls, fee) async def delete_mirror(self, coin_id: bytes32, fee: uint64) -> None: await self.wallet_rpc.dl_delete_mirror(coin_id, fee) async def get_mirrors(self, tree_id: bytes32) -> List[Mirror]: return await self.wallet_rpc.dl_get_mirrors(tree_id) async def update_subscriptions_from_wallet(self, tree_id: bytes32) -> None: mirrors: List[Mirror] = await self.wallet_rpc.dl_get_mirrors(tree_id) urls: List[str] = [] for mirror in mirrors: urls = urls + [url.decode("utf8") for url in mirror.urls] urls = [url.rstrip("/") for url in urls] await self.data_store.update_subscriptions_from_wallet(tree_id, urls) async def get_owned_stores(self) -> List[SingletonRecord]: return await self.wallet_rpc.dl_owned_singletons() async def get_kv_diff(self, tree_id: bytes32, hash_1: bytes32, hash_2: bytes32) -> Set[DiffData]: return await self.data_store.get_kv_diff(tree_id, hash_1, hash_2) async def periodically_manage_data(self) -> None: manage_data_interval = self.config.get("manage_data_interval", 60) while not self._shut_down: async with self.subscription_lock: try: subscriptions = await self.data_store.get_subscriptions() for subscription in subscriptions: await self.wallet_rpc.dl_track_new(subscription.tree_id) break except aiohttp.client_exceptions.ClientConnectorError: pass except asyncio.CancelledError: raise except Exception as e: self.log.error(f"Exception while requesting wallet track subscription: {type(e)} {e}") self.log.warning("Cannot connect to the wallet. Retrying in 3s.") delay_until = time.monotonic() + 3 while time.monotonic() < delay_until: if self._shut_down: break try: await asyncio.sleep(0.1) except asyncio.CancelledError: raise while not self._shut_down: async with self.subscription_lock: subscriptions = await self.data_store.get_subscriptions() # Subscribe to all local tree_ids that we can find on chain. local_tree_ids = await self.data_store.get_tree_ids() subscription_tree_ids = set(subscription.tree_id for subscription in subscriptions) for local_id in local_tree_ids: if local_id not in subscription_tree_ids: try: await self.subscribe(local_id, []) except asyncio.CancelledError: raise except Exception as e: self.log.info( f"Can't subscribe to locally stored {local_id}: {type(e)} {e} {traceback.format_exc()}" ) async with self.subscription_lock: for subscription in subscriptions: try: await self.update_subscriptions_from_wallet(subscription.tree_id) await self.fetch_and_validate(subscription.tree_id) await self.upload_files(subscription.tree_id) except asyncio.CancelledError: raise except Exception as e: self.log.error(f"Exception while fetching data: {type(e)} {e} {traceback.format_exc()}.") try: await asyncio.sleep(manage_data_interval) except asyncio.CancelledError: raise async def build_offer_changelist( self, store_id: bytes32, inclusions: Tuple[KeyValue, ...], ) -> List[Dict[str, Any]]: async with self.data_store.transaction(): changelist: List[Dict[str, Any]] = [] for entry in inclusions: try: existing_value = await self.get_value(store_id=store_id, key=entry.key) except KeyNotFoundError: existing_value = None if existing_value == entry.value: # already present, nothing needed continue if existing_value is not None: # upsert, delete the existing key and value changelist.append( { "action": "delete", "key": entry.key, } ) changelist.append( { "action": "insert", "key": entry.key, "value": entry.value, } ) return changelist async def process_offered_stores(self, offer_stores: Tuple[OfferStore, ...]) -> Dict[bytes32, StoreProofs]: async with self.data_store.transaction(): our_store_proofs: Dict[bytes32, StoreProofs] = {} for offer_store in offer_stores: async with self.lock: await self._update_confirmation_status(tree_id=offer_store.store_id) changelist = await self.build_offer_changelist( store_id=offer_store.store_id, inclusions=offer_store.inclusions, ) if len(changelist) > 0: new_root_hash = await self.batch_insert( tree_id=offer_store.store_id, changelist=changelist, ) else: existing_root = await self.get_root(store_id=offer_store.store_id) if existing_root is None: raise Exception(f"store id not available: {offer_store.store_id.hex()}") new_root_hash = existing_root.root if new_root_hash is None: raise Exception("only inserts are supported so a None root hash should not be possible") proofs: List[Proof] = [] for entry in offer_store.inclusions: node_hash = await self.get_key_value_hash( store_id=offer_store.store_id, key=entry.key, root_hash=new_root_hash, ) proof_of_inclusion = await self.data_store.get_proof_of_inclusion_by_hash( node_hash=node_hash, tree_id=offer_store.store_id, root_hash=new_root_hash, ) proof = Proof( key=entry.key, value=entry.value, node_hash=proof_of_inclusion.node_hash, layers=tuple( Layer( other_hash_side=layer.other_hash_side, other_hash=layer.other_hash, combined_hash=layer.combined_hash, ) for layer in proof_of_inclusion.layers ), ) proofs.append(proof) store_proof = StoreProofs(store_id=offer_store.store_id, proofs=tuple(proofs)) our_store_proofs[offer_store.store_id] = store_proof return our_store_proofs async def make_offer( self, maker: Tuple[OfferStore, ...], taker: Tuple[OfferStore, ...], fee: uint64, ) -> Offer: async with self.data_store.transaction(): our_store_proofs = await self.process_offered_stores(offer_stores=maker) offer_dict: Dict[Union[uint32, str], int] = { **{offer_store.store_id.hex(): -1 for offer_store in maker}, **{offer_store.store_id.hex(): 1 for offer_store in taker}, } solver: Dict[str, Any] = { "0x" + our_offer_store.store_id.hex(): { "new_root": "0x" + our_store_proofs[our_offer_store.store_id].proofs[0].root().hex(), "dependencies": [ { "launcher_id": "0x" + their_offer_store.store_id.hex(), "values_to_prove": [ "0x" + leaf_hash(key=entry.key, value=entry.value).hex() for entry in their_offer_store.inclusions ], } for their_offer_store in taker ], } for our_offer_store in maker } wallet_offer, trade_record = await self.wallet_rpc.create_offer_for_ids( offer_dict=offer_dict, solver=solver, driver_dict={}, fee=fee, validate_only=False, ) if wallet_offer is None: raise Exception("offer is None despite validate_only=False") offer = Offer( trade_id=trade_record.trade_id, offer=bytes(wallet_offer), taker=taker, maker=tuple(our_store_proofs.values()), ) # being extra careful and verifying the offer before returning it trading_offer = TradingOffer.from_bytes(offer.offer) summary = await DataLayerWallet.get_offer_summary(offer=trading_offer) verify_offer(maker=offer.maker, taker=offer.taker, summary=summary) return offer async def take_offer( self, offer_bytes: bytes, taker: Tuple[OfferStore, ...], maker: Tuple[StoreProofs, ...], fee: uint64, ) -> TradeRecord: async with self.data_store.transaction(): our_store_proofs = await self.process_offered_stores(offer_stores=taker) offer = TradingOffer.from_bytes(offer_bytes) summary = await DataLayerWallet.get_offer_summary(offer=offer) verify_offer(maker=maker, taker=taker, summary=summary) all_store_proofs: Dict[bytes32, StoreProofs] = { store_proofs.proofs[0].root(): store_proofs for store_proofs in [*maker, *our_store_proofs.values()] } proofs_of_inclusion: List[Tuple[str, str, List[str]]] = [] for root, store_proofs in all_store_proofs.items(): for proof in store_proofs.proofs: layers = [ ProofOfInclusionLayer( combined_hash=layer.combined_hash, other_hash_side=layer.other_hash_side, other_hash=layer.other_hash, ) for layer in proof.layers ] proof_of_inclusion = ProofOfInclusion(node_hash=proof.node_hash, layers=layers) sibling_sides_integer = proof_of_inclusion.sibling_sides_integer() proofs_of_inclusion.append( ( root.hex(), str(sibling_sides_integer), ["0x" + sibling_hash.hex() for sibling_hash in proof_of_inclusion.sibling_hashes()], ) ) solver: Dict[str, Any] = { "proofs_of_inclusion": proofs_of_inclusion, **{ "0x" + our_offer_store.store_id.hex(): { "new_root": "0x" + root.hex(), "dependencies": [ {
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
true
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/data_layer/util/benchmark.py
flax/data_layer/util/benchmark.py
from __future__ import annotations import asyncio import os import sys import tempfile import time from pathlib import Path from typing import Dict, Optional from flax.data_layer.data_layer_util import Side, TerminalNode, leaf_hash from flax.data_layer.data_store import DataStore from flax.types.blockchain_format.sized_bytes import bytes32 async def generate_datastore(num_nodes: int, slow_mode: bool) -> None: with tempfile.TemporaryDirectory() as temp_directory: temp_directory_path = Path(temp_directory) db_path = temp_directory_path.joinpath("dl_benchmark.sqlite") print(f"Writing DB to {db_path}") if os.path.exists(db_path): os.remove(db_path) data_store = await DataStore.create(database=db_path) try: hint_keys_values: Dict[bytes, bytes] = {} tree_id = bytes32(b"0" * 32) await data_store.create_tree(tree_id) insert_time = 0.0 insert_count = 0 autoinsert_time = 0.0 autoinsert_count = 0 delete_time = 0.0 delete_count = 0 for i in range(num_nodes): key = i.to_bytes(4, byteorder="big") value = (2 * i).to_bytes(4, byteorder="big") seed = leaf_hash(key=key, value=value) reference_node_hash: Optional[bytes32] = await data_store.get_terminal_node_for_seed(tree_id, seed) side: Optional[Side] = data_store.get_side_for_seed(seed) if i == 0: reference_node_hash = None side = None if i % 3 == 0: t1 = time.time() if not slow_mode: await data_store.insert( key=key, value=value, tree_id=tree_id, reference_node_hash=reference_node_hash, side=side, hint_keys_values=hint_keys_values, ) else: await data_store.insert( key=key, value=value, tree_id=tree_id, reference_node_hash=reference_node_hash, side=side, use_optimized=False, ) t2 = time.time() insert_time += t2 - t1 insert_count += 1 elif i % 3 == 1: t1 = time.time() if not slow_mode: await data_store.autoinsert( key=key, value=value, tree_id=tree_id, hint_keys_values=hint_keys_values, ) else: await data_store.autoinsert( key=key, value=value, tree_id=tree_id, use_optimized=False, ) t2 = time.time() autoinsert_time += t2 - t1 autoinsert_count += 1 else: t1 = time.time() assert reference_node_hash is not None node = await data_store.get_node(reference_node_hash) assert isinstance(node, TerminalNode) if not slow_mode: await data_store.delete(key=node.key, tree_id=tree_id, hint_keys_values=hint_keys_values) else: await data_store.delete(key=node.key, tree_id=tree_id, use_optimized=False) t2 = time.time() delete_time += t2 - t1 delete_count += 1 print(f"Average insert time: {insert_time / insert_count}") print(f"Average autoinsert time: {autoinsert_time / autoinsert_count}") print(f"Average delete time: {delete_time / delete_count}") print(f"Total time for {num_nodes} operations: {insert_time + autoinsert_time + delete_time}") root = await data_store.get_tree_root(tree_id=tree_id) print(f"Root hash: {root.node_hash}") finally: await data_store.close() if __name__ == "__main__": slow_mode = False if len(sys.argv) > 2 and sys.argv[2] == "slow": slow_mode = True asyncio.run(generate_datastore(int(sys.argv[1]), slow_mode))
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/data_layer/util/__init__.py
flax/data_layer/util/__init__.py
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/clvm/spend_sim.py
flax/clvm/spend_sim.py
import random from pathlib import Path from dataclasses import dataclass from typing import Optional, List, Dict, Tuple, Any, Type, TypeVar from flax.types.blockchain_format.sized_bytes import bytes32 from flax.types.blockchain_format.coin import Coin from flax.types.mempool_item import MempoolItem from flax.util.ints import uint64, uint32 from flax.util.hash import std_hash from flax.util.errors import Err, ValidationError from flax.util.db_wrapper import DBWrapper2 from flax.util.streamable import Streamable, streamable from flax.types.coin_record import CoinRecord from flax.types.spend_bundle import SpendBundle from flax.types.generator_types import BlockGenerator from flax.types.mempool_inclusion_status import MempoolInclusionStatus from flax.types.coin_spend import CoinSpend from flax.full_node.bundle_tools import simple_solution_generator from flax.full_node.mempool_manager import MempoolManager from flax.full_node.coin_store import CoinStore from flax.full_node.mempool_check_conditions import get_puzzle_and_solution_for_coin from flax.consensus.constants import ConsensusConstants from flax.consensus.default_constants import DEFAULT_CONSTANTS from flax.consensus.coinbase import create_pool_coin, create_farmer_coin from flax.consensus.block_rewards import calculate_pool_reward, calculate_base_farmer_reward from flax.consensus.cost_calculator import NPCResult """ The purpose of this file is to provide a lightweight simulator for the testing of Flaxlisp smart contracts. The Node object uses actual MempoolManager, Mempool and CoinStore objects, while substituting FullBlock and BlockRecord objects for trimmed down versions. There is also a provided NodeClient object which implements many of the methods from flax.rpc.full_node_rpc_client and is designed so that you could test with it and then swap in a real rpc client that uses the same code you tested. """ @streamable @dataclass(frozen=True) class SimFullBlock(Streamable): transactions_generator: Optional[BlockGenerator] height: uint32 # Note that height is not on a regular FullBlock _T_SimBlockRecord = TypeVar("_T_SimBlockRecord", bound="SimBlockRecord") @streamable @dataclass(frozen=True) class SimBlockRecord(Streamable): reward_claims_incorporated: List[Coin] height: uint32 prev_transaction_block_height: uint32 timestamp: uint64 is_transaction_block: bool header_hash: bytes32 prev_transaction_block_hash: bytes32 @classmethod def create(cls: Type[_T_SimBlockRecord], rci: List[Coin], height: uint32, timestamp: uint64) -> _T_SimBlockRecord: return cls( rci, height, uint32(height - 1 if height > 0 else 0), timestamp, True, std_hash(bytes(height)), std_hash(std_hash(height)), ) @streamable @dataclass(frozen=True) class SimStore(Streamable): timestamp: uint64 block_height: uint32 block_records: List[SimBlockRecord] blocks: List[SimFullBlock] _T_SpendSim = TypeVar("_T_SpendSim", bound="SpendSim") class SpendSim: db_wrapper: DBWrapper2 mempool_manager: MempoolManager block_records: List[SimBlockRecord] blocks: List[SimFullBlock] timestamp: uint64 block_height: uint32 defaults: ConsensusConstants @classmethod async def create( cls: Type[_T_SpendSim], db_path: Optional[Path] = None, defaults: ConsensusConstants = DEFAULT_CONSTANTS ) -> _T_SpendSim: self = cls() if db_path is None: uri = f"file:db_{random.randint(0, 99999999)}?mode=memory&cache=shared" else: uri = f"file:{db_path}" self.db_wrapper = await DBWrapper2.create(database=uri, uri=True, reader_count=1) coin_store = await CoinStore.create(self.db_wrapper) self.mempool_manager = MempoolManager(coin_store, defaults) self.defaults = defaults # Load the next data if there is any async with self.db_wrapper.writer_maybe_transaction() as conn: await conn.execute("CREATE TABLE IF NOT EXISTS block_data(data blob PRIMARY_KEY)") cursor = await conn.execute("SELECT * from block_data") row = await cursor.fetchone() await cursor.close() if row is not None: store_data = SimStore.from_bytes(row[0]) self.timestamp = store_data.timestamp self.block_height = store_data.block_height self.block_records = store_data.block_records self.blocks = store_data.blocks # Create a protocol to make BlockRecord and SimBlockRecord interchangeable. self.mempool_manager.peak = self.block_records[-1] # type: ignore[assignment] else: self.timestamp = uint64(1) self.block_height = uint32(0) self.block_records = [] self.blocks = [] return self async def close(self) -> None: async with self.db_wrapper.writer_maybe_transaction() as conn: c = await conn.execute("DELETE FROM block_data") await c.close() c = await conn.execute( "INSERT INTO block_data VALUES(?)", (bytes(SimStore(self.timestamp, self.block_height, self.block_records, self.blocks)),), ) await c.close() await self.db_wrapper.close() async def new_peak(self) -> None: # Create a protocol to make BlockRecord and SimBlockRecord interchangeable. await self.mempool_manager.new_peak(self.block_records[-1], None) # type: ignore[arg-type] def new_coin_record(self, coin: Coin, coinbase: bool = False) -> CoinRecord: return CoinRecord( coin, uint32(self.block_height + 1), uint32(0), coinbase, self.timestamp, ) async def all_non_reward_coins(self) -> List[Coin]: coins = set() async with self.mempool_manager.coin_store.db_wrapper.reader_no_transaction() as conn: cursor = await conn.execute( "SELECT * from coin_record WHERE coinbase=0 AND spent=0 ", ) rows = await cursor.fetchall() await cursor.close() for row in rows: coin = Coin(bytes32(bytes.fromhex(row[6])), bytes32(bytes.fromhex(row[5])), uint64.from_bytes(row[7])) coins.add(coin) return list(coins) async def generate_transaction_generator(self, bundle: Optional[SpendBundle]) -> Optional[BlockGenerator]: if bundle is None: return None return simple_solution_generator(bundle) async def farm_block(self, puzzle_hash: bytes32 = bytes32(b"0" * 32)) -> Tuple[List[Coin], List[Coin]]: # Fees get calculated fees = uint64(0) if self.mempool_manager.mempool.spends: for _, item in self.mempool_manager.mempool.spends.items(): fees = uint64(fees + item.spend_bundle.fees()) # Rewards get created next_block_height: uint32 = uint32(self.block_height + 1) if len(self.block_records) > 0 else self.block_height pool_coin: Coin = create_pool_coin( next_block_height, puzzle_hash, calculate_pool_reward(next_block_height), self.defaults.GENESIS_CHALLENGE, ) farmer_coin: Coin = create_farmer_coin( next_block_height, puzzle_hash, uint64(calculate_base_farmer_reward(next_block_height) + fees), self.defaults.GENESIS_CHALLENGE, ) await self.mempool_manager.coin_store._add_coin_records( [self.new_coin_record(pool_coin, True), self.new_coin_record(farmer_coin, True)] ) # Coin store gets updated generator_bundle: Optional[SpendBundle] = None return_additions: List[Coin] = [] return_removals: List[Coin] = [] if (len(self.block_records) > 0) and (self.mempool_manager.mempool.spends): peak = self.mempool_manager.peak if peak is not None: result = await self.mempool_manager.create_bundle_from_mempool(peak.header_hash) if result is not None: bundle, additions, removals = result generator_bundle = bundle return_additions = additions return_removals = removals await self.mempool_manager.coin_store._add_coin_records( [self.new_coin_record(addition) for addition in additions] ) await self.mempool_manager.coin_store._set_spent( [r.name() for r in removals], uint32(self.block_height + 1) ) # SimBlockRecord is created generator: Optional[BlockGenerator] = await self.generate_transaction_generator(generator_bundle) self.block_records.append( SimBlockRecord.create( [pool_coin, farmer_coin], next_block_height, self.timestamp, ) ) self.blocks.append(SimFullBlock(generator, next_block_height)) # block_height is incremented self.block_height = next_block_height # mempool is reset await self.new_peak() # return some debugging data return return_additions, return_removals def get_height(self) -> uint32: return self.block_height def pass_time(self, time: uint64) -> None: self.timestamp = uint64(self.timestamp + time) def pass_blocks(self, blocks: uint32) -> None: self.block_height = uint32(self.block_height + blocks) async def rewind(self, block_height: uint32) -> None: new_br_list = list(filter(lambda br: br.height <= block_height, self.block_records)) new_block_list = list(filter(lambda block: block.height <= block_height, self.blocks)) self.block_records = new_br_list self.blocks = new_block_list await self.mempool_manager.coin_store.rollback_to_block(block_height) self.mempool_manager.mempool.spends = {} self.block_height = block_height if new_br_list: self.timestamp = new_br_list[-1].timestamp else: self.timestamp = uint64(1) class SimClient: def __init__(self, service: SpendSim) -> None: self.service = service async def push_tx(self, spend_bundle: SpendBundle) -> Tuple[MempoolInclusionStatus, Optional[Err]]: try: cost_result: NPCResult = await self.service.mempool_manager.pre_validate_spendbundle( spend_bundle, None, spend_bundle.name() ) except ValidationError as e: return MempoolInclusionStatus.FAILED, e.code cost, status, error = await self.service.mempool_manager.add_spend_bundle( spend_bundle, cost_result, spend_bundle.name() ) return status, error async def get_coin_record_by_name(self, name: bytes32) -> Optional[CoinRecord]: return await self.service.mempool_manager.coin_store.get_coin_record(name) async def get_coin_records_by_names( self, names: List[bytes32], start_height: Optional[int] = None, end_height: Optional[int] = None, include_spent_coins: bool = False, ) -> List[CoinRecord]: kwargs: Dict[str, Any] = {"include_spent_coins": include_spent_coins, "names": names} if start_height is not None: kwargs["start_height"] = start_height if end_height is not None: kwargs["end_height"] = end_height return await self.service.mempool_manager.coin_store.get_coin_records_by_names(**kwargs) async def get_coin_records_by_parent_ids( self, parent_ids: List[bytes32], start_height: Optional[int] = None, end_height: Optional[int] = None, include_spent_coins: bool = False, ) -> List[CoinRecord]: kwargs: Dict[str, Any] = {"include_spent_coins": include_spent_coins, "parent_ids": parent_ids} if start_height is not None: kwargs["start_height"] = start_height if end_height is not None: kwargs["end_height"] = end_height return await self.service.mempool_manager.coin_store.get_coin_records_by_parent_ids(**kwargs) async def get_coin_records_by_puzzle_hash( self, puzzle_hash: bytes32, include_spent_coins: bool = True, start_height: Optional[int] = None, end_height: Optional[int] = None, ) -> List[CoinRecord]: kwargs: Dict[str, Any] = {"include_spent_coins": include_spent_coins, "puzzle_hash": puzzle_hash} if start_height is not None: kwargs["start_height"] = start_height if end_height is not None: kwargs["end_height"] = end_height return await self.service.mempool_manager.coin_store.get_coin_records_by_puzzle_hash(**kwargs) async def get_coin_records_by_puzzle_hashes( self, puzzle_hashes: List[bytes32], include_spent_coins: bool = True, start_height: Optional[int] = None, end_height: Optional[int] = None, ) -> List[CoinRecord]: kwargs: Dict[str, Any] = {"include_spent_coins": include_spent_coins, "puzzle_hashes": puzzle_hashes} if start_height is not None: kwargs["start_height"] = start_height if end_height is not None: kwargs["end_height"] = end_height return await self.service.mempool_manager.coin_store.get_coin_records_by_puzzle_hashes(**kwargs) async def get_block_record_by_height(self, height: uint32) -> SimBlockRecord: return list(filter(lambda block: block.height == height, self.service.block_records))[0] async def get_block_record(self, header_hash: bytes32) -> SimBlockRecord: return list(filter(lambda block: block.header_hash == header_hash, self.service.block_records))[0] async def get_block_records(self, start: uint32, end: uint32) -> List[SimBlockRecord]: return list(filter(lambda block: (block.height >= start) and (block.height < end), self.service.block_records)) async def get_block(self, header_hash: bytes32) -> SimFullBlock: selected_block: SimBlockRecord = list( filter(lambda br: br.header_hash == header_hash, self.service.block_records) )[0] block_height: uint32 = selected_block.height block: SimFullBlock = list(filter(lambda block: block.height == block_height, self.service.blocks))[0] return block async def get_all_block(self, start: uint32, end: uint32) -> List[SimFullBlock]: return list(filter(lambda block: (block.height >= start) and (block.height < end), self.service.blocks)) async def get_additions_and_removals(self, header_hash: bytes32) -> Tuple[List[CoinRecord], List[CoinRecord]]: selected_block: SimBlockRecord = list( filter(lambda br: br.header_hash == header_hash, self.service.block_records) )[0] block_height: uint32 = selected_block.height additions: List[CoinRecord] = await self.service.mempool_manager.coin_store.get_coins_added_at_height( block_height ) # noqa removals: List[CoinRecord] = await self.service.mempool_manager.coin_store.get_coins_removed_at_height( block_height ) # noqa return additions, removals async def get_puzzle_and_solution(self, coin_id: bytes32, height: uint32) -> Optional[CoinSpend]: filtered_generators = list(filter(lambda block: block.height == height, self.service.blocks)) # real consideration should be made for the None cases instead of just hint ignoring generator: BlockGenerator = filtered_generators[0].transactions_generator # type: ignore[assignment] coin_record: CoinRecord coin_record = await self.service.mempool_manager.coin_store.get_coin_record( # type: ignore[assignment] coin_id, ) error, puzzle, solution = get_puzzle_and_solution_for_coin(generator, coin_record.coin) if error: return None else: assert puzzle is not None assert solution is not None return CoinSpend(coin_record.coin, puzzle, solution) async def get_all_mempool_tx_ids(self) -> List[bytes32]: return list(self.service.mempool_manager.mempool.spends.keys()) async def get_all_mempool_items(self) -> Dict[bytes32, MempoolItem]: spends = {} for tx_id, item in self.service.mempool_manager.mempool.spends.items(): spends[tx_id] = item return spends async def get_mempool_item_by_tx_id(self, tx_id: bytes32) -> Optional[Dict[str, Any]]: item = self.service.mempool_manager.get_mempool_item(tx_id) if item is None: return None else: return item.__dict__
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/clvm/singleton.py
flax/clvm/singleton.py
from __future__ import annotations from flax.wallet.puzzles.load_clvm import load_clvm_maybe_recompile P2_SINGLETON_MOD = load_clvm_maybe_recompile("p2_singleton.clvm") SINGLETON_TOP_LAYER_MOD = load_clvm_maybe_recompile("singleton_top_layer.clvm") SINGLETON_LAUNCHER = load_clvm_maybe_recompile("singleton_launcher.clvm")
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/clvm/__init__.py
flax/clvm/__init__.py
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/rpc/crawler_rpc_api.py
flax/rpc/crawler_rpc_api.py
from __future__ import annotations import ipaddress from typing import Any, Dict, List, Optional from flax.rpc.rpc_server import Endpoint, EndpointResult from flax.seeder.crawler import Crawler from flax.util.ws_message import WsRpcMessage, create_payload_dict class CrawlerRpcApi: def __init__(self, crawler: Crawler): self.service = crawler self.service_name = "flax_crawler" def get_routes(self) -> Dict[str, Endpoint]: return { "/get_peer_counts": self.get_peer_counts, "/get_ips_after_timestamp": self.get_ips_after_timestamp, } async def _state_changed(self, change: str, change_data: Optional[Dict[str, Any]] = None) -> List[WsRpcMessage]: payloads = [] if change_data is None: change_data = await self.get_peer_counts({}) if change in ("crawl_batch_completed", "loaded_initial_peers"): payloads.append(create_payload_dict(change, change_data, self.service_name, "metrics")) return payloads async def get_peer_counts(self, _request: Dict) -> EndpointResult: ipv6_addresses_count = 0 for host in self.service.best_timestamp_per_peer.keys(): try: ipaddress.IPv6Address(host) ipv6_addresses_count += 1 except ipaddress.AddressValueError: continue reliable_peers = 0 if self.service.crawl_store is not None: reliable_peers = self.service.crawl_store.get_reliable_peers() data = { "peer_counts": { "total_last_5_days": len(self.service.best_timestamp_per_peer), "reliable_nodes": reliable_peers, "ipv4_last_5_days": len(self.service.best_timestamp_per_peer) - ipv6_addresses_count, "ipv6_last_5_days": ipv6_addresses_count, "versions": self.service.versions, } } return data async def get_ips_after_timestamp(self, _request: Dict) -> EndpointResult: after = _request.get("after", None) if after is None: raise ValueError("`after` is required and must be a unix timestamp") offset = _request.get("offset", 0) limit = _request.get("limit", 10000) matched_ips: List[str] = [] for ip, timestamp in self.service.best_timestamp_per_peer.items(): if timestamp > after: matched_ips.append(ip) matched_ips.sort() return { "ips": matched_ips[offset : (offset + limit)], "total": len(matched_ips), }
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/rpc/data_layer_rpc_api.py
flax/rpc/data_layer_rpc_api.py
from __future__ import annotations import dataclasses from pathlib import Path from typing import TYPE_CHECKING, Any, Dict, List, Optional from flax.data_layer.data_layer_errors import OfferIntegrityError from flax.data_layer.data_layer_util import ( CancelOfferRequest, CancelOfferResponse, MakeOfferRequest, MakeOfferResponse, Side, Subscription, TakeOfferRequest, TakeOfferResponse, VerifyOfferResponse, ) from flax.data_layer.data_layer_wallet import DataLayerWallet, Mirror, verify_offer from flax.rpc.data_layer_rpc_util import marshal from flax.rpc.rpc_server import Endpoint, EndpointResult from flax.types.blockchain_format.sized_bytes import bytes32 from flax.util.byte_types import hexstr_to_bytes # todo input assertions for all rpc's from flax.util.ints import uint64 from flax.util.streamable import recurse_jsonify from flax.util.ws_message import WsRpcMessage from flax.wallet.trading.offer import Offer as TradingOffer if TYPE_CHECKING: from flax.data_layer.data_layer import DataLayer def process_change(change: Dict[str, Any]) -> Dict[str, Any]: # TODO: A full class would likely be nice for this so downstream doesn't # have to deal with maybe-present attributes or Dict[str, Any] hints. reference_node_hash = change.get("reference_node_hash") if reference_node_hash is not None: reference_node_hash = bytes32(hexstr_to_bytes(reference_node_hash)) side = change.get("side") if side is not None: side = Side(side) value = change.get("value") if value is not None: value = hexstr_to_bytes(value) return { **change, "key": hexstr_to_bytes(change["key"]), "value": value, "reference_node_hash": reference_node_hash, "side": side, } def get_fee(config: Dict[str, Any], request: Dict[str, Any]) -> uint64: fee = request.get("fee") if fee is None: config_fee = config.get("fee", 0) return uint64(config_fee) return uint64(fee) class DataLayerRpcApi: # TODO: other RPC APIs do not accept a wallet and the service start does not expect to provide one def __init__(self, data_layer: DataLayer): # , wallet: DataLayerWallet): self.service: DataLayer = data_layer self.service_name = "flax_data_layer" def get_routes(self) -> Dict[str, Endpoint]: return { "/create_data_store": self.create_data_store, "/get_owned_stores": self.get_owned_stores, "/batch_update": self.batch_update, "/get_value": self.get_value, "/get_keys": self.get_keys, "/get_keys_values": self.get_keys_values, "/get_ancestors": self.get_ancestors, "/get_root": self.get_root, "/get_local_root": self.get_local_root, "/get_roots": self.get_roots, "/delete_key": self.delete_key, "/insert": self.insert, "/subscribe": self.subscribe, "/unsubscribe": self.unsubscribe, "/add_mirror": self.add_mirror, "/delete_mirror": self.delete_mirror, "/get_mirrors": self.get_mirrors, "/remove_subscriptions": self.remove_subscriptions, "/subscriptions": self.subscriptions, "/get_kv_diff": self.get_kv_diff, "/get_root_history": self.get_root_history, "/add_missing_files": self.add_missing_files, "/make_offer": self.make_offer, "/take_offer": self.take_offer, "/verify_offer": self.verify_offer, "/cancel_offer": self.cancel_offer, } async def _state_changed(self, change: str, change_data: Optional[Dict[str, Any]]) -> List[WsRpcMessage]: pass async def create_data_store(self, request: Dict[str, Any]) -> EndpointResult: if self.service is None: raise Exception("Data layer not created") fee = get_fee(self.service.config, request) txs, value = await self.service.create_store(uint64(fee)) return {"txs": txs, "id": value.hex()} async def get_owned_stores(self, request: Dict[str, Any]) -> EndpointResult: if self.service is None: raise Exception("Data layer not created") singleton_records = await self.service.get_owned_stores() return {"store_ids": [singleton.launcher_id.hex() for singleton in singleton_records]} async def get_value(self, request: Dict[str, Any]) -> EndpointResult: store_id = bytes32.from_hexstr(request["id"]) key = hexstr_to_bytes(request["key"]) root_hash = request.get("root_hash") if root_hash is not None: root_hash = bytes32.from_hexstr(root_hash) if self.service is None: raise Exception("Data layer not created") value = await self.service.get_value(store_id=store_id, key=key, root_hash=root_hash) hex = None if value is not None: hex = value.hex() return {"value": hex} async def get_keys(self, request: Dict[str, Any]) -> EndpointResult: store_id = bytes32.from_hexstr(request["id"]) root_hash = request.get("root_hash") if root_hash is not None: root_hash = bytes32.from_hexstr(root_hash) if self.service is None: raise Exception("Data layer not created") keys = await self.service.get_keys(store_id, root_hash) if keys == [] and root_hash is not None and root_hash != bytes32([0] * 32): raise Exception(f"Can't find keys for {root_hash}") return {"keys": [f"0x{key.hex()}" for key in keys]} async def get_keys_values(self, request: Dict[str, Any]) -> EndpointResult: store_id = bytes32(hexstr_to_bytes(request["id"])) root_hash = request.get("root_hash") if root_hash is not None: root_hash = bytes32.from_hexstr(root_hash) if self.service is None: raise Exception("Data layer not created") res = await self.service.get_keys_values(store_id, root_hash) json_nodes = [] for node in res: json = recurse_jsonify(dataclasses.asdict(node)) json_nodes.append(json) if json_nodes == [] and root_hash is not None and root_hash != bytes32([0] * 32): raise Exception(f"Can't find keys and values for {root_hash}") return {"keys_values": json_nodes} async def get_ancestors(self, request: Dict[str, Any]) -> EndpointResult: store_id = bytes32(hexstr_to_bytes(request["id"])) node_hash = bytes32.from_hexstr(request["hash"]) if self.service is None: raise Exception("Data layer not created") value = await self.service.get_ancestors(node_hash, store_id) return {"ancestors": value} async def batch_update(self, request: Dict[str, Any]) -> EndpointResult: """ id - the id of the store we are operating on changelist - a list of changes to apply on store """ fee = get_fee(self.service.config, request) changelist = [process_change(change) for change in request["changelist"]] store_id = bytes32(hexstr_to_bytes(request["id"])) # todo input checks if self.service is None: raise Exception("Data layer not created") transaction_record = await self.service.batch_update(store_id, changelist, uint64(fee)) if transaction_record is None: raise Exception(f"Batch update failed for: {store_id}") return {"tx_id": transaction_record.name} async def insert(self, request: Dict[str, Any]) -> EndpointResult: """ rows_to_add a list of clvm objects as bytes to add to table rows_to_remove a list of row hashes to remove """ fee = get_fee(self.service.config, request) key = hexstr_to_bytes(request["key"]) value = hexstr_to_bytes(request["value"]) store_id = bytes32(hexstr_to_bytes(request["id"])) # todo input checks if self.service is None: raise Exception("Data layer not created") changelist = [{"action": "insert", "key": key, "value": value}] transaction_record = await self.service.batch_update(store_id, changelist, uint64(fee)) return {"tx_id": transaction_record.name} async def delete_key(self, request: Dict[str, Any]) -> EndpointResult: """ rows_to_add a list of clvm objects as bytes to add to table rows_to_remove a list of row hashes to remove """ fee = get_fee(self.service.config, request) key = hexstr_to_bytes(request["key"]) store_id = bytes32(hexstr_to_bytes(request["id"])) # todo input checks if self.service is None: raise Exception("Data layer not created") changelist = [{"action": "delete", "key": key}] transaction_record = await self.service.batch_update(store_id, changelist, uint64(fee)) return {"tx_id": transaction_record.name} async def get_root(self, request: Dict[str, Any]) -> EndpointResult: """get hash of latest tree root""" store_id = bytes32(hexstr_to_bytes(request["id"])) # todo input checks if self.service is None: raise Exception("Data layer not created") rec = await self.service.get_root(store_id) if rec is None: raise Exception(f"Failed to get root for {store_id.hex()}") return {"hash": rec.root, "confirmed": rec.confirmed, "timestamp": rec.timestamp} async def get_local_root(self, request: Dict[str, Any]) -> EndpointResult: """get hash of latest tree root saved in our local datastore""" store_id = bytes32(hexstr_to_bytes(request["id"])) # todo input checks if self.service is None: raise Exception("Data layer not created") res = await self.service.get_local_root(store_id) return {"hash": res} async def get_roots(self, request: Dict[str, Any]) -> EndpointResult: """ get state hashes for a list of roots """ store_ids = request["ids"] # todo input checks if self.service is None: raise Exception("Data layer not created") roots = [] for id in store_ids: id_bytes = bytes32.from_hexstr(id) rec = await self.service.get_root(id_bytes) if rec is not None: roots.append({"id": id_bytes, "hash": rec.root, "confirmed": rec.confirmed, "timestamp": rec.timestamp}) return {"root_hashes": roots} async def subscribe(self, request: Dict[str, Any]) -> EndpointResult: """ subscribe to singleton """ store_id = request.get("id") if store_id is None: raise Exception("missing store id in request") if self.service is None: raise Exception("Data layer not created") store_id_bytes = bytes32.from_hexstr(store_id) urls = request.get("urls", []) await self.service.subscribe(store_id=store_id_bytes, urls=urls) return {} async def unsubscribe(self, request: Dict[str, Any]) -> EndpointResult: """ unsubscribe from singleton """ store_id = request.get("id") if store_id is None: raise Exception("missing store id in request") if self.service is None: raise Exception("Data layer not created") store_id_bytes = bytes32.from_hexstr(store_id) await self.service.unsubscribe(store_id_bytes) return {} async def subscriptions(self, request: Dict[str, Any]) -> EndpointResult: """ List current subscriptions """ if self.service is None: raise Exception("Data layer not created") subscriptions: List[Subscription] = await self.service.get_subscriptions() return {"store_ids": [sub.tree_id.hex() for sub in subscriptions]} async def remove_subscriptions(self, request: Dict[str, Any]) -> EndpointResult: if self.service is None: raise Exception("Data layer not created") store_id = request.get("id") if store_id is None: raise Exception("missing store id in request") store_id_bytes = bytes32.from_hexstr(store_id) urls = request["urls"] await self.service.remove_subscriptions(store_id=store_id_bytes, urls=urls) return {} async def add_missing_files(self, request: Dict[str, Any]) -> EndpointResult: """ complete the data server files. """ if "ids" in request: store_ids = request["ids"] ids_bytes = [bytes32.from_hexstr(id) for id in store_ids] else: subscriptions: List[Subscription] = await self.service.get_subscriptions() ids_bytes = [subscription.tree_id for subscription in subscriptions] overwrite = request.get("overwrite", False) foldername: Optional[Path] = None if "foldername" in request: foldername = Path(request["foldername"]) for tree_id in ids_bytes: await self.service.add_missing_files(tree_id, overwrite, foldername) return {} async def get_root_history(self, request: Dict[str, Any]) -> EndpointResult: """ get history of state hashes for a store """ if self.service is None: raise Exception("Data layer not created") store_id = request["id"] id_bytes = bytes32.from_hexstr(store_id) records = await self.service.get_root_history(id_bytes) res: List[Dict[str, Any]] = [] for rec in records: res.insert(0, {"root_hash": rec.root, "confirmed": rec.confirmed, "timestamp": rec.timestamp}) return {"root_history": res} async def get_kv_diff(self, request: Dict[str, Any]) -> EndpointResult: """ get kv diff between two root hashes """ if self.service is None: raise Exception("Data layer not created") store_id = request["id"] id_bytes = bytes32.from_hexstr(store_id) hash_1 = request["hash_1"] hash_1_bytes = bytes32.from_hexstr(hash_1) hash_2 = request["hash_2"] hash_2_bytes = bytes32.from_hexstr(hash_2) records = await self.service.get_kv_diff(id_bytes, hash_1_bytes, hash_2_bytes) res: List[Dict[str, Any]] = [] for rec in records: res.insert(0, {"type": rec.type.name, "key": rec.key.hex(), "value": rec.value.hex()}) return {"diff": res} async def add_mirror(self, request: Dict[str, Any]) -> EndpointResult: store_id = request["id"] id_bytes = bytes32.from_hexstr(store_id) urls = request["urls"] amount = request["amount"] fee = get_fee(self.service.config, request) await self.service.add_mirror(id_bytes, urls, amount, fee) return {} async def delete_mirror(self, request: Dict[str, Any]) -> EndpointResult: coin_id = request["coin_id"] coin_id_bytes = bytes32.from_hexstr(coin_id) fee = get_fee(self.service.config, request) await self.service.delete_mirror(coin_id_bytes, fee) return {} async def get_mirrors(self, request: Dict[str, Any]) -> EndpointResult: store_id = request["id"] id_bytes = bytes32.from_hexstr(store_id) mirrors: List[Mirror] = await self.service.get_mirrors(id_bytes) return {"mirrors": [mirror.to_json_dict() for mirror in mirrors]} @marshal() # type: ignore[arg-type] async def make_offer(self, request: MakeOfferRequest) -> MakeOfferResponse: fee = get_fee(self.service.config, {"fee": request.fee}) offer = await self.service.make_offer(maker=request.maker, taker=request.taker, fee=fee) return MakeOfferResponse(success=True, offer=offer) @marshal() # type: ignore[arg-type] async def take_offer(self, request: TakeOfferRequest) -> TakeOfferResponse: fee = get_fee(self.service.config, {"fee": request.fee}) trade_record = await self.service.take_offer( offer_bytes=request.offer.offer, maker=request.offer.maker, taker=request.offer.taker, fee=fee, ) return TakeOfferResponse(success=True, trade_id=trade_record.trade_id) @marshal() # type: ignore[arg-type] async def verify_offer(self, request: TakeOfferRequest) -> VerifyOfferResponse: fee = get_fee(self.service.config, {"fee": request.fee}) offer = TradingOffer.from_bytes(request.offer.offer) summary = await DataLayerWallet.get_offer_summary(offer=offer) try: verify_offer(maker=request.offer.maker, taker=request.offer.taker, summary=summary) except OfferIntegrityError as e: return VerifyOfferResponse(success=True, valid=False, error=str(e)) return VerifyOfferResponse(success=True, valid=True, fee=fee) @marshal() # type: ignore[arg-type] async def cancel_offer(self, request: CancelOfferRequest) -> CancelOfferResponse: fee = get_fee(self.service.config, {"fee": request.fee}) await self.service.cancel_offer( trade_id=request.trade_id, secure=request.secure, fee=fee, ) return CancelOfferResponse(success=True)
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/rpc/util.py
flax/rpc/util.py
from __future__ import annotations import logging import traceback from typing import Callable import aiohttp from flax.util.json_util import obj_to_response log = logging.getLogger(__name__) def wrap_http_handler(f) -> Callable: async def inner(request) -> aiohttp.web.Response: request_data = await request.json() try: res_object = await f(request_data) if res_object is None: res_object = {} if "success" not in res_object: res_object["success"] = True except Exception as e: tb = traceback.format_exc() log.warning(f"Error while handling message: {tb}") if len(e.args) > 0: res_object = {"success": False, "error": f"{e.args[0]}"} else: res_object = {"success": False, "error": f"{e}"} return obj_to_response(res_object) return inner
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/rpc/full_node_rpc_client.py
flax/rpc/full_node_rpc_client.py
from typing import Dict, List, Optional, Tuple, Any from flax.consensus.block_record import BlockRecord from flax.full_node.signage_point import SignagePoint from flax.rpc.rpc_client import RpcClient from flax.types.blockchain_format.sized_bytes import bytes32 from flax.types.coin_record import CoinRecord from flax.types.coin_spend import CoinSpend from flax.types.end_of_slot_bundle import EndOfSubSlotBundle from flax.types.full_block import FullBlock from flax.types.spend_bundle import SpendBundle from flax.types.unfinished_header_block import UnfinishedHeaderBlock from flax.util.byte_types import hexstr_to_bytes from flax.util.ints import uint32, uint64 def coin_record_dict_backwards_compat(coin_record: Dict[str, Any]): del coin_record["spent"] return coin_record class FullNodeRpcClient(RpcClient): """ Client to Flax RPC, connects to a local full node. Uses HTTP/JSON, and converts back from JSON into native python objects before returning. All api calls use POST requests. Note that this is not the same as the peer protocol, or wallet protocol (which run Flax's protocol on top of TCP), it's a separate protocol on top of HTTP that provides easy access to the full node. """ async def get_blockchain_state(self) -> Dict: response = await self.fetch("get_blockchain_state", {}) if response["blockchain_state"]["peak"] is not None: response["blockchain_state"]["peak"] = BlockRecord.from_json_dict(response["blockchain_state"]["peak"]) return response["blockchain_state"] async def get_block(self, header_hash) -> Optional[FullBlock]: try: response = await self.fetch("get_block", {"header_hash": header_hash.hex()}) except Exception: return None return FullBlock.from_json_dict(response["block"]) async def get_blocks(self, start: int, end: int, exclude_reorged: bool = False) -> List[FullBlock]: response = await self.fetch( "get_blocks", {"start": start, "end": end, "exclude_header_hash": True, "exclude_reorged": exclude_reorged} ) return [FullBlock.from_json_dict(block) for block in response["blocks"]] async def get_block_record_by_height(self, height) -> Optional[BlockRecord]: try: response = await self.fetch("get_block_record_by_height", {"height": height}) except Exception: return None return BlockRecord.from_json_dict(response["block_record"]) async def get_block_record(self, header_hash) -> Optional[BlockRecord]: try: response = await self.fetch("get_block_record", {"header_hash": header_hash.hex()}) if response["block_record"] is None: return None except Exception: return None return BlockRecord.from_json_dict(response["block_record"]) async def get_unfinished_block_headers(self) -> List[UnfinishedHeaderBlock]: response = await self.fetch("get_unfinished_block_headers", {}) return [UnfinishedHeaderBlock.from_json_dict(r) for r in response["headers"]] async def get_all_block(self, start: uint32, end: uint32) -> List[FullBlock]: response = await self.fetch("get_blocks", {"start": start, "end": end, "exclude_header_hash": True}) return [FullBlock.from_json_dict(r) for r in response["blocks"]] async def get_network_space( self, newer_block_header_hash: bytes32, older_block_header_hash: bytes32 ) -> Optional[uint64]: try: network_space_bytes_estimate = await self.fetch( "get_network_space", { "newer_block_header_hash": newer_block_header_hash.hex(), "older_block_header_hash": older_block_header_hash.hex(), }, ) except Exception: return None return network_space_bytes_estimate["space"] async def get_coin_record_by_name(self, coin_id: bytes32) -> Optional[CoinRecord]: try: response = await self.fetch("get_coin_record_by_name", {"name": coin_id.hex()}) except Exception: return None return CoinRecord.from_json_dict(coin_record_dict_backwards_compat(response["coin_record"])) async def get_coin_records_by_names( self, names: List[bytes32], include_spent_coins: bool = True, start_height: Optional[int] = None, end_height: Optional[int] = None, ) -> List: names_hex = [name.hex() for name in names] d = {"names": names_hex, "include_spent_coins": include_spent_coins} if start_height is not None: d["start_height"] = start_height if end_height is not None: d["end_height"] = end_height response = await self.fetch("get_coin_records_by_names", d) return [CoinRecord.from_json_dict(coin_record_dict_backwards_compat(coin)) for coin in response["coin_records"]] async def get_coin_records_by_puzzle_hash( self, puzzle_hash: bytes32, include_spent_coins: bool = True, start_height: Optional[int] = None, end_height: Optional[int] = None, ) -> List: d = {"puzzle_hash": puzzle_hash.hex(), "include_spent_coins": include_spent_coins} if start_height is not None: d["start_height"] = start_height if end_height is not None: d["end_height"] = end_height response = await self.fetch("get_coin_records_by_puzzle_hash", d) return [CoinRecord.from_json_dict(coin_record_dict_backwards_compat(coin)) for coin in response["coin_records"]] async def get_coin_records_by_puzzle_hashes( self, puzzle_hashes: List[bytes32], include_spent_coins: bool = True, start_height: Optional[int] = None, end_height: Optional[int] = None, ) -> List: puzzle_hashes_hex = [ph.hex() for ph in puzzle_hashes] d = {"puzzle_hashes": puzzle_hashes_hex, "include_spent_coins": include_spent_coins} if start_height is not None: d["start_height"] = start_height if end_height is not None: d["end_height"] = end_height response = await self.fetch("get_coin_records_by_puzzle_hashes", d) return [CoinRecord.from_json_dict(coin_record_dict_backwards_compat(coin)) for coin in response["coin_records"]] async def get_coin_records_by_parent_ids( self, parent_ids: List[bytes32], include_spent_coins: bool = True, start_height: Optional[int] = None, end_height: Optional[int] = None, ) -> List: parent_ids_hex = [pid.hex() for pid in parent_ids] d = {"parent_ids": parent_ids_hex, "include_spent_coins": include_spent_coins} if start_height is not None: d["start_height"] = start_height if end_height is not None: d["end_height"] = end_height response = await self.fetch("get_coin_records_by_parent_ids", d) return [CoinRecord.from_json_dict(coin_record_dict_backwards_compat(coin)) for coin in response["coin_records"]] async def get_coin_records_by_hint( self, hint: bytes32, include_spent_coins: bool = True, start_height: Optional[int] = None, end_height: Optional[int] = None, ) -> List: d = {"hint": hint.hex(), "include_spent_coins": include_spent_coins} if start_height is not None: d["start_height"] = start_height if end_height is not None: d["end_height"] = end_height response = await self.fetch("get_coin_records_by_hint", d) return [CoinRecord.from_json_dict(coin_record_dict_backwards_compat(coin)) for coin in response["coin_records"]] async def get_additions_and_removals(self, header_hash: bytes32) -> Tuple[List[CoinRecord], List[CoinRecord]]: try: response = await self.fetch("get_additions_and_removals", {"header_hash": header_hash.hex()}) except Exception: return [], [] removals = [] additions = [] for coin_record in response["removals"]: removals.append(CoinRecord.from_json_dict(coin_record_dict_backwards_compat(coin_record))) for coin_record in response["additions"]: additions.append(CoinRecord.from_json_dict(coin_record_dict_backwards_compat(coin_record))) return additions, removals async def get_block_records(self, start: int, end: int) -> List: try: response = await self.fetch("get_block_records", {"start": start, "end": end}) if response["block_records"] is None: return [] except Exception: return [] # TODO: return block records return response["block_records"] async def get_block_spends(self, header_hash: bytes32) -> Optional[List[CoinSpend]]: try: response = await self.fetch("get_block_spends", {"header_hash": header_hash.hex()}) block_spends = [] for block_spend in response["block_spends"]: block_spends.append(CoinSpend.from_json_dict(block_spend)) return block_spends except Exception: return None async def push_tx(self, spend_bundle: SpendBundle): return await self.fetch("push_tx", {"spend_bundle": spend_bundle.to_json_dict()}) async def get_puzzle_and_solution(self, coin_id: bytes32, height: uint32) -> Optional[CoinSpend]: try: response = await self.fetch("get_puzzle_and_solution", {"coin_id": coin_id.hex(), "height": height}) return CoinSpend.from_json_dict(response["coin_solution"]) except Exception: return None async def get_all_mempool_tx_ids(self) -> List[bytes32]: response = await self.fetch("get_all_mempool_tx_ids", {}) return [bytes32(hexstr_to_bytes(tx_id_hex)) for tx_id_hex in response["tx_ids"]] async def get_all_mempool_items(self) -> Dict[bytes32, Dict]: response: Dict = await self.fetch("get_all_mempool_items", {}) converted: Dict[bytes32, Dict] = {} for tx_id_hex, item in response["mempool_items"].items(): converted[bytes32(hexstr_to_bytes(tx_id_hex))] = item return converted async def get_mempool_item_by_tx_id(self, tx_id: bytes32) -> Optional[Dict]: try: response = await self.fetch("get_mempool_item_by_tx_id", {"tx_id": tx_id.hex()}) return response["mempool_item"] except Exception: return None async def get_recent_signage_point_or_eos( self, sp_hash: Optional[bytes32], challenge_hash: Optional[bytes32] ) -> Optional[Any]: try: if sp_hash is not None: assert challenge_hash is None response = await self.fetch("get_recent_signage_point_or_eos", {"sp_hash": sp_hash.hex()}) return { "signage_point": SignagePoint.from_json_dict(response["signage_point"]), "time_received": response["time_received"], "reverted": response["reverted"], } else: assert challenge_hash is not None response = await self.fetch("get_recent_signage_point_or_eos", {"challenge_hash": challenge_hash.hex()}) return { "eos": EndOfSubSlotBundle.from_json_dict(response["eos"]), "time_received": response["time_received"], "reverted": response["reverted"], } except Exception: return None async def get_fee_estimate( self, target_times: Optional[List[int]], cost: Optional[int], ) -> Dict[str, Any]: response = await self.fetch("get_fee_estimate", {"cost": cost, "target_times": target_times}) return response
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/rpc/farmer_rpc_client.py
flax/rpc/farmer_rpc_client.py
from __future__ import annotations from typing import Any, Dict, List, Optional from flax.rpc.farmer_rpc_api import PlotInfoRequestData, PlotPathRequestData from flax.rpc.rpc_client import RpcClient from flax.types.blockchain_format.sized_bytes import bytes32 from flax.util.misc import dataclass_to_json_dict class FarmerRpcClient(RpcClient): """ Client to Flax RPC, connects to a local farmer. Uses HTTP/JSON, and converts back from JSON into native python objects before returning. All api calls use POST requests. Note that this is not the same as the peer protocol, or wallet protocol (which run Flax's protocol on top of TCP), it's a separate protocol on top of HTTP that provides easy access to the full node. """ async def get_signage_point(self, sp_hash: bytes32) -> Optional[Dict]: try: return await self.fetch("get_signage_point", {"sp_hash": sp_hash.hex()}) except ValueError: return None async def get_signage_points(self) -> List[Dict]: return (await self.fetch("get_signage_points", {}))["signage_points"] async def get_reward_targets(self, search_for_private_key: bool, max_ph_to_search: int = 500) -> Dict: response = await self.fetch( "get_reward_targets", {"search_for_private_key": search_for_private_key, "max_ph_to_search": max_ph_to_search}, ) return_dict = { "farmer_target": response["farmer_target"], "pool_target": response["pool_target"], } if "have_pool_sk" in response: return_dict["have_pool_sk"] = response["have_pool_sk"] if "have_farmer_sk" in response: return_dict["have_farmer_sk"] = response["have_farmer_sk"] return return_dict async def set_reward_targets(self, farmer_target: Optional[str] = None, pool_target: Optional[str] = None) -> Dict: request = {} if farmer_target is not None: request["farmer_target"] = farmer_target if pool_target is not None: request["pool_target"] = pool_target return await self.fetch("set_reward_targets", request) async def get_pool_state(self) -> Dict: return await self.fetch("get_pool_state", {}) async def set_payout_instructions(self, launcher_id: bytes32, payout_instructions: str) -> Dict: request = {"launcher_id": launcher_id.hex(), "payout_instructions": payout_instructions} return await self.fetch("set_payout_instructions", request) async def get_harvesters(self) -> Dict[str, Any]: return await self.fetch("get_harvesters", {}) async def get_harvesters_summary(self) -> Dict[str, object]: return await self.fetch("get_harvesters_summary", {}) async def get_harvester_plots_valid(self, request: PlotInfoRequestData) -> Dict[str, Any]: return await self.fetch("get_harvester_plots_valid", dataclass_to_json_dict(request)) async def get_harvester_plots_invalid(self, request: PlotPathRequestData) -> Dict[str, Any]: return await self.fetch("get_harvester_plots_invalid", dataclass_to_json_dict(request)) async def get_harvester_plots_keys_missing(self, request: PlotPathRequestData) -> Dict[str, Any]: return await self.fetch("get_harvester_plots_keys_missing", dataclass_to_json_dict(request)) async def get_harvester_plots_duplicates(self, request: PlotPathRequestData) -> Dict[str, Any]: return await self.fetch("get_harvester_plots_duplicates", dataclass_to_json_dict(request)) async def get_pool_login_link(self, launcher_id: bytes32) -> Optional[str]: try: return (await self.fetch("get_pool_login_link", {"launcher_id": launcher_id.hex()}))["login_link"] except ValueError: return None
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/rpc/harvester_rpc_api.py
flax/rpc/harvester_rpc_api.py
from __future__ import annotations from typing import Any, Dict, List from flax.harvester.harvester import Harvester from flax.rpc.rpc_server import Endpoint, EndpointResult from flax.util.ws_message import WsRpcMessage, create_payload_dict class HarvesterRpcApi: def __init__(self, harvester: Harvester): self.service = harvester self.service_name = "flax_harvester" def get_routes(self) -> Dict[str, Endpoint]: return { "/get_plots": self.get_plots, "/refresh_plots": self.refresh_plots, "/delete_plot": self.delete_plot, "/add_plot_directory": self.add_plot_directory, "/get_plot_directories": self.get_plot_directories, "/remove_plot_directory": self.remove_plot_directory, } async def _state_changed(self, change: str, change_data: Dict[str, Any] = None) -> List[WsRpcMessage]: if change_data is None: change_data = {} payloads = [] if change == "plots": data = await self.get_plots({}) payload = create_payload_dict("get_plots", data, self.service_name, "wallet_ui") payloads.append(payload) if change == "farming_info": payloads.append(create_payload_dict("farming_info", change_data, self.service_name, "metrics")) return payloads async def get_plots(self, request: Dict) -> EndpointResult: plots, failed_to_open, not_found = self.service.get_plots() return { "plots": plots, "failed_to_open_filenames": failed_to_open, "not_found_filenames": not_found, } async def refresh_plots(self, request: Dict) -> EndpointResult: self.service.plot_manager.trigger_refresh() return {} async def delete_plot(self, request: Dict) -> EndpointResult: filename = request["filename"] if self.service.delete_plot(filename): return {} raise ValueError(f"Not able to delete file {filename}") async def add_plot_directory(self, request: Dict) -> EndpointResult: directory_name = request["dirname"] if await self.service.add_plot_directory(directory_name): return {} raise ValueError(f"Did not add plot directory {directory_name}") async def get_plot_directories(self, request: Dict) -> EndpointResult: plot_dirs = await self.service.get_plot_directories() return {"directories": plot_dirs} async def remove_plot_directory(self, request: Dict) -> EndpointResult: directory_name = request["dirname"] if await self.service.remove_plot_directory(directory_name): return {} raise ValueError(f"Did not remove plot directory {directory_name}")
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/rpc/full_node_rpc_api.py
flax/rpc/full_node_rpc_api.py
from __future__ import annotations from datetime import datetime, timezone from typing import Any, Dict, List, Optional from clvm.casts import int_from_bytes from flax.consensus.block_record import BlockRecord from flax.consensus.cost_calculator import NPCResult from flax.consensus.pos_quality import UI_ACTUAL_SPACE_CONSTANT_FACTOR from flax.full_node.fee_estimator_interface import FeeEstimatorInterface from flax.full_node.full_node import FullNode from flax.full_node.generator import setup_generator_args from flax.full_node.mempool_check_conditions import get_puzzle_and_solution_for_coin from flax.rpc.rpc_server import Endpoint, EndpointResult from flax.server.outbound_message import NodeType from flax.types.blockchain_format.coin import Coin from flax.types.blockchain_format.sized_bytes import bytes32 from flax.types.coin_record import CoinRecord from flax.types.coin_spend import CoinSpend from flax.types.full_block import FullBlock from flax.types.generator_types import BlockGenerator from flax.types.mempool_inclusion_status import MempoolInclusionStatus from flax.types.spend_bundle import SpendBundle from flax.types.unfinished_header_block import UnfinishedHeaderBlock from flax.util.byte_types import hexstr_to_bytes from flax.util.ints import uint32, uint64, uint128 from flax.util.log_exceptions import log_exceptions from flax.util.ws_message import WsRpcMessage, create_payload_dict from flax.wallet.puzzles.decompress_block_spends import DECOMPRESS_BLOCK_SPENDS def coin_record_dict_backwards_compat(coin_record: Dict[str, Any]): coin_record["spent"] = coin_record["spent_block_index"] > 0 return coin_record class FullNodeRpcApi: def __init__(self, service: FullNode): self.service = service self.service_name = "flax_full_node" self.cached_blockchain_state: Optional[Dict] = None def get_routes(self) -> Dict[str, Endpoint]: return { # Blockchain "/get_blockchain_state": self.get_blockchain_state, "/get_block": self.get_block, "/get_blocks": self.get_blocks, "/get_block_count_metrics": self.get_block_count_metrics, "/get_block_record_by_height": self.get_block_record_by_height, "/get_block_record": self.get_block_record, "/get_block_records": self.get_block_records, "/get_block_spends": self.get_block_spends, "/get_unfinished_block_headers": self.get_unfinished_block_headers, "/get_network_space": self.get_network_space, "/get_additions_and_removals": self.get_additions_and_removals, # this function is just here for backwards-compatibility. It will probably # be removed in the future "/get_initial_freeze_period": self.get_initial_freeze_period, "/get_network_info": self.get_network_info, "/get_recent_signage_point_or_eos": self.get_recent_signage_point_or_eos, # Coins "/get_coin_records_by_puzzle_hash": self.get_coin_records_by_puzzle_hash, "/get_coin_records_by_puzzle_hashes": self.get_coin_records_by_puzzle_hashes, "/get_coin_record_by_name": self.get_coin_record_by_name, "/get_coin_records_by_names": self.get_coin_records_by_names, "/get_coin_records_by_parent_ids": self.get_coin_records_by_parent_ids, "/get_coin_records_by_hint": self.get_coin_records_by_hint, "/push_tx": self.push_tx, "/get_puzzle_and_solution": self.get_puzzle_and_solution, # Mempool "/get_all_mempool_tx_ids": self.get_all_mempool_tx_ids, "/get_all_mempool_items": self.get_all_mempool_items, "/get_mempool_item_by_tx_id": self.get_mempool_item_by_tx_id, # Fee estimation "/get_fee_estimate": self.get_fee_estimate, } async def _state_changed(self, change: str, change_data: Dict[str, Any] = None) -> List[WsRpcMessage]: if change_data is None: change_data = {} payloads = [] if change == "new_peak" or change == "sync_mode": data = await self.get_blockchain_state({}) assert data is not None payloads.append( create_payload_dict( "get_blockchain_state", data, self.service_name, "wallet_ui", ) ) payloads.append( create_payload_dict( "get_blockchain_state", data, self.service_name, "metrics", ) ) if change in ("block", "signage_point"): payloads.append(create_payload_dict(change, change_data, self.service_name, "metrics")) return payloads # this function is just here for backwards-compatibility. It will probably # be removed in the future async def get_initial_freeze_period(self, _: Dict) -> EndpointResult: # Mon May 03 2021 17:00:00 GMT+0000 return {"INITIAL_FREEZE_END_TIMESTAMP": 1620061200} async def get_blockchain_state(self, _request: Dict) -> EndpointResult: """ Returns a summary of the node's view of the blockchain. """ node_id = self.service.server.node_id.hex() if self.service.initialized is False: res: Dict = { "blockchain_state": { "peak": None, "genesis_challenge_initialized": self.service.initialized, "sync": { "sync_mode": False, "synced": False, "sync_tip_height": 0, "sync_progress_height": 0, }, "difficulty": 0, "sub_slot_iters": 0, "space": 0, "mempool_size": 0, "mempool_cost": 0, "mempool_min_fees": { "cost_5000000": 0, }, "mempool_max_total_cost": 0, "block_max_cost": 0, "node_id": node_id, }, } return res peak: Optional[BlockRecord] = self.service.blockchain.get_peak() if peak is not None and peak.height > 0: difficulty = uint64(peak.weight - self.service.blockchain.block_record(peak.prev_hash).weight) sub_slot_iters = peak.sub_slot_iters else: difficulty = self.service.constants.DIFFICULTY_STARTING sub_slot_iters = self.service.constants.SUB_SLOT_ITERS_STARTING sync_mode: bool = self.service.sync_store.get_sync_mode() or self.service.sync_store.get_long_sync() sync_tip_height: Optional[uint32] = uint32(0) if sync_mode: if self.service.sync_store.get_sync_target_height() is not None: sync_tip_height = self.service.sync_store.get_sync_target_height() assert sync_tip_height is not None if peak is not None: sync_progress_height: uint32 = peak.height # Don't display we're syncing towards 0, instead show 'Syncing height/height' # until sync_store retrieves the correct number. if sync_tip_height == uint32(0): sync_tip_height = peak.height else: sync_progress_height = uint32(0) else: sync_progress_height = uint32(0) if peak is not None and peak.height > 1: newer_block_hex = peak.header_hash.hex() # Average over the last day header_hash = self.service.blockchain.height_to_hash(uint32(max(1, peak.height - 4608))) assert header_hash is not None older_block_hex = header_hash.hex() space = await self.get_network_space( {"newer_block_header_hash": newer_block_hex, "older_block_header_hash": older_block_hex} ) else: space = {"space": uint128(0)} if self.service.mempool_manager is not None: mempool_size = len(self.service.mempool_manager.mempool.spends) mempool_cost = self.service.mempool_manager.mempool.total_mempool_cost mempool_min_fee_5m = self.service.mempool_manager.mempool.get_min_fee_rate(5000000) mempool_max_total_cost = self.service.mempool_manager.mempool_max_total_cost else: mempool_size = 0 mempool_cost = 0 mempool_min_fee_5m = 0 mempool_max_total_cost = 0 if self.service.server is not None: is_connected = len(self.service.server.get_connections(NodeType.FULL_NODE)) > 0 or "simulator" in str( self.service.config.get("selected_network") ) else: is_connected = False synced = await self.service.synced() and is_connected assert space is not None response: Dict = { "blockchain_state": { "peak": peak, "genesis_challenge_initialized": self.service.initialized, "sync": { "sync_mode": sync_mode, "synced": synced, "sync_tip_height": sync_tip_height, "sync_progress_height": sync_progress_height, }, "difficulty": difficulty, "sub_slot_iters": sub_slot_iters, "space": space["space"], "mempool_size": mempool_size, "mempool_cost": mempool_cost, "mempool_min_fees": { # We may give estimates for varying costs in the future # This Dict sets us up for that in the future "cost_5000000": mempool_min_fee_5m, }, "mempool_max_total_cost": mempool_max_total_cost, "block_max_cost": self.service.constants.MAX_BLOCK_COST_CLVM, "node_id": node_id, }, } self.cached_blockchain_state = dict(response["blockchain_state"]) return response async def get_network_info(self, request: Dict) -> EndpointResult: network_name = self.service.config["selected_network"] address_prefix = self.service.config["network_overrides"]["config"][network_name]["address_prefix"] return {"network_name": network_name, "network_prefix": address_prefix} async def get_recent_signage_point_or_eos(self, request: Dict) -> EndpointResult: if "sp_hash" not in request: challenge_hash: bytes32 = bytes32.from_hexstr(request["challenge_hash"]) # This is the case of getting an end of slot eos_tuple = self.service.full_node_store.recent_eos.get(challenge_hash) if not eos_tuple: raise ValueError(f"Did not find eos {challenge_hash.hex()} in cache") eos, time_received = eos_tuple # If it's still in the full node store, it's not reverted if self.service.full_node_store.get_sub_slot(eos.challenge_chain.get_hash()): return {"eos": eos, "time_received": time_received, "reverted": False} # Otherwise we can backtrack from peak to find it in the blockchain curr: Optional[BlockRecord] = self.service.blockchain.get_peak() if curr is None: raise ValueError("No blocks in the chain") number_of_slots_searched = 0 while number_of_slots_searched < 10: if curr.first_in_sub_slot: assert curr.finished_challenge_slot_hashes is not None if curr.finished_challenge_slot_hashes[-1] == eos.challenge_chain.get_hash(): # Found this slot in the blockchain return {"eos": eos, "time_received": time_received, "reverted": False} number_of_slots_searched += len(curr.finished_challenge_slot_hashes) curr = self.service.blockchain.try_block_record(curr.prev_hash) if curr is None: # Got to the beginning of the blockchain without finding the slot return {"eos": eos, "time_received": time_received, "reverted": True} # Backtracked through 10 slots but still did not find it return {"eos": eos, "time_received": time_received, "reverted": True} # Now we handle the case of getting a signage point sp_hash: bytes32 = bytes32.from_hexstr(request["sp_hash"]) sp_tuple = self.service.full_node_store.recent_signage_points.get(sp_hash) if sp_tuple is None: raise ValueError(f"Did not find sp {sp_hash.hex()} in cache") sp, time_received = sp_tuple assert sp.rc_vdf is not None, "Not an EOS, the signage point rewards chain VDF must not be None" assert sp.cc_vdf is not None, "Not an EOS, the signage point challenge chain VDF must not be None" # If it's still in the full node store, it's not reverted if self.service.full_node_store.get_signage_point(sp_hash): return {"signage_point": sp, "time_received": time_received, "reverted": False} # Otherwise we can backtrack from peak to find it in the blockchain rc_challenge: bytes32 = sp.rc_vdf.challenge next_b: Optional[BlockRecord] = None curr_b_optional: Optional[BlockRecord] = self.service.blockchain.get_peak() assert curr_b_optional is not None curr_b: BlockRecord = curr_b_optional for _ in range(200): sp_total_iters = sp.cc_vdf.number_of_iterations + curr_b.ip_sub_slot_total_iters(self.service.constants) if curr_b.reward_infusion_new_challenge == rc_challenge: if next_b is None: return {"signage_point": sp, "time_received": time_received, "reverted": False} next_b_total_iters = next_b.ip_sub_slot_total_iters(self.service.constants) + next_b.ip_iters( self.service.constants ) return { "signage_point": sp, "time_received": time_received, "reverted": sp_total_iters > next_b_total_iters, } if curr_b.finished_reward_slot_hashes is not None: assert curr_b.finished_challenge_slot_hashes is not None for eos_rc in curr_b.finished_challenge_slot_hashes: if eos_rc == rc_challenge: if next_b is None: return {"signage_point": sp, "time_received": time_received, "reverted": False} next_b_total_iters = next_b.ip_sub_slot_total_iters(self.service.constants) + next_b.ip_iters( self.service.constants ) return { "signage_point": sp, "time_received": time_received, "reverted": sp_total_iters > next_b_total_iters, } next_b = curr_b curr_b_optional = self.service.blockchain.try_block_record(curr_b.prev_hash) if curr_b_optional is None: break curr_b = curr_b_optional return {"signage_point": sp, "time_received": time_received, "reverted": True} async def get_block(self, request: Dict) -> EndpointResult: if "header_hash" not in request: raise ValueError("No header_hash in request") header_hash = bytes32.from_hexstr(request["header_hash"]) block: Optional[FullBlock] = await self.service.block_store.get_full_block(header_hash) if block is None: raise ValueError(f"Block {header_hash.hex()} not found") return {"block": block} async def get_blocks(self, request: Dict) -> EndpointResult: if "start" not in request: raise ValueError("No start in request") if "end" not in request: raise ValueError("No end in request") exclude_hh = False if "exclude_header_hash" in request: exclude_hh = request["exclude_header_hash"] exclude_reorged = False if "exclude_reorged" in request: exclude_reorged = request["exclude_reorged"] start = int(request["start"]) end = int(request["end"]) block_range = [] for a in range(start, end): block_range.append(uint32(a)) blocks: List[FullBlock] = await self.service.block_store.get_full_blocks_at(block_range) json_blocks = [] for block in blocks: hh: bytes32 = block.header_hash if exclude_reorged and self.service.blockchain.height_to_hash(block.height) != hh: # Don't include forked (reorged) blocks continue json = block.to_json_dict() if not exclude_hh: json["header_hash"] = hh.hex() json_blocks.append(json) return {"blocks": json_blocks} async def get_block_count_metrics(self, request: Dict) -> EndpointResult: compact_blocks = 0 uncompact_blocks = 0 with log_exceptions(self.service.log, consume=True): compact_blocks = await self.service.block_store.count_compactified_blocks() uncompact_blocks = await self.service.block_store.count_uncompactified_blocks() hint_count = 0 if self.service.hint_store is not None: with log_exceptions(self.service.log, consume=True): hint_count = await self.service.hint_store.count_hints() return { "metrics": { "compact_blocks": compact_blocks, "uncompact_blocks": uncompact_blocks, "hint_count": hint_count, } } async def get_block_records(self, request: Dict) -> EndpointResult: if "start" not in request: raise ValueError("No start in request") if "end" not in request: raise ValueError("No end in request") start = int(request["start"]) end = int(request["end"]) records = [] peak_height = self.service.blockchain.get_peak_height() if peak_height is None: raise ValueError("Peak is None") for a in range(start, end): if peak_height < uint32(a): self.service.log.warning("requested block is higher than known peak ") break header_hash: Optional[bytes32] = self.service.blockchain.height_to_hash(uint32(a)) if header_hash is None: raise ValueError(f"Height not in blockchain: {a}") record: Optional[BlockRecord] = self.service.blockchain.try_block_record(header_hash) if record is None: # Fetch from DB record = await self.service.blockchain.block_store.get_block_record(header_hash) if record is None: raise ValueError(f"Block {header_hash.hex()} does not exist") records.append(record) return {"block_records": records} async def get_block_spends(self, request: Dict) -> EndpointResult: if "header_hash" not in request: raise ValueError("No header_hash in request") header_hash = bytes32.from_hexstr(request["header_hash"]) full_block: Optional[FullBlock] = await self.service.block_store.get_full_block(header_hash) if full_block is None: raise ValueError(f"Block {header_hash.hex()} not found") spends: List[CoinSpend] = [] block_generator = await self.service.blockchain.get_block_generator(full_block) if block_generator is None: # if block is not a transaction block. return {"block_spends": spends} block_program, block_program_args = setup_generator_args(block_generator) _, coin_spends = DECOMPRESS_BLOCK_SPENDS.run_with_cost( self.service.constants.MAX_BLOCK_COST_CLVM, block_program, block_program_args ) for spend in coin_spends.as_iter(): parent, puzzle, amount, solution = spend.as_iter() puzzle_hash = puzzle.get_tree_hash() coin = Coin(parent.atom, puzzle_hash, int_from_bytes(amount.atom)) spends.append(CoinSpend(coin, puzzle, solution)) return {"block_spends": spends} async def get_block_record_by_height(self, request: Dict) -> EndpointResult: if "height" not in request: raise ValueError("No height in request") height = request["height"] header_height = uint32(int(height)) peak_height = self.service.blockchain.get_peak_height() if peak_height is None or header_height > peak_height: raise ValueError(f"Block height {height} not found in chain") header_hash: Optional[bytes32] = self.service.blockchain.height_to_hash(header_height) if header_hash is None: raise ValueError(f"Block hash {height} not found in chain") record: Optional[BlockRecord] = self.service.blockchain.try_block_record(header_hash) if record is None: # Fetch from DB record = await self.service.blockchain.block_store.get_block_record(header_hash) if record is None: raise ValueError(f"Block {header_hash} does not exist") return {"block_record": record} async def get_block_record(self, request: Dict) -> EndpointResult: if "header_hash" not in request: raise ValueError("header_hash not in request") header_hash_str = request["header_hash"] header_hash = bytes32.from_hexstr(header_hash_str) record: Optional[BlockRecord] = self.service.blockchain.try_block_record(header_hash) if record is None: # Fetch from DB record = await self.service.blockchain.block_store.get_block_record(header_hash) if record is None: raise ValueError(f"Block {header_hash.hex()} does not exist") return {"block_record": record} async def get_unfinished_block_headers(self, request: Dict) -> EndpointResult: peak: Optional[BlockRecord] = self.service.blockchain.get_peak() if peak is None: return {"headers": []} response_headers: List[UnfinishedHeaderBlock] = [] for ub_height, block, _ in (self.service.full_node_store.get_unfinished_blocks()).values(): if ub_height == peak.height: unfinished_header_block = UnfinishedHeaderBlock( block.finished_sub_slots, block.reward_chain_block, block.challenge_chain_sp_proof, block.reward_chain_sp_proof, block.foliage, block.foliage_transaction_block, b"", ) response_headers.append(unfinished_header_block) return {"headers": response_headers} async def get_network_space(self, request: Dict) -> EndpointResult: """ Retrieves an estimate of total space validating the chain between two block header hashes. """ if "newer_block_header_hash" not in request or "older_block_header_hash" not in request: raise ValueError("Invalid request. newer_block_header_hash and older_block_header_hash required") newer_block_hex = request["newer_block_header_hash"] older_block_hex = request["older_block_header_hash"] if newer_block_hex == older_block_hex: raise ValueError("New and old must not be the same") newer_block_bytes = bytes32.from_hexstr(newer_block_hex) older_block_bytes = bytes32.from_hexstr(older_block_hex) newer_block = await self.service.block_store.get_block_record(newer_block_bytes) if newer_block is None: # It's possible that the peak block has not yet been committed to the DB, so as a fallback, check memory try: newer_block = self.service.blockchain.block_record(newer_block_bytes) except KeyError: raise ValueError(f"Newer block {newer_block_hex} not found") older_block = await self.service.block_store.get_block_record(older_block_bytes) if older_block is None: raise ValueError(f"Older block {older_block_hex} not found") delta_weight = newer_block.weight - older_block.weight delta_iters = newer_block.total_iters - older_block.total_iters weight_div_iters = delta_weight / delta_iters additional_difficulty_constant = self.service.constants.DIFFICULTY_CONSTANT_FACTOR eligible_plots_filter_multiplier = 2**self.service.constants.NUMBER_ZERO_BITS_PLOT_FILTER network_space_bytes_estimate = ( UI_ACTUAL_SPACE_CONSTANT_FACTOR * weight_div_iters * additional_difficulty_constant * eligible_plots_filter_multiplier ) return {"space": uint128(int(network_space_bytes_estimate))} async def get_coin_records_by_puzzle_hash(self, request: Dict) -> EndpointResult: """ Retrieves the coins for a given puzzlehash, by default returns unspent coins. """ if "puzzle_hash" not in request: raise ValueError("Puzzle hash not in request") kwargs: Dict[str, Any] = {"include_spent_coins": False, "puzzle_hash": hexstr_to_bytes(request["puzzle_hash"])} if "start_height" in request: kwargs["start_height"] = uint32(request["start_height"]) if "end_height" in request: kwargs["end_height"] = uint32(request["end_height"]) if "include_spent_coins" in request: kwargs["include_spent_coins"] = request["include_spent_coins"] coin_records = await self.service.blockchain.coin_store.get_coin_records_by_puzzle_hash(**kwargs) return {"coin_records": [coin_record_dict_backwards_compat(cr.to_json_dict()) for cr in coin_records]} async def get_coin_records_by_puzzle_hashes(self, request: Dict) -> EndpointResult: """ Retrieves the coins for a given puzzlehash, by default returns unspent coins. """ if "puzzle_hashes" not in request: raise ValueError("Puzzle hashes not in request") kwargs: Dict[str, Any] = { "include_spent_coins": False, "puzzle_hashes": [hexstr_to_bytes(ph) for ph in request["puzzle_hashes"]], } if "start_height" in request: kwargs["start_height"] = uint32(request["start_height"]) if "end_height" in request: kwargs["end_height"] = uint32(request["end_height"]) if "include_spent_coins" in request: kwargs["include_spent_coins"] = request["include_spent_coins"] coin_records = await self.service.blockchain.coin_store.get_coin_records_by_puzzle_hashes(**kwargs) return {"coin_records": [coin_record_dict_backwards_compat(cr.to_json_dict()) for cr in coin_records]} async def get_coin_record_by_name(self, request: Dict) -> EndpointResult: """ Retrieves a coin record by it's name. """ if "name" not in request: raise ValueError("Name not in request") name = bytes32.from_hexstr(request["name"]) coin_record: Optional[CoinRecord] = await self.service.blockchain.coin_store.get_coin_record(name) if coin_record is None: raise ValueError(f"Coin record 0x{name.hex()} not found") return {"coin_record": coin_record_dict_backwards_compat(coin_record.to_json_dict())} async def get_coin_records_by_names(self, request: Dict) -> EndpointResult: """ Retrieves the coins for given coin IDs, by default returns unspent coins. """ if "names" not in request: raise ValueError("Names not in request") kwargs: Dict[str, Any] = { "include_spent_coins": False, "names": [hexstr_to_bytes(name) for name in request["names"]], } if "start_height" in request: kwargs["start_height"] = uint32(request["start_height"]) if "end_height" in request: kwargs["end_height"] = uint32(request["end_height"]) if "include_spent_coins" in request: kwargs["include_spent_coins"] = request["include_spent_coins"] coin_records = await self.service.blockchain.coin_store.get_coin_records_by_names(**kwargs) return {"coin_records": [coin_record_dict_backwards_compat(cr.to_json_dict()) for cr in coin_records]} async def get_coin_records_by_parent_ids(self, request: Dict) -> EndpointResult: """ Retrieves the coins for given parent coin IDs, by default returns unspent coins. """ if "parent_ids" not in request: raise ValueError("Parent IDs not in request") kwargs: Dict[str, Any] = { "include_spent_coins": False, "parent_ids": [hexstr_to_bytes(ph) for ph in request["parent_ids"]], } if "start_height" in request: kwargs["start_height"] = uint32(request["start_height"]) if "end_height" in request: kwargs["end_height"] = uint32(request["end_height"]) if "include_spent_coins" in request: kwargs["include_spent_coins"] = request["include_spent_coins"] coin_records = await self.service.blockchain.coin_store.get_coin_records_by_parent_ids(**kwargs) return {"coin_records": [coin_record_dict_backwards_compat(cr.to_json_dict()) for cr in coin_records]} async def get_coin_records_by_hint(self, request: Dict) -> EndpointResult: """ Retrieves coins by hint, by default returns unspent coins. """ if "hint" not in request: raise ValueError("Hint not in request") if self.service.hint_store is None: return {"coin_records": []} names: List[bytes32] = await self.service.hint_store.get_coin_ids(bytes32.from_hexstr(request["hint"])) kwargs: Dict[str, Any] = { "include_spent_coins": False, "names": names, } if "start_height" in request: kwargs["start_height"] = uint32(request["start_height"]) if "end_height" in request: kwargs["end_height"] = uint32(request["end_height"]) if "include_spent_coins" in request: kwargs["include_spent_coins"] = request["include_spent_coins"] coin_records = await self.service.blockchain.coin_store.get_coin_records_by_names(**kwargs) return {"coin_records": [coin_record_dict_backwards_compat(cr.to_json_dict()) for cr in coin_records]} async def push_tx(self, request: Dict) -> EndpointResult: if "spend_bundle" not in request: raise ValueError("Spend bundle not in request") spend_bundle: SpendBundle = SpendBundle.from_json_dict(request["spend_bundle"]) spend_name = spend_bundle.name() if self.service.mempool_manager.get_spendbundle(spend_name) is not None: status = MempoolInclusionStatus.SUCCESS error = None else: status, error = await self.service.respond_transaction(spend_bundle, spend_name) if status != MempoolInclusionStatus.SUCCESS: if self.service.mempool_manager.get_spendbundle(spend_name) is not None: # Already in mempool status = MempoolInclusionStatus.SUCCESS error = None if status == MempoolInclusionStatus.FAILED: assert error is not None raise ValueError(f"Failed to include transaction {spend_name}, error {error.name}") return { "status": status.name, } async def get_puzzle_and_solution(self, request: Dict) -> EndpointResult: coin_name: bytes32 = bytes32.from_hexstr(request["coin_id"]) height = request["height"] coin_record = await self.service.coin_store.get_coin_record(coin_name) if coin_record is None or not coin_record.spent or coin_record.spent_block_index != height: raise ValueError(f"Invalid height {height}. coin record {coin_record}") header_hash = self.service.blockchain.height_to_hash(height) assert header_hash is not None
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
true
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/rpc/wallet_rpc_client.py
flax/rpc/wallet_rpc_client.py
from typing import Dict, List, Optional, Any, Tuple, Union from flax.data_layer.data_layer_wallet import Mirror, SingletonRecord from flax.pools.pool_wallet_info import PoolWalletInfo from flax.rpc.rpc_client import RpcClient from flax.types.announcement import Announcement from flax.types.blockchain_format.coin import Coin from flax.types.blockchain_format.sized_bytes import bytes32 from flax.util.ints import uint16, uint32, uint64 from flax.wallet.notification_store import Notification from flax.wallet.trade_record import TradeRecord from flax.wallet.trading.offer import Offer from flax.wallet.transaction_record import TransactionRecord from flax.wallet.transaction_sorting import SortKey from flax.wallet.util.wallet_types import WalletType def parse_result_transactions(result: Dict[str, Any]) -> Dict[str, Any]: result["transaction"] = TransactionRecord.from_json_dict(result["transaction"]) if result["fee_transaction"]: result["fee_transaction"] = TransactionRecord.from_json_dict(result["fee_transaction"]) return result class WalletRpcClient(RpcClient): """ Client to Flax RPC, connects to a local wallet. Uses HTTP/JSON, and converts back from JSON into native python objects before returning. All api calls use POST requests. Note that this is not the same as the peer protocol, or wallet protocol (which run Flax's protocol on top of TCP), it's a separate protocol on top of HTTP that provides easy access to the full node. """ # Key Management APIs async def log_in(self, fingerprint: int) -> Dict: try: return await self.fetch( "log_in", {"fingerprint": fingerprint, "type": "start"}, ) except ValueError as e: return e.args[0] async def get_logged_in_fingerprint(self) -> int: return (await self.fetch("get_logged_in_fingerprint", {}))["fingerprint"] async def get_public_keys(self) -> List[int]: return (await self.fetch("get_public_keys", {}))["public_key_fingerprints"] async def get_private_key(self, fingerprint: int) -> Dict: return (await self.fetch("get_private_key", {"fingerprint": fingerprint}))["private_key"] async def generate_mnemonic(self) -> List[str]: return (await self.fetch("generate_mnemonic", {}))["mnemonic"] async def add_key(self, mnemonic: List[str], request_type: str = "new_wallet") -> Dict[str, Any]: return await self.fetch("add_key", {"mnemonic": mnemonic, "type": request_type}) async def delete_key(self, fingerprint: int) -> Dict[str, Any]: return await self.fetch("delete_key", {"fingerprint": fingerprint}) async def check_delete_key(self, fingerprint: int, max_ph_to_search: int = 100) -> Dict[str, Any]: return await self.fetch("check_delete_key", {"fingerprint": fingerprint, "max_ph_to_search": max_ph_to_search}) async def delete_all_keys(self) -> Dict[str, Any]: return await self.fetch("delete_all_keys", {}) # Wallet Node APIs async def get_sync_status(self) -> bool: return (await self.fetch("get_sync_status", {}))["syncing"] async def get_synced(self) -> bool: return (await self.fetch("get_sync_status", {}))["synced"] async def get_height_info(self) -> uint32: return (await self.fetch("get_height_info", {}))["height"] async def push_tx(self, spend_bundle): return await self.fetch("push_tx", {"spend_bundle": bytes(spend_bundle).hex()}) async def push_transactions(self, txs: List[TransactionRecord]): transactions = [bytes(tx).hex() for tx in txs] return await self.fetch("push_transactions", {"transactions": transactions}) async def farm_block(self, address: str) -> Dict[str, Any]: return await self.fetch("farm_block", {"address": address}) # Wallet Management APIs async def get_wallets(self, wallet_type: Optional[WalletType] = None) -> Dict: request: Dict[str, Any] = {} if wallet_type is not None: request["type"] = wallet_type return (await self.fetch("get_wallets", request))["wallets"] # Wallet APIs async def get_wallet_balance(self, wallet_id: str) -> Dict: return (await self.fetch("get_wallet_balance", {"wallet_id": wallet_id}))["wallet_balance"] async def get_transaction(self, wallet_id: str, transaction_id: bytes32) -> TransactionRecord: res = await self.fetch( "get_transaction", {"walled_id": wallet_id, "transaction_id": transaction_id.hex()}, ) return TransactionRecord.from_json_dict_convenience(res["transaction"]) async def get_transactions( self, wallet_id: str, start: int = None, end: int = None, sort_key: SortKey = None, reverse: bool = False, to_address: Optional[str] = None, ) -> List[TransactionRecord]: request: Dict[str, Any] = {"wallet_id": wallet_id} if start is not None: request["start"] = start if end is not None: request["end"] = end if sort_key is not None: request["sort_key"] = sort_key.name request["reverse"] = reverse if to_address is not None: request["to_address"] = to_address res = await self.fetch( "get_transactions", request, ) return [TransactionRecord.from_json_dict_convenience(tx) for tx in res["transactions"]] async def get_transaction_count( self, wallet_id: str, ) -> List[TransactionRecord]: res = await self.fetch( "get_transaction_count", {"wallet_id": wallet_id}, ) return res["count"] async def get_next_address(self, wallet_id: str, new_address: bool) -> str: return (await self.fetch("get_next_address", {"wallet_id": wallet_id, "new_address": new_address}))["address"] async def send_transaction( self, wallet_id: str, amount: uint64, address: str, fee: uint64 = uint64(0), memos: Optional[List[str]] = None, min_coin_amount: uint64 = uint64(0), ) -> TransactionRecord: if memos is None: send_dict: Dict = { "wallet_id": wallet_id, "amount": amount, "address": address, "fee": fee, "min_coin_amount": min_coin_amount, } else: send_dict = { "wallet_id": wallet_id, "amount": amount, "address": address, "fee": fee, "memos": memos, "min_coin_amount": min_coin_amount, } res = await self.fetch("send_transaction", send_dict) return TransactionRecord.from_json_dict_convenience(res["transaction"]) async def send_transaction_multi( self, wallet_id: str, additions: List[Dict], coins: List[Coin] = None, fee: uint64 = uint64(0) ) -> TransactionRecord: # Converts bytes to hex for puzzle hashes additions_hex = [] for ad in additions: additions_hex.append({"amount": ad["amount"], "puzzle_hash": ad["puzzle_hash"].hex()}) if "memos" in ad: additions_hex[-1]["memos"] = ad["memos"] if coins is not None and len(coins) > 0: coins_json = [c.to_json_dict() for c in coins] response: Dict = await self.fetch( "send_transaction_multi", {"wallet_id": wallet_id, "additions": additions_hex, "coins": coins_json, "fee": fee}, ) else: response = await self.fetch( "send_transaction_multi", {"wallet_id": wallet_id, "additions": additions_hex, "fee": fee} ) return TransactionRecord.from_json_dict_convenience(response["transaction"]) async def delete_unconfirmed_transactions(self, wallet_id: str) -> None: await self.fetch( "delete_unconfirmed_transactions", {"wallet_id": wallet_id}, ) return None async def get_current_derivation_index(self) -> str: return (await self.fetch("get_current_derivation_index", {}))["index"] async def extend_derivation_index(self, index: int) -> str: return (await self.fetch("extend_derivation_index", {"index": index}))["index"] async def get_farmed_amount(self) -> Dict: return await self.fetch("get_farmed_amount", {}) async def create_signed_transactions( self, additions: List[Dict], coins: List[Coin] = None, fee: uint64 = uint64(0), coin_announcements: Optional[List[Announcement]] = None, puzzle_announcements: Optional[List[Announcement]] = None, min_coin_amount: uint64 = uint64(0), exclude_coins: Optional[List[Coin]] = None, wallet_id: Optional[int] = None, ) -> List[TransactionRecord]: # Converts bytes to hex for puzzle hashes additions_hex = [] for ad in additions: additions_hex.append({"amount": ad["amount"], "puzzle_hash": ad["puzzle_hash"].hex()}) if "memos" in ad: additions_hex[-1]["memos"] = ad["memos"] request: Dict[str, Any] = { "additions": additions_hex, "fee": fee, "min_coin_amount": min_coin_amount, } if coin_announcements is not None and len(coin_announcements) > 0: request["coin_announcements"] = [ { "coin_id": ann.origin_info.hex(), "message": ann.message.hex(), "morph_bytes": ann.morph_bytes.hex() if ann.morph_bytes is not None else b"".hex(), } for ann in coin_announcements ] if puzzle_announcements is not None and len(puzzle_announcements) > 0: request["puzzle_announcements"] = [ { "puzzle_hash": ann.origin_info.hex(), "message": ann.message.hex(), "morph_bytes": ann.morph_bytes.hex() if ann.morph_bytes is not None else b"".hex(), } for ann in puzzle_announcements ] if coins is not None and len(coins) > 0: coins_json = [c.to_json_dict() for c in coins] request["coins"] = coins_json if exclude_coins is not None and len(exclude_coins) > 0: exclude_coins_json = [exclude_coin.to_json_dict() for exclude_coin in exclude_coins] request["exclude_coins"] = exclude_coins_json if wallet_id: request["wallet_id"] = wallet_id response: Dict = await self.fetch("create_signed_transaction", request) return [TransactionRecord.from_json_dict_convenience(tx) for tx in response["signed_txs"]] async def create_signed_transaction( self, additions: List[Dict], coins: List[Coin] = None, fee: uint64 = uint64(0), coin_announcements: Optional[List[Announcement]] = None, puzzle_announcements: Optional[List[Announcement]] = None, min_coin_amount: uint64 = uint64(0), exclude_coins: Optional[List[Coin]] = None, wallet_id: Optional[int] = None, ) -> TransactionRecord: txs: List[TransactionRecord] = await self.create_signed_transactions( additions=additions, coins=coins, fee=fee, coin_announcements=coin_announcements, puzzle_announcements=puzzle_announcements, min_coin_amount=min_coin_amount, exclude_coins=exclude_coins, wallet_id=wallet_id, ) if len(txs) == 0: raise ValueError("`create_signed_transaction` returned empty list!") return txs[0] async def select_coins( self, *, amount: int, wallet_id: int, excluded_coins: Optional[List[Coin]] = None, min_coin_amount: uint64 = uint64(0), ) -> List[Coin]: if excluded_coins is None: excluded_coins = [] request = { "amount": amount, "wallet_id": wallet_id, "min_coin_amount": min_coin_amount, "excluded_coins": [excluded_coin.to_json_dict() for excluded_coin in excluded_coins], } response: Dict[str, List[Dict]] = await self.fetch("select_coins", request) return [Coin.from_json_dict(coin) for coin in response["coins"]] # DID wallet async def create_new_did_wallet( self, amount: int, fee: int = 0, name: Optional[str] = "DID Wallet", backup_ids: List[str] = [], required_num: int = 0, ) -> Dict: request: Dict[str, Any] = { "wallet_type": "did_wallet", "did_type": "new", "backup_dids": backup_ids, "num_of_backup_ids_needed": required_num, "amount": amount, "fee": fee, "wallet_name": name, } response = await self.fetch("create_new_wallet", request) return response async def get_did_id(self, wallet_id: int) -> Dict: request: Dict[str, Any] = { "wallet_id": wallet_id, } response = await self.fetch("did_get_did", request) return response async def create_did_backup_file(self, wallet_id: int, filename: str) -> Dict: request: Dict[str, Any] = { "wallet_id": wallet_id, "filename": filename, } response = await self.fetch("did_create_backup_file", request) return response async def update_did_recovery_list(self, wallet_id: int, recovery_list: List[str], num_verification: int) -> Dict: request: Dict[str, Any] = { "wallet_id": wallet_id, "new_list": recovery_list, "num_verifications_required": num_verification, } response = await self.fetch("did_update_recovery_ids", request) return response async def get_did_recovery_list(self, wallet_id: int) -> Dict: request: Dict[str, Any] = { "wallet_id": wallet_id, } response = await self.fetch("did_get_recovery_list", request) return response async def update_did_metadata(self, wallet_id: int, metadata: Dict) -> Dict: request: Dict[str, Any] = { "wallet_id": wallet_id, "metadata": metadata, } response = await self.fetch("did_update_metadata", request) return response async def get_did_metadata(self, wallet_id: int) -> Dict: request: Dict[str, Any] = { "wallet_id": wallet_id, } response = await self.fetch("did_get_metadata", request) return response async def create_new_did_wallet_from_recovery(self, filename: str) -> Dict: request: Dict[str, Any] = { "wallet_type": "did_wallet", "did_type": "recovery", "filename": filename, } response = await self.fetch("create_new_wallet", request) return response async def did_create_attest( self, wallet_id: int, coin_name: str, pubkey: str, puzhash: str, file_name: str ) -> Dict: request: Dict[str, Any] = { "wallet_id": wallet_id, "coin_name": coin_name, "pubkey": pubkey, "puzhash": puzhash, "filename": file_name, } response = await self.fetch("did_create_attest", request) return response async def did_recovery_spend(self, wallet_id: int, attest_filenames: str) -> Dict: request: Dict[str, Any] = { "wallet_id": wallet_id, "attest_filenames": attest_filenames, } response = await self.fetch("did_recovery_spend", request) return response async def did_transfer_did(self, wallet_id: int, address: str, fee: int, with_recovery: bool) -> Dict: request: Dict[str, Any] = { "wallet_id": wallet_id, "inner_address": address, "fee": fee, "with_recovery_info": with_recovery, } response = await self.fetch("did_transfer_did", request) return response async def did_set_wallet_name(self, wallet_id: int, name: str) -> Dict: request = {"wallet_id": wallet_id, "name": name} response = await self.fetch("did_set_wallet_name", request) return response async def did_get_wallet_name(self, wallet_id: int) -> Dict: request = {"wallet_id": wallet_id} response = await self.fetch("did_get_wallet_name", request) return response # TODO: test all invocations of create_new_pool_wallet with new fee arg. async def create_new_pool_wallet( self, target_puzzlehash: Optional[bytes32], pool_url: Optional[str], relative_lock_height: uint32, backup_host: str, mode: str, state: str, fee: uint64, p2_singleton_delay_time: Optional[uint64] = None, p2_singleton_delayed_ph: Optional[bytes32] = None, ) -> TransactionRecord: request: Dict[str, Any] = { "wallet_type": "pool_wallet", "mode": mode, "initial_target_state": { "target_puzzle_hash": target_puzzlehash.hex() if target_puzzlehash else None, "relative_lock_height": relative_lock_height, "pool_url": pool_url, "state": state, }, "fee": fee, } if p2_singleton_delay_time is not None: request["p2_singleton_delay_time"] = p2_singleton_delay_time if p2_singleton_delayed_ph is not None: request["p2_singleton_delayed_ph"] = p2_singleton_delayed_ph.hex() res = await self.fetch("create_new_wallet", request) return TransactionRecord.from_json_dict(res["transaction"]) async def pw_self_pool(self, wallet_id: str, fee: uint64) -> Dict: reply = await self.fetch("pw_self_pool", {"wallet_id": wallet_id, "fee": fee}) reply = parse_result_transactions(reply) return reply async def pw_join_pool( self, wallet_id: str, target_puzzlehash: bytes32, pool_url: str, relative_lock_height: uint32, fee: uint64 ) -> Dict: request = { "wallet_id": int(wallet_id), "target_puzzlehash": target_puzzlehash.hex(), "relative_lock_height": relative_lock_height, "pool_url": pool_url, "fee": fee, } reply = await self.fetch("pw_join_pool", request) reply = parse_result_transactions(reply) return reply async def pw_absorb_rewards( self, wallet_id: str, fee: uint64 = uint64(0), max_spends_in_tx: Optional[int] = None ) -> Dict: reply = await self.fetch( "pw_absorb_rewards", {"wallet_id": wallet_id, "fee": fee, "max_spends_in_tx": max_spends_in_tx} ) reply["state"] = PoolWalletInfo.from_json_dict(reply["state"]) reply = parse_result_transactions(reply) return reply async def pw_status(self, wallet_id: str) -> Tuple[PoolWalletInfo, List[TransactionRecord]]: json_dict = await self.fetch("pw_status", {"wallet_id": wallet_id}) return ( PoolWalletInfo.from_json_dict(json_dict["state"]), [TransactionRecord.from_json_dict(tr) for tr in json_dict["unconfirmed_transactions"]], ) # CATS async def create_new_cat_and_wallet(self, amount: uint64) -> Dict: request: Dict[str, Any] = { "wallet_type": "cat_wallet", "mode": "new", "amount": amount, } return await self.fetch("create_new_wallet", request) async def create_wallet_for_existing_cat(self, asset_id: bytes) -> Dict: request: Dict[str, Any] = { "wallet_type": "cat_wallet", "asset_id": asset_id.hex(), "mode": "existing", } return await self.fetch("create_new_wallet", request) async def get_cat_asset_id(self, wallet_id: str) -> bytes32: request: Dict[str, Any] = { "wallet_id": wallet_id, } return bytes32.from_hexstr((await self.fetch("cat_get_asset_id", request))["asset_id"]) async def get_stray_cats(self) -> Dict: response = await self.fetch("get_stray_cats", {}) return response["stray_cats"] async def cat_asset_id_to_name(self, asset_id: bytes32) -> Optional[Tuple[Optional[uint32], str]]: request: Dict[str, Any] = { "asset_id": asset_id.hex(), } try: res = await self.fetch("cat_asset_id_to_name", request) except ValueError: return None wallet_id: Optional[uint32] = None if res["wallet_id"] is None else uint32(int(res["wallet_id"])) return wallet_id, res["name"] async def get_cat_name(self, wallet_id: str) -> str: request: Dict[str, Any] = { "wallet_id": wallet_id, } return (await self.fetch("cat_get_name", request))["name"] async def set_cat_name(self, wallet_id: str, name: str) -> None: request: Dict[str, Any] = { "wallet_id": wallet_id, "name": name, } await self.fetch("cat_set_name", request) async def cat_spend( self, wallet_id: str, amount: uint64, inner_address: str, fee: uint64 = uint64(0), memos: Optional[List[str]] = None, min_coin_amount: uint64 = uint64(0), ) -> TransactionRecord: send_dict = { "wallet_id": wallet_id, "amount": amount, "inner_address": inner_address, "fee": fee, "memos": memos if memos else [], "min_coin_amount": min_coin_amount, } res = await self.fetch("cat_spend", send_dict) return TransactionRecord.from_json_dict_convenience(res["transaction"]) # Offers async def create_offer_for_ids( self, offer_dict: Dict[Union[uint32, str], int], driver_dict: Dict[str, Any] = None, solver: Dict[str, Any] = None, fee=uint64(0), validate_only: bool = False, min_coin_amount: uint64 = uint64(0), ) -> Tuple[Optional[Offer], TradeRecord]: send_dict: Dict[str, int] = {str(key): value for key, value in offer_dict.items()} req = { "offer": send_dict, "validate_only": validate_only, "fee": fee, "min_coin_amount": min_coin_amount, } if driver_dict is not None: req["driver_dict"] = driver_dict if solver is not None: req["solver"] = solver res = await self.fetch("create_offer_for_ids", req) offer: Optional[Offer] = None if validate_only else Offer.from_bech32(res["offer"]) offer_str: str = "" if offer is None else bytes(offer).hex() return offer, TradeRecord.from_json_dict_convenience(res["trade_record"], offer_str) async def get_offer_summary(self, offer: Offer, advanced: bool = False) -> Dict[str, Dict[str, int]]: res = await self.fetch("get_offer_summary", {"offer": offer.to_bech32(), "advanced": advanced}) return res["summary"] async def check_offer_validity(self, offer: Offer) -> bool: res = await self.fetch("check_offer_validity", {"offer": offer.to_bech32()}) return res["valid"] async def take_offer( self, offer: Offer, solver: Dict[str, Any] = None, fee=uint64(0), min_coin_amount: uint64 = uint64(0) ) -> TradeRecord: req = {"offer": offer.to_bech32(), "fee": fee, "min_coin_amount": min_coin_amount} if solver is not None: req["solver"] = solver res = await self.fetch("take_offer", req) return TradeRecord.from_json_dict_convenience(res["trade_record"]) async def get_offer(self, trade_id: bytes32, file_contents: bool = False) -> TradeRecord: res = await self.fetch("get_offer", {"trade_id": trade_id.hex(), "file_contents": file_contents}) offer_str = bytes(Offer.from_bech32(res["offer"])).hex() if file_contents else "" return TradeRecord.from_json_dict_convenience(res["trade_record"], offer_str) async def get_all_offers( self, start: int = 0, end: int = 50, sort_key: str = None, reverse: bool = False, file_contents: bool = False, exclude_my_offers: bool = False, exclude_taken_offers: bool = False, include_completed: bool = False, ) -> List[TradeRecord]: res = await self.fetch( "get_all_offers", { "start": start, "end": end, "sort_key": sort_key, "reverse": reverse, "file_contents": file_contents, "exclude_my_offers": exclude_my_offers, "exclude_taken_offers": exclude_taken_offers, "include_completed": include_completed, }, ) records = [] if file_contents: optional_offers = [bytes(Offer.from_bech32(o)).hex() for o in res["offers"]] else: optional_offers = [""] * len(res["trade_records"]) for record, offer in zip(res["trade_records"], optional_offers): records.append(TradeRecord.from_json_dict_convenience(record, offer)) return records async def cancel_offer(self, trade_id: bytes32, fee=uint64(0), secure: bool = True): await self.fetch("cancel_offer", {"trade_id": trade_id.hex(), "secure": secure, "fee": fee}) # NFT wallet async def create_new_nft_wallet(self, did_id, name=None): request: Dict[str, Any] = { "wallet_type": "nft_wallet", "did_id": did_id, "name": name, } response = await self.fetch("create_new_wallet", request) return response async def mint_nft( self, wallet_id, royalty_address, target_address, hash, uris, meta_hash="", meta_uris=[], license_hash="", license_uris=[], edition_total=1, edition_number=1, fee=0, royalty_percentage=0, did_id=None, ): request: Dict[str, Any] = { "wallet_id": wallet_id, "royalty_address": royalty_address, "target_address": target_address, "hash": hash, "uris": uris, "meta_hash": meta_hash, "meta_uris": meta_uris, "license_hash": license_hash, "license_uris": license_uris, "edition_number": edition_number, "edition_total": edition_total, "royalty_percentage": royalty_percentage, "did_id": did_id, "fee": fee, } response = await self.fetch("nft_mint_nft", request) return response async def add_uri_to_nft(self, wallet_id, nft_coin_id, key, uri, fee): request: Dict[str, Any] = { "wallet_id": wallet_id, "nft_coin_id": nft_coin_id, "uri": uri, "key": key, "fee": fee, } response = await self.fetch("nft_add_uri", request) return response async def nft_calculate_royalties( self, royalty_assets_dict: Dict[Any, Tuple[Any, uint16]], fungible_asset_dict: Dict[Any, uint64], ) -> Dict[Any, List[Dict[str, Any]]]: request: Dict[str, Any] = { "royalty_assets": [ {"asset": id, "royalty_address": royalty_info[0], "royalty_percentage": royalty_info[1]} for id, royalty_info in royalty_assets_dict.items() ], "fungible_assets": [{"asset": name, "amount": amount} for name, amount in fungible_asset_dict.items()], } response = await self.fetch("nft_calculate_royalties", request) del response["success"] return response async def get_nft_info(self, coin_id: str, latest: bool = True): request: Dict[str, Any] = {"coin_id": coin_id, "latest": latest} response = await self.fetch("nft_get_info", request) return response async def transfer_nft(self, wallet_id, nft_coin_id, target_address, fee): request: Dict[str, Any] = { "wallet_id": wallet_id, "nft_coin_id": nft_coin_id, "target_address": target_address, "fee": fee, } response = await self.fetch("nft_transfer_nft", request) return response async def list_nfts(self, wallet_id): request: Dict[str, Any] = {"wallet_id": wallet_id} response = await self.fetch("nft_get_nfts", request) return response async def set_nft_did(self, wallet_id, did_id, nft_coin_id, fee): request: Dict[str, Any] = {"wallet_id": wallet_id, "did_id": did_id, "nft_coin_id": nft_coin_id, "fee": fee} response = await self.fetch("nft_set_nft_did", request) return response async def get_nft_wallet_did(self, wallet_id): request: Dict[str, Any] = {"wallet_id": wallet_id} response = await self.fetch("nft_get_wallet_did", request) return response async def nft_mint_bulk( self, wallet_id: int, metadata_list: List[Dict[str, Any]], royalty_percentage: Optional[int], royalty_address: Optional[str], target_list: Optional[List[str]] = None, mint_number_start: Optional[int] = 1, mint_total: Optional[int] = None, xfx_coins: Optional[List[Dict]] = None, xfx_change_target: Optional[str] = None, new_innerpuzhash: Optional[str] = None, did_coin: Optional[Dict] = None, did_lineage_parent: Optional[str] = None, mint_from_did: Optional[bool] = False, fee: Optional[int] = 0, ) -> Dict: request = { "wallet_id": wallet_id, "metadata_list": metadata_list, "target_list": target_list, "royalty_percentage": royalty_percentage, "royalty_address": royalty_address, "mint_number_start": mint_number_start, "mint_total": mint_total, "xfx_coins": xfx_coins, "xfx_change_target": xfx_change_target, "new_innerpuzhash": new_innerpuzhash, "did_coin": did_coin, "did_lineage_parent": did_lineage_parent, "mint_from_did": mint_from_did, "fee": fee, } response = await self.fetch("nft_mint_bulk", request) return response # DataLayer async def create_new_dl(self, root: bytes32, fee: uint64) -> Tuple[List[TransactionRecord], bytes32]: request = {"root": root.hex(), "fee": fee} response = await self.fetch("create_new_dl", request) txs: List[TransactionRecord] = [ TransactionRecord.from_json_dict_convenience(tx) for tx in response["transactions"] ] launcher_id: bytes32 = bytes32.from_hexstr(response["launcher_id"]) return txs, launcher_id async def dl_track_new(self, launcher_id: bytes32) -> None: request = {"launcher_id": launcher_id.hex()} await self.fetch("dl_track_new", request) return None async def dl_stop_tracking(self, launcher_id: bytes32) -> None: request = {"launcher_id": launcher_id.hex()} await self.fetch("dl_stop_tracking", request) return None async def dl_latest_singleton( self, launcher_id: bytes32, only_confirmed: bool = False ) -> Optional[SingletonRecord]: request = {"launcher_id": launcher_id.hex(), "only_confirmed": only_confirmed} response = await self.fetch("dl_latest_singleton", request) return None if response["singleton"] is None else SingletonRecord.from_json_dict(response["singleton"]) async def dl_singletons_by_root(self, launcher_id: bytes32, root: bytes32) -> List[SingletonRecord]: request = {"launcher_id": launcher_id.hex(), "root": root.hex()} response = await self.fetch("dl_singletons_by_root", request) return [SingletonRecord.from_json_dict(single) for single in response["singletons"]] async def dl_update_root(self, launcher_id: bytes32, new_root: bytes32, fee: uint64) -> TransactionRecord: request = {"launcher_id": launcher_id.hex(), "new_root": new_root.hex(), "fee": fee}
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
true
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/rpc/timelord_rpc_api.py
flax/rpc/timelord_rpc_api.py
from __future__ import annotations from typing import Any, Dict, List, Optional from flax.rpc.rpc_server import Endpoint from flax.timelord.timelord import Timelord from flax.util.ws_message import WsRpcMessage, create_payload_dict class TimelordRpcApi: def __init__(self, timelord: Timelord): self.service = timelord self.service_name = "flax_timelord" def get_routes(self) -> Dict[str, Endpoint]: return {} async def _state_changed(self, change: str, change_data: Optional[Dict[str, Any]] = None) -> List[WsRpcMessage]: payloads = [] if change_data is None: change_data = {} if change in ("finished_pot", "new_compact_proof", "skipping_peak", "new_peak"): payloads.append(create_payload_dict(change, change_data, self.service_name, "metrics")) return payloads
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/rpc/wallet_rpc_api.py
flax/rpc/wallet_rpc_api.py
import asyncio import dataclasses import json import logging from pathlib import Path from typing import Any, Dict, List, Optional, Set, Tuple, Union from blspy import G1Element, G2Element, PrivateKey from flax.consensus.block_rewards import calculate_base_farmer_reward from flax.data_layer.data_layer_wallet import DataLayerWallet from flax.pools.pool_wallet import PoolWallet from flax.pools.pool_wallet_info import FARMING_TO_POOL, PoolState, PoolWalletInfo, create_pool_state from flax.protocols.protocol_message_types import ProtocolMessageTypes from flax.protocols.wallet_protocol import CoinState from flax.rpc.rpc_server import Endpoint, EndpointResult, default_get_connections from flax.server.outbound_message import NodeType, make_msg from flax.server.ws_connection import WSFlaxConnection from flax.simulator.simulator_protocol import FarmNewBlockProtocol from flax.types.announcement import Announcement from flax.types.blockchain_format.coin import Coin, coin_as_list from flax.types.blockchain_format.program import Program from flax.types.blockchain_format.sized_bytes import bytes32 from flax.types.coin_spend import CoinSpend from flax.types.spend_bundle import SpendBundle from flax.util.bech32m import decode_puzzle_hash, encode_puzzle_hash from flax.util.byte_types import hexstr_to_bytes from flax.util.config import load_config from flax.util.errors import KeychainIsLocked from flax.util.ints import uint8, uint32, uint64, uint16 from flax.util.keychain import bytes_to_mnemonic, generate_mnemonic from flax.util.path import path_from_root from flax.util.ws_message import WsRpcMessage, create_payload_dict from flax.wallet.cat_wallet.cat_constants import DEFAULT_CATS from flax.wallet.cat_wallet.cat_wallet import CATWallet from flax.wallet.derive_keys import ( MAX_POOL_WALLETS, master_sk_to_farmer_sk, master_sk_to_pool_sk, master_sk_to_singleton_owner_sk, match_address_to_sk, ) from flax.wallet.did_wallet.did_wallet import DIDWallet from flax.wallet.nft_wallet import nft_puzzles from flax.wallet.nft_wallet.nft_info import NFTInfo, NFTCoinInfo from flax.wallet.nft_wallet.nft_puzzles import get_metadata_and_phs from flax.wallet.nft_wallet.nft_wallet import NFTWallet from flax.wallet.nft_wallet.uncurry_nft import UncurriedNFT from flax.wallet.notification_store import Notification from flax.wallet.outer_puzzles import AssetType from flax.wallet.puzzle_drivers import PuzzleInfo, Solver from flax.wallet.trade_record import TradeRecord from flax.wallet.trading.offer import Offer from flax.wallet.transaction_record import TransactionRecord from flax.wallet.util.address_type import AddressType, is_valid_address from flax.wallet.util.transaction_type import TransactionType from flax.wallet.util.wallet_types import AmountWithPuzzlehash, WalletType from flax.wallet.wallet_info import WalletInfo from flax.wallet.wallet_node import WalletNode from flax.wallet.wallet import Wallet from flax.wallet.wallet_protocol import WalletProtocol # Timeout for response from wallet/full node for sending a transaction TIMEOUT = 30 MAX_DERIVATION_INDEX_DELTA = 1000 log = logging.getLogger(__name__) class WalletRpcApi: def __init__(self, wallet_node: WalletNode): assert wallet_node is not None self.service = wallet_node self.service_name = "flax_wallet" self.balance_cache: Dict[int, Any] = {} def get_routes(self) -> Dict[str, Endpoint]: return { # Key management "/log_in": self.log_in, "/get_logged_in_fingerprint": self.get_logged_in_fingerprint, "/get_public_keys": self.get_public_keys, "/get_private_key": self.get_private_key, "/generate_mnemonic": self.generate_mnemonic, "/add_key": self.add_key, "/delete_key": self.delete_key, "/check_delete_key": self.check_delete_key, "/delete_all_keys": self.delete_all_keys, # Wallet node "/get_sync_status": self.get_sync_status, "/get_height_info": self.get_height_info, "/push_tx": self.push_tx, "/push_transactions": self.push_transactions, "/farm_block": self.farm_block, # Only when node simulator is running # this function is just here for backwards-compatibility. It will probably # be removed in the future "/get_initial_freeze_period": self.get_initial_freeze_period, "/get_network_info": self.get_network_info, # Wallet management "/get_wallets": self.get_wallets, "/create_new_wallet": self.create_new_wallet, # Wallet "/get_wallet_balance": self.get_wallet_balance, "/get_transaction": self.get_transaction, "/get_transactions": self.get_transactions, "/get_transaction_count": self.get_transaction_count, "/get_next_address": self.get_next_address, "/send_transaction": self.send_transaction, "/send_transaction_multi": self.send_transaction_multi, "/get_farmed_amount": self.get_farmed_amount, "/create_signed_transaction": self.create_signed_transaction, "/delete_unconfirmed_transactions": self.delete_unconfirmed_transactions, "/select_coins": self.select_coins, "/get_current_derivation_index": self.get_current_derivation_index, "/extend_derivation_index": self.extend_derivation_index, "/get_notifications": self.get_notifications, "/delete_notifications": self.delete_notifications, "/send_notification": self.send_notification, "/sign_message_by_address": self.sign_message_by_address, "/sign_message_by_id": self.sign_message_by_id, # CATs and trading "/cat_set_name": self.cat_set_name, "/cat_asset_id_to_name": self.cat_asset_id_to_name, "/cat_get_name": self.cat_get_name, "/get_stray_cats": self.get_stray_cats, "/cat_spend": self.cat_spend, "/cat_get_asset_id": self.cat_get_asset_id, "/create_offer_for_ids": self.create_offer_for_ids, "/get_offer_summary": self.get_offer_summary, "/check_offer_validity": self.check_offer_validity, "/take_offer": self.take_offer, "/get_offer": self.get_offer, "/get_all_offers": self.get_all_offers, "/get_offers_count": self.get_offers_count, "/cancel_offer": self.cancel_offer, "/cancel_offers": self.cancel_offers, "/get_cat_list": self.get_cat_list, # DID Wallet "/did_set_wallet_name": self.did_set_wallet_name, "/did_get_wallet_name": self.did_get_wallet_name, "/did_update_recovery_ids": self.did_update_recovery_ids, "/did_update_metadata": self.did_update_metadata, "/did_get_pubkey": self.did_get_pubkey, "/did_get_did": self.did_get_did, "/did_recovery_spend": self.did_recovery_spend, "/did_get_recovery_list": self.did_get_recovery_list, "/did_get_metadata": self.did_get_metadata, "/did_create_attest": self.did_create_attest, "/did_get_information_needed_for_recovery": self.did_get_information_needed_for_recovery, "/did_get_current_coin_info": self.did_get_current_coin_info, "/did_create_backup_file": self.did_create_backup_file, "/did_transfer_did": self.did_transfer_did, # NFT Wallet "/nft_mint_nft": self.nft_mint_nft, "/nft_get_nfts": self.nft_get_nfts, "/nft_get_by_did": self.nft_get_by_did, "/nft_set_nft_did": self.nft_set_nft_did, "/nft_set_nft_status": self.nft_set_nft_status, "/nft_get_wallet_did": self.nft_get_wallet_did, "/nft_get_wallets_with_dids": self.nft_get_wallets_with_dids, "/nft_get_info": self.nft_get_info, "/nft_transfer_nft": self.nft_transfer_nft, "/nft_add_uri": self.nft_add_uri, "/nft_calculate_royalties": self.nft_calculate_royalties, "/nft_mint_bulk": self.nft_mint_bulk, # Pool Wallet "/pw_join_pool": self.pw_join_pool, "/pw_self_pool": self.pw_self_pool, "/pw_absorb_rewards": self.pw_absorb_rewards, "/pw_status": self.pw_status, # DL Wallet "/create_new_dl": self.create_new_dl, "/dl_track_new": self.dl_track_new, "/dl_stop_tracking": self.dl_stop_tracking, "/dl_latest_singleton": self.dl_latest_singleton, "/dl_singletons_by_root": self.dl_singletons_by_root, "/dl_update_root": self.dl_update_root, "/dl_update_multiple": self.dl_update_multiple, "/dl_history": self.dl_history, "/dl_owned_singletons": self.dl_owned_singletons, "/dl_get_mirrors": self.dl_get_mirrors, "/dl_new_mirror": self.dl_new_mirror, "/dl_delete_mirror": self.dl_delete_mirror, } def get_connections(self, request_node_type: Optional[NodeType]) -> List[Dict[str, Any]]: return default_get_connections(server=self.service.server, request_node_type=request_node_type) async def _state_changed(self, change: str, change_data: Optional[Dict[str, Any]]) -> List[WsRpcMessage]: """ Called by the WalletNode or WalletStateManager when something has changed in the wallet. This gives us an opportunity to send notifications to all connected clients via WebSocket. """ payloads = [] if change in {"sync_changed", "coin_added"}: # Metrics is the only current consumer for this event payloads.append(create_payload_dict(change, change_data, self.service_name, "metrics")) if change in { "offer_cancelled", "offer_added", "wallet_created", "did_coin_added", "nft_coin_added", "nft_coin_removed", "nft_coin_updated", "nft_coin_did_set", "new_block", "coin_removed", "coin_added", "new_derivation_index", "added_stray_cat", "pending_transaction", "tx_update", }: payloads.append(create_payload_dict("state_changed", change_data, self.service_name, "wallet_ui")) return payloads async def _stop_wallet(self): """ Stops a currently running wallet/key, which allows starting the wallet with a new key. Each key has it's own wallet database. """ if self.service is not None: self.service._close() peers_close_task: Optional[asyncio.Task] = await self.service._await_closed(shutting_down=False) if peers_close_task is not None: await peers_close_task async def _convert_tx_puzzle_hash(self, tx: TransactionRecord) -> TransactionRecord: return dataclasses.replace( tx, to_puzzle_hash=( await self.service.wallet_state_manager.convert_puzzle_hash(tx.wallet_id, tx.to_puzzle_hash) ), ) ########################################################################################## # Key management ########################################################################################## async def log_in(self, request) -> EndpointResult: """ Logs in the wallet with a specific key. """ fingerprint = request["fingerprint"] if self.service.logged_in_fingerprint == fingerprint: return {"fingerprint": fingerprint} await self._stop_wallet() self.balance_cache = {} started = await self.service._start_with_fingerprint(fingerprint) if started is True: return {"fingerprint": fingerprint} return {"success": False, "error": "Unknown Error"} async def get_logged_in_fingerprint(self, request: Dict) -> EndpointResult: return {"fingerprint": self.service.logged_in_fingerprint} async def get_public_keys(self, request: Dict) -> EndpointResult: try: fingerprints = [ sk.get_g1().get_fingerprint() for (sk, seed) in await self.service.keychain_proxy.get_all_private_keys() ] except KeychainIsLocked: return {"keyring_is_locked": True} except Exception as e: raise Exception( "Error while getting keys. If the issue persists, restart all services." f" Original error: {type(e).__name__}: {e}" ) from e else: return {"public_key_fingerprints": fingerprints} async def _get_private_key(self, fingerprint) -> Tuple[Optional[PrivateKey], Optional[bytes]]: try: all_keys = await self.service.keychain_proxy.get_all_private_keys() for sk, seed in all_keys: if sk.get_g1().get_fingerprint() == fingerprint: return sk, seed except Exception as e: log.error(f"Failed to get private key by fingerprint: {e}") return None, None async def get_private_key(self, request) -> EndpointResult: fingerprint = request["fingerprint"] sk, seed = await self._get_private_key(fingerprint) if sk is not None: s = bytes_to_mnemonic(seed) if seed is not None else None return { "private_key": { "fingerprint": fingerprint, "sk": bytes(sk).hex(), "pk": bytes(sk.get_g1()).hex(), "farmer_pk": bytes(master_sk_to_farmer_sk(sk).get_g1()).hex(), "pool_pk": bytes(master_sk_to_pool_sk(sk).get_g1()).hex(), "seed": s, }, } return {"success": False, "private_key": {"fingerprint": fingerprint}} async def generate_mnemonic(self, request: Dict) -> EndpointResult: return {"mnemonic": generate_mnemonic().split(" ")} async def add_key(self, request) -> EndpointResult: if "mnemonic" not in request: raise ValueError("Mnemonic not in request") # Adding a key from 24 word mnemonic mnemonic = request["mnemonic"] try: sk = await self.service.keychain_proxy.add_private_key(" ".join(mnemonic)) except KeyError as e: return { "success": False, "error": f"The word '{e.args[0]}' is incorrect.'", "word": e.args[0], } except Exception as e: return {"success": False, "error": str(e)} fingerprint = sk.get_g1().get_fingerprint() await self._stop_wallet() # Makes sure the new key is added to config properly started = False try: await self.service.keychain_proxy.check_keys(self.service.root_path) except Exception as e: log.error(f"Failed to check_keys after adding a new key: {e}") started = await self.service._start_with_fingerprint(fingerprint=fingerprint) if started is True: return {"fingerprint": fingerprint} raise ValueError("Failed to start") async def delete_key(self, request) -> EndpointResult: await self._stop_wallet() fingerprint = request["fingerprint"] try: await self.service.keychain_proxy.delete_key_by_fingerprint(fingerprint) except Exception as e: log.error(f"Failed to delete key by fingerprint: {e}") return {"success": False, "error": str(e)} path = path_from_root( self.service.root_path, f"{self.service.config['database_path']}-{fingerprint}", ) if path.exists(): path.unlink() return {} async def _check_key_used_for_rewards( self, new_root: Path, sk: PrivateKey, max_ph_to_search: int ) -> Tuple[bool, bool]: """Checks if the given key is used for either the farmer rewards or pool rewards returns a tuple of two booleans The first is true if the key is used as the Farmer rewards, otherwise false The second is true if the key is used as the Pool rewards, otherwise false Returns both false if the key cannot be found with the given fingerprint """ if sk is None: return False, False config: Dict = load_config(new_root, "config.yaml") farmer_target = config["farmer"].get("xfx_target_address") pool_target = config["pool"].get("xfx_target_address") address_to_check: List[bytes32] = [decode_puzzle_hash(farmer_target), decode_puzzle_hash(pool_target)] found_addresses: Set[bytes32] = match_address_to_sk(sk, address_to_check, max_ph_to_search) found_farmer = address_to_check[0] in found_addresses found_pool = address_to_check[1] in found_addresses return found_farmer, found_pool async def check_delete_key(self, request) -> EndpointResult: """Check the key use prior to possible deletion checks whether key is used for either farm or pool rewards checks if any wallets have a non-zero balance """ used_for_farmer: bool = False used_for_pool: bool = False walletBalance: bool = False fingerprint = request["fingerprint"] max_ph_to_search = request.get("max_ph_to_search", 100) sk, _ = await self._get_private_key(fingerprint) if sk is not None: used_for_farmer, used_for_pool = await self._check_key_used_for_rewards( self.service.root_path, sk, max_ph_to_search ) if self.service.logged_in_fingerprint != fingerprint: await self._stop_wallet() await self.service._start_with_fingerprint(fingerprint=fingerprint) wallets: List[WalletInfo] = await self.service.wallet_state_manager.get_all_wallet_info_entries() for w in wallets: wallet = self.service.wallet_state_manager.wallets[w.id] unspent = await self.service.wallet_state_manager.coin_store.get_unspent_coins_for_wallet(w.id) balance = await wallet.get_confirmed_balance(unspent) pending_balance = await wallet.get_unconfirmed_balance(unspent) if (balance + pending_balance) > 0: walletBalance = True break return { "fingerprint": fingerprint, "used_for_farmer_rewards": used_for_farmer, "used_for_pool_rewards": used_for_pool, "wallet_balance": walletBalance, } async def delete_all_keys(self, request: Dict) -> EndpointResult: await self._stop_wallet() try: await self.service.keychain_proxy.delete_all_keys() except Exception as e: log.error(f"Failed to delete all keys: {e}") return {"success": False, "error": str(e)} path = path_from_root(self.service.root_path, self.service.config["database_path"]) if path.exists(): path.unlink() return {} ########################################################################################## # Wallet Node ########################################################################################## async def get_sync_status(self, request: Dict) -> EndpointResult: sync_mode = self.service.wallet_state_manager.sync_mode has_pending_queue_items = self.service.new_peak_queue.has_pending_data_process_items() syncing = sync_mode or has_pending_queue_items synced = await self.service.wallet_state_manager.synced() return {"synced": synced, "syncing": syncing, "genesis_initialized": True} async def get_height_info(self, request: Dict) -> EndpointResult: height = await self.service.wallet_state_manager.blockchain.get_finished_sync_up_to() return {"height": height} async def get_network_info(self, request: Dict) -> EndpointResult: network_name = self.service.config["selected_network"] address_prefix = self.service.config["network_overrides"]["config"][network_name]["address_prefix"] return {"network_name": network_name, "network_prefix": address_prefix} async def push_tx(self, request: Dict) -> EndpointResult: nodes = self.service.server.get_connections(NodeType.FULL_NODE) if len(nodes) == 0: raise ValueError("Wallet is not currently connected to any full node peers") await self.service.push_tx(SpendBundle.from_bytes(hexstr_to_bytes(request["spend_bundle"]))) return {} async def push_transactions(self, request: Dict) -> EndpointResult: if await self.service.wallet_state_manager.synced() is False: raise ValueError("Wallet needs to be fully synced before sending transactions") wallet = self.service.wallet_state_manager.main_wallet txs: List[TransactionRecord] = [] for transaction_hexstr in request["transactions"]: tx = TransactionRecord.from_bytes(hexstr_to_bytes(transaction_hexstr)) txs.append(tx) async with self.service.wallet_state_manager.lock: for tx in txs: await wallet.push_transaction(tx) return {} async def farm_block(self, request) -> EndpointResult: raw_puzzle_hash = decode_puzzle_hash(request["address"]) request = FarmNewBlockProtocol(raw_puzzle_hash) msg = make_msg(ProtocolMessageTypes.farm_new_block, request) await self.service.server.send_to_all([msg], NodeType.FULL_NODE) return {} ########################################################################################## # Wallet Management ########################################################################################## async def get_wallets(self, request: Dict) -> EndpointResult: include_data: bool = request.get("include_data", True) wallet_type: Optional[WalletType] = None if "type" in request: wallet_type = WalletType(request["type"]) wallets: List[WalletInfo] = await self.service.wallet_state_manager.get_all_wallet_info_entries(wallet_type) if not include_data: result: List[WalletInfo] = [] for wallet in wallets: result.append(WalletInfo(wallet.id, wallet.name, wallet.type, "")) wallets = result response: EndpointResult = {"wallets": wallets} if self.service.logged_in_fingerprint is not None: response["fingerprint"] = self.service.logged_in_fingerprint return response async def create_new_wallet(self, request: Dict) -> EndpointResult: wallet_state_manager = self.service.wallet_state_manager if await self.service.wallet_state_manager.synced() is False: raise ValueError("Wallet needs to be fully synced.") main_wallet = wallet_state_manager.main_wallet fee = uint64(request.get("fee", 0)) if request["wallet_type"] == "cat_wallet": # If not provided, the name will be autogenerated based on the tail hash. name = request.get("name", None) if request["mode"] == "new": async with self.service.wallet_state_manager.lock: cat_wallet: CATWallet = await CATWallet.create_new_cat_wallet( wallet_state_manager, main_wallet, {"identifier": "genesis_by_id"}, uint64(request["amount"]), name, ) asset_id = cat_wallet.get_asset_id() self.service.wallet_state_manager.state_changed("wallet_created") return {"type": cat_wallet.type(), "asset_id": asset_id, "wallet_id": cat_wallet.id()} elif request["mode"] == "existing": async with self.service.wallet_state_manager.lock: cat_wallet = await CATWallet.create_wallet_for_cat( wallet_state_manager, main_wallet, request["asset_id"], name ) self.service.wallet_state_manager.state_changed("wallet_created") return {"type": cat_wallet.type(), "asset_id": request["asset_id"], "wallet_id": cat_wallet.id()} else: # undefined mode pass elif request["wallet_type"] == "did_wallet": if request["did_type"] == "new": backup_dids = [] num_needed = 0 for d in request["backup_dids"]: backup_dids.append(decode_puzzle_hash(d)) if len(backup_dids) > 0: num_needed = uint64(request["num_of_backup_ids_needed"]) metadata: Dict[str, str] = {} if "metadata" in request: if type(request["metadata"]) is dict: metadata = request["metadata"] async with self.service.wallet_state_manager.lock: did_wallet_name: str = request.get("wallet_name", None) if did_wallet_name is not None: did_wallet_name = did_wallet_name.strip() did_wallet: DIDWallet = await DIDWallet.create_new_did_wallet( wallet_state_manager, main_wallet, uint64(request["amount"]), backup_dids, uint64(num_needed), metadata, did_wallet_name, uint64(request.get("fee", 0)), ) my_did_id = encode_puzzle_hash( bytes32.fromhex(did_wallet.get_my_DID()), AddressType.DID.hrp(self.service.config) ) nft_wallet_name = did_wallet_name if nft_wallet_name is not None: nft_wallet_name = f"{nft_wallet_name} NFT Wallet" await NFTWallet.create_new_nft_wallet( wallet_state_manager, main_wallet, bytes32.fromhex(did_wallet.get_my_DID()), nft_wallet_name, ) return { "success": True, "type": did_wallet.type(), "my_did": my_did_id, "wallet_id": did_wallet.id(), } elif request["did_type"] == "recovery": async with self.service.wallet_state_manager.lock: did_wallet = await DIDWallet.create_new_did_wallet_from_recovery( wallet_state_manager, main_wallet, request["backup_data"] ) assert did_wallet.did_info.temp_coin is not None assert did_wallet.did_info.temp_puzhash is not None assert did_wallet.did_info.temp_pubkey is not None my_did = did_wallet.get_my_DID() coin_name = did_wallet.did_info.temp_coin.name().hex() coin_list = coin_as_list(did_wallet.did_info.temp_coin) newpuzhash = did_wallet.did_info.temp_puzhash pubkey = did_wallet.did_info.temp_pubkey return { "success": True, "type": did_wallet.type(), "my_did": my_did, "wallet_id": did_wallet.id(), "coin_name": coin_name, "coin_list": coin_list, "newpuzhash": newpuzhash.hex(), "pubkey": pubkey.hex(), "backup_dids": did_wallet.did_info.backup_ids, "num_verifications_required": did_wallet.did_info.num_of_backup_ids_needed, } else: # undefined did_type pass elif request["wallet_type"] == "nft_wallet": for wallet in self.service.wallet_state_manager.wallets.values(): did_id: Optional[bytes32] = None if "did_id" in request and request["did_id"] is not None: did_id = decode_puzzle_hash(request["did_id"]) if wallet.type() == WalletType.NFT: assert isinstance(wallet, NFTWallet) if wallet.get_did() == did_id: log.info("NFT wallet already existed, skipping.") return { "success": True, "type": wallet.type(), "wallet_id": wallet.id(), } async with self.service.wallet_state_manager.lock: nft_wallet: NFTWallet = await NFTWallet.create_new_nft_wallet( wallet_state_manager, main_wallet, did_id, request.get("name", None) ) return { "success": True, "type": nft_wallet.type(), "wallet_id": nft_wallet.id(), } elif request["wallet_type"] == "pool_wallet": if request["mode"] == "new": if "initial_target_state" not in request: raise AttributeError("Daemon didn't send `initial_target_state`. Try updating the daemon.") owner_puzzle_hash: bytes32 = await self.service.wallet_state_manager.main_wallet.get_puzzle_hash(True) from flax.pools.pool_wallet_info import initial_pool_state_from_dict async with self.service.wallet_state_manager.lock: # We assign a pseudo unique id to each pool wallet, so that each one gets its own deterministic # owner and auth keys. The public keys will go on the blockchain, and the private keys can be found # using the root SK and trying each index from zero. The indexes are not fully unique though, # because the PoolWallet is not created until the tx gets confirmed on chain. Therefore if we # make multiple pool wallets at the same time, they will have the same ID. max_pwi = 1 for _, wallet in self.service.wallet_state_manager.wallets.items(): if wallet.type() == WalletType.POOLING_WALLET: assert isinstance(wallet, PoolWallet) pool_wallet_index = await wallet.get_pool_wallet_index() if pool_wallet_index > max_pwi: max_pwi = pool_wallet_index if max_pwi + 1 >= (MAX_POOL_WALLETS - 1): raise ValueError(f"Too many pool wallets ({max_pwi}), cannot create any more on this key.") owner_sk: PrivateKey = master_sk_to_singleton_owner_sk( self.service.wallet_state_manager.private_key, uint32(max_pwi + 1) ) owner_pk: G1Element = owner_sk.get_g1() initial_target_state = initial_pool_state_from_dict( request["initial_target_state"], owner_pk, owner_puzzle_hash ) assert initial_target_state is not None try: delayed_address = None if "p2_singleton_delayed_ph" in request: delayed_address = bytes32.from_hexstr(request["p2_singleton_delayed_ph"]) tr, p2_singleton_puzzle_hash, launcher_id = await PoolWallet.create_new_pool_wallet_transaction( wallet_state_manager, main_wallet, initial_target_state, fee, request.get("p2_singleton_delay_time", None), delayed_address, ) except Exception as e: raise ValueError(str(e)) return { "total_fee": fee * 2, "transaction": tr, "launcher_id": launcher_id.hex(),
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
true
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/rpc/data_layer_rpc_util.py
flax/rpc/data_layer_rpc_util.py
from __future__ import annotations from typing import Any, Dict, Type, TypeVar from typing_extensions import Protocol _T = TypeVar("_T") # If accepted for general use then this should be moved to a common location # and probably implemented by the framework instead of manual decoration. class MarshallableProtocol(Protocol): @classmethod def unmarshal(cls: Type[_T], marshalled: Dict[str, Any]) -> _T: ... def marshal(self) -> Dict[str, Any]: ... class UnboundRoute(Protocol): async def __call__(self, request: Dict[str, Any]) -> Dict[str, Any]: pass class UnboundMarshalledRoute(Protocol): # Ignoring pylint complaint about the name of the first argument since this is a # special case. async def __call__( # pylint: disable=E0213 protocol_self, self: Any, request: MarshallableProtocol ) -> MarshallableProtocol: pass class RouteDecorator(Protocol): def __call__(self, route: UnboundMarshalledRoute) -> UnboundRoute: pass def marshal() -> RouteDecorator: def decorator(route: UnboundMarshalledRoute) -> UnboundRoute: from typing import get_type_hints hints = get_type_hints(route) request_class: Type[MarshallableProtocol] = hints["request"] async def wrapper(self: object, request: Dict[str, object]) -> Dict[str, object]: # import json # name = route.__name__ # print(f"\n ==== {name} request.json\n{json.dumps(request, indent=4)}") unmarshalled_request = request_class.unmarshal(request) response = await route(self, request=unmarshalled_request) marshalled_response = response.marshal() # print(f"\n ==== {name} response.json\n{json.dumps(marshalled_response, indent=4)}") return marshalled_response # type ignoring since mypy is having issues with bound vs. unbound methods return wrapper # type: ignore[return-value] return decorator
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/rpc/farmer_rpc_api.py
flax/rpc/farmer_rpc_api.py
from __future__ import annotations import dataclasses import operator from typing import Any, Callable, Dict, List, Optional from typing_extensions import Protocol from flax.farmer.farmer import Farmer from flax.plot_sync.receiver import Receiver from flax.protocols.harvester_protocol import Plot from flax.rpc.rpc_server import Endpoint, EndpointResult from flax.types.blockchain_format.sized_bytes import bytes32 from flax.util.byte_types import hexstr_to_bytes from flax.util.ints import uint32 from flax.util.paginator import Paginator from flax.util.streamable import Streamable, streamable from flax.util.ws_message import WsRpcMessage, create_payload_dict class PaginatedRequestData(Protocol): @property def node_id(self) -> bytes32: pass @property def page(self) -> uint32: pass @property def page_size(self) -> uint32: pass @streamable @dataclasses.dataclass(frozen=True) class FilterItem(Streamable): key: str value: Optional[str] @streamable @dataclasses.dataclass(frozen=True) class PlotInfoRequestData(Streamable): node_id: bytes32 page: uint32 page_size: uint32 filter: List[FilterItem] = dataclasses.field(default_factory=list) sort_key: str = "filename" reverse: bool = False @streamable @dataclasses.dataclass(frozen=True) class PlotPathRequestData(Streamable): node_id: bytes32 page: uint32 page_size: uint32 filter: List[str] = dataclasses.field(default_factory=list) reverse: bool = False def paginated_plot_request(source: List[Any], request: PaginatedRequestData) -> Dict[str, object]: paginator: Paginator = Paginator(source, request.page_size) return { "node_id": request.node_id.hex(), "page": request.page, "page_count": paginator.page_count(), "total_count": len(source), "plots": paginator.get_page(request.page), } def plot_matches_filter(plot: Plot, filter_item: FilterItem) -> bool: plot_attribute = getattr(plot, filter_item.key) if filter_item.value is None: return plot_attribute is None else: return filter_item.value in str(plot_attribute) class FarmerRpcApi: def __init__(self, farmer: Farmer): self.service = farmer self.service_name = "flax_farmer" def get_routes(self) -> Dict[str, Endpoint]: return { "/get_signage_point": self.get_signage_point, "/get_signage_points": self.get_signage_points, "/get_reward_targets": self.get_reward_targets, "/set_reward_targets": self.set_reward_targets, "/get_pool_state": self.get_pool_state, "/set_payout_instructions": self.set_payout_instructions, "/get_harvesters": self.get_harvesters, "/get_harvesters_summary": self.get_harvesters_summary, "/get_harvester_plots_valid": self.get_harvester_plots_valid, "/get_harvester_plots_invalid": self.get_harvester_plots_invalid, "/get_harvester_plots_keys_missing": self.get_harvester_plots_keys_missing, "/get_harvester_plots_duplicates": self.get_harvester_plots_duplicates, "/get_pool_login_link": self.get_pool_login_link, } async def _state_changed(self, change: str, change_data: Optional[Dict[str, Any]]) -> List[WsRpcMessage]: payloads = [] if change_data is None: # TODO: maybe something better? pass elif change == "new_signage_point": sp_hash = change_data["sp_hash"] data = await self.get_signage_point({"sp_hash": sp_hash.hex()}) payloads.append( create_payload_dict( "new_signage_point", data, self.service_name, "wallet_ui", ) ) elif change == "new_farming_info": payloads.append( create_payload_dict( "new_farming_info", change_data, self.service_name, "wallet_ui", ) ) elif change == "harvester_update": payloads.append( create_payload_dict( "harvester_update", change_data, self.service_name, "wallet_ui", ) ) elif change == "harvester_removed": payloads.append( create_payload_dict( "harvester_removed", change_data, self.service_name, "wallet_ui", ) ) elif change == "submitted_partial": payloads.append( create_payload_dict( "submitted_partial", change_data, self.service_name, "metrics", ) ) elif change == "proof": payloads.append( create_payload_dict( "proof", change_data, self.service_name, "metrics", ) ) return payloads async def get_signage_point(self, request: Dict) -> EndpointResult: sp_hash = hexstr_to_bytes(request["sp_hash"]) for _, sps in self.service.sps.items(): for sp in sps: if sp.challenge_chain_sp == sp_hash: pospaces = self.service.proofs_of_space.get(sp.challenge_chain_sp, []) return { "signage_point": { "challenge_hash": sp.challenge_hash, "challenge_chain_sp": sp.challenge_chain_sp, "reward_chain_sp": sp.reward_chain_sp, "difficulty": sp.difficulty, "sub_slot_iters": sp.sub_slot_iters, "signage_point_index": sp.signage_point_index, }, "proofs": pospaces, } raise ValueError(f"Signage point {sp_hash.hex()} not found") async def get_signage_points(self, _: Dict) -> EndpointResult: result: List[Dict[str, Any]] = [] for sps in self.service.sps.values(): for sp in sps: pospaces = self.service.proofs_of_space.get(sp.challenge_chain_sp, []) result.append( { "signage_point": { "challenge_hash": sp.challenge_hash, "challenge_chain_sp": sp.challenge_chain_sp, "reward_chain_sp": sp.reward_chain_sp, "difficulty": sp.difficulty, "sub_slot_iters": sp.sub_slot_iters, "signage_point_index": sp.signage_point_index, }, "proofs": pospaces, } ) return {"signage_points": result} async def get_reward_targets(self, request: Dict) -> EndpointResult: search_for_private_key = request["search_for_private_key"] max_ph_to_search = request.get("max_ph_to_search", 500) return await self.service.get_reward_targets(search_for_private_key, max_ph_to_search) async def set_reward_targets(self, request: Dict) -> EndpointResult: farmer_target, pool_target = None, None if "farmer_target" in request: farmer_target = request["farmer_target"] if "pool_target" in request: pool_target = request["pool_target"] self.service.set_reward_targets(farmer_target, pool_target) return {} def get_pool_contract_puzzle_hash_plot_count(self, pool_contract_puzzle_hash: bytes32) -> int: plot_count: int = 0 for receiver in self.service.plot_sync_receivers.values(): plot_count += sum( plot.pool_contract_puzzle_hash == pool_contract_puzzle_hash for plot in receiver.plots().values() ) return plot_count async def get_pool_state(self, _: Dict) -> EndpointResult: pools_list = [] for p2_singleton_puzzle_hash, pool_dict in self.service.pool_state.items(): pool_state = pool_dict.copy() pool_state["p2_singleton_puzzle_hash"] = p2_singleton_puzzle_hash.hex() pool_state["plot_count"] = self.get_pool_contract_puzzle_hash_plot_count(p2_singleton_puzzle_hash) pools_list.append(pool_state) return {"pool_state": pools_list} async def set_payout_instructions(self, request: Dict) -> EndpointResult: launcher_id: bytes32 = bytes32.from_hexstr(request["launcher_id"]) await self.service.set_payout_instructions(launcher_id, request["payout_instructions"]) return {} async def get_harvesters(self, _: Dict) -> EndpointResult: return await self.service.get_harvesters(False) async def get_harvesters_summary(self, _: Dict[str, object]) -> EndpointResult: return await self.service.get_harvesters(True) async def get_harvester_plots_valid(self, request_dict: Dict[str, object]) -> EndpointResult: # TODO: Consider having a extra List[PlotInfo] in Receiver to avoid rebuilding the list for each call request = PlotInfoRequestData.from_json_dict(request_dict) plot_list = list(self.service.get_receiver(request.node_id).plots().values()) # Apply filter plot_list = [ plot for plot in plot_list if all(plot_matches_filter(plot, filter_item) for filter_item in request.filter) ] restricted_sort_keys: List[str] = ["pool_contract_puzzle_hash", "pool_public_key", "plot_public_key"] # Apply sort_key and reverse if sort_key is not restricted if request.sort_key in restricted_sort_keys: raise KeyError(f"Can't sort by optional attributes: {restricted_sort_keys}") # Sort by plot_id also by default since its unique plot_list = sorted(plot_list, key=operator.attrgetter(request.sort_key, "plot_id"), reverse=request.reverse) return paginated_plot_request(plot_list, request) def paginated_plot_path_request( self, source_func: Callable[[Receiver], List[str]], request_dict: Dict[str, object] ) -> Dict[str, object]: request: PlotPathRequestData = PlotPathRequestData.from_json_dict(request_dict) receiver = self.service.get_receiver(request.node_id) source = source_func(receiver) # Apply filter source = [plot for plot in source if all(filter_item in plot for filter_item in request.filter)] # Apply reverse source = sorted(source, reverse=request.reverse) return paginated_plot_request(source, request) async def get_harvester_plots_invalid(self, request_dict: Dict[str, object]) -> EndpointResult: return self.paginated_plot_path_request(Receiver.invalid, request_dict) async def get_harvester_plots_keys_missing(self, request_dict: Dict[str, object]) -> EndpointResult: return self.paginated_plot_path_request(Receiver.keys_missing, request_dict) async def get_harvester_plots_duplicates(self, request_dict: Dict[str, object]) -> EndpointResult: return self.paginated_plot_path_request(Receiver.duplicates, request_dict) async def get_pool_login_link(self, request: Dict) -> EndpointResult: launcher_id: bytes32 = bytes32(hexstr_to_bytes(request["launcher_id"])) login_link: Optional[str] = await self.service.generate_login_link(launcher_id) if login_link is None: raise ValueError(f"Failed to generate login link for {launcher_id.hex()}") return {"login_link": login_link}
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/rpc/__init__.py
flax/rpc/__init__.py
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/rpc/rpc_client.py
flax/rpc/rpc_client.py
import asyncio from ssl import SSLContext from typing import Dict, List, Optional, Any import aiohttp from flax.server.server import NodeType, ssl_context_for_client from flax.server.ssl_context import private_ssl_ca_paths from flax.types.blockchain_format.sized_bytes import bytes32 from flax.util.byte_types import hexstr_to_bytes from flax.util.ints import uint16 class RpcClient: """ Client to Flax RPC, connects to a local service. Uses HTTP/JSON, and converts back from JSON into native python objects before returning. All api calls use POST requests. Note that this is not the same as the peer protocol, or wallet protocol (which run Flax's protocol on top of TCP), it's a separate protocol on top of HTTP that provides easy access to the full node. """ url: str session: aiohttp.ClientSession closing_task: Optional[asyncio.Task] ssl_context: Optional[SSLContext] hostname: str port: uint16 @classmethod async def create(cls, self_hostname: str, port: uint16, root_path, net_config): self = cls() self.hostname = self_hostname self.port = port self.url = f"https://{self_hostname}:{str(port)}/" self.session = aiohttp.ClientSession() ca_crt_path, ca_key_path = private_ssl_ca_paths(root_path, net_config) crt_path = root_path / net_config["daemon_ssl"]["private_crt"] key_path = root_path / net_config["daemon_ssl"]["private_key"] self.ssl_context = ssl_context_for_client(ca_crt_path, ca_key_path, crt_path, key_path) self.closing_task = None return self async def fetch(self, path, request_json) -> Any: async with self.session.post(self.url + path, json=request_json, ssl_context=self.ssl_context) as response: response.raise_for_status() res_json = await response.json() if not res_json["success"]: raise ValueError(res_json) return res_json async def get_connections(self, node_type: Optional[NodeType] = None) -> List[Dict]: request = {} if node_type is not None: request["node_type"] = node_type.value response = await self.fetch("get_connections", request) for connection in response["connections"]: connection["node_id"] = hexstr_to_bytes(connection["node_id"]) return response["connections"] async def open_connection(self, host: str, port: int) -> Dict: return await self.fetch("open_connection", {"host": host, "port": int(port)}) async def close_connection(self, node_id: bytes32) -> Dict: return await self.fetch("close_connection", {"node_id": node_id.hex()}) async def stop_node(self) -> Dict: return await self.fetch("stop_node", {}) async def healthz(self) -> Dict: return await self.fetch("healthz", {}) def close(self) -> None: self.closing_task = asyncio.create_task(self.session.close()) async def await_closed(self) -> None: if self.closing_task is not None: await self.closing_task
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/rpc/data_layer_rpc_client.py
flax/rpc/data_layer_rpc_client.py
from __future__ import annotations from pathlib import Path from typing import Any, Dict, List, Optional from flax.rpc.rpc_client import RpcClient from flax.types.blockchain_format.sized_bytes import bytes32 from flax.util.ints import uint64 class DataLayerRpcClient(RpcClient): async def create_data_store(self, fee: Optional[uint64]) -> Dict[str, Any]: response = await self.fetch("create_data_store", {"fee": fee}) # TODO: better hinting for .fetch() (probably a TypedDict) return response # type: ignore[no-any-return] async def get_value(self, store_id: bytes32, key: bytes, root_hash: Optional[bytes32]) -> Dict[str, Any]: request: Dict[str, Any] = {"id": store_id.hex(), "key": key.hex()} if root_hash is not None: request["root_hash"] = root_hash.hex() response = await self.fetch("get_value", request) # TODO: better hinting for .fetch() (probably a TypedDict) return response # type: ignore[no-any-return] async def update_data_store( self, store_id: bytes32, changelist: List[Dict[str, str]], fee: Optional[uint64] ) -> Dict[str, Any]: response = await self.fetch("batch_update", {"id": store_id.hex(), "changelist": changelist, "fee": fee}) # TODO: better hinting for .fetch() (probably a TypedDict) return response # type: ignore[no-any-return] async def get_keys_values(self, store_id: bytes32, root_hash: Optional[bytes32]) -> Dict[str, Any]: request: Dict[str, Any] = {"id": store_id.hex()} if root_hash is not None: request["root_hash"] = root_hash.hex() response = await self.fetch("get_keys_values", request) # TODO: better hinting for .fetch() (probably a TypedDict) return response # type: ignore[no-any-return] async def get_keys(self, store_id: bytes32, root_hash: Optional[bytes32]) -> Dict[str, Any]: request: Dict[str, Any] = {"id": store_id.hex()} if root_hash is not None: request["root_hash"] = root_hash.hex() response = await self.fetch("get_keys", request) # TODO: better hinting for .fetch() (probably a TypedDict) return response # type: ignore[no-any-return] async def get_ancestors(self, store_id: bytes32, hash: bytes32) -> Dict[str, Any]: response = await self.fetch("get_ancestors", {"id": store_id.hex(), "hash": hash}) # TODO: better hinting for .fetch() (probably a TypedDict) return response # type: ignore[no-any-return] async def get_root(self, store_id: bytes32) -> Dict[str, Any]: response = await self.fetch("get_root", {"id": store_id.hex()}) # TODO: better hinting for .fetch() (probably a TypedDict) return response # type: ignore[no-any-return] async def get_local_root(self, store_id: bytes32) -> Dict[str, Any]: response = await self.fetch("get_local_root", {"id": store_id.hex()}) # TODO: better hinting for .fetch() (probably a TypedDict) return response # type: ignore[no-any-return] async def get_roots(self, store_ids: List[bytes32]) -> Dict[str, Any]: response = await self.fetch("get_roots", {"ids": store_ids}) # TODO: better hinting for .fetch() (probably a TypedDict) return response # type: ignore[no-any-return] async def subscribe(self, store_id: bytes32, urls: List[str]) -> Dict[str, Any]: response = await self.fetch("subscribe", {"id": store_id.hex(), "urls": urls}) return response # type: ignore[no-any-return] async def remove_subscriptions(self, store_id: bytes32, urls: List[str]) -> Dict[str, Any]: response = await self.fetch("remove_subscriptions", {"id": store_id.hex(), "urls": urls}) return response # type: ignore[no-any-return] async def unsubscribe(self, store_id: bytes32) -> Dict[str, Any]: response = await self.fetch("unsubscribe", {"id": store_id.hex()}) return response # type: ignore[no-any-return] async def add_missing_files( self, store_ids: Optional[List[bytes32]], overwrite: Optional[bool], foldername: Optional[Path] ) -> Dict[str, Any]: request: Dict[str, Any] = {} if store_ids is not None: request["ids"] = [store_id.hex() for store_id in store_ids] if overwrite is not None: request["overwrite"] = overwrite if foldername is not None: request["foldername"] = str(foldername) response = await self.fetch("add_missing_files", request) return response # type: ignore[no-any-return] async def get_kv_diff(self, store_id: bytes32, hash_1: bytes32, hash_2: bytes32) -> Dict[str, Any]: response = await self.fetch( "get_kv_diff", {"id": store_id.hex(), "hash_1": hash_1.hex(), "hash_2": hash_2.hex()} ) return response # type: ignore[no-any-return] async def get_root_history(self, store_id: bytes32) -> Dict[str, Any]: response = await self.fetch("get_root_history", {"id": store_id.hex()}) return response # type: ignore[no-any-return] async def add_mirror( self, store_id: bytes32, urls: List[str], amount: int, fee: Optional[uint64] ) -> Dict[str, Any]: response = await self.fetch("add_mirror", {"id": store_id.hex(), "urls": urls, "amount": amount, "fee": fee}) return response # type: ignore[no-any-return] async def delete_mirror(self, coin_id: bytes32, fee: Optional[uint64]) -> Dict[str, Any]: response = await self.fetch("delete_mirror", {"coin_id": coin_id.hex(), "fee": fee}) return response # type: ignore[no-any-return] async def get_mirrors(self, store_id: bytes32) -> Dict[str, Any]: response = await self.fetch("get_mirrors", {"id": store_id.hex()}) return response # type: ignore[no-any-return] async def get_subscriptions(self) -> Dict[str, Any]: response = await self.fetch("subscriptions", {}) return response # type: ignore[no-any-return] async def get_owned_stores(self) -> Dict[str, Any]: response = await self.fetch("get_owned_stores", {}) return response # type: ignore[no-any-return]
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/rpc/harvester_rpc_client.py
flax/rpc/harvester_rpc_client.py
from __future__ import annotations from typing import Any, Dict, List from flax.rpc.rpc_client import RpcClient class HarvesterRpcClient(RpcClient): """ Client to Flax RPC, connects to a local harvester. Uses HTTP/JSON, and converts back from JSON into native python objects before returning. All api calls use POST requests. Note that this is not the same as the peer protocol, or wallet protocol (which run Flax's protocol on top of TCP), it's a separate protocol on top of HTTP that provides easy access to the full node. """ async def get_plots(self) -> Dict[str, Any]: return await self.fetch("get_plots", {}) async def refresh_plots(self) -> None: await self.fetch("refresh_plots", {}) async def delete_plot(self, filename: str) -> bool: return await self.fetch("delete_plot", {"filename": filename}) async def add_plot_directory(self, dirname: str) -> bool: return (await self.fetch("add_plot_directory", {"dirname": dirname}))["success"] async def get_plot_directories(self) -> List[str]: return (await self.fetch("get_plot_directories", {}))["directories"] async def remove_plot_directory(self, dirname: str) -> bool: return (await self.fetch("remove_plot_directory", {"dirname": dirname}))["success"]
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/rpc/rpc_server.py
flax/rpc/rpc_server.py
from __future__ import annotations import asyncio import json import logging import traceback from dataclasses import dataclass from pathlib import Path from ssl import SSLContext from typing import Any, Awaitable, Callable, Dict, List, Optional from aiohttp import ClientConnectorError, ClientSession, ClientWebSocketResponse, WSMsgType, web from typing_extensions import Protocol, final from flax.rpc.util import wrap_http_handler from flax.server.outbound_message import NodeType from flax.server.server import FlaxServer, ssl_context_for_client, ssl_context_for_server from flax.server.ws_connection import WSFlaxConnection from flax.types.peer_info import PeerInfo from flax.util.byte_types import hexstr_to_bytes from flax.util.config import str2bool from flax.util.ints import uint16 from flax.util.json_util import dict_to_json_str from flax.util.network import WebServer from flax.util.ws_message import WsRpcMessage, create_payload, create_payload_dict, format_response, pong log = logging.getLogger(__name__) max_message_size = 50 * 1024 * 1024 # 50MB EndpointResult = Dict[str, Any] Endpoint = Callable[[Dict[str, object]], Awaitable[EndpointResult]] class StateChangedProtocol(Protocol): def __call__(self, change: str, change_data: Dict[str, Any]) -> None: ... class RpcServiceProtocol(Protocol): _shut_down: bool """Indicates a request to shut down the service. This is generally set internally by the class itself and not used externally. Consider replacing with asyncio cancellation. """ @property def server(self) -> FlaxServer: """The server object that handles the common server behavior for the RPC.""" # a property so as to be read only which allows FlaxServer to satisfy # Optional[FlaxServer] ... def get_connections(self, request_node_type: Optional[NodeType]) -> List[Dict[str, Any]]: """Report the active connections for the service. A default implementation is available and can be called as flax.rpc.rpc_server.default_get_connections() """ ... async def on_connect(self, peer: WSFlaxConnection) -> None: """Called when a new connection is established to the server.""" ... def _close(self) -> None: """Request that the service shuts down. Initiate the shutdown procedure such that multiple activities are triggered in preparation. Follow by awaiting `._await_closed()` to wait for all tasks to complete. """ ... async def _await_closed(self) -> None: """Wait for all tasks to terminate. To be called only after `._close()` is called to initiate the shutdown. """ ... def _set_state_changed_callback(self, callback: StateChangedProtocol) -> None: """Register the callable that will process state change events.""" ... async def _start(self) -> None: """Launch all necessary tasks and do any setup needed to be fully running.""" ... class RpcApiProtocol(Protocol): service_name: str """The name of the service. All lower case with underscores as needed. """ def __init__(self, node: RpcServiceProtocol) -> None: ... @property def service(self) -> RpcServiceProtocol: """The service object that provides the specific behavior for the API.""" # using a read-only property per https://github.com/python/mypy/issues/12990 ... def get_routes(self) -> Dict[str, Endpoint]: """Return the mapping of endpoints to handler callables.""" ... async def _state_changed(self, change: str, change_data: Optional[Dict[str, Any]]) -> List[WsRpcMessage]: """Notify the state change system of a changed state.""" ... def default_get_connections(server: FlaxServer, request_node_type: Optional[NodeType]) -> List[Dict[str, Any]]: connections = server.get_connections(request_node_type) con_info = [ { "type": con.connection_type, "local_port": con.local_port, "peer_host": con.peer_host, "peer_port": con.peer_port, "peer_server_port": con.peer_server_port, "node_id": con.peer_node_id, "creation_time": con.creation_time, "bytes_read": con.bytes_read, "bytes_written": con.bytes_written, "last_message_time": con.last_message_time, } for con in connections ] return con_info @final @dataclass class RpcServer: """ Implementation of RPC server. """ rpc_api: RpcApiProtocol stop_cb: Callable[[], None] service_name: str ssl_context: SSLContext ssl_client_context: SSLContext webserver: Optional[WebServer] = None daemon_connection_task: Optional[asyncio.Task[None]] = None shut_down: bool = False websocket: Optional[ClientWebSocketResponse] = None client_session: Optional[ClientSession] = None @classmethod def create( cls, rpc_api: Any, service_name: str, stop_cb: Callable[[], None], root_path: Path, net_config: Dict[str, Any] ) -> RpcServer: crt_path = root_path / net_config["daemon_ssl"]["private_crt"] key_path = root_path / net_config["daemon_ssl"]["private_key"] ca_cert_path = root_path / net_config["private_ssl_ca"]["crt"] ca_key_path = root_path / net_config["private_ssl_ca"]["key"] ssl_context = ssl_context_for_server(ca_cert_path, ca_key_path, crt_path, key_path, log=log) ssl_client_context = ssl_context_for_client(ca_cert_path, ca_key_path, crt_path, key_path, log=log) return cls(rpc_api, stop_cb, service_name, ssl_context, ssl_client_context) async def start(self, self_hostname: str, rpc_port: uint16, max_request_body_size: int, prefer_ipv6: bool) -> None: if self.webserver is not None: raise RuntimeError("RpcServer already started") self.webserver = await WebServer.create( hostname=self_hostname, port=rpc_port, max_request_body_size=max_request_body_size, routes=[web.post(route, wrap_http_handler(func)) for (route, func) in self.get_routes().items()], ssl_context=self.ssl_context, prefer_ipv6=prefer_ipv6, ) def close(self) -> None: self.shut_down = True if self.webserver is not None: self.webserver.close() async def await_closed(self) -> None: if self.websocket is not None: await self.websocket.close() if self.client_session is not None: await self.client_session.close() if self.webserver is not None: await self.webserver.await_closed() if self.daemon_connection_task is not None: await self.daemon_connection_task self.daemon_connection_task = None async def _state_changed(self, change: str, change_data: Optional[Dict[str, Any]]) -> None: if self.websocket is None or self.websocket.closed: return None payloads: List[WsRpcMessage] = await self.rpc_api._state_changed(change, change_data) if change == "add_connection" or change == "close_connection" or change == "peer_changed_peak": data = await self.get_connections({}) if data is not None: payload = create_payload_dict( "get_connections", data, self.service_name, "wallet_ui", ) payloads.append(payload) for payload in payloads: if "success" not in payload["data"]: payload["data"]["success"] = True if self.websocket is None or self.websocket.closed: return None try: await self.websocket.send_str(dict_to_json_str(payload)) except Exception: tb = traceback.format_exc() log.warning(f"Sending data failed. Exception {tb}.") def state_changed(self, change: str, change_data: Optional[Dict[str, Any]] = None) -> None: if self.websocket is None or self.websocket.closed: return None asyncio.create_task(self._state_changed(change, change_data)) @property def listen_port(self) -> uint16: if self.webserver is None: raise RuntimeError("RpcServer is not started") return self.webserver.listen_port def get_routes(self) -> Dict[str, Endpoint]: return { **self.rpc_api.get_routes(), "/get_connections": self.get_connections, "/open_connection": self.open_connection, "/close_connection": self.close_connection, "/stop_node": self.stop_node, "/get_routes": self._get_routes, "/healthz": self.healthz, } async def _get_routes(self, request: Dict[str, Any]) -> EndpointResult: return { "success": True, "routes": list(self.get_routes().keys()), } async def get_connections(self, request: Dict[str, Any]) -> EndpointResult: request_node_type: Optional[NodeType] = None if "node_type" in request: request_node_type = NodeType(request["node_type"]) if self.rpc_api.service.server is None: raise ValueError("Global connections is not set") con_info: List[Dict[str, Any]] con_info = self.rpc_api.service.get_connections(request_node_type=request_node_type) return {"connections": con_info} async def open_connection(self, request: Dict[str, Any]) -> EndpointResult: host = request["host"] port = request["port"] target_node: PeerInfo = PeerInfo(host, uint16(int(port))) on_connect = None if hasattr(self.rpc_api.service, "on_connect"): on_connect = self.rpc_api.service.on_connect if not await self.rpc_api.service.server.start_client(target_node, on_connect): raise ValueError("Start client failed, or server is not set") return {} async def close_connection(self, request: Dict[str, Any]) -> EndpointResult: node_id = hexstr_to_bytes(request["node_id"]) if self.rpc_api.service.server is None: raise web.HTTPInternalServerError() connections_to_close = [c for c in self.rpc_api.service.server.get_connections() if c.peer_node_id == node_id] if len(connections_to_close) == 0: raise ValueError(f"Connection with node_id {node_id.hex()} does not exist") for connection in connections_to_close: await connection.close() return {} async def stop_node(self, request: Dict[str, Any]) -> EndpointResult: """ Shuts down the node. """ if self.stop_cb is not None: self.stop_cb() return {} async def healthz(self, request: Dict[str, Any]) -> EndpointResult: return { "success": True, } async def ws_api(self, message: WsRpcMessage) -> Optional[Dict[str, object]]: """ This function gets called when new message is received via websocket. """ command = message["command"] if message["ack"]: return None data: Dict[str, object] = {} if "data" in message: data = message["data"] if command == "ping": return pong() f_internal: Optional[Endpoint] = getattr(self, command, None) if f_internal is not None: return await f_internal(data) f_rpc_api: Optional[Endpoint] = getattr(self.rpc_api, command, None) if f_rpc_api is not None: return await f_rpc_api(data) raise ValueError(f"unknown_command {command}") async def safe_handle(self, websocket: ClientWebSocketResponse, payload: str) -> None: message = None try: message = json.loads(payload) log.debug(f"Rpc call <- {message['command']}") response = await self.ws_api(message) # Only respond if we return something from api call if response is not None: log.debug(f"Rpc response -> {message['command']}") # Set success to true automatically (unless it's already set) if "success" not in response: response["success"] = True await websocket.send_str(format_response(message, response)) except Exception as e: tb = traceback.format_exc() log.warning(f"Error while handling message: {tb}") if message is not None: error = e.args[0] if e.args else e res = {"success": False, "error": f"{error}"} await websocket.send_str(format_response(message, res)) async def connection(self, ws: ClientWebSocketResponse) -> None: data = {"service": self.service_name} payload = create_payload("register_service", data, self.service_name, "daemon") await ws.send_str(payload) while True: # ClientWebSocketReponse::receive() internally handles PING, PONG, and CLOSE messages msg = await ws.receive() if msg.type == WSMsgType.TEXT: message = msg.data.strip() # log.info(f"received message: {message}") await self.safe_handle(ws, message) elif msg.type == WSMsgType.BINARY: log.debug("Received binary data") else: if msg.type == WSMsgType.ERROR: log.error("Error during receive %s" % ws.exception()) elif msg.type == WSMsgType.CLOSED: pass break def connect_to_daemon(self, self_hostname: str, daemon_port: uint16) -> None: if self.daemon_connection_task is not None: raise RuntimeError("Already connected to the daemon") async def inner() -> None: while not self.shut_down: try: self.client_session = ClientSession() self.websocket = await self.client_session.ws_connect( f"wss://{self_hostname}:{daemon_port}", autoclose=True, autoping=True, heartbeat=60, ssl_context=self.ssl_client_context, max_msg_size=max_message_size, ) await self.connection(self.websocket) except ClientConnectorError: log.warning(f"Cannot connect to daemon at ws://{self_hostname}:{daemon_port}") except Exception as e: tb = traceback.format_exc() log.warning(f"Exception: {tb} {type(e)}") if self.websocket is not None: await self.websocket.close() if self.client_session is not None: await self.client_session.close() self.websocket = None self.client_session = None await asyncio.sleep(2) self.daemon_connection_task = asyncio.create_task(inner()) async def start_rpc_server( rpc_api: RpcApiProtocol, self_hostname: str, daemon_port: uint16, rpc_port: uint16, stop_cb: Callable[[], None], root_path: Path, net_config: Dict[str, object], connect_to_daemon: bool = True, max_request_body_size: Optional[int] = None, ) -> RpcServer: """ Starts an HTTP server with the following RPC methods, to be used by local clients to query the node. """ try: if max_request_body_size is None: max_request_body_size = 1024**2 rpc_server = RpcServer.create(rpc_api, rpc_api.service_name, stop_cb, root_path, net_config) rpc_server.rpc_api.service._set_state_changed_callback(rpc_server.state_changed) prefer_ipv6 = str2bool(str(net_config.get("prefer_ipv6", False))) await rpc_server.start(self_hostname, rpc_port, max_request_body_size, prefer_ipv6) if connect_to_daemon: rpc_server.connect_to_daemon(self_hostname, daemon_port) return rpc_server except Exception: tb = traceback.format_exc() log.error(f"Starting RPC server failed. Exception {tb}") raise
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/simulator_constants.py
flax/simulator/simulator_constants.py
if __name__ == "__main__": from flax.util.default_root import DEFAULT_ROOT_PATH from flax.simulator.block_tools import create_block_tools, test_constants from tests.util.keyring import TempKeyring with TempKeyring() as keychain: # TODO: mariano: fix this with new consensus bt = create_block_tools(root_path=DEFAULT_ROOT_PATH, keychain=keychain) new_genesis_block = bt.create_genesis_block(test_constants, b"0") print(bytes(new_genesis_block))
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/socket.py
flax/simulator/socket.py
from __future__ import annotations import secrets import socket from typing import Set recent_ports: Set[int] = set() def find_available_listen_port(name: str = "free") -> int: global recent_ports while True: port = secrets.randbelow(0xFFFF - 1024) + 1024 if port in recent_ports: continue with socket.socket() as s: try: s.bind(("127.0.0.1", port)) except OSError: recent_ports.add(port) continue recent_ports.add(port) print(f"{name} port: {port}") return port
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/wallet_tools.py
flax/simulator/wallet_tools.py
from __future__ import annotations from typing import Any, Dict, List, Optional, Tuple from blspy import AugSchemeMPL, G1Element, G2Element, PrivateKey from clvm.casts import int_from_bytes, int_to_bytes from flax.consensus.constants import ConsensusConstants from flax.types.announcement import Announcement from flax.types.blockchain_format.coin import Coin from flax.types.blockchain_format.program import Program, SerializedProgram from flax.types.blockchain_format.sized_bytes import bytes32 from flax.types.coin_spend import CoinSpend from flax.types.condition_opcodes import ConditionOpcode from flax.types.condition_with_args import ConditionWithArgs from flax.types.spend_bundle import SpendBundle from flax.util.condition_tools import conditions_by_opcode, conditions_for_solution from flax.util.hash import std_hash from flax.util.ints import uint32, uint64 from flax.wallet.derive_keys import master_sk_to_wallet_sk from flax.wallet.puzzles.p2_delegated_puzzle_or_hidden_puzzle import ( DEFAULT_HIDDEN_PUZZLE_HASH, calculate_synthetic_secret_key, puzzle_for_pk, solution_for_conditions, ) DEFAULT_SEED = b"seed" * 8 assert len(DEFAULT_SEED) == 32 class WalletTool: next_address = 0 pubkey_num_lookup: Dict[bytes, uint32] = {} puzzle_pk_cache: Dict[bytes32, PrivateKey] = {} def __init__(self, constants: ConsensusConstants, sk: Optional[PrivateKey] = None): self.constants = constants self.current_balance = 0 self.my_utxos: set = set() if sk is not None: self.private_key = sk else: self.private_key = AugSchemeMPL.key_gen(DEFAULT_SEED) self.generator_lookups: Dict = {} self.puzzle_pk_cache: Dict = {} self.get_new_puzzle() def get_next_address_index(self) -> uint32: self.next_address = uint32(self.next_address + 1) return self.next_address def get_private_key_for_puzzle_hash(self, puzzle_hash: bytes32) -> PrivateKey: sk = self.puzzle_pk_cache.get(puzzle_hash) if sk: return sk for child in range(self.next_address): pubkey = master_sk_to_wallet_sk(self.private_key, uint32(child)).get_g1() if puzzle_hash == puzzle_for_pk(pubkey).get_tree_hash(): return master_sk_to_wallet_sk(self.private_key, uint32(child)) raise ValueError(f"Do not have the keys for puzzle hash {puzzle_hash}") def puzzle_for_pk(self, pubkey: G1Element) -> Program: return puzzle_for_pk(pubkey) def get_new_puzzle(self) -> Program: next_address_index: uint32 = self.get_next_address_index() sk: PrivateKey = master_sk_to_wallet_sk(self.private_key, next_address_index) pubkey: G1Element = sk.get_g1() self.pubkey_num_lookup[bytes(pubkey)] = next_address_index puzzle: Program = puzzle_for_pk(pubkey) self.puzzle_pk_cache[puzzle.get_tree_hash()] = sk return puzzle def get_new_puzzlehash(self) -> bytes32: puzzle = self.get_new_puzzle() return puzzle.get_tree_hash() def sign(self, value: bytes, pubkey: bytes) -> G2Element: privatekey: PrivateKey = master_sk_to_wallet_sk(self.private_key, self.pubkey_num_lookup[pubkey]) return AugSchemeMPL.sign(privatekey, value) def make_solution(self, condition_dic: Dict[ConditionOpcode, List[ConditionWithArgs]]) -> Program: ret = [] for con_list in condition_dic.values(): for cvp in con_list: if cvp.opcode == ConditionOpcode.CREATE_COIN and len(cvp.vars) > 2: formatted: List[Any] = [] formatted.extend(cvp.vars) formatted[2] = cvp.vars[2:] ret.append([cvp.opcode.value] + formatted) else: ret.append([cvp.opcode.value] + cvp.vars) return solution_for_conditions(Program.to(ret)) def generate_unsigned_transaction( self, amount: uint64, new_puzzle_hash: bytes32, coins: List[Coin], condition_dic: Dict[ConditionOpcode, List[ConditionWithArgs]], fee: int = 0, secret_key: Optional[PrivateKey] = None, additional_outputs: Optional[List[Tuple[bytes32, int]]] = None, memo: Optional[bytes32] = None, ) -> List[CoinSpend]: spends = [] spend_value = sum([c.amount for c in coins]) if ConditionOpcode.CREATE_COIN not in condition_dic: condition_dic[ConditionOpcode.CREATE_COIN] = [] if ConditionOpcode.CREATE_COIN_ANNOUNCEMENT not in condition_dic: condition_dic[ConditionOpcode.CREATE_COIN_ANNOUNCEMENT] = [] coin_create = [new_puzzle_hash, int_to_bytes(amount)] if memo is not None: coin_create.append(memo) output = ConditionWithArgs(ConditionOpcode.CREATE_COIN, coin_create) condition_dic[output.opcode].append(output) if additional_outputs is not None: for o in additional_outputs: out = ConditionWithArgs(ConditionOpcode.CREATE_COIN, [o[0], int_to_bytes(o[1])]) condition_dic[out.opcode].append(out) amount_total = sum(int_from_bytes(cvp.vars[1]) for cvp in condition_dic[ConditionOpcode.CREATE_COIN]) change = spend_value - amount_total - fee if change > 0: change_puzzle_hash = self.get_new_puzzlehash() change_output = ConditionWithArgs(ConditionOpcode.CREATE_COIN, [change_puzzle_hash, int_to_bytes(change)]) condition_dic[output.opcode].append(change_output) secondary_coins_cond_dic: Dict[ConditionOpcode, List[ConditionWithArgs]] = dict() secondary_coins_cond_dic[ConditionOpcode.ASSERT_COIN_ANNOUNCEMENT] = [] for n, coin in enumerate(coins): puzzle_hash = coin.puzzle_hash if secret_key is None: secret_key = self.get_private_key_for_puzzle_hash(puzzle_hash) pubkey = secret_key.get_g1() puzzle: Program = puzzle_for_pk(pubkey) if n == 0: message_list = [c.name() for c in coins] for outputs in condition_dic[ConditionOpcode.CREATE_COIN]: coin_to_append = Coin( coin.name(), bytes32(outputs.vars[0]), int_from_bytes(outputs.vars[1]), ) message_list.append(coin_to_append.name()) message = std_hash(b"".join(message_list)) condition_dic[ConditionOpcode.CREATE_COIN_ANNOUNCEMENT].append( ConditionWithArgs(ConditionOpcode.CREATE_COIN_ANNOUNCEMENT, [message]) ) primary_announcement_hash = Announcement(coin.name(), message).name() secondary_coins_cond_dic[ConditionOpcode.ASSERT_COIN_ANNOUNCEMENT].append( ConditionWithArgs(ConditionOpcode.ASSERT_COIN_ANNOUNCEMENT, [primary_announcement_hash]) ) main_solution = self.make_solution(condition_dic) spends.append( CoinSpend( coin, SerializedProgram.from_program(puzzle), SerializedProgram.from_program(main_solution) ) ) else: spends.append( CoinSpend( coin, SerializedProgram.from_program(puzzle), SerializedProgram.from_program(self.make_solution(secondary_coins_cond_dic)), ) ) return spends def sign_transaction(self, coin_spends: List[CoinSpend]) -> SpendBundle: signatures = [] solution: Program puzzle: Program for coin_spend in coin_spends: # noqa secret_key = self.get_private_key_for_puzzle_hash(coin_spend.coin.puzzle_hash) synthetic_secret_key = calculate_synthetic_secret_key(secret_key, DEFAULT_HIDDEN_PUZZLE_HASH) err, con, cost = conditions_for_solution( coin_spend.puzzle_reveal, coin_spend.solution, self.constants.MAX_BLOCK_COST_CLVM ) if not con: raise ValueError(err) conditions_dict = conditions_by_opcode(con) for cwa in conditions_dict.get(ConditionOpcode.AGG_SIG_UNSAFE, []): msg = cwa.vars[1] signature = AugSchemeMPL.sign(synthetic_secret_key, msg) signatures.append(signature) for cwa in conditions_dict.get(ConditionOpcode.AGG_SIG_ME, []): msg = cwa.vars[1] + bytes(coin_spend.coin.name()) + self.constants.AGG_SIG_ME_ADDITIONAL_DATA signature = AugSchemeMPL.sign(synthetic_secret_key, msg) signatures.append(signature) aggsig = AugSchemeMPL.aggregate(signatures) spend_bundle = SpendBundle(coin_spends, aggsig) return spend_bundle def generate_signed_transaction( self, amount: uint64, new_puzzle_hash: bytes32, coin: Coin, condition_dic: Dict[ConditionOpcode, List[ConditionWithArgs]] = None, fee: int = 0, additional_outputs: Optional[List[Tuple[bytes32, int]]] = None, memo: Optional[bytes32] = None, ) -> SpendBundle: if condition_dic is None: condition_dic = {} transaction = self.generate_unsigned_transaction( amount, new_puzzle_hash, [coin], condition_dic, fee, additional_outputs=additional_outputs, memo=memo ) assert transaction is not None return self.sign_transaction(transaction) def generate_signed_transaction_multiple_coins( self, amount: uint64, new_puzzle_hash: bytes32, coins: List[Coin], condition_dic: Dict[ConditionOpcode, List[ConditionWithArgs]] = None, fee: int = 0, additional_outputs: Optional[List[Tuple[bytes32, int]]] = None, ) -> SpendBundle: if condition_dic is None: condition_dic = {} transaction = self.generate_unsigned_transaction( amount, new_puzzle_hash, coins, condition_dic, fee, additional_outputs=additional_outputs ) assert transaction is not None return self.sign_transaction(transaction)
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/ssl_certs_2.py
flax/simulator/ssl_certs_2.py
from __future__ import annotations from typing import Dict, Tuple SSL_TEST_PRIVATE_CA_CRT = b"""-----BEGIN CERTIFICATE----- MIIDKTCCAhGgAwIBAgIUbFhRlgpIM3M+ZYuTigQ1Vbmi6P4wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMB4XDTIyMDMyMzE3MjkyMloXDTMyMDMy MDE3MjkyMlowRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8G A1UECwwYT3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEAsc4R76dCSzj3MR7adSLI+Mk9cX42bTHiu00c964rUXr2 eGpYy1fmtdiq71kkVFRCtX+m8tc0jA5RCOCJsVKPZ7a2zQVcUkC1HJDCg8lufI2p hS33zpjP+BePGmxQDhBU744cmFA/TVN+VTEhTlbmhFo62eX2Repbl2coF3MhoKTz cilUgiCww+DUa6IQk06Zkh8TFJ8iPp67QRM1wEhMEcKrnRNxPGHDxa9ZxhwrmKft UOFrat+ijftQDexMkVZLUXPoksM/7afjqvP9fkFpQEJZ3R1p3uwSX+oIr4yE/0il nnLnunvUcWYTmvVcwrV5Zu+IOtV+yBbJxmFsobiecQIDAQABoxMwETAPBgNVHRMB Af8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQAgxl6fGre+yFpKxEVcJ554klsg Hefei1tv94BDMqdzfdeocTBiYmN70j9KEZr5CoMUhpRh0sESpgZ+6JD506Crpa6y CwkhfQXwOH58E6pbqLLpG3F96BeIBQ/IS0iGvRaerK/9hybt4NJAyrXX1idJikiJ h4qck731LOSiCw7T138yjlVEXm4DdCj/MYJDJJznMYDXJrJEE7tDHHvPaPU3Snrd CeAYwXaZlvoCbU0f0DCyAXS5+/HgzY5qVrvDXCHTAEnMSEQyIhESSL2xmumTGNCA BBlbMJ6oLn3fOHrB7qQortCwcAQkbk/MiZhAkL/+NDz6gdIZqgXLDDVZxext -----END CERTIFICATE----- """ SSL_TEST_PRIVATE_CA_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEAsc4R76dCSzj3MR7adSLI+Mk9cX42bTHiu00c964rUXr2eGpY y1fmtdiq71kkVFRCtX+m8tc0jA5RCOCJsVKPZ7a2zQVcUkC1HJDCg8lufI2phS33 zpjP+BePGmxQDhBU744cmFA/TVN+VTEhTlbmhFo62eX2Repbl2coF3MhoKTzcilU giCww+DUa6IQk06Zkh8TFJ8iPp67QRM1wEhMEcKrnRNxPGHDxa9ZxhwrmKftUOFr at+ijftQDexMkVZLUXPoksM/7afjqvP9fkFpQEJZ3R1p3uwSX+oIr4yE/0ilnnLn unvUcWYTmvVcwrV5Zu+IOtV+yBbJxmFsobiecQIDAQABAoIBABilM59AU9QRZVIN sMIjvC+f1UBx+iFQlNjZa3Z5Uc/Nd3RhaUVmPbhe+/KJLJvzwfteYkmuwr3XDixo 0y0dAHuju9rXL2DHT1NSTWPu+72P9Ttcj8i3Lbx5p4BGGyKX6O37iMMj/GI/fHda g/9T1EfsKdQiJ+yw+1kVF12Iu9SETXVSl+xtEv0D0nj3vvSCzHf3wPELNMDigb1k R43zsbzT/QF03rlMy22xkNWDyxki1EdmkuU93+8DQCso5r5OwI3hGDQzWW2c5nPm 49+m7lHe3apYUxjhbdLAWfyviEI5ysIhf9qwRXZJTHj7qncrkYZMm4wI49TWb318 Sw/EwnECgYEA3021Gg6lqwfL3++mUKYyGEKVwRFPK9cZU6+xMT+yjPtahnbRlueL pZ/rRYKUe5iIGYNdHoQgLqsE9hh0iZbjiNLQ0HLvMBt0QdMey+F6vKlzkSiBJsmf mZXgQMI36uHbuJcm9Dm/nSoxQT0rmHk1rdW0hpJZOtUKMlm1SdjUH+8CgYEAy9bl tTyq8oMwXJ7dp3UfLtSL4y5ekPLe8o+/cMTOHjaZBDFdPXgFN3DQLqrhvPAQHl1G PI+zsjLoZYBtrOgIJ0Dt/4N9jijSdfhfZtwpXcVxWPXSjh/hTmY29pD3IDV9sbyq PyLxpMaCL8BrUXPTpLyuuUUpanPxhzG5FXs6x58CgYEAtruiXcZqr8Dbh09XbFv0 VoH2hl2hyiBla2Q0vjZ/6HqwI6UL8k9cqZZqMyGeXF3/0dD73MMGiuoMT07H3ugJ HqhVlJ7ZOSbeRhd79h94DvcjyT+6IIGSB17selH07FMTOMUIbYbsVLJ4SAjEqitW UAC3kAAm4MwBYh6jCeFUBSUCgYAkuSeTOkXWARqSZTCrvacLidFV8YGp/Yd7DbjA uUQlH1L79WTF8TyHW3S2I6Udo+ZTghxoRr9qCE/kEXow33CwmbsHAIp7NRGNnVya rGlrcmnUTB1N66JsvG+EhmNvUxO9FK9bRpFgTT8hGTp8ZzCnCjM0P6iRfCf0Ylnk 69mQIwKBgQC0lu/wkUsJtbMaUDW5v05XoVw3c+aHd3fFX7WW10d4aDqzFXYMjdxT tKpkYxpBuoco9E1PZMF248wGMsIltykwPvy7QI3gRbsZIW6gTwUBsI3xTYOybu2x trfVO6ksP0sIoYOJH2JbJfIyzy49hA90x1cIA7i/HdJWRGitJ/xKkw== -----END RSA PRIVATE KEY----- """ SSL_TEST_FULLNODE_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUJBzmO7OHvvlimGi0mXLrh/8TPeMwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyMloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC792uVfc1mFbJluKxzWxZ0r5yaKGjR8azECVrNTcegAjLF Qd7+iZS+7DZwEA6Xy/h8T9DZd3Q1m0Rjlgg73ngO50leCvLqWEvrhueuEIWLdbef 4NaX4qkusMI/orYE/ItKgL86HWkGUELnmf3TkMccohR63vS+Fr6dZDvIw3g+gBPL P9MlK7sdXq1I8CIcV+2du4jhmkA4mJ278TdQZOfXnX1hhe1wPuyhJyBN1sV2ntLG TLcRl8WQSIh3j4vhMilEU85rA+q4TuqrOlZtKPTPNGeACwrD7qQkWihsEAKWMdQJ e++9+CdigL/S3IhMmdTwHHNht31oYl1vAqbQbCEzAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAttszf/gjwRvkxZs8Iq474 aoBzfsF/NKCKBNRoTdVwQc6DycJylA9JL45BFhc39tka00ttcKGbXmbnOzltnFsH QuD/1B4pQOESZzUEcsHHCn7tKxIrCn4wk9OiiqcIwHwavFy+guHFSw71jVFhv6im ILe/K+wzpgc+pUeYiQlWRSuoR7YABZekL8bjpCpuq1kXzP4bV9pnq0sMayCHdH+q enRnvo4u6PtMUGdX+bye3sp609uFgH53v06ufl3ylkoK5TRuaOj84yYuJDBrAAG6 ZYZaosM/CKXoumetH90Sc2rAvWp2HniHe99STfaw1aNK9YV1T9SjIqhzyzoMzGRP -----END CERTIFICATE----- """ SSL_TEST_FULLNODE_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEAu/drlX3NZhWyZbisc1sWdK+cmiho0fGsxAlazU3HoAIyxUHe /omUvuw2cBAOl8v4fE/Q2Xd0NZtEY5YIO954DudJXgry6lhL64bnrhCFi3W3n+DW l+KpLrDCP6K2BPyLSoC/Oh1pBlBC55n905DHHKIUet70vha+nWQ7yMN4PoATyz/T JSu7HV6tSPAiHFftnbuI4ZpAOJidu/E3UGTn1519YYXtcD7soScgTdbFdp7Sxky3 EZfFkEiId4+L4TIpRFPOawPquE7qqzpWbSj0zzRngAsKw+6kJFoobBACljHUCXvv vfgnYoC/0tyITJnU8BxzYbd9aGJdbwKm0GwhMwIDAQABAoIBABntdxmX0M1UENeX MbJ3zhEqaB+bk1niTEJ+R9gp8m9P3lD3VRsnPy1Wx+uNS3YE3LHJELXulEkQsc5K 07fuaAEmRiiCuh85Lr++TBbmkIU8J6gWC4PH8C5Qk3rTpufpLg2I1NffVq1YROJN i4WzYsPAV7LbLkdKO+DaAqUe0WdNZph8Fhrg/WhjGC5VAajRgfVM7cbnW4SjrQzz lqoVB3GQPWLgUhHoBj6yRMBKP7D96h+oqUZprn19ilEeaoDVvDMx1Uqj57PGCZ8k c166dctWvSVxLKwbau20HLAZCZWQylhOugk3sEIceEhkiP95LYNfAZAHiU1Aqfpe PgKSAYECgYEA8uvqkXwejuFEMGJWo/JUH/pETc420gatwVD222LYYFeNhk3C6k/E iHa/iE8v9jKHTv7xmlG6ybBkluDGsaK2vngzKpc97nCYfg3mFjS3CN/leZDMwUDX Bj1XgFhYM9yLVojwVJl3PkA4B/WYmnxgSo9u9oCy9K8HdSMUcCcPQgcCgYEAxhYU 9OPA0VmKYwipWfpZlir5LrvLkwJdcmAV5UhKVXkMXr+M9ByRRLYrr++6SxipjOjO Zi1t1hB79pxtc2mFBCT9gtnbNvcgEdkxSo08U/uj3xcp1oCZAN9Vu3Dk19Oi3jUT BAlE1V+Le3b0mPh9IytPjpO7xjWstpi5ar6obHUCgYAH0x+QJh5Z3dmzcUd3KnQZ P5d5ph3P8BUit/froyhzGf7eB50yrPUYrDKJMnvKA2CmY8HmhaFto7fpwD3GNQaL 5hVH1u1Qw+G1lb8GkhYfPA8JNmfSBcOnWMx7vtzAducqF2keYH8dyzXC099hgoYb gLlDSWv6Q7UKyeF7p1ZvewKBgCnWbCK1H/qXoOT95Vb9y4IuHWdDfuHT9Ay+QqGk vR6EbJpudsTwa7ZJi7yjM4O898KtQTrPiY1W+ffCXlOsC84uSeUjQmu/kmRyrTiD 0CQk2B28dLe7fZVzllX6qDr1lka8iwGlO4adoYY4P703bqbI9Qq2JUjd+VavtynW jxgpAoGALXc4mrAJl4ckfso2OOXo0UHYuO7XCVO3Ll5bzGZbaiRuCYG6ilm2wKRf FnrYRd9KtvrA100LxTTepdo0tTVcdAWY7STJpBIycUN72OMQOCI3VWSTkSpJHGjp WBqJDcueUhUe8x5//qsMtXJFgXc2ZerODemObr+bRT1nBYMiZQI= -----END RSA PRIVATE KEY----- """ SSL_TEST_FULLNODE_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUF2mq+KA3KYyp6bso3F79MnD6AacwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyMloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC5wiF41CixaxHM2oHf3nYkuGmLeG6xBdSogQuaSMAw6KCy AvCfLDBRgfbvWjXV5teUv61+xgyLctNLmJQBg0owYQhhZnwIZK2jK9h5CvquI9UC xAdgtvKc6yFKlWS435xSt+ja2w5eHsE0QE6U9SL9qm7OnehvF0baDA7CjQNKQ8SR lkrl0+mQZCEc5lfroYlpOJ1XKrmLhfX4KV+RcNEuLF4roY1TdkUfCOk9Jq8/DrCD rAOuFaU/GShqmG9REt3HKIGBO254/xoTcSkGIOHOGI/2uZI0MVUDK8tNDwAaDLcg RAclaoGQ1++jcjnmjvopsqySEJwJrDJMkpqKd0SzAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQCImPY2TwUGre7AM6nzBqrh WCXTEct84E1jfJtgWZ5xYdVMNd0Ujg6A89LZnc//KW1xVDImmTrsxwHj/vR7lRdr L7ADGbKOepqKMgUdT8Im67jpMen9Bnrx/q5dtW8qmUMc+EpGwvMOASYEa5jxQ1Uy Bxpyk3lpeZs5HZJPG0WVFQnNXtlG8LMlmlj1JAEB79hbK7PqPvat6rnS6NTCHGtC vjAd8mHjVQJkla6u4dV4oI+niEJk12d1yJ9dMSZ8hO3CiBJBieZJ2v2S04N8UUMh PQEX/yYT94hLaYWYextZRDxNWnjS68Ju1xv8j8GKdMLE693Z6K5kJkspBy0sEtxk -----END CERTIFICATE----- """ SSL_TEST_FULLNODE_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAucIheNQosWsRzNqB3952JLhpi3husQXUqIELmkjAMOigsgLw nywwUYH271o11ebXlL+tfsYMi3LTS5iUAYNKMGEIYWZ8CGStoyvYeQr6riPVAsQH YLbynOshSpVkuN+cUrfo2tsOXh7BNEBOlPUi/apuzp3obxdG2gwOwo0DSkPEkZZK 5dPpkGQhHOZX66GJaTidVyq5i4X1+ClfkXDRLixeK6GNU3ZFHwjpPSavPw6wg6wD rhWlPxkoaphvURLdxyiBgTtueP8aE3EpBiDhzhiP9rmSNDFVAyvLTQ8AGgy3IEQH JWqBkNfvo3I55o76KbKskhCcCawyTJKaindEswIDAQABAoIBAAWr8LuwtqFcJIn9 rfN45mCOpOJWRgLvq6ONdR471Gpp3+YvgstJXRxP/IsoVPZ3+uMWyyRQxbdIRT1M plA5gv1hKRFYQLc847RUtWJUvHyuqWVROOxyCYxS/Yw6bX3bjflUli6Ae7rR85I1 2HBh37ShDIsQdTVXH5muvpCgH5aX18gONUYsQt+xDbnuDW1Cdl6MFYCNCOzL1W5k 6kccejG2aDvNN4f9FZdtvft4sQFp61LGxClZGml9zlFuOav/dJx3eXU47Z8DVADw OJmtXJend7A29uPFyyoQ44uE0F1SG0dzNmmrxrD39c90w3BTvyGsilmjkr1diRkv jRHl4nECgYEA4qHmHJlA0Liu6z9Wg+/n6Z7+OnZAfTqvCUayPhD5lKu8WWC6LsI3 7m2AhkkREaVHWu+9Slte4c5A3stH4eEkSKSWSef5axdlYZc2ST3UNOFAzMkPle2A kZAYWZ7XkBzptJhztgBiQUBJLrQ1SuXayvnrpgqIIYkeuKuRYc89zWsCgYEA0dRP rMdz3+rHlGmNWgU038G57qGlWFr6NLEqSITYz/7Xp19hP/bfuD44PvniH9N8x/3a IlgNqaZLU5IyFzIfYE6yuPsUXC0nNzxcc9FCiLedH7d+247jDOcbbQXOi3pTa8Ar rkwHTzAbQXT8VuAOcs+cjDMa6rW9IsvHvuD4r9kCgYAqDOAlbkoYcCwEejwTPvBI 6LdDIa3Vjo3rqrJn0b59V2AbNVdWVbMLCkZOpEAGhiQ3O0RkB5ATVbGzpQQxZRTW ZbN9Aw3EURL+iJAKBu7Y4PKlDKlXqDmyyIm8FzzoAHVcjOzrWCbi9Iqfn9BDlWKD RtvycwHPNyH8IdlXzJwrAQKBgHirKVrKpSe7hCUkgoangd3AMiY6zbS/NS7CR/fG dk0/WFPHtUyss8Hn/j6xQ8pbvGHi6eRgURMkMCOSar4ONB8VgxCATBgqW2gXjW+J g0LOnUyVIR4w0QAllA8hjMOHiJvpuvUUgguXNcVx+oAXgBekr3mtFiiudWOiX2+1 Py8ZAoGBAKPAc1n0UbvdNjQHllxm9Ehok3hcVvJZRRBtcXytKWwl3FI6/I50/XAy 8PaI4gbysiPgMl+zTU9mIZGIxyMHNy6vr5/3g+ZceNadAsIQnJQLTMM95WP/nKcQ XsAuSwTFviI2LBxC7Scnpc8JHugzP6a4oiRs8yqSfKXYGck8jaAf -----END RSA PRIVATE KEY----- """ SSL_TEST_WALLET_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIURlqEdkPWX2ld1ZkYRM10UTM191wwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyMloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDKHNdtHZzYGVJlTaAmiJDMsNdVpyo3sHewUF23K2zMTUZh 2DBX1heO09RpOIoGIdsgm2P2T/+731O6Hi1+pJyLBq/7LtoPX5fZL/AT1uQN5yDF xBUvmaFmnapEyRC2tg6H/YNBCTrHO3OKWzF5Zn5dZDmS8D5FcnhPups13k6YYklZ ZewRTTUxUlnorKdDh2Ur5UPHnpxfG+yRYow/prs6sfQNj1Hdv4nsjEwTPwJQVIC7 xViZMiSWUaYMx0giJe1wggkuVYTBQ6tYCOtbO/FKErYS+NrZ5lUfUzmpzlXIM1bn Ux+4SwMYddcbedVywMap7mzupD8ZQNCuio9Z7nc1AgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBghZflsoqx/js1oQC2JfNc gD5HWNqlS6JbupJr2zt7KaKFVQfXmMEUNcVsEr9PXIGA3vqDnpT3L7Ybk0R9knYP yGb1c5uRFn5A7moAcJjgwUrDE9GQBx59KRXmK4DofcwinUPEe6BU8sn9VfqjTprQ WFFLyt941YCxaCCGPgZTyGbHWK2pTQY0aBSQAyNppk+dsca6l2HkelkmUrS6I30p r4nhJq+eXmehrtn8+zXT6qxmr/vw+F7cwnYyxLswBMc8ijcmvBbkcSEcFbdP8TMN A4FFYyh0rIijlKTsoEyvUP7LGBBJv0d3RU30jHPBm4faJ1wWXLm6p3hQEJmLzM0i -----END CERTIFICATE----- """ SSL_TEST_WALLET_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEAyhzXbR2c2BlSZU2gJoiQzLDXVacqN7B3sFBdtytszE1GYdgw V9YXjtPUaTiKBiHbIJtj9k//u99Tuh4tfqSciwav+y7aD1+X2S/wE9bkDecgxcQV L5mhZp2qRMkQtrYOh/2DQQk6xztzilsxeWZ+XWQ5kvA+RXJ4T7qbNd5OmGJJWWXs EU01MVJZ6KynQ4dlK+VDx56cXxvskWKMP6a7OrH0DY9R3b+J7IxMEz8CUFSAu8VY mTIkllGmDMdIIiXtcIIJLlWEwUOrWAjrWzvxShK2Evja2eZVH1M5qc5VyDNW51Mf uEsDGHXXG3nVcsDGqe5s7qQ/GUDQroqPWe53NQIDAQABAoIBAHiLmzFJaDK7Z5lk IxDYgwSStNwxR8zPQ5O1Wy/Uhp+Tt1bESpEY8BQP47CeODRQHRHlnElcjXrQSG/J b/kI1RVWd7+owgZJTZgML3Slxn9ESxepS7mIN+usPdGo2n8fNquFWLOBfb02iEMN AQUXTGcHUA+DmqBxFbD363rFjLr1VM0+N1vjw20auYGpvWOFWbhXjgWGBHuJhRNn tgkXSsrOsPzbGIWw3GEt/Tlw50ehVNTSGA1jdxUlNHF7sGfFLVYjcO5AjCx7661v w+w1eBwWI+SrYxXp1YgHlaJS1/u0vCvQ0kLcc2Ry+zpmesvi4aKVodKXWn7ZEsKb qv+pYgECgYEA5pchaX88w6FiH80fzF+mcCcDnliw83kRtIWRE0XmhIL5ocnWuOcb pgSFr5kEw80pPDt+IYrKHxyh/fVZV33n8JJ2fjNsHFwpZykIDhO2H2CmkXm+fTxu gD5HIGzPx9qxvni8xjjXfSFCGvKuwGa975XGL45P0LsT90iAumkNnAkCgYEA4GJd oRpSdxxDYuTvDHkvdlgTYSFAy/4njk7MsfnEsbn2l/p/xDx5H2nKrql/7J26pHKc ODZcQXaRGaOi83K+vYAmHPC8zdmuEgh4hlSqJ04IEcU+gadxeCDh/RcBUPMvtBe8 nDl15HrGi/k1MxsdrrL4Un1mrvtwvfjbvX+tZM0CgYEAhS9TeBiqox/qig2zSRsS CgMuvt3hTq9l/4uKEMS18WGpB76JzACIYqqIALV0IBe2snh2UK9WMQQbuJBmivdI 6RXfZOMUlYjRzSjQ4ziVX6g2bR4RXUpzVJUkBeFzXa6+LRKVjjQ0mqyD/wae0rhF CkXK05ryFNCJJrH00DZvSukCgYEA2n0N3Jxr5k2gFEEFwGiUXbEflbmyhbBCRiDW 0wp5i/Gfe5dRJ/0WmA8EbBTiWr2viweKtHXCWYAhhAzB1DpMHuwUsKN9xRgMlsSm z27LjKA/3UXqOoeYRrgGNdJb1r4mGj/uyVRuRn+Cq7OLKOtjeMQOZwxymzp9Ko6T Ma+MYJUCgYBeY597VeXh9vwMlfgjIz0vbGjrIgGSS0YqM//SgfziHDv9Bh/sQY/J zy18xbkjdbCulGGyro7zNDXmOcf5CUsgei2cc/vgESQEZpoMSnVvG1MWQ30xq32M g4FlmGzdEiQiRxA8+9lzOPJRcQdUgS+Le7fOWH85q2aXrv7wp6lT0w== -----END RSA PRIVATE KEY----- """ SSL_TEST_WALLET_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIULNQ5Bq+zPWOGPtKDkjFf9aHtCBYwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyMloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDmIHrbtqy5/pMJq5NZmVRFbX8wHSciOLyUwWY6K6BgOtZH 8WaKoOS03X8KVnWKqXGcUY9DKWar8iQ+VbGP7YLw9wJjr4hNsW1DqN7uzxla3XIF upT/tKAhZpiqOHKstGEoKwjVD3Dym5xmSP6ERQTfMolo7WaakTpANCGKW0tKM2Rs 6pSaHV4GIvbHSer/apt1zr2IBFQI7Sj9KSXZ1OhOZERSE4FigTAJvW5PEcuVsjwR LB11vpPKiF7YkLmsj0MQRHlFqZukrSdlvR9ZLaAREJLgk7SwCwUSYGQEGhjiEkH6 vWXT/35IYCkiYNI/vcdCQlN4xBOOAXgO3c1HtikFAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQByHJaF2w67743OsMwKbQ5j oWAt+rqivYmqJ6tVKEpCAZu3aMPdchcoZdfWRfh/tRP0SwkNE7PwIyRxo0qynrPO gXhGR17ezrgz3a5AzQ42EXg0xb75QzpkXdrOZK9ynjer4jlMx+a+IJniYlSpyCxc AnEKvnH22S4j1xCYC9zMDUF6Jqm51h+Pnrz2sHr7NyRu7Lq9cJ62rfyT9kFW/aZX 1/xAwzw2GmyYRpw7ZEiRN9Ipkjs8Nn6yCWOvs/wa6el06mXB/i/IvOdMI7/B3PJS sOvOjmtIS04kyR2ZB4Qhkty5WSHrF0Se/9WH28L6a6bjFKLRMKLTRLdeZ3ybEOFN -----END CERTIFICATE----- """ SSL_TEST_WALLET_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEA5iB627asuf6TCauTWZlURW1/MB0nIji8lMFmOiugYDrWR/Fm iqDktN1/ClZ1iqlxnFGPQylmq/IkPlWxj+2C8PcCY6+ITbFtQ6je7s8ZWt1yBbqU /7SgIWaYqjhyrLRhKCsI1Q9w8pucZkj+hEUE3zKJaO1mmpE6QDQhiltLSjNkbOqU mh1eBiL2x0nq/2qbdc69iARUCO0o/Skl2dToTmREUhOBYoEwCb1uTxHLlbI8ESwd db6Tyohe2JC5rI9DEER5RambpK0nZb0fWS2gERCS4JO0sAsFEmBkBBoY4hJB+r1l 0/9+SGApImDSP73HQkJTeMQTjgF4Dt3NR7YpBQIDAQABAoIBAQCTXdlPOfwCX3Pp jWYeyoGctDHurbyRvaOF3xOHzMg213bBO2VfAQl0iSMBi7xZv4hxggksCScmlTmA cX/zmzVu+b8d9xpiJmzCFzIr25NxDL4nzQP9e73PpdO9rchBsIFHJ8fQKMM7mUre dYAHU+t6wvIbr2s1MCsNUlToNO5R5MBRrJjxqvDteLMrcH9Q6ae6f4sWscqs/oyy yXa7Qve74dGh84PfNCDeXljQjXRE0080OMWBfY2F5Oy86Vf42q31M563ufKIcCBM lMLKBZjc5L2AqFZKOERITBfax4GAoV3xfiRfClgAOA6cuQ385tp18LxG0IYf8Qcj xQuhvyoBAoGBAPbmLyianEJV3j7gojm6dl5rcYblzqU6rDrCOGNSRh0N1bGBP/T7 OEe9bi7apK/09JN4sm0c4LhhyJDanCfaRQ9DRn0OKU0plELSWGvJ3XIAiCoeZSg2 I40A0CSg5SDnsFYIBdBqFi6E3oLwM3VsntQz3WH9O81k8KWraFdgMgipAoGBAO6c Bv7k1hmvbc2j4CLdcf1hkpDGuv5bCBG/cPIg7EZUmpfeKnkP+7TyOzJJJufKE4U4 GOjkN9k9sYoNb7VubkWpdO74ylIszqo7bTI/6iwY8N+ZpJmi53poU3Fp2PTOJy0g UcDDtaOiOaD+gEF1+5LxC+uUonL0g6bUmS9lpQr9AoGALGL5e21ARlS1ncw4nfQ9 r3/VaxEJc37206FzDbgOzs5b6ot3+gzn803E7ztzfAanqZN7UE5uv/ckXZZPmIKP A81ucLEJD8w30UOLjeU+oG4kDJ5mRTJmdcT9pngeeSnt86mBkhRgZICSmCuitKuQ akngtOsXwzcwZDhKi9rJY/ECgYAoC6mk59UC9I1SIPnCADZcVx7ZC3FgtPhyuhWD nYDqANL9P/0S2lrdMHY850gPSLvj9NlBZOP2osMEL2MbKRB6wojsfna+OeTpbxXR hCaSBhGPBWM5obyFr7KpayFNXLf4e98cofv/HX/chDoUQm/ZZnkgrY5iCqV5v16C NOXxJQKBgEHFazeFqKKFnIc7oWhZUKvU+UQ04KKGFIuRg0IKhIjxySQGqiJQIvJA DfNrpsARfWpfCo+dSVxBIcSUATKvA3LMVPaaYAZSj8n7YFA8M/2oCegtM68QM5DZ Rc8M9EbKkv9/LE48h4gc9ywIw1PD14SGq30il8wldWRSYyry7/9t -----END RSA PRIVATE KEY----- """ SSL_TEST_FARMER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUTnXTzqEOILFs1Y6LuvX7UkxgI1EwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyMloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDWr7824CNwPS2WHAlYs2QpHVtj+nMn/nl02e3JIX9utKfz 2sVXy9dT0sW7VcDaeUYBi6pDZz8DecwGjvnBMAfh+bkEx9gCs1tY8Iqitgmekoy7 e7+zHJ1zuo0J+p/zeW+Lwg6D0FztarME2gm2tuw1c5FTIfWWnwotYetXxUWCeKNc +TgeK8WnfUjRcULzyFRAA16n6AmqihfcfVmT/Jyr2eubKeyCJFGUx6jIClb+OFUU 0h4VCZzhHOx/R/X6B9HWJTWgdoKUxQcMt1sdlNuntOkgg1JsJPVPM/+NnijCdHEC Wsk6MGCiVVH/vtR6ek3sDitsJfk36m5NjiDzeK9dAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQCj7q/5jVqInWNHENfekLWU u9N+cSMhDMyq/ANc/wm3OcOAYUODAmfgZDuGAmHW73BSeoEuXQdsnxQTCM0bVF5v 9hKcQkLY9v0tez7xcDwicFQfg/SzjCehbeKtKZGnrANLg1tEm2QFUuqmepbhatF1 NREBmX1EtUrZ8l9e0i1oDk13eOJvdkZ5pfQC7UOK2N7dAHQmsWJtJgHpGu9KgdDV eKRf55N0tiDKFjumdFucvMQVaOtuZX+4bKrLuDE3y6lG/Bzt+ZHZkbCsYAqCtubp PfGozr3jW+plZvnRz4X2GxQRWFw2jVBcBzu8f8Ahp7q62nT9bEfJ6fsKqwhX/KSx -----END CERTIFICATE----- """ SSL_TEST_FARMER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEA1q+/NuAjcD0tlhwJWLNkKR1bY/pzJ/55dNntySF/brSn89rF V8vXU9LFu1XA2nlGAYuqQ2c/A3nMBo75wTAH4fm5BMfYArNbWPCKorYJnpKMu3u/ sxydc7qNCfqf83lvi8IOg9Bc7WqzBNoJtrbsNXORUyH1lp8KLWHrV8VFgnijXPk4 HivFp31I0XFC88hUQANep+gJqooX3H1Zk/ycq9nrmynsgiRRlMeoyApW/jhVFNIe FQmc4Rzsf0f1+gfR1iU1oHaClMUHDLdbHZTbp7TpIINSbCT1TzP/jZ4ownRxAlrJ OjBgolVR/77UenpN7A4rbCX5N+puTY4g83ivXQIDAQABAoIBAEOfWgiL8z2wV4KX 1C3XW65Dq/zC77DiTBmNZ4PaBEy3pMt/1ndAItQpaNUIPtXSK0XjWz8d71BF9gj+ 0haS7Xi1cxzZYeX/3r8WDWURF9iV6rRHV2uwkLvaQACrq+RCFOudtXq5j/vMhxT5 JOQjnCV+AIGCCdxmvgrrc/jSj4F3sFiIpMh5z7oufTmT3vmcx8dk4dSCujpMywHm +xFj7OQm3DGVY5sqF/tevkD2OTal0pWHj+EfvDaNWVWa9buCsjy8h7urPplLX+pd ie+BIS1sID5YTRmFQrxzzbrDuE7lXB7yV47f0sj/+23S9yVqIpUIEqLhIFnrP2rG iVFbISECgYEA+3AoJOcKXvWZYOHP4OeF63Qu0yUq780sk1I8DUSto0idoJPJZG33 RB1/11is+DvfQDt8/C5SpfNONvRLfDs3uKyJ8aCps4dyf4Mp97nTpibRkXfUSc6T 1cR6HWw9d6Om1bqDAgp1HceWM0pGRg57tPmLzFxO91Qh65Ttp0p2w1kCgYEA2pTk QYUzoOgbJhQAkYnzGSP4caYst0lUq/rfFIYvL6eejoLcqowst0iX0tPfD429wJcV P45/JGN2yQz8QrPbctflsUCPVQ3E521oem5FLNcsKr97oxzy1HF1PWjHX6xhZ6/7 tfVXaP2cCAeAKKCVvph3vDI7SzfU8ek0DK3NH6UCgYEA5KUdHFGtMKUOEPfHXbGs KmzAl+lYnjBptJ43Val6bN1/2aIKpXUKQbrBokZVJHbtkS+HfJtzNM2H9pk4e4Qu K5Va64s6RrOI/0N7SnaFbLYoJKxfM67S6LV+hnsDemQrNngg4h44WhhBEesc9F// RpcW9YOLm4W6QsxvQI2KaiECgYA33Kd9Kzqnm8occC45A8VyHmRHP03cRcxy63mJ uEVk63S1PTKCD7L54H6Urfsq8XGWP8Z5aMSLmzPna/8oWOjzr8OPCk3XUd6Jusdh yr65GAC8qBVD+YkBzEFHQXj6tYZrRmmQ9jOxrGbtEmWpfGjovfSTz06iCZHNhWj8 +Ioc1QKBgQDTA8/Hw9zpG80MY5e51AHF9amNOYGa7/OkhDBAs+U0zjQcF1O0IlMK eooQuhSf6RX0/DI2JgSs4Yf9Gx3jvCGW4w4LGTN3veiyQeLocqbNlGijaz+R6bcP zOfGG0s1vdq/thQbnBerx9sjoyE9RIeOmf2c7Sv3vn+uQDTR7QIpVA== -----END RSA PRIVATE KEY----- """ SSL_TEST_FARMER_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUR24x4LgpE1t6Nmpk9Lbcm2p9bZ8wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyMloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC2ye4u+jn4ldMnKFJTrpndM/mgaOI9irWCQ9/kES44RvYz SCWgNIqU83XC7siCkDTAfmQ5dPDgwExGp9mqbBjLa3QuWLiBSmstk/RdvWyYTyv7 Tk3BXjmYU6nbBr0p310+D5Jw8RKB7O88wM603E5Cb48GKmh71DY5+JxwaIJbFATs DmPXQ5tIO+z2WZmzB/Zba7pYOILk1XDR4YPLgVdvOGlaMCkfMALYKtdW9ek6hIFS oPlm/mbzbIld80PYP9E3Sf9iX55GVytuIt5B0u6PbUYFcrKyNld9K1UEA9fyNECa KUVe6UK1Kc+LYGdkRv/qAmMG85zMM4CHs1dP2jRFAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAREhwgP+CXusazRom0cMeb KfKZIY2TMHWTYceAB21vUDSor8dfDNZNaJGqNDWJiwxMdqCa6k5u4ClBts2silfs qYWGQvUpygD9dq9Nazsf8GATZJ/X5OfVKSb/j9OsmikirngsB3KfoOVUz77aALec yuH9tji46NtYUXEMYsCvQ+8SAmLQNra/jqzM/SHAL1Rz2JNxXY2ldBpsWuwaau8n j4FqvQtT97zC/RV32B/Io4/LJnD2bvPd41Wf5YutTOJXUFuVDQPD9rI0VkZk87a3 o7oGLlusWLZ1ZIqTylCNVtv/Lz0JXwImhYIsDcNswVhNIWiKHSJkR4aS3gqVt4Sr -----END CERTIFICATE----- """ SSL_TEST_FARMER_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEAtsnuLvo5+JXTJyhSU66Z3TP5oGjiPYq1gkPf5BEuOEb2M0gl oDSKlPN1wu7IgpA0wH5kOXTw4MBMRqfZqmwYy2t0Lli4gUprLZP0Xb1smE8r+05N wV45mFOp2wa9Kd9dPg+ScPESgezvPMDOtNxOQm+PBipoe9Q2OficcGiCWxQE7A5j 10ObSDvs9lmZswf2W2u6WDiC5NVw0eGDy4FXbzhpWjApHzAC2CrXVvXpOoSBUqD5 Zv5m82yJXfND2D/RN0n/Yl+eRlcrbiLeQdLuj21GBXKysjZXfStVBAPX8jRAmilF XulCtSnPi2BnZEb/6gJjBvOczDOAh7NXT9o0RQIDAQABAoIBAHu/0BpL3A142aBs AviWf6KrenfoKisCCopri1trakA9gpcLZDXG/H+FKBfV8ze5i406xH3FtwJiDgHT x2BCmLK3R8vM0vTtPgx4W3tPMAMZrqwPwkKEmTeQhLE9Kbn8d7L5deoyu5Xso7cc zZTShcUio9DHyz7yV9f9gWP0zTP8/qYIlWTS6laSsBKlcemsMmSklopj+aR0Sbkl 8qF2rlywc4994+ZmD/TEQMSJ/BhPfUkQqCQdoOj2tPIOPtXFqckvZkfvYC4pWJLl 61GXxv18+y+QB5uMOUcTQ7vvLVPwbfXd7TS1bhUiOFSJw/fxmMtOOoGDOirxnfLD 8vBeVUECgYEA7BVUmT35dGp4tEvvvl/RUJtmBdj0prgMOjadO5DX0ZbqNYWFakuw p9X456G1T3lgRqRp5YddJpCFSYH8YnKoOSCzZ80jIUbjDW/0mnESZCb5e8TXyj2d TxqZpOrVkuE+Dadn2O/iEROz/oBXN/QpG58GqptsDuSJ+P3OjVW1TnUCgYEAxjWa V/NcMWqY61TJabAy5wlGlF78YjdhNjS0a1vq4NgQcO7k0+Jd0ErLkMpTN1B1t+Yw MW2BMz1E58AFKUzHd/f6eeJGzFjEV4cirwViNPkf0X7/mIGAAR/6DZLay/IxW3fC 8kWe0cqKFsXAa2TAtgr0q7ji/XaBmmRihqo1NJECgYEA2d3VdJX837JiMgDh/o3u XLUMMdlF7ZVrs00zTQUeJg1floTh2nZ/UGPmj9xrtiwM7SRNlcSV8kDswCl1AGVP WWkUJ3boNI12e7AVy3ENx98v3UiK29iAk7+4irks35995JvY+hpmRdwo/3TxCHIK fbMEM+26iwPdUCrpswSljQECgYBZMf4G3ij6w/GU1U7eFMCTX4U3d5czy6AfeJBI T9De5dxgNeEbyJ5XAZGh0qqoFbkjzJ6bX5/oowXDFJI+B6MrxZgeCUm646dXjCR7 hnyvQfyjlfcHdh9YYj9wpEl5xb+YXciIpfPWjMKfhNYWffyK71sze7wKO64PAGWm HCpdQQKBgQCftgQ1tpeLhjiA3PCkYUpj0XnErP0+FWhLq0pEkwsVKfprxoMO/foY Ku3/XVtRat0w6/CdQpmN+pk9PDFle/rnD9emxqkeo8pkDxIo7bYSr5wF4oV9c36j TTp/SFMfM0rMkuoMeNM2uVXroCXOExSbMmBcWfthFwoCJv8tOCGLhw== -----END RSA PRIVATE KEY----- """ SSL_TEST_HARVESTER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUQsRmXdBM+Yt81O+qtGzJpULDwhcwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyMloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDc2huslrMBGoEROWCsfrd4LwHPSXrehqP8uthUzpsxhxJP HU2bDi4Q56IiAaXl33txbDnKE7zOE205rp0h/k3mvnbo9zBFHZakIZuySP5L/+ry +Jyld9QuggpD5mWWHW6lCmUtGfY0UJJJbr6KPyMqzzQ0xrjLAPWqVvNR19Iapd5D GsWgBSpKyUIwPUf8JpkFvSv4udZlrONoMA+/PAVEeCgOKbWdwi8vrpR43VcUPSe0 TbxE/bWHgOSDW1FtE46logzJLOzvx/k3Lhvumfrr+znNsZyjk14peqkdAUtOA0dm VEhs/wHthVkw/47MO7G96DzB0NI0++anRhNXLiAZAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAVNEaquHBV5LaHJDGrr66p xPuM9sjaahXr01VfAFBqFGzr+8ZH2T7VL0bg0vO3aimM+Kp45eRGM+gffZ70ab0q 94CVT++3rhoro6nXhx1U1lHRNRqVOyGImwMbz/MtmIAeme7My+kZDcNlFg+MC5DY 0pjN/EAoBslrhGp7yWzEh6oo6cKsYajfqcrewwMRrY7shqrpH/fs9gAB4uzryCVV 54tBj69C9JVi0d06YijpLcUT5czScd6yPlX61XKR9lpKUDyEGbRU+4f4DP2oJzzq 6tsME2HXXcZr2fsxkBeCjZpDEsKPMxsHBnebwSTNESCLQgdQc7wJ8QVzgOkAGoNg -----END CERTIFICATE----- """ SSL_TEST_HARVESTER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpQIBAAKCAQEA3NobrJazARqBETlgrH63eC8Bz0l63oaj/LrYVM6bMYcSTx1N mw4uEOeiIgGl5d97cWw5yhO8zhNtOa6dIf5N5r526PcwRR2WpCGbskj+S//q8vic pXfULoIKQ+Zllh1upQplLRn2NFCSSW6+ij8jKs80NMa4ywD1qlbzUdfSGqXeQxrF oAUqSslCMD1H/CaZBb0r+LnWZazjaDAPvzwFRHgoDim1ncIvL66UeN1XFD0ntE28 RP21h4Dkg1tRbROOpaIMySzs78f5Ny4b7pn66/s5zbGco5NeKXqpHQFLTgNHZlRI bP8B7YVZMP+OzDuxveg8wdDSNPvmp0YTVy4gGQIDAQABAoIBAEYIa+oox468Bt2d YkiQzkEwNtSyqmHSNEI6Rctu0Mu911J7KlbXAkieC03ZU/A3E//9n72y0JZQlrxJ 4M4cxDs9fpuVdxsTrOdTOPoqJ2mWN7zglVvrSb+NwQ+TCfe2UZXIXBkXOHmSazEa CxXvu4kht55cvdCx9zUS6Ym0dI26IGBybmr7zwOnCg7Kz4WTfO2JB265mLu/B6wV V+W5cLPeh8bDKl0Za4+v4XXdzMmUliBmyGyyhT+VcuqQWwFwp2OrsPKAth73S4rN pxMd1DrOyrZtAMgkdfzkNTJy7oFW54ns6OxG9p/p/t5N19HCL/kpUGcBoGUQFhXb YxrLy/kCgYEA+xQRNVJTQIqoK0tCEv5dIyziD0ZfzsDDhc5+qFV+7uKsfdyRhLGR GBP9JfQ7Yc0U1W2omreUGRSwVxU6YpqMQQS7tEQQhiQp3yHuP45mVKG20qqFzMDG zeACkTOSIyh0BMkaN+nxkS4PnqlRaqUsyuBRsomof6y87g86cELreYMCgYEA4S5c uf76WFOg6IFwM+1d0P2EDwa+jeXOvZI9fQ44rzyUNkMZfsvFw7+h8hsZHihrKhTR hCemvEcgDIfiCmsCYMRpoI4oJUQGPCeD4mCu8I/ackIX/UCsm7OmoYyNX9KEPJ4C eUCocYaETc31wjOyXqHzjIGynZd9fCFHRUjyeTMCgYEAoveRe9SlqNzW7tL4Xi+v 8GbvjA6XnTFNN4qid0yXCSMj5sXFxiUjEkfXJk1yRbbBcQ6uQ04o2GavVra2oM3D f2g9FXKgbxEGBIiXhbU+Amy8p9x64D24TGS8Bdc9YYieVYTaebRlUWBeTxODfv8b JcuX+5SSQ9yw/KvxuHAXO1UCgYEAjhG2JxMb14ZLyuV/aQOlYSnRm7lhmB0ZZrlR WgkS8lyCFgoXl8vwpiPNhPZbzo8prY8c8QgjRj6Jld5VWsVQ5sSE7+tAoOJeHK3B o53kQZpA9D2G7R1UyZd61gnbWE11aNk4LlAA9j8sUfpTx4beTp5XDpr1mj/tx9cn JCt178kCgYEAttYPBKitz4UVAVfFNdJk68N/Tuw3KoZH06l0TCy1Ygof0S2GZpE9 iWNVNino9Jw+AjQWK0FgKUVurK6fiBTlvtZHZk72nJRTGpeIGwa2kZbeL3qn9nQm bsUE07d0gn+0Ztdo5iI8hB+y3xTN1tq4hIa6xCXKHz5Dnytqkon2h/Q= -----END RSA PRIVATE KEY----- """ SSL_TEST_TIMELORD_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUXa72z76zyiyFs6cTa7GIU/m41T0wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyMloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDTSy0YIggCwTF96eLR2AxXmpXg30F1eG4SZzr6xWd5sXiL crUjSc6V9YZRPF+g6ODEryNYjSxWlYf0EtFPD1MGLW+7ssUJrWK1BX+FFCLvjQX6 ShfRFoOqmkAhWp813xYaWihdLLv2UglphfekREFhRw5h8ikfk5JA3AgTFVGFjB/q 1pZ7gWVamhjjzvrbhiXdqcHDqMuNUMQoCuPLlMOq1D59nzYhUUYZOTP8aAOD2dj8 a8plM6OQwAuQarqt9DW69Tm7AxKbFrXnzXqTT4Ccp4rEJxscV8OIP2DVioFLV37B EWq3pVcarIJku+Lxcpf4C7jXvhBUYAFVeQLMmjzXAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQCSc1CA9sp1CEbEV+7+8EOc 5v3DU1rTEW4dG94MiWDXH/s8B+nWb2lsXLd9Gmau8S+/c3c8rW3eejS7YZ5w7lnb NOdc8SUwPDM+/f89UCiEeuk9fUIe9EK3pER60Fn4H/0ZXQhVob+1lGScnIyx5vr0 Hq5rPO99qnZ3kgLeYRfHQygSpFQ28XHOkQGVSklgCbCBdE0lNWKpaw8oxw+Ki2zb tSGF5Uoel75Y3e2ZqtonZCuvE9Q02LGmDmmfSrRuS9jW2hvV/CHpRnv02GMPQT4+ JTKtqOeY6+hI/eg4UKBYbGLY2Sn1irKMRFwAzftgB2eeU+Bhxb4ioksFlhDvzkMf -----END CERTIFICATE----- """ SSL_TEST_TIMELORD_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpQIBAAKCAQEA00stGCIIAsExfeni0dgMV5qV4N9BdXhuEmc6+sVnebF4i3K1 I0nOlfWGUTxfoOjgxK8jWI0sVpWH9BLRTw9TBi1vu7LFCa1itQV/hRQi740F+koX 0RaDqppAIVqfNd8WGlooXSy79lIJaYX3pERBYUcOYfIpH5OSQNwIExVRhYwf6taW e4FlWpoY487624Yl3anBw6jLjVDEKArjy5TDqtQ+fZ82IVFGGTkz/GgDg9nY/GvK ZTOjkMALkGq6rfQ1uvU5uwMSmxa15816k0+AnKeKxCcbHFfDiD9g1YqBS1d+wRFq t6VXGqyCZLvi8XKX+Au4174QVGABVXkCzJo81wIDAQABAoIBAQCK0TwqO8mJjcXn VK9JcKkDMTPBDsyh0eJ3Qs00DleiUx/AdjddnNMWIL4DRygIvpdVgT82oWF87Tbp +yb6yzWfvGBJL/VWG0zbY2ZZV1ZwjfVccCtfmmwcvMTfZPtu2EdcPtmABbDj7xfx 9SszCAjwUU+4t/GepkSTSjwf1YS+uJRm8JmEVJdysRo2p34hps0UQEQSQNpSEPsA lG3aYtR0spLQUXXoDGBxJ/mHFjV8mlmYm9bVhfAdjLSaaY4z+e60LgiTUVApyLuO Mm8OP86aIxK7Vy4U+okg0ZlzL3xgsXiReCfLDR4BaTbXYS80wsIg/tqB1soLzzSO qGsMXMIxAoGBAOxnudUSXgv+bboPdA8cxfvZfJNc23/uBXLCtnEMHQCYok0jGro8 o/Lsl9HkPRyX0DQXCaOwO3CkEXx2i3J8NKjTJuyLvfVefqclpGSxewq8+N09Ins9 wxOow/3nJcDPJrbdgZP48cIqFleNbmF/CmsPFf5HWb6j5tTFhFWcwR8/AoGBAOTO nBDqb8HjWXBOGufitEG1kUwjbsZQ9wnfbqdlugni1QurY1X7JlbAG9QyOQmLXngK 6NQVqIkvu0aWdiFavg3UUVaTnVmgKmmmO+npCvJmHUvwkKQaDpbScF4d1wLfaWe8 pkaoaXUjuTQMF/lPh7xBDNMPz3cvSqjO+TDjrJRpAoGBAN/rr/2+lA5QRKbEFG5s Fqvi6Ti7771ROx/khuK1UpNKABGIeryEy9ZBe9x3j9sRgUiVua+uMd8TyOxXbOZX 95khx/CuvJM5mkXAReKKqb0WGbOVQJ/zdF+er2ZEF2J11HnJff8nAfej3d24PSFk L/4QIAjmlH8ayH4pSJu/Cr4JAoGAB7ZTGlrck3t3S0rGq2Q/0Ssuj5NuK28VNJb8 YtYR9D1aEv+e5IoHm8rz5S4gMAsrjv5HJMbqHF2ogVOW/b7SQyMR7sog9qFobJE2 2caKIOuCN0oPhgh+z2Sedv2ofqdLJTz9mcoZa+JdXry9niCpIZZLuV2CD7FfYdtA GP7DlWkCgYEAllfMeW5fWwJsio/N8PDQRISlN8yh5HA9DPfl343c8cGCx5ENl9n7 QOqa6xCTtTWPdDwnTQ8oCf5v/97bGPwpWrYxFxqzld+BIc8UHdtBEMwqzptvw2TD i90QCyFVv/7y+izXLsrTUimCAM++muTYyXhfq6Z+trMr0PzAz5yxNmM= -----END RSA PRIVATE KEY----- """ SSL_TEST_TIMELORD_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUfuygNa26jw3yA1o8IQkLYCW31D8wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyMloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDlsfb6//PmK5sQ+v3l3+IIjiTdRcoIxHB3e+fMu6kZPD0r xLiIbQtw06CZsX4yVF3DaiIPobGKfI1fv7pxyHM5OldOAn52SFIWjnU5PNGfrw7H +6Z1yCnB6lC89UO39ArbfiNrYGpf0Lq99ECHd/EjRP/mMd717fOQ//2zkhzeenXC 9jRffLZhkhblPCyFepVBAmBQPKB0rNmnhblwtueUM86LWPq0FrDp0MfP/HbgPQ/v VxY1Pd0mBQ23xXnKCQDg4buXAqv9IVd/kNxzG7H8+5k2Ji1QSoSi301XWWa66kXu svWc4125avodKiC5t3Czbce7kLAq8mvU32GacJ+fAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQA5M3qJYfjlVzdXzu/JTmG0 4Mp2G8cjAXcSWEPwz+FI6gImLrA4tZz5MER5WxMQF9ALKKPt58qi3hk1b8Ko8OUa wq802DBkg+LpurAmPNht3IZ8s4oTkSWOP3b0FYA+/rYqM4+EGBcso6cGSl6msayc 0eyUO+AlWYg+2Bw9AiDEiAiLMaODgmMh6ztmycNluMhP8TNOzQRqFlrEs6YvL/z6 tryToIqZVjIZogcU5Bko8KMcLOEWbLprSzSd4CIJEtuao3TdbU40TZmhUgcorX0h GKaAgtGOxcYjApuavtzr3BA1X/HKLOUNOMDo/27lFPSL2PhSBBRZGGU56FQm2LB4 -----END CERTIFICATE----- """ SSL_TEST_TIMELORD_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEA5bH2+v/z5iubEPr95d/iCI4k3UXKCMRwd3vnzLupGTw9K8S4 iG0LcNOgmbF+MlRdw2oiD6GxinyNX7+6cchzOTpXTgJ+dkhSFo51OTzRn68Ox/um dcgpwepQvPVDt/QK234ja2BqX9C6vfRAh3fxI0T/5jHe9e3zkP/9s5Ic3np1wvY0 X3y2YZIW5TwshXqVQQJgUDygdKzZp4W5cLbnlDPOi1j6tBaw6dDHz/x24D0P71cW NT3dJgUNt8V5ygkA4OG7lwKr/SFXf5Dccxux/PuZNiYtUEqEot9NV1lmuupF7rL1 nONduWr6HSogubdws23Hu5CwKvJr1N9hmnCfnwIDAQABAoIBAGKeWDZIMoW+byOJ P/20dC3MKdO/JRFCli8Wyd1DLUUicfkay0f32ZOlqSyT4mTliCRgqyMe/0VAWMql XP2BXMdTXyylMXrDbks0+uuKS05OMQB38W5cdGFHo0ad32dZple6/qYZjVJ6IdNw zUvcmXHVLDG/c8UPVyYIYvr4XuC9zwc8QyY6HS5FLL2YeuDWXMFqhzNHRPuLUebP cFHxM/doBHuL/hOvRJiwuaG//od+f/j/2tAjpg9Aw0+H9Swyzjbf8SCh40B3oNHH C5FfU+F1C5vY09oq1HCJnuNuYyKz1TxUHcm6FZQbbaFcqMYK9u7Ys++ZCm0N6RJo JMSP7uECgYEA+UO5pmJGai89V2/OgghxCjJCHy2eZ88Cn3iz2G6DU/ispiSOig+r i9LRmoI2s9ip0mNL8oVjXABHpbohyWTn6PNFZq74VNvfGFyH179nXPJZwNszLueg Aky47Sjmfbr/EZwPsaSXWNJVx+c0o7AfJuvDOC3PDvRIvCooB+RCwckCgYEA6+be kZG8Hd2ys/hRzbQ27YS0Rp0uqLWHda7HxRVUcIB4eYFVn/kb3Ll+WJslO9/FZL7w e+IWrU0N09qsXLXGN/4Tn/W27kf40F1kIcHaUGmgEgdQ9fmcBQIMGxmHr1OX8J0o CnjMaqvdHkwQgiBAVoAtZry/ci0IuRJCP465SicCgYBgMygaM8FzR6oH7cmoW7Os uLrWJ5gD/lvHyiC2vegHZ2jScjdkxylwvDtSw0BzZoIcBWCRR7OSFTWRm2VgwYXT XNgDCjIjJfxS/Zsbw+4TbCEBkleNma0iVhPky60xBxNb63wPFjOm/v5GOVASgG11 avYb32oTHmpX3Hk4mnq9KQKBgFrBNi0wsPuYeBCu3uHRjDQykpx8CiBTvipzNF3J B/REKJUuQb/KuYJgRpBWF6wCOdG5d5FheLHxa/luLlN4hyqxb+FhSaBARiP7WfN2 vcOj7zYgZHBNOE3g7MFcQAwej9y8yVPGB3aeafIm907ok3fz1gOpZ8nIM4vnz17e TMCPAoGBALrKGVHHstz8NNtCwgthyRrOsh6shgSQrQ545wi6FVyXT0AEM9mI0x6D hoErSrwA3WAikT4homKcF8skuk8IEEureOBLN3mj8YsrG8Ga5fUmGqxSMzf/IBK8 pVPqryaTVINRh3Yk9EEZixme+u/YZ4D0owyCdph9yG6ojNqMr6oI -----END RSA PRIVATE KEY----- """ SSL_TEST_CRAWLER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUWOfPmS17sBQ2KK+z+yx4bCQgBiswDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyMloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQD9vVqZL4co41Wj3v05i+zWg7J+9ODBraJDHeEaw3T7fXDD I+ZmzNDER6uWmEGqFOvXHdwi2b0mDa6+LLOB2ksOiLknMME7rAF1BusxhYLypF7t 8uQXq1aGQ4fb8LN0llRR3EagfB9mQEJtLHksK50Q39tL+00L/Te56zvjwJR4IwME MifXGQF0TbN5ofVPOxVczpo5cULvVyLst8S7C4qCs9iHxWFe+o7CXlJRtedNL00+ SdqkTllHXeEYM3nmSoj15telQDTW9AJyHQUTB34qEt8o2Oa6nrrEBRNHZGlBmwcF EJt0EPpp6A4lHd8Iq/aQAhrweud/kWzde9oMBx11AgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQB0VYSPGkkpREqo5NXcXn3h vhVmZwV+M1ZZac0/P5g/ILxhRSIWn1JTLd0y6eFznEPOYrQHZws33jsfZlU4OyT2 8Ypxp6v2TRZjY4RpEPy85VAqu5JU0+FZpJkHt4PXaLSnOX3Nd1XZi0AXtQHLvrTK qEe0A4v0hkwAQK1Ds02udRn2eyHSZVfMVchMPJSD2wrlZ5Mz7uIWNu1jdTrNzHsY sSBZlwrOzUYSgYP9YucbzEquj/tmn2rhZXNDaFZZ4/Rw1kcKH96vBTIxKnf/ocla bYmP7j1r3Auw6AxLR5zUtybAj2M9tdE1c+qSP5mvN/ckCBhwOP1XuGjHs40bAiea -----END CERTIFICATE----- """ SSL_TEST_CRAWLER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEA/b1amS+HKONVo979OYvs1oOyfvTgwa2iQx3hGsN0+31wwyPm ZszQxEerlphBqhTr1x3cItm9Jg2uviyzgdpLDoi5JzDBO6wBdQbrMYWC8qRe7fLk F6tWhkOH2/CzdJZUUdxGoHwfZkBCbSx5LCudEN/bS/tNC/03ues748CUeCMDBDIn 1xkBdE2zeaH1TzsVXM6aOXFC71ci7LfEuwuKgrPYh8VhXvqOwl5SUbXnTS9NPkna pE5ZR13hGDN55kqI9ebXpUA01vQCch0FEwd+KhLfKNjmup66xAUTR2RpQZsHBRCb dBD6aegOJR3fCKv2kAIa8Hrnf5Fs3XvaDAcddQIDAQABAoIBAHmcMTnN76eHHVqG 2zKjf4VoZTo3vyjUQTqNrX+YQg7ulgbQw/JtI3mPKAvrOT18/XOCWilR1jfQwvle j0IjD2oN2T+RPGuPCru97ycy6AnHAcBlczBs6/E5mHmvKTMtgYgiXK86DgqBrdSJ RiIHXSXjREVsUgb2+6hdt7x2ZjIVEWTbepfJ+gA1y/4GHgrntC5CtDkm+uh3W9rM HnI8fmnpTB7nT32IynVbQy4/+ZHflDYMoKLCIiamvyk4L/mSghYD2YFduoLlfAqG r/G/lA5gzpnrzuPmudIil//yrEeEcir8xkeuCC6dYQU/T8AKJh/o9jEcwHA2SBVd XK/UPgECgYEA/12P3hhGEST5j61iNQQtSr5p4vX12o3Ov2FSJYi/qzqDyz5GU1r5 EGYej4lBQvR+C98hR4bVjJp+nciOcAejtaa/Oz+UU8nyfS6Z2NXqV0REZyAEeGLo dVvUIFM24j/mNI2B20kJvAvBAz8Jy9efbBphTA/38JxBGSLKj8VTGbUCgYEA/l7B +xXACCPGeF3UCWBghjB4vsut+LXiyf39b1n7BCaHiWGoiVKF86yUlaJu8DGxMIDx U5jP0hjSww8I3qBY2K8iAegyMlH5O3RspEGNL+mIRVFMditUKRHT2wUsf6MkF5os GxKPAw+nFheUmLsdin3Z4B9TgDp7s01ejFUjTMECgYAd8NZhb+8nK3KnSejt1mOJ E/JOThBZY68N+VcsV3BBn0a8mbydIVl6dr62jZ09QHVW5v576G85YRPfZBhvQjYL olVhmP7HJDJuQvx+0/X57WMnxDVB+DbRK8cfUyJoPJ29I6pKD7I4fhhPTSDU6Z8j iaRGysiDSY7IZ6/gU35+0QKBgBt12VUk1PVL/2oRHwngGKuD4hUe4eoeoJwTyl9S BHI/QpSHMW2ZthJHSEcbIQTXKHzG/sZ6kbzppx8dqWR3RQAnb/FqwriB9vj/KZdV 6EsK2AY7r5h2NwC0Bv33AgXJc+UEZMyLZVr8Ppp48zbFxHul+HZki1wldCM4MAPQ UR5BAoGBAO+FGYfEeYmTVo7deE2GstA990IbuJxYUbXapSDGZehlu6calWGSg+dd l/hugFQ3HiUxps8veJIHP5W+2LSgsN5zBT53I0YRvfK7/juAqG8Y8bUcDU2nG8BQ /v8mMVAlIqNeGoD3szW1/6BBnvHBi7bKrAEoZGcIiWzb89av7upM -----END RSA PRIVATE KEY----- """ SSL_TEST_DAEMON_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIURUSWnNQeBOShv/Sz9MuDq2t6VVwwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyM1oYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDEDI/6MSomdp0AjdEuQgP6og1bMKOb/X0G9mEpvKjyIl+8 SSijACXVRhSG7Nx0tU61pebjXF2ax6jgqpzSrrlv/w6WxSmRcqbrdZFSUWMG5FFc dYfSKyrMmF/p0o0kXQRaBSeIhkLnGS43Zna1w5b7ak76EttzQd5uiJ6bG7vCpGn0
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
true
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/ssl_certs_4.py
flax/simulator/ssl_certs_4.py
from __future__ import annotations from typing import Dict, Tuple SSL_TEST_PRIVATE_CA_CRT = b"""-----BEGIN CERTIFICATE----- MIIDKTCCAhGgAwIBAgIUS+xy2kGNomsBGfU0DEELWiHoSa4wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMB4XDTIyMDMyMzE3MjkyNFoXDTMyMDMy MDE3MjkyNFowRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8G A1UECwwYT3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEA9wgpBPIdclPot8ydp7C8EfKfZXve31sim/LBU9nViOTB 2vZGWcnwmb8bBg9gAaCCeSRHF0FqEmU0hUMDD7AY9npBpIzA4SUjUL3++/kKlZa7 Yw6kWJoogcVXpCYvubeslpReXq7EhrrCwE83uqJ+gmz+pGkEaEoED42mw4xvNl+K 8B+nfYJ9aYlErX3JjQGtby+RWUw9aH3xBDDZ1Fss3+289OQ4+4KV6jPXXKZgniD4 exnpss6LqdVhuRt6Wuhol7eoWl/kpcQfQ77fHr/8xTW1TsuFrHjsgJUXqGi73OuF esOaijmYCLkgklocSND0LDeF9uzNjKEOXl86iHpOKwIDAQABoxMwETAPBgNVHRMB Af8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQDeZ8UXHc6TqZGkvrFIY6U6ycHP YSH42ihMkqJApBYWEpb8wFM3vAJIOZV0BBYguat8/7gApRGiy+xnq1TFDJiMLRPu Q1yDWbYXM1fsObgyh83K8ZNQ/nFr0w5o+HcShkjia6pWaNsX5OErrJ57iJefaADU xnLvxHXPDvwvs9f1mLZIZgzYtv3go9oQVOCgeIKOyV7cFUAAgIeyOidcoQEN6Gvy DzlkZdmRRkvvIddDG0kcURmhMJzqg3Tn3hmG29wzSbsw6LK9kwr7S9BKNv/bgxDi DOLVn9LP8qDeRA7zQtbneTtcEU6saUQT8Q9JLyvGUjk+Qgwdj24M79L9s0MR -----END CERTIFICATE----- """ SSL_TEST_PRIVATE_CA_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpgIBAAKCAQEA9wgpBPIdclPot8ydp7C8EfKfZXve31sim/LBU9nViOTB2vZG Wcnwmb8bBg9gAaCCeSRHF0FqEmU0hUMDD7AY9npBpIzA4SUjUL3++/kKlZa7Yw6k WJoogcVXpCYvubeslpReXq7EhrrCwE83uqJ+gmz+pGkEaEoED42mw4xvNl+K8B+n fYJ9aYlErX3JjQGtby+RWUw9aH3xBDDZ1Fss3+289OQ4+4KV6jPXXKZgniD4exnp ss6LqdVhuRt6Wuhol7eoWl/kpcQfQ77fHr/8xTW1TsuFrHjsgJUXqGi73OuFesOa ijmYCLkgklocSND0LDeF9uzNjKEOXl86iHpOKwIDAQABAoIBAQCHx450T3fr/T7u t6L4JuZYnxkJuNo5vmf5e6bTpen+wm3jInZsp9h9SVNbM1w7yLOuTkhc+fGJhuMl VD38g3hVEcG+5jamCbmtiaD7cllk+2KoAcZHhQQ6v/N6IBsfY1uTsJ1mQX136HNf LKufA+2xVqNoTujDQduViPBej3QZV7obRrcOuycF0SPbXQadbE0cEEKo2htfTgcH R0LhPOFQQUvlV7fnTgUtCXZAnxRFvciLABUZ3SHwSswBhhWcbWmzaZQxzfCFOdpF OvBk+xqlpSsa+pmgJ/MnL7O0b4y9JAdLlTf/w95w5gyJMOvn7B3LGeuwIZFHcxvd CQMjlk3xAoGBAP19pcjZ5Kn2ChQXoeOx44mOd4ahAZXOgDgs1mR2tRPtdjH23Mqf C3LaOtn9aBpW1A5UyJRHNOIlBQnqbvQcXHFbi1KJIs/L1yv638dUzmZyUZihunOV hpLQCY5KFqej544BaLJSfBO+xK4mV0hxDiDky9WqzAP7kvmReRGCKqu9AoGBAPl6 JUEOvhBkVHAS3FpVKbEkv9cIFLoY9wLI8/aprcEvSEgn3LmLJKcDauNKJBKXnukX oXRkWYSU+CrOE4k5vDvos8O8KLJqDFZfrPNCuDz8hEdt52DI3Eu88oknfXbuSht+ cJ04WjgyyIf5nDKvCgI7WvtuBLhGlmh9GRmvGcwHAoGBANc4xfhpH986GcaDZh0n nPPetRbmPq1NncmUMBcuPoID3JWBbmbOcG78YHlS0P+D9xmP3JkgeAMFwWhw1fGG 3uoT+o+CBb9951vc7gCUvYV3zFWWAvM94ftmjKZ1uxRsch48jgLRS62MC/t8bCEC dCdzeqkYEY3UHC6u16cI6GfVAoGBAJogvW1hF0l3Qrdu35YrcTOQ2biWtH94tvqQ fjDRCZkFhimV/wbekQlh0iKUBo85/yJQyB3pdWi0xFFluaoY8lMs5Aq0b4wyembO e0Ja4QpEk9CxdLZVwcxE8q6LqDbW5w/vYNGxJAP+U+e17ateeteAJiiaAu56Jahu SRiWFmD3AoGBAPv5pzfb6L51/pey6kBL+Kry9gTEHN1hW9mfv4KyQbjBIDfBLSNj GjrtGQCN3g0o/ElLP+IFXxhJ9k+KlFUZkQAFYMR3X9p1you8BL8eOCjJW+mk2H7P rkUFuht8pmfgMrCAVcKneG+ZZfc+bvghcCmHVeNiioKfOw/7/fqDQ048 -----END RSA PRIVATE KEY----- """ SSL_TEST_FULLNODE_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUcVyMMiaYY4UmD0lc+D0TSzOgx6AwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyNFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCq6EP4SllvUyXjblM/2V88nxkpBwgC9ta7Ndd8pxIZR4Oy lnNYiaes3gTVurf7HMAIZ0wHnlzRZghVvpZQ3eKGR1ETKYXaoRzlgwa1uZKGn8/a DBU2bhioG31zYIOZ/QDf3ZcUR5JkcybdpY+Yj7YGowRkLT/GGN+5GgTA7tXJRWJQ lpHNaIjFgjj5fKB+xXck6OhVHftl+rB2ZPrVgWaXPDBWjgpF1SJnxsbmOK9o4kB6 bw6zm2wuByZrOYg8ckuIqbJhDjINKesfcyb9qSk77h+8ILj9b11OzZUfX7PhvgO1 +W9se/RCYtfGgT4nSh9No7l2vA/IkwOnZOK7nBgDAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAHcwPIii2n0DabvcPo4Kfz iiHQfxOxlnTovNmI3VIWNYoe+ElYkuzKUlwbYEve0dEJwu6mWazIEo+Qexgv1Cs3 Yn7djsmsC7q8pOvSmw+3t+6aOXGzeANcFUPJTgNIlxA0sucHoWwpROLsndBdqVWQ LsV5IwgLJbcUt3tjaIsqfUXabqJMm/KleCd6uDzOuFlW7E1jdUyPomvbOKgc/jAt /AxQimzkMt2uBRH/2IyOW1IS+035AxyyCfZgyhJIhf0l5oA6IiIvS47utLJ/DtWb 93+WPiBYIgNofNr2qGrDtK8Pm6BjjJtBlFvu9gNcHn0E2mC6TKNg2ppFNxXdX70Q -----END CERTIFICATE----- """ SSL_TEST_FULLNODE_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEAquhD+EpZb1Ml425TP9lfPJ8ZKQcIAvbWuzXXfKcSGUeDspZz WImnrN4E1bq3+xzACGdMB55c0WYIVb6WUN3ihkdREymF2qEc5YMGtbmShp/P2gwV Nm4YqBt9c2CDmf0A392XFEeSZHMm3aWPmI+2BqMEZC0/xhjfuRoEwO7VyUViUJaR zWiIxYI4+XygfsV3JOjoVR37ZfqwdmT61YFmlzwwVo4KRdUiZ8bG5jivaOJAem8O s5tsLgcmazmIPHJLiKmyYQ4yDSnrH3Mm/akpO+4fvCC4/W9dTs2VH1+z4b4Dtflv bHv0QmLXxoE+J0ofTaO5drwPyJMDp2Tiu5wYAwIDAQABAoIBAGjkEAMsrmMSpuhE Z7eCE19DTc/OTu5yzCstykjoyMTXDU7n43btVQlVYaZC6HOnm3wM2a67VL/3XRoy 1FJhO4up7WpTS6F4zCFYHyAc+n7BSnHKhKJZQ6y44m+TRnGVw5mhh/2cR4561dmm qNC7Mr40Apfw5XkQ/w29mDlI29CgUZOCg9e/DNfNcHULXjaBvIT6Ecr3IOXl/d9B zdtyAZohHCv5m3Psv7ciFjDKb1nY1+c6c8WUFUYgPQz6SUbm7mvtLiH1gVBuEjgw xI6RwhcNqEVY11+NO8hVcHTvwffEIDMbn7W2L4nvJsU6PlHvsxZx5OHyJIPLmMi3 IrnbKRECgYEA3jrZ+zMaP+eeuV2syjc3moYK+dbKzk+ewk6EBQsUTyvq6CPvIZXL 5MnckGjw3CECIKwZG0gKph2+Y6M9h4sfg2Wz7Kyfygk+TolMU21Aw8mRhkWRCs01 9hiZbCrNypiQa4BmeFWo+uyjVDafSRJqcTIcVSHaoeyRn9uRIYIvOfUCgYEAxODe //ZBx9lufRXMYR6NoEqok/fsK8uORr5+l+QdZimAkdSDmGtY4/o9/TBg6fm0C0kr 9o0owbi43FwEq3ZLyPIevCaKHClZO5MQm+PfRYDs+uZhrAWaPVW9Q0b6eiYe8Xwv Vw9aR23DlTPXzV1kiuWwsLIq3+Oq9C7pt2qZdxcCgYAfMyIBa3ZG/IzDN4yXw1LS JfmKhAZrGrCOVRmh36FVUDQlrU3YaEB8+X425BTUwumajq7jrqSYF9rwAC4WRokB GJk/JCk24z9VJV+K4u7Rzg3ZTREE9DScPW3kysmjpPG5tggs4tHbkLeJjjWku6oo BEIIDb21OBJl4ByrGKzqtQKBgE0Ph7nAdfb3kFu9kIXjI6Q+FMX2IKbzwfjGz148 l5VJYV2zRN8ABYcWh/T2Xri2WFaiiWaz0eQhnZoDGoDSiM9aldUncJ+dP6Ql6DZc dyQJVrjOPCTM/JZNXQtcWOY+zZXP+eelxrx2pjtcU3e6uoPza7l9w3Jm9p8lTa3R N8h5AoGAUAtG7NJ3Q3CCUsz85OUaDGlQVPNrKi1BBG5KEZJla2n82qjnUdOYRWx1 c9gr9O94Yukur3VWtrNKpxnjwJx+F3akW9rHwEEy5xtlAJbi1mR7/1thgObUS73P uapcJeqezHfl4ir03YUHSAJebwefo54B5t5pOdWEFQLS2AkggSM= -----END RSA PRIVATE KEY----- """ SSL_TEST_FULLNODE_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUIpT5MM70VeIvnygCEHRVsL6Aq80wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyNFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDsxtOxdud/1pyMnhIdMYyqWmH80gO0Afp/ojKApcqzV3aB KBFfQWLp4hc+CwykpAItx3vuTNXn/dQFxzC2NXrmq1OlPiPUcxorzctxqDNdoXlj WTtxjkC+kxvvA2d7hgl+Huz3JxTWWMt+fM8eLTAOdVpPea7unW5GfQ4TwhdEMsGQ 4AmUylw/vjJDUaiOHlKwwD2c4EakZNd35pCtRZfNjM3CF9BxdK2xysWp+xoOIY2C G61UFfaXiVK+XkbZB1g0+nhNEsur03gFXkFEVmetXZvpfTvQ3J8a3f/sguzLqmYq spKleR4utiP3llVrgnKPWpDiMvsx+xRbMlbSUMvHAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAV6jnHn5x8uYtbM9jN3cqQ FK0OrZPSDsk+QJt1I0U0+HF8j2jMZ1RTxRhUCnjCoytqbh/fT/Xk+8s0N614lvja 84fmW8dKq+asD2mWrPZeEgpipk+fzthUOrovNobAWtpdEqjKWEvQxMOICijEXFbv 95V4kZS7JN+s3jAf5nXOK9EhGVI9214UyGNZZU/nzFKlOLcZFhGBibUAT7oA9bKi BLbCPI4/CIdUnwaK7y8xF9z9KL+A24ZZzhLNVC35gl0zESgVqa0DN9XQ+GP0qC1S 1Z6PF4qBDeta+3R28PtfPIiNpYJ6uHAOT/iDmIWBKTGC2Y6NVs2diNZSOlZXSzN6 -----END CERTIFICATE----- """ SSL_TEST_FULLNODE_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEA7MbTsXbnf9acjJ4SHTGMqlph/NIDtAH6f6IygKXKs1d2gSgR X0Fi6eIXPgsMpKQCLcd77kzV5/3UBccwtjV65qtTpT4j1HMaK83LcagzXaF5Y1k7 cY5AvpMb7wNne4YJfh7s9ycU1ljLfnzPHi0wDnVaT3mu7p1uRn0OE8IXRDLBkOAJ lMpcP74yQ1Gojh5SsMA9nOBGpGTXd+aQrUWXzYzNwhfQcXStscrFqfsaDiGNghut VBX2l4lSvl5G2QdYNPp4TRLLq9N4BV5BRFZnrV2b6X070NyfGt3/7ILsy6pmKrKS pXkeLrYj95ZVa4Jyj1qQ4jL7MfsUWzJW0lDLxwIDAQABAoIBAGOH7OMTpZrCf0pJ BDpLYuMVXU1mhvH7Ru6yIuKbTsr2wDTov+y30rmYNcb55BWtb9EIoxr4J47+z0qi geKGNqSSbnXu2ibrP5wcRSIA357DSwCtOOSyNJsnwb1GRBDTtlfS7i+yuPqllt0T 4AjCXAon4I+6CgP6H6n31ZwOobMjh+SOsgfcaCiSspyD1Dwnkxvz1tVRrLgv4RGa gyzCEUN0zJaQTvTnlBhSOvZ7E+AgNa0gt2lYUKuSd3m8Hr/xtKKAyotFZZjkkI+A GjK3eL7S2zL2yaYyJvQmGpwGwceti2oq5sytWXXREraFBxjusF1Yxw4n/pguvrAS +5CDlFECgYEA+O7KoYx5g1JEOFCFpyfDVyR3s1SOVBe2pQIe7qcNbtrDFQu624Mv YSvYNsvplSJsbFUCPIcqzEf+BIzgQQ17yDacczZnk5rN3VurU9xRaGjZTKeF73nE bDhRXmIJlxCtkcXi/vzDUJdhAtzN1yTHhwgz7SvHHeqqZkKwPjEGo7kCgYEA83+v vZfMOWJjHXGlKj2cAmHkLGrKal5l6HpMxOMqaoVbx/oDguQLP5uH8TQnckAJVyKA ks0gJrJsu4lk5CCt2xgMQSLl+heGcN+usVmxiV7bBv3HC7E0wNp9/13NJWL5mrL6 COEDIl/qjF9DI8ISam+L7KQYk+TPp4lxgyxxq38CgYEAk8pJuUHKPsIPyJNd1lDQ M6NuAaUY3yo5AJxSuwOpAQCWQ590L7Eh5wH92wKTSjxmvKZ3rnHdYez4DcGJvnV/ 4O0zU1+gfMyynlI3VJGAL4nYQR9QcE4N5OZGwM9ZvDtloR8oVpTAbM+DBA0NlEa8 wxmGoq+UBtn0ksPTGQlIVNkCgYA+XCUV2RpkV94qXECAYObjdU6KUY8lTqeqsieX BNaIET9AJ7defiijUaGvFDxF9kBuIFftQLtLLcbLAJTmF7hus+nvhJCBTCUSIzcK FH5zP+e4EqY3SFrKSSqbi9pOCNsD03JVc8rpssbOzFbVgY5V09tx71ScC61iqsB3 Z5p04QKBgCDlV7wh15Q+C0KSR26EE+6Aj+CaH8uRSoDO707vf+ZS7oqw5Xivl32Y QHFVDim4TF3UyYJvCRKmvSMNNsAKc9hFBU5b3TlBMwa5Cx8l+fOmYhe9eNsP8BNm aOrHGu+nvZ/oke47p1HXEEqUfPw5hPdwo11jwa5lUtSJZhLQhhT/ -----END RSA PRIVATE KEY----- """ SSL_TEST_WALLET_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUBOIDJICHJA4JiPMdTj1KC19GQOgwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyNVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDUjguITn4XjS5HDyHEP5Gmq+dgP1dxpYLMDWnJtHZatsYJ 0x/rnEmDTReeQgiCbISO1oyK/TZ/L1IfzoRTm///uNns8uBnku2VmUDaTUd5K6ws WqxN3YU+h3P5de6otb0DGkayANr3bMy3KQqGm/XxQB2VvXuo4nzbB4Tk5jDO6vtk lG4184IbY+08nrj41L3YNCOynSnRDi+1ipfc/hrIKuCA5Giuf56S02hHapjEw8+W Tvokx1drAlcJkFBLDVuPd146L7klCAhENaIYxJmoqLme9ZNOta2jmSEpeIHbsw1x HPJNi+6n/Kh7k8Lsp0fE+jgQfPDEaqOXsnLCZOcxAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBXHURcU2ox80IFiBq8xEDO cmHDZVOrQqpmOdygP+q/JRFoX9jF6X0nR17DBfDedgBz1ghax993nXwGJswvs1K+ 1DsTIKxO2HJefd/5iur6mxLFF8RXdku9as1tfNx7CZMm9WcML3XJu/u1/E+JRUFT +QdoAX3+GnZGY6g+2MUSo11+3Ide9aaHvRUVDIXxqxDOZgLvy+EpIoQU4lkL7cuJ CuFB0LYM9FMih1BX1uEu3wnCRhJq2nJuIObMEU8wQj8MmgPZTcJh5tyVR8OeDZ73 CACnvjXydwYvFmcB/NCMLpolQxxgrpYKrz8dx1NN8mZRNb+HUrM2tiLsWKAdFEid -----END CERTIFICATE----- """ SSL_TEST_WALLET_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpQIBAAKCAQEA1I4LiE5+F40uRw8hxD+RpqvnYD9XcaWCzA1pybR2WrbGCdMf 65xJg00XnkIIgmyEjtaMiv02fy9SH86EU5v//7jZ7PLgZ5LtlZlA2k1HeSusLFqs Td2FPodz+XXuqLW9AxpGsgDa92zMtykKhpv18UAdlb17qOJ82weE5OYwzur7ZJRu NfOCG2PtPJ64+NS92DQjsp0p0Q4vtYqX3P4ayCrggORorn+ektNoR2qYxMPPlk76 JMdXawJXCZBQSw1bj3deOi+5JQgIRDWiGMSZqKi5nvWTTrWto5khKXiB27MNcRzy TYvup/yoe5PC7KdHxPo4EHzwxGqjl7JywmTnMQIDAQABAoIBAQDQJN1UOJEvnPgx a7cER7/ouDQWw1BtIMgJ7CSo+ghgYtVhr5Z1khFG+8piFoXgukXA3oa4YKfqOjuw m/pnKb+x+qGlcF2h73aq5W1lmQGhvcuXj59ljMS7a8d9BSiVm4qhLC0IiN/kJW3+ +ritArL/8WpHRUuAIXJkxmM0B9rJ8/bPYhcK6cdgwV09KOKRL5FVrmVQIzNlM3F7 EakCLVTaHeAlOHTt24XU5EuhV92ZtHorQOUvdx/wjWTGosOZxs92DS43gS/ZszUq uH5mfbRTyTbde/BEKSDE27dgYDV2uJ9FuUeTJcJl2kjuKRUPrhZf+0FoCrhcAhzg JIjVt3ABAoGBAPJ/AHWpEPlp5v4RxhVrwZGHbwac7kzzaaUqS3r4tgw8iAb7iEZF VDyVrM4gXsfaKedUobxaVMUvH3ajlIHF6ncnND0I7u4jff6lc+V1HqZbOs4xaLwu zlrfecfU6JOrQ9UnhYk18jpShzMsoBl2mdPFe8QZClvn6UMfXaOdot0BAoGBAOBk NEchBh9Tms2826G2PZHclp9JVpCYWdxqW1/X3MoTt4T8gQUSGbeEx3ieY95oqAE4 eE1RhEniIQ8sQtdgnZud/LD+9mrSCtaAdkDOSCulCXNt04B84odid3LHkd+qZ5/5 rqctxAmECxLFaYHU6eIeAMhyoFx8gUcPLjIvRpoxAoGAPbMox8c7pWpXtr+I+fxP 5RpjmnglffjVIYwwZlqP328rYTNwyghr1Xpz3IKJ+ym8TbrP6B/Hv+AsjkAy0g4s iSK1fO4f9QGc1kT8xx5UrRk7TiluL6ttH9wKnVjD0IbcHIkQxgeu2T4UXmX1WmU9 4I833X5Nj3LjfAuoBLBgNwECgYEArzUOrMtYYHWDVkm0pJwLjyzSXyWAdf6/i59w IXIHb7HdhfUzOKZddjIzHjdue2b0Z5+UL6sKxDXQ4mwI9Or3pV7Cw+EQv2+qDrrX mtp2970xl/OVRao9psB3zCOP/zirGPp4KQlPHK8BhnKmYz3AMVKEAf+evxhoSPfN dln7osECgYEAy/HevTnTfcCn6TZyYBz3rHfZ8mZBO1I6gyVytcNQNgmz2ZPI/Cxs iDg78PSjypKSZ1PyYFc+5dIIw+02guglrTnIrrxUbGp7cy26VQfEwGLjaqFHZplc PFS4W+Fz2xVGnkv2sQwh3tSihThxd3hQK9isI3iHBeZB3HDWpGQzRMg= -----END RSA PRIVATE KEY----- """ SSL_TEST_WALLET_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUN7Hj/9zSlPgvmKSmTRU0Kd3ok3QwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyNVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDgmG/ekJTb+4NZslwT7MXUZGuOOId95dTgXWrev88flfsE +lEl1MvVKQLVi3F1I/mxZujYbCW4bRqmwEM/jwpLNxd6lzQjGLoePQWTURCBdnAY RtslK1eetPhKRMJTTzaH21prkEEEwjqNb4he91O95VMApYSkEX1vOPd6LhxW2X5E Z7rwZzgL+qwKtQy0VdnxYIcBnEXIKanNodC3vR6BRTU8vBvMM1wtxjKAAcs+fQVY 6eyBu3Z450Fo2Ge1+orDgLdN1qSFEDw/DU98V7Xo8CzEoBV0vRxja7VU3kRqIMKk EyVwjD6QBfm6CadVC0+vj3B8sbFF4C+w/gkZUkodAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQB0UQbCG+es9N/hKKbzG6+P nXbd/c8LB0iJIPZ6xyPWoZsyzPmItMt3KFnYko7EbZ083Uuvfy+IyHSPcxihxQl4 qLGvjxHG+relpKexwnhYgRWuW7d8xI2WMjDT7Xs6q6npbCQjwpZXbKxe2Sr/WMu/ HitB3RwZ/CCeQL5oh8rm7TRWi6boqJXG6Yx6jjPRrs+f+V7deXNxHs2eV3RUKdBp Lc6IiNoTtdkZm9MS+xsucm0HJa/Mf0/Gbos5A9oqB++q8FR18Rg7cEt6oTyPjlBF xq/9SRUCLAeaIVufV+Be/bx/tX117/MUQth3cqSqlMkPfvyIYmZFbJbr2wlyQ4wS -----END CERTIFICATE----- """ SSL_TEST_WALLET_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEA4Jhv3pCU2/uDWbJcE+zF1GRrjjiHfeXU4F1q3r/PH5X7BPpR JdTL1SkC1YtxdSP5sWbo2GwluG0apsBDP48KSzcXepc0Ixi6Hj0Fk1EQgXZwGEbb JStXnrT4SkTCU082h9taa5BBBMI6jW+IXvdTveVTAKWEpBF9bzj3ei4cVtl+RGe6 8Gc4C/qsCrUMtFXZ8WCHAZxFyCmpzaHQt70egUU1PLwbzDNcLcYygAHLPn0FWOns gbt2eOdBaNhntfqKw4C3TdakhRA8Pw1PfFe16PAsxKAVdL0cY2u1VN5EaiDCpBMl cIw+kAX5ugmnVQtPr49wfLGxReAvsP4JGVJKHQIDAQABAoIBADWQZW3BMZ9dVrA3 t3oRCAVlhbk/hiDihWiVHv3M5Qr1bA593IiXPZ2y0Dg5r29uiwhiMLoc4MohSy/l vqQT6zKRCwpzsT2Fki3QA9pkhPk7U/SWQYGV2qnBI04jI+1WgPzZtbDdkIQgBnLg 3Lc5aUFqxebrkrzGZxH1liAPizay6ds8PsGGN7AAeGHdcyL4oGIlQux/jbiGbBzU NBJmD3qvmbjyrc0J2wYyCJtlCyMYUW6Z428iRI8Qzv1wBzAmnEoKHlFnsIwvzPRU SlG0CdvWyckXPy9MfWpjmMhQos7U5MZwECWl0aF9MPSkLSxuyfeVWw4/p9tOWS/f ebyJVwkCgYEA9xU9GAgFzpTHE/1uFNqHSfQxqtEULo/FsxBcOsRJyVvO55+mQN+z S0UtdiQJ7s4Vzz5UXrnhG3qgxtQvgt6grg2m7pPN5UekIDNsQoDMwMLA8Bt248vw 3TLbSe5Rn2H54F1MuxfoxG/sTMpzNAgNuc9TuPkRok6X+nsfbfiPQXsCgYEA6LNw kuShVbWRu5aZd8t2hVSFOWN+lmI4MHhpDCFXdTyJ2kxU3k1vdPth0i9kFU3JktNI Ptnf3R32Uf13lWa75e/0tHUlHaYs1gpdKqDU1T7OvU0xk0zzeogshc35cl1b7Lyw Op+PJX3F+QjK3Y5gDEnKAUpi3Z4MFvi7sV7BE0cCgYEAuLa1/5svzCpJUdZqT0i3 T0AxSUQY1F5DLASVDpHjn5b07Q/bGDCkNyc2P1Xd3xtODqrIJDDN6t8YBsxl4G5S rQwjucPhbwDJ4BDRZD4p1AlEd7vwe4fhP1xft7tkZcS3K1ZUoKHVL9WEUDwhN8q1 iC1Ip8X7ut0KnQUij/H8FrUCgYEApUF5uvgfE01E16GWD5sw6nMhwaXE6muKV/HL OFAdWibKB3uZ8d2wP7WevLPnMbHyaxEdB3WXI+L5YTTOTg2Ndzg34kgnOa0fvknR 7EoXm/FkxM8jW+aUKvq2E7g5ZFykwbUmuhtCf2+YvsjduQY5c8Cbctsu5xAsqcuv D8GpAFUCgYAWVdHC37arXcZiwLO/YYPE94PbIqd5LrMaDXcWNcwFSbB7kOnINt9G stvnxoD999PrSJLRbnvWyQhcGhK8qXZtDyh5sw/VuUsufcz+xSwI1+K3NSBEJc09 e9XstIYrR5rdizf1g6Ai45W+wAcs2ysUBfnY3fUv4+n8ZoRiLXCepA== -----END RSA PRIVATE KEY----- """ SSL_TEST_FARMER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUH2fAuEi168jppWUawNNToTni7CQwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyNVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDRJQfoJxErXVdwTU4sAQ+05EX8tC1REoYFJyB3hhB4LfOz meCPe85X6FTYbcPdaL3NVevqEL2hzbqESD5Gf5Fvx9ctIdzwYv674P/tqPrIkTd+ cLshBKaR6CeSjPt5cFbWhg1hnmWy9Ta7SsYqOXh2aBQJKTRIK80U9b+8iVs407E+ NCMljerodAdePW5X13i0ca9ifwbTZkS2/c9nQEi7qldj18/MVax6qezY0aKqu/96 8DSSTc6uUiNLKmRYP5xRJw06ggVooviX7snMzG6SgsbLK2tZJXeJj/EECOY4UrPc FOkVmjxGBP3QD0oLoXnZpxvutS72ovUrcPxAMImxAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBSOIrT/3mFkZmuoQ/7UcPR TOssC9o0xAwR0iRdziNQBZne2zLCxk6p32di+T6GIJahqYFqVU2cfDyyw9YUCr3P nbMjuwsSrvor4LwJ9jlWKRRyBm/adCttg6OQIO3rYk/rX7XE+fBY1wYhqK+KcSCb iRLqHIPEo9On/kpaSOWKFeSrGLMkj8nQWMNNtbzTNcdhQlxEGXcxPsVb3PGs2b0p n63n55HTUbiL0UsHQvxR8gr0YiSpmlgJLi5pipDbyMiVHyCxj5j5vEovXckRliVd iEbH235NTXPtJ9aBVEDsHW7W1AhzK5gh0Ev0xOC9vP98qTYR+4Oq/3Mz9r2jP5/d -----END CERTIFICATE----- """ SSL_TEST_FARMER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpQIBAAKCAQEA0SUH6CcRK11XcE1OLAEPtORF/LQtURKGBScgd4YQeC3zs5ng j3vOV+hU2G3D3Wi9zVXr6hC9oc26hEg+Rn+Rb8fXLSHc8GL+u+D/7aj6yJE3fnC7 IQSmkegnkoz7eXBW1oYNYZ5lsvU2u0rGKjl4dmgUCSk0SCvNFPW/vIlbONOxPjQj JY3q6HQHXj1uV9d4tHGvYn8G02ZEtv3PZ0BIu6pXY9fPzFWseqns2NGiqrv/evA0 kk3OrlIjSypkWD+cUScNOoIFaKL4l+7JzMxukoLGyytrWSV3iY/xBAjmOFKz3BTp FZo8RgT90A9KC6F52acb7rUu9qL1K3D8QDCJsQIDAQABAoIBAQDBn1fXnDtv+yVV KayCXqUs4dzNW/1MPirnIFcVcH9U0633izDzhTn99nB+Qfh/xVVagP48ny0AXBce GkfVOorpgoh6FwyVXADa7S3i13r9LjvDChikM8sF73ibW3wA7HjoeAhxZJRgflYi RNJ7CuO0MxzBcm0dl7dwfSb6I+vZCa5b6McimTnKhXSBwQy5m85ldAVKOZveU+aH gLU1qSmW+2x9jErdzJadhfqrPDcy8UBla0uqamXfPBCeSdcSRHtlWvc9RxBcdtQF jkzhCyGK4K2cBKEMa1rWCcr+kAd2uasEoSTfe4LMPgQGbS2e7sl9fufbKRDkZWrH NuGr/aVlAoGBAOvjN8lAgOQJyI1PmKcZnbUXRFhyYvjZ9kWmsN73RpZ3yhWPL1MV 0qyVHD1VcqnRWW/Dw3Jw42cLw+LZNJMSNxPnl5e2MtxSnmYn0PcrkUcpOafxy6dO MV6op8PeA6njtMMEFnnPBoVwM9km2OiSW2/L3+rndtS3eApRzkm7jjjfAoGBAOL6 FolDf9EJS/njwHFGhMRfUvTC5C+YJh/vUjkY22rUw4v5GfxTlDVigbbqzerzMnA6 XSU11S/I/n7HuqGbc5dyUGGyk8S7Iv7hvfDPLfy1EXlKvQElpcbXG2Ln1wZ9E124 9+jRzzOUv0GcuxMXMGi+OIRsWyyzhNOZUlLYWT9vAoGBAMZhFO1//eXKBIwzQKJn fKZrpuLrcCjwxZjWEzGwrACnRaDUBmzNkZvq2xEJ56DBm4HPFXQNVHG5B0ikev6k 9wUaY/cHF8cLBIPNQIRec5NxLDf9tdRCgmqlVFH5SQN7qO3JZk2Sul1Ge5RIg2s0 iwl+YBZiCyHiGmYzXlXMElPpAoGBAJrLQglUzluqQnVmvLzEAhHGjNW+AE7xLbcD yQiFikZ+Weog9XbfLSmHR72OvuZn+1MMiq+w2fZf1ihyYDaMxLVZUbZ/SkWV9pTr MVWEhfFdL1CQBvw8R6Wm19eJE10qecWmOvQ9+lhMLm85y1+Gpg4ZBIRTPY7r0z9X xgwX3i3jAoGASf/FiOO2qtKDxn61LLVedxDtdmxd8FHLP35i+4S2ZyeIe8l9K/Cf lbXe42v2NEKSjYq+z0HKdtjgZLkL2ucF+rLbkBfg7G2hmWob0hfYCE8xcnNPWIKM yoKW82uijH86yJEWHAFAv3IZhU1CQP0BkYteAxE8CExQU/CSuHsCDao= -----END RSA PRIVATE KEY----- """ SSL_TEST_FARMER_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUFPTg1QrNlWLRFn/hC78RXi0IOD8wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyNVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDB7fCDqqnna6BfaJsv4xztP80jBCygHHhHdliSWbGX/tm0 lK716u0lBRiI3FmzPk9MqKMuV2Vvjsqm7gwLzG3oMHKaUPJUOiVf5v5/rXauNiAA m/sfRAROef+ZVoVmU6rqwnGvTf6POI/MPdEbCPGIXu3bWjPXPq/BKzJ0KCJh7ekR DaFWCkfQEs3Zilr2ehrdObzwHOxJh408t2qGeCQDlQeDXZYa5cTHo0tNoSWdfJIi 1jNlEnvpo6ZV4fyKY1MiN42J/2swaxypdS3KxvPZzKWebgaloFaZoY3HziotiIva EnJrUXNgQI1lW4/a7jooQ4c7A0t2XBidRS5Sohx7AgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQCAQP7xtLehAfWTp1k3E7IM eMT0Qm2iBWQqB4RLxIJWgHyVHYeY7Lp7lS+BZFKHOkbVoc2J8cA3qGGDw3WrmQuF uRxfL+bLC+HMSjEvPbXmnMWAqMKmVBzOvZf91VVKsFR0h4Gyt78EFteZVEHZI5bQ jC2RLte2uCtht/Wum74z7jGzplx3fRV+zcig7Gka8IwTcHaRpfhhZa0wbbR3Kfe0 uXcCgDF18rwr2uIDNPBmJfy9C3nyQugWzNV/j/FDmrqHD94tagfDx5wYPb/ZFVpM TRg94mZSL6OkgITfba9MkOBcVGbkCO15NckC8rm0p3ngbEgu62eW9FlwsE8b1bVK -----END CERTIFICATE----- """ SSL_TEST_FARMER_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpQIBAAKCAQEAwe3wg6qp52ugX2ibL+Mc7T/NIwQsoBx4R3ZYklmxl/7ZtJSu 9ertJQUYiNxZsz5PTKijLldlb47Kpu4MC8xt6DBymlDyVDolX+b+f612rjYgAJv7 H0QETnn/mVaFZlOq6sJxr03+jziPzD3RGwjxiF7t21oz1z6vwSsydCgiYe3pEQ2h VgpH0BLN2Ypa9noa3Tm88BzsSYeNPLdqhngkA5UHg12WGuXEx6NLTaElnXySItYz ZRJ76aOmVeH8imNTIjeNif9rMGscqXUtysbz2cylnm4GpaBWmaGNx84qLYiL2hJy a1FzYECNZVuP2u46KEOHOwNLdlwYnUUuUqIcewIDAQABAoIBAQCwX4qi9RBZXNUa cLTTNKcWTzRuaFl9tObfd47Oa6zNJAcz6RXGqsbLKHtL3bvm/QB6I9VlTC8A6sj8 UPu7r002IvnXx07ds5RSSG+mB0ks4CTy6OnXYbDY/rOr7bide/KyV+21FiYyc6q0 gnQvNk8VS+Df4oXLeUO3V2Ynpmi+zl4B9dDT5nZ6bb26fYI8ei4HDPexPdQbJQ3k mCimfkMbodEsrJfhM1V/NPwHxJvfXa8mTsEuJnn+efB7bsS3GjTtQ7nuIiliSqHm SONfIUWYdgEo6chSnKA7MDWFsoPabV3zYrPU/aJqMeoCH2jNEu52NiOhTkv79Dg3 AAqci1CBAoGBAPbdSxAWGaRv2KEa3Zry7snhhSVth3/wY+imVO7U7Z3dO23b+KNE iEobXbuK6eLKvskvcHel04DfUbOhNws1qytDpG4rLklXZvX8eWpTECkt4BPfefVi SeN8FCxpx2JSmQgiCzDuAGTg530OaHHTbymhEr+Sl8rQWBZYjo99A5lLAoGBAMkb KLDai93wWYt96MYn4NPxBhUNbSW75wKSi3PHgHvnAM9qsInXo82BFmw6oUFCit6h zRc+gAp2wsqIaka9/Hao0MSeCgR3xuuohZeOKmSmItnw70k75Qgrnu9wKyCEdpC4 juDnkaf8G6lT7+Re9g48/MA0Qd6l6WVvXs5nTDuRAoGAaEDqe1+p8pzdcqQi5FYl 7BIWpcjMyYYe21irU7WOp/WPLIUSSvkdSZanDhXLUmDnE5W6PH1Ghg1Jtr+lvFEs +Xd2kKQhxw1nSQkXyYRMtedO03W0TqH0rGJxLpR5hJd3U0z1RvOsLO4iNNkJ2NA/ COiiP09MVXWJTd6WThiwlWMCgYEAlbwfA+71DP6T7YSF+GRgxe1DdhFVHy9UxVmP c1krlRVeSRFK+JcSY0SmCVduEUUWWMVoCtKCS0g5qMsBNkLm4wK2zm5NTx5Pgc8s CLfVYLNCZ7s4rvJliTvRTr3ZnpCCJycDWvmQPd88SUsx5nu+AMPv/Lvr/3bQ3LGb iVroK8ECgYEAoSKTrvPcy+/ViHCr8ctBK7oIWiE07l0OeXNsH94hTp25OtBScGIy alsJJrq3P8NjRJvxvbV0FXhMN2Mq08w3sZdCbZW3t7hu9mk1chxREcmmmfcJIqxx x3zd2+szabHIFg5ozqybYbjmJfDZxNIG8h4HvHRdmBZocbRQHBM5VN0= -----END RSA PRIVATE KEY----- """ SSL_TEST_HARVESTER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUC/PhYZPSyT/cH2+54Hfayu9ZXIQwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyNVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCog5fCeSavpTI1/3mA/Jv9XJF6ZGRzmNJq8JdRPUd/V6dQ eU5cOE7QGXbqBV1gQUOXIf8Ke9wgwcMPGRLBbhMQcd9CqWK/rZZOuczRBoqyEvQP YhkyPWmIbRsNTLg6KYxghdCD9Ps75YWBpxb7uGwKgYadixPGGTDlbGw4m4T+xoSX kkXcoCiYf+AnWdT/xYloEG+ovy0oBfOfv3q3ps7ECZRX/hZ+4RCRgA1IYi4z7VwL JepZz87PH6zv9D1CmtraQVZUD3UJRfMGVsimLlH09r+mbZm3Ndu9cO7fLLkLzLP6 w9hhibZtnNAOyLDYrgOjl70bGjePzeodmqzPMY2zAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQB2/xNHBk4oXI5iOyhh4Kob 7ZVFfnjnOFFVhoWYAHSL4rJy6Zk12VwqsvUh4viwkSgmpKkZxyjQR7rKGTyopzHJ aUEV7mhHc6lpM1biTZyXHz9PIJAgiHe1J+CTm5qVx9STi1b1cJ1FlTYK+7TT/noZ Pscg1KOw5rmUbTcJ6UnBF1EtSSl+JzPZDxE0/NKBKJey/vRZXj8l4WLiN7sZTr9v n3AnByDua5653q+AOTjoWP6/U/w1JWa4QNCzk05qBnFLczWGmU/oAXuvIRkTZ+wq L/VQNnOjmBDeN+LAVAjUxDuGxVJiuCQisUiV5KZVl2kAayCgJccEI5N+OYKO2oI+ -----END CERTIFICATE----- """ SSL_TEST_HARVESTER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAqIOXwnkmr6UyNf95gPyb/VyRemRkc5jSavCXUT1Hf1enUHlO XDhO0Bl26gVdYEFDlyH/CnvcIMHDDxkSwW4TEHHfQqliv62WTrnM0QaKshL0D2IZ Mj1piG0bDUy4OimMYIXQg/T7O+WFgacW+7hsCoGGnYsTxhkw5WxsOJuE/saEl5JF 3KAomH/gJ1nU/8WJaBBvqL8tKAXzn796t6bOxAmUV/4WfuEQkYANSGIuM+1cCyXq Wc/Ozx+s7/Q9Qpra2kFWVA91CUXzBlbIpi5R9Pa/pm2ZtzXbvXDu3yy5C8yz+sPY YYm2bZzQDsiw2K4Do5e9Gxo3j83qHZqszzGNswIDAQABAoIBAG0x0E4ZOUNJ9Y5d /HrjtaTorfA0S49IcNkRC8x9u+29e9K+uFMzvYZFafPdBBPSVp0BT4WYmxyy0dXf tnKXBE18rGJC5pU0Q5jB9wFfjtIzS+kH9THD77WSlZv5ocs2jxsguuw2+/FlGizY fCEi8QehxPwjWe3c9v1DU6EezYBVT9ANny0k/tjIRWgl8XpCuErIOh5LbzdnVINx smAPD5xbYA85HDSGxWL7ar/nV2cMyMPrXjq13cfMyJSgMgGQ7imMje3c4aUDNZdK hhuNIAYqGqfGRvT7Sg18o9upN0pm8NX5gXDOifgqLgI0Pt07pomm3LdOlz1mJlqo sWYiuYECgYEA1xuwXlNl29BiKKAxjpUPJrxwVMX2J1Ijrx76YfLWRkWRzCotYqKD vvy3NyVUNJW2mDunAq1q/kjlf6c0M+bAQdF895hiYgQWmz40NwtlBG0NIuUvtUCa EAj1RXi0mKvZ9da8p2eRL4GZW9CSgpK0d9Yq9NVJDxohL7OHuE/KXkECgYEAyIxi k0BC4My6GX7zaPBt05mRWsaWhXpP4pN67sox9QLm19rP0eO2ivDrvc4d1ue9JyOe W/mmmPI8wTIm2AgJvXKhUz8x1idwJ5I30NicOflBEhg9xgNlXFv6ja/QZE2PjyUz l7UTE525Zwn2r2mtQSQoCljPYF2HhgfFkIbglvMCgYEAzCOP3gSBbvk0nl9giHK3 XUiJxjnUX/6YtNHORnRBm5DcS4hfZ/LY2sBUU7ZOUlUeYxyBY44WMtoVSm7woKzF GfFoCkUIYQKGPa/rt61NocSoKcyc2QNE8iC+O77QjO7SO3cdtDUaWJ5CXxryX45A TFXokE91NSrUAcP78hNu9sECgYBWB/MZnA2Uhf6nhVBCCjHy/gPe3yYfKHMwjXfF DDQWGSKSIqnYLklWnTdj+xHN6Se5rIv4hMY1AmWRs0P6lKgo/w25unhUmCKCtzT+ gI20SPrjGkcVtMs8rbB0K6HIBYW6MIlLYUBHv/eS/jE22qyaLzqGBccgXb8PfjIA Z/vchQKBgAv1/ufFNbrJqWWHsop8lz73D8jG0SEEFXsyOvsAT3E0MzfKK00J+o/q +1Sw3QAXWmtn9/6QeRFk2J5ikSKCpz20oWsVWIoCHVZDb6/FkrLJn1HbFGIi2BD9 eIb2MjCrudZLGJKlrL1aMSHJ1QZZNczDF/RtaUyD3e+15qLrXczQ -----END RSA PRIVATE KEY----- """ SSL_TEST_TIMELORD_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUKXI5XpFZ30y1ouQq11Ke6CJYc80wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyNVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC5cLVLbbFTsBDiYGEvK2t3V2I1o/OjEbX/xqAcfYasvNTo E8q61KL3tjIB5kdKYp2Ywl0ibUSnM8M9Zm2uMz+Wrpc0YB1H6IEpoN796q36m6Xh /O/lDpatgwZkRiBnKVAuvifGeVb868keNBKAZ2DNHdpQcRtbkG6jMKSNonmOh3Jx nurvv01mvf7VR7iTc9o4kBIgO2lOnxB2dpFcPxdi/kIIGjrUgU7tzAh4SfQgKKVg WwRDk4BrlLWLRGkPsIvvoUNkVuC0adqXOaX+8WRfalw1mNed3OpYQ+W0SjHWuw7S CxrpcfvXMniy3CpEdBJmbtKyC8Somj41QxmRRZblAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBVYAjTaWQpR8Ke7zD5ahJg G/UDUUh9ZhUGCc4E0e2+qVjDgkJMqNjXx+OUUvj+iKo0A0UI/QJYf5n7kxs6C0GP JLqt/OHbxdqRji3GQvftRAMjaIQ0KmRUIgN0XwbDUvFJ7QHBdV33AeWvDh1wWvtD DYmMDausznQQBlYApt5LDq/Y+96rmMiaPGOga1Lz1GWON5v8RU3qPLyc8GgCeoaV zoVLKiGDVtrhUzaOBTsZ464ZH74hIzjEb/QDqyoQYgk4o1RSdewNhnzmwWmS6hXD E11IwGGiy0ix9OWyL5WyXvjHqjtJ219KIYQuLsEV/lOdHsybBcAQygjVqgMkz5CL -----END CERTIFICATE----- """ SSL_TEST_TIMELORD_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEAuXC1S22xU7AQ4mBhLytrd1diNaPzoxG1/8agHH2GrLzU6BPK utSi97YyAeZHSmKdmMJdIm1EpzPDPWZtrjM/lq6XNGAdR+iBKaDe/eqt+pul4fzv 5Q6WrYMGZEYgZylQLr4nxnlW/OvJHjQSgGdgzR3aUHEbW5BuozCkjaJ5jodycZ7q 779NZr3+1Ue4k3PaOJASIDtpTp8QdnaRXD8XYv5CCBo61IFO7cwIeEn0ICilYFsE Q5OAa5S1i0RpD7CL76FDZFbgtGnalzml/vFkX2pcNZjXndzqWEPltEox1rsO0gsa 6XH71zJ4stwqRHQSZm7SsgvEqJo+NUMZkUWW5QIDAQABAoIBAQCTMXd2K9e5ieOd DMuXWWuwCtiVo1Hcek5wfATTGIAx1KFapXsh2W6SGTiQcWzdCnH1szGiBgGchmXO 8uLUhzFONb8nf7M+RLthg6P9AK6gYbPGMbNpqa7Ig1wrc858lDplH+MKk34MvEuj gcm9ylD3/14uw9jnUTnApve2xOSf0GDUdIAT0AkYfHmn0/NSev40uMi7q0KmH2Tf 3VCHjWTLKvEp5/z6a2vBw2pxQj4KpC9TobfZZCTBbnzt/VnW4zG3mZHcAYV+EZqU /UZzmOHQC/0F4FkOzS8THlWb5rXUAv80NpOTzf/LNQXy6QhBpQN9a3atPvzvN4Eb dt0vD+PxAoGBAOh12gPNpXolJJYIHGhhKqYzFIBh9pCJPlmQ3ok+lS4Frhfgzjzu 5m1daB8pUO0du4n+KLmQMb+cXpZTJ86KqRE2MXtuP71wt1RTxx+7KQCuuz/KfY8z 8A7NzGk9swXx8EqdfgYcm4gqrRjOYhvwWZ3R1m9b0x9A35QjBAZbLcVDAoGBAMw3 8FguXSmIKUtU916S8kCZ8y+w+1Uh4tDYUMprbbvPrsmdiZI1pCRULcH0k7uw+r+n UviUk0T3CZBTSP5W+0WZ57uSY+aeJzZeuyn1cNguDBiwVL9zmV2JkvFcIfXEWPkL Ae5OBVfGUtucg6+Xp7UdXrYWg2XkMY79eqhVWNy3AoGBAKCfbjlai5DOwWz5xcdJ /JJCkVP0XM6aRn7U3y+uEp5uRlExgNARsx62gA+oGMb+2GsNN06hF/7yKVlts/+/ R/sgmyhSkbBwhfy6tshyJm7WTYRSglfE54cTJL9DZsQg3IxyLnZCpiV8d4bAdIIh nYqzR5xCsqrRxKszVsCdmA7JAoGAbwaihm5+e8vpF2mUKzict/56thz0J26Kz5wr IEGToR3iGv6pAnJjUNTrI52Ci/JGANhJRZgRENd1vZ9p+cz0QvzPfayy33hwPSD3 hHJJ7V3reai0CnogkTfwSYQbenBLJuqTHCoSwYuzFG5dMaOzq8XR7hEDUuvi/ahV fRsZerUCgYAXEJOAnffMvFJZrfflJ62HbPxQDuKtUqZ2aWFRh6/d6yLC+xCTv+AV Ygl8U9GHqiafLb0jqzzHU+NzpCFsI9IG/6r5O3k+CoQkw2u1mN6diys8IIip5PRv DsER2F0w6ZrwEkUpFxxIpQgTCXarTFugMbWkjhjcpgK/lDGWFsWW/w== -----END RSA PRIVATE KEY----- """ SSL_TEST_TIMELORD_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIURVoAXVmDtr+4fUDOOVA0ZXW+RTEwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyNVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDZsq3BSwg/a/I3AlY+Uj3d4S+W8jIhWHI8XHX5Ud7k+auJ gfKvA/D6PrYI/TunHFzTGdVaGOd2y2Ylw7KUFZ9YIjtfQfNI0UnuIEyovcmLBiw2 tCtQE7ItEgLkrEjgBX8DNWlQxGKZ8+HAeY5Ux3eRsLJJn3fBFAxOtC+cxF5hFFvt EcGTMo1lYr/A/XKt5Klh8eoOLkE8JNbwuO7AQC5NQN1AP3ZP+3rOC6AU+xdECF33 9H3gyfXeGk5ixLpV/d+Oz3VzRgmBCBt7+QLT/MSgm+xD3hO21MB2cBBIHJ6bzeTy 4nwvidsnSPPn6RoHg5vTR6HFmLvALirbiA0arr3/AgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBl4c1dN+9iucNMtM0bLiAq qeGRLnjGhizrhXuI0PtO5zrgmWgPnuJ/gZUwoPrGczO5g8ZO2zQhDuz8QWXLCNby UL5C0aQrMafIqawKd3oumnHFOotY5eW4hf1rKyYfCGJ15xisWDIXuVSHzf6YlNlk avHfchtw3I6xPIt6ui08qnRjuxVeoHbKKgM3DOx3vfvWiOyjXI0pZt2uYdMHdX8s kOqJVoEF7XvSheDLXjhF7iWeGDmqjuBHv6eRfnA20MOXbE2l26Oa7M9z4xzVZBvU GxtQwVXfxwmo54EuxVSS23gTD2q85JRRfPWuZnOs+NUr7e8P9MkejuC7iuvA2P7G -----END CERTIFICATE----- """ SSL_TEST_TIMELORD_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEA2bKtwUsIP2vyNwJWPlI93eEvlvIyIVhyPFx1+VHe5PmriYHy rwPw+j62CP07pxxc0xnVWhjndstmJcOylBWfWCI7X0HzSNFJ7iBMqL3JiwYsNrQr UBOyLRIC5KxI4AV/AzVpUMRimfPhwHmOVMd3kbCySZ93wRQMTrQvnMReYRRb7RHB kzKNZWK/wP1yreSpYfHqDi5BPCTW8LjuwEAuTUDdQD92T/t6zgugFPsXRAhd9/R9 4Mn13hpOYsS6Vf3fjs91c0YJgQgbe/kC0/zEoJvsQ94TttTAdnAQSByem83k8uJ8 L4nbJ0jz5+kaB4Ob00ehxZi7wC4q24gNGq69/wIDAQABAoIBABDpO2wvivV6SjeR u+dddibdTlgYemJyv3UG7bcvb/QznOqyqIqF8NtPsc5i9ZZWsrNHZ3Z3RsvIoye9 2wp734P2LMyKj/6RG4AfDDVzgMuG8DpTpqWy0f2ET6s54vNcGfDC3mqCxvIUqu3L w428bQJpSoBDngbmqsoWXzh7XKWHzaeRNzhmEd58yNZH8Fb0OhPWESNA0U6t+oJx eZ7mtSzIY21mF0Qo2JIRMC2BMwpK2MMHsvTKs4VcARBAA2X7K9ZAxAoASTZU3xCc nOglUUOZzPa0mGses2E+b1pbI2M2YLhwov6kRm7MihtjXRgMHCVcOJwuNK6QR0HC K29CP6ECgYEA8mZ1mvY5Xgt85fgQepVib23vfbdXHqRRKkkGoqky+o6Pa55bgSxS wzI6dj3LJD/Qk/5I7gS0Ft8FCYeFQTDBf2a/wZ9+RH4k3NOR9WYVxEQtAnT9DeSq DfZQqopSQ+29eosBS8uqfI+8C1C+k3aS4qJqpSpyaj58ZrOPCcZyA48CgYEA5elt GE0oIzRaPmbH7aRSgSc+D/MtmMmlDQekA1v5vPKPCdrwCvNHh73sGpHGeYDuEZZI wMMccVJ6rBQQ4Hsk2fmrHj3dbn2HNB++n14zxAX9iv7sVKGvrOvxTnhSidRXuQ92 Ap3wHFAY2x4oPRRTBT+HJuz46wmqooOFGMd0ppECgYEA21meaNkRdqn8nvoIp3UQ +3bHNsM24fKdxB8LExz7lcJ1xFQrx8t9JUgJoUAv2KCqtZFxG3pEIUI1g7cP/bsK DqjDM4qJr59a6j3GIgP8BHwRIt0MtYrL3BCeVIURBolXYlHxnU4y+77x0meB3V16 c/23dbjgioX6+tDXyme6er8CgYB1puMV+X3drg+0OSJ8QIeb4foHbXja4+1bYpqS wYFmKHX8JBaMc/wZwZ3N5uU7DjhFtbMbOX0XnI57+nS8eyfbh8ECY8Qpo4EJsmj4 4tr4p9wcQeGsWWUtxzuf3UDXmVser4PDSREzW+WsU51hzEHDwMOnrsKefD7elREK Ih9WkQKBgDfRy6VKMVBnyvPW+mby5sS3aAS1Mq6CJXjWTWkLoolkhATd3YrrC2b+ /IuSbjsgagN3u+Ih1uIKb3FDHjKv7o2o+bRot5415P4z+FQeKFrjU/pPF/0B80ug PdlK3MF+/2UgKAwawIimV8HSgtSSx6VgDk8q0HUPVJHxdziyo4dR -----END RSA PRIVATE KEY----- """ SSL_TEST_CRAWLER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUGfJCme460FNV8uIRcAb2+fNOKnowDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyNVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC5pSuCco5DLrrC806I0t4XFEp/2HgHVve+xI3mIyl4A+mL XXasrNMeVEo3MU1ADZBntZJcDl16PvHx01/sY5vo+0BwjzXIZyl96B5yH0ibxWeo tZbkaU2FOg1/aR1sDL9guxQZ3JfrOA7AhFX+W5o36X9ySUsVcj9IFSuBd4WreAz+ lo/DCcsdNq6PvfpwR3Lz9VURBsYmRseO7cHdcASzr/UbfaIYFaJxYQzUkC127qXt 6KEqaUKPwt6/pNSCx6PChTS9isqz7oTg8CH9Ku8M9lQz+w9J9T1/AmuFnKUhLAg6 MVvl7bGDG657ndawiUYLsFnAtCQBxjnhdhngv0LPAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQCr3TlMTjaxIWlpeaHo0rcR CmZNB01iJQKHhu6HEKJunILBf1eH8Gm/CLftytMtbxPfEUB/OG04CvDfCYAk+yVK lVhlLXKU1MHNbjCEYYhL9Nai862dxvAMLI4PMbrhIl9qPYfQ2tZ/yRKKZIy0Jnsx EQECv1dFXTDPFZOd8/ViNFmHNLR9cHAnEuTFKnM2NoTOYlRF+f01yTF3AAAgdNw5 ViGPO3v4Xv5XeLVmpxOqG4ZXdCE4ZfSkqmR3MuDpe5GsYYOeEClLSZJxX4kNwd7e EK8qZ/rAt2Yk+/O/FKGa5C59qj3dKiVVTN5UPfFD+cPYFFjCNjy+GP+Mw8sKit+r -----END CERTIFICATE----- """ SSL_TEST_CRAWLER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAuaUrgnKOQy66wvNOiNLeFxRKf9h4B1b3vsSN5iMpeAPpi112 rKzTHlRKNzFNQA2QZ7WSXA5dej7x8dNf7GOb6PtAcI81yGcpfegech9Im8VnqLWW 5GlNhToNf2kdbAy/YLsUGdyX6zgOwIRV/luaN+l/cklLFXI/SBUrgXeFq3gM/paP wwnLHTauj736cEdy8/VVEQbGJkbHju3B3XAEs6/1G32iGBWicWEM1JAtdu6l7eih KmlCj8Lev6TUgsejwoU0vYrKs+6E4PAh/SrvDPZUM/sPSfU9fwJrhZylISwIOjFb 5e2xgxuue53WsIlGC7BZwLQkAcY54XYZ4L9CzwIDAQABAoIBAQCbQCT1z4Vna7Hm DQF1bRssI9z1s3sVcEZ5c/jTKD6qzmLGGOCBIXrg107Ff2aCFZXZFUCT2bOU4wUE 3mdO0jJ1kYDfYPRyZsuNLswfVkgrdNfugAXzeJjKvLTDA44GaVa2t1zlD9TAcj3s A//CWqrK7WuWkPLIuaVwS7v5ZpITxT/fV3rEm/aNI0bKIQvg/QpXqX19q91WfFct 1zhzim0JRU6FmBqhpYG69Z2da9ZoNvj6ZENC0nNhaI243ubkvzGSz/vICREnGvlu mTq70i77G6UK7Li2+7jTKtxSWhcwpUFjdnzxwNd7aDlvoTS1F0gbXQ4QlaRm9cv2 0viZO7QZAoGBAPRepRdW6DRnYVbtd6788i/qKiTK+odtbQj9C8N5jBbLD/NWvTXL syxSbxJUpIDRUgZOqLepNoetZZwDJOWnavMaLKsnxYGMUstH+cMrAeYbhyxlf+ol oK00XzqQjW0kUL20usHQLr5GcWuAonsYIfLSucEZDI/bF+413hIlqDQzAoGBAMJ7 CVo12fy36HcpKtWR55r9G7SYh71moSvt/LNlDwQaCrvt3ySKOid1y4Ufob5eQvDO UBk6LFpuGH1pIBKQKz8okw++W2w7jqmcY0RdUTS2jKk9fwwIR4EtSpv8cTjE3S/1 g9P9SjVVkAL/o/VVSEWTYLj/ho9Xhh3WDsI9h3r1AoGAMwcUaDRAlrjDrbg2lrbB B9pY5IfyGpdx/j+A1leqNhQ/B2wkZHhduLKZ+PTtyOxsuV5xgrB174z4u8Q4TzBP d+YOT8slRfD8VPB5qhRv+BHlfxLOzCEBVUmrXPpUXecIaSS1HsWPDTJ+eplI1HVs mV0BZt4JLnzsmVRsQ9PTNNsCgYA8QgcJznm2Vf1PPpApEEYkvZvh/wi/5Ja3l8ue ggd/C9qbk/55weJ264advslMxMQU/LfQuTeY5VftM69eURE1Rosaa67EAEgZwXz4 Z7mLjaxTm9xLjB0rpy7g2fzyy/yEqZupCWf+0n4Gj9LrZvs3o4xqhbHZpBLIF9UG 1i2uKQKBgHEEncIbSz/BYXH3u2jh6CacXaoe5eh4S6ihEup1EZ/ajavYLtD/cfT4 9QuJjBSD9me7I4Rdas5OtvRVcUbo8BLISU3Y9bMkTW8vf1wof7oIAlB6Q9jZFaXA p05qDfXHJ4/DcMWQTkfC0PNVslc5lPHJ7jylPNhMq6oR9Wn3OH8/ -----END RSA PRIVATE KEY----- """ SSL_TEST_DAEMON_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUEfp1B/UPB0Hf5bcKFsJZ/Jg5ZUMwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyNVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDAIc6vaGVenMWjN8uyIetlwtTXCVRK0aTwLj6HHXpcJCSF bIhvsZRlZ7Fvu4VelVNzXH/kmZhpUXY59QQObspZ2z7TfVLgS0r4mAU8WqmCGi+F 7cLVX7Du2E06jGhsBgKd9l6Ybud0SlW2/y8IzdIq75bW9qD7viAkbXg6sSR1zqwg
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
true
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/simulator_full_node_rpc_api.py
flax/simulator/simulator_full_node_rpc_api.py
from __future__ import annotations from secrets import token_bytes from typing import Dict, List from flax.rpc.full_node_rpc_api import FullNodeRpcApi from flax.rpc.rpc_server import Endpoint, EndpointResult from flax.simulator.simulator_protocol import FarmNewBlockProtocol, GetAllCoinsProtocol, ReorgProtocol from flax.types.blockchain_format.sized_bytes import bytes32 from flax.types.coin_record import CoinRecord from flax.types.full_block import FullBlock from flax.util.bech32m import decode_puzzle_hash from flax.util.ints import uint32 class SimulatorFullNodeRpcApi(FullNodeRpcApi): def get_routes(self) -> Dict[str, Endpoint]: routes = super().get_routes() routes["/get_all_blocks"] = self.get_all_blocks routes["/farm_block"] = self.farm_block routes["/set_auto_farming"] = self.set_auto_farming routes["/get_auto_farming"] = self.get_auto_farming routes["/get_farming_ph"] = self.get_farming_ph routes["/get_all_coins"] = self.get_all_coins routes["/get_all_puzzle_hashes"] = self.get_all_puzzle_hashes routes["/revert_blocks"] = self.revert_blocks routes["/reorg_blocks"] = self.reorg_blocks return routes async def get_all_blocks(self, _request: Dict[str, object]) -> EndpointResult: all_blocks: List[FullBlock] = await self.service.server.api.get_all_full_blocks() return {"blocks": [block.to_json_dict() for block in all_blocks]} async def farm_block(self, _request: Dict[str, object]) -> EndpointResult: request_address = str(_request["address"]) guarantee_tx_block = bool(_request.get("guarantee_tx_block", False)) blocks = int(str(_request.get("blocks", 1))) # mypy made me do this ph = decode_puzzle_hash(request_address) req = FarmNewBlockProtocol(ph) cur_height = self.service.blockchain.get_peak_height() if guarantee_tx_block: for i in range(blocks): # these can only be tx blocks await self.service.server.api.farm_new_transaction_block(req) else: for i in range(blocks): # these can either be full blocks or tx blocks await self.service.server.api.farm_new_block(req) return {"new_peak_height": (cur_height if cur_height is not None else 0) + blocks} async def set_auto_farming(self, _request: Dict[str, object]) -> EndpointResult: auto_farm = bool(_request["auto_farm"]) result = await self.service.server.api.update_autofarm_config(auto_farm) return {"auto_farm_enabled": result} async def get_auto_farming(self, _request: Dict[str, object]) -> EndpointResult: return {"auto_farm_enabled": self.service.server.api.auto_farm} async def get_farming_ph(self, _request: Dict[str, object]) -> EndpointResult: return {"puzzle_hash": self.service.server.api.bt.farmer_ph.hex()} async def get_all_coins(self, _request: Dict[str, object]) -> EndpointResult: p_request = GetAllCoinsProtocol(bool((_request.get("include_spent_coins", False)))) result: List[CoinRecord] = await self.service.server.api.get_all_coins(p_request) return {"coin_records": [coin_record.to_json_dict() for coin_record in result]} async def get_all_puzzle_hashes(self, _request: Dict[str, object]) -> EndpointResult: result = await self.service.server.api.get_all_puzzle_hashes() return { "puzzle_hashes": {puzzle_hash.hex(): (amount, num_tx) for (puzzle_hash, (amount, num_tx)) in result.items()} } async def revert_blocks(self, _request: Dict[str, object]) -> EndpointResult: blocks = int(str(_request.get("num_of_blocks", 1))) # number of blocks to revert all_blocks = bool(_request.get("delete_all_blocks", False)) # revert all blocks height = self.service.blockchain.get_peak_height() if height is None: raise ValueError("No blocks to revert") new_height = (height - blocks) if not all_blocks else 1 assert new_height >= 1 await self.service.server.api.revert_block_height(new_height) return {"new_peak_height": new_height} async def reorg_blocks(self, _request: Dict[str, object]) -> EndpointResult: fork_blocks = int(str(_request.get("num_of_blocks_to_rev", 1))) # number of blocks to go back new_blocks = int(str(_request.get("num_of_new_blocks", 1))) # how many extra blocks should we add all_blocks = bool(_request.get("revert_all_blocks", False)) # fork all blocks use_random_seed = bool(_request.get("random_seed", True)) # randomize the seed to differentiate reorgs random_seed = bytes32(token_bytes(32)) if use_random_seed else None cur_height = self.service.blockchain.get_peak_height() if cur_height is None: raise ValueError("No blocks to revert") fork_height = (cur_height - fork_blocks) if not all_blocks else 1 new_height = cur_height + new_blocks # any number works as long as its not 0 assert fork_height >= 1 and new_height - 1 >= cur_height request = ReorgProtocol( uint32(fork_height), uint32(new_height), self.service.server.api.bt.farmer_ph, random_seed ) await self.service.server.api.reorg_from_index_to_new_index(request) return {"new_peak_height": new_height}
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/ssl_certs_7.py
flax/simulator/ssl_certs_7.py
from __future__ import annotations from typing import Dict, Tuple SSL_TEST_PRIVATE_CA_CRT = b"""-----BEGIN CERTIFICATE----- MIIDKTCCAhGgAwIBAgIUHoeobLQu3yMmraIDXDF+F6M4j9IwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMB4XDTIyMDMyMzE3MjkyOVoXDTMyMDMy MDE3MjkyOVowRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8G A1UECwwYT3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEAskK29xVfnH/4tpM+loZOOZX3d0u/NARRkgnPeoTs14M0 dKP+dZ+FRuuqKmJQHuO8+MFfeTFIiI671rWobtdGCXVD+TZ3g4btdtGdvPjIBXJs RFhYkP/fIjzq0MoJ9O6qlhXh3skispfHRY2ysVHpT4d63tixhycDsMn82Jh92OGm BaO8UpjIk1twEnfxsKm5MtPbvNJGVzAkwYXWVFdV7GdEYCKsVm94Sd85TpDg0xFq q5YWOg5mpFbGAExBjFerHSuVBuNsBap0mjL3aIb6MXvQeYp+lKrzeUfkUH06e/Pr AY+TQPO9ktcUHHZ8+HrXhOODdeDlbC8mWzR9I59AfQIDAQABoxMwETAPBgNVHRMB Af8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQBQ/s/lX6Tbdg1g1FIShK+BH+5q msfNkAQG+mXYGbn6SYQQspYFZdZp4kXLdSKSjok5eWoMnfYN+hy29A5HgeJfdbM4 4Nmt5OUvWT0EOTD1VtdVnsH8tac5Q1XevE0ZK9DXYBSEXqO8sVSt6VWmNT98lmEZ AVWtawc0zt/31QAZEa5Jjghq/HRbIi6KUX1t3Hx/yVa9Uxiz1dBVE8A+QBwVKOzv egKu6T94xBCcOeOh0NgluRdFiTr9cXAYNQAUM+WdmyAvFZ4qwuUKam7C7zX+td6M r80F1SD8qbQgxYS1bwqx6K06xbFRLXpWbyHXG18v6ia+sifWblg6JQnYhxZg -----END CERTIFICATE----- """ SSL_TEST_PRIVATE_CA_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEAskK29xVfnH/4tpM+loZOOZX3d0u/NARRkgnPeoTs14M0dKP+ dZ+FRuuqKmJQHuO8+MFfeTFIiI671rWobtdGCXVD+TZ3g4btdtGdvPjIBXJsRFhY kP/fIjzq0MoJ9O6qlhXh3skispfHRY2ysVHpT4d63tixhycDsMn82Jh92OGmBaO8 UpjIk1twEnfxsKm5MtPbvNJGVzAkwYXWVFdV7GdEYCKsVm94Sd85TpDg0xFqq5YW Og5mpFbGAExBjFerHSuVBuNsBap0mjL3aIb6MXvQeYp+lKrzeUfkUH06e/PrAY+T QPO9ktcUHHZ8+HrXhOODdeDlbC8mWzR9I59AfQIDAQABAoIBAFm7l5qdWbnP+YT+ bf0bsnjuctnMeX1Xxy/6XETScN6zn04v10GigVaH/urC/o3uGgwmW0cIdfi30Ppu C1FwcEMGkqb6sgK1gwfS0NJ1cUq8pJ9q0Xp8MvhrLdDYQ1bWZWyTq1WYbiz0lkz+ 3TrBfu6XxlQzRHpCO2tc4jit2nu3k92I8EHo8sRPcFssgEH7JdFpGOm/G6ATWGpU mSJZTxBOzR5iprR8Hl2RXIBDGXqVKXApLJ3OlchSOodeFt2h7ffiNJmuGZ/cnxs0 05eXzIg0zJ5CffoQdO5s63SPRg+x8O+L+hN0k6Kh5CmFpAcn1jzZatvGO47ndBUx kSyrH0ECgYEA2a1n+84y6A35LOeUvTE0m3c+DXoI7jl6zUSffXJ5PVH7lKro2hq8 P5TDG2NV9qFv4KFJVy8hvy6Ie0+HTNP+QSUB2LvJSp4GhlQNP4/J6oY4NGfocfbK +rc8/jEVQaoySq1ODLchEaxMjwgKOVcUqh6tCQjiTZ3dqpZuwUGALoUCgYEA0aTR UYcynBWPyt5OT98EkVX4Nu+NqONAyKlDYJqU2NHP4xHFxVPPwYR1C4vZJEmC1z3C Rad+svwBhCXsh54hTBhZkF+BV8ll4/BqiuHiaqF95VRz8B4wjv+0QKN1fCQO4RT5 dEqbAkJYPq+vYCJew3iPWODLkaK/B8yc1hQ3l5kCgYAkYhGBSwPDOaKuWL7JqJHM cm/SvNUFTGI0MQYfZ6TQFQXh4XcuDU3tqqW5zC6wHGeguhSSF/SiCdsSEUbiFoTm ypK2cRzB9gvNI/ta5mOvaWO3jq6Rbdibc0kki3usEBB73t+uzGUgmRXqykM7Nkzj 6mCto+h/ZKWKP76fWp1cKQKBgH2KEiKdMExRiRr1xrWDmkuhzJKxHwZsl6XR3lwi FVJFShTy1piU2MtMk36Hj09wid50yDpH09JAoHPO9fY8VjooNrICzwSPwOkfVd22 6IvsCuTijs7SdUecjgdLGxZszVAx7DOcXXib3BYlxIJv8olhT43sh1q9t2FnQN/d mXC5AoGAN5klrbJVgUE8kRik5GvpcoasyDktJQ8KKDD2u/TDkRaCJf6H0ZP145aM k0Mg5DMG5M8+Eb6l+iEOX1lrrJ3EPtcQraUiFAPXF8slboUs7k5HZ6rVckHqMvBC ZTAxfIdR90eFK6q0PTRYH2ZfxKKpPDORQvzt59reHexvOVTuozk= -----END RSA PRIVATE KEY----- """ SSL_TEST_FULLNODE_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUFNReIWFnacmYlEf+oXKER30rJfAwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyOVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDdivRLL/onTCvG9JKzYXCxW6hrwYRgmiyG4ISrIWlainW3 ZCduM13t4qlWp2lVYCIez8K3NYb+m9Jk4tYJujzU9FhusvAy2D7SeGJGkAvDuYMK LCRM0m3/Q0fls0RMHyNd7Csg26LNyGukdvEyKmonqA8q5MZENtsRx1tQtHORLlio kEXjyd67J1wm5m4rOk+DqdrIzSAuomj+M/D1lRh0icjiSE0Wm9PXJllzSp/JyLqN AMIDIjkG5CZc7cD2yM7OZQ+haCxIbAmxzyWVhLeuGiTP2qZ2ZRML2HXGVkQfbE+c vFkPKVoY6pOI0USzM6ipqmYO9Y6357SIeSWhNNG1AgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBGWHpJNp8iDR5uy14qFYwY 1wwIvQUem0IYADuTXIP3Y+kSKyZpuZeYWFlKzrfTf6wTlmZchcqpidUfkqPS8sFL 4LLRlDFTCWhIiBSs25gLLwRiMTErStedojGS9+smMVpp+/LguAp+kR0zyov7+Qe/ 05DW/fgtZFZIuDa9DX2aLcr2LHLpQU2+nKFM5E4dOEEwaf2rDkpqITME00bZRipF yytQq6MIG+W2dl48b32B+VhU3UtjeJ4bYDY2BUvAoI69XN/RWO2JVZqEcuAKXjIY m/+snrJJ8RNATWZ0XgFUQ3UL2j98qHwY5XtGNvLfkot6EC48t0jmuPICg/mTxCPV -----END CERTIFICATE----- """ SSL_TEST_FULLNODE_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEA3Yr0Sy/6J0wrxvSSs2FwsVuoa8GEYJoshuCEqyFpWop1t2Qn bjNd7eKpVqdpVWAiHs/CtzWG/pvSZOLWCbo81PRYbrLwMtg+0nhiRpALw7mDCiwk TNJt/0NH5bNETB8jXewrINuizchrpHbxMipqJ6gPKuTGRDbbEcdbULRzkS5YqJBF 48neuydcJuZuKzpPg6nayM0gLqJo/jPw9ZUYdInI4khNFpvT1yZZc0qfyci6jQDC AyI5BuQmXO3A9sjOzmUPoWgsSGwJsc8llYS3rhokz9qmdmUTC9h1xlZEH2xPnLxZ DylaGOqTiNFEszOoqapmDvWOt+e0iHkloTTRtQIDAQABAoIBACHjhJUPxLtIKpYn iV1JNXzb4XqCQqaoTtFe/MxUsxH3hiREfMedseuWtYKc3z8BEpcV/toZpQnDej6W eFlKlM2ahwB//MA6VfnKEnZqyHHrKcFfmTnrIopel1vqvTLLvJQ8cSh4kIHb+6NP 0ntzA4QHcDKGhlGe9onUrgI9aEQ3wrHZvChyyAV8P/sxY2IseOf5PkJ/fBqttGPZ 9aRdpzvMCyfbhygHAVklucefuQehpc2duv6BUwCd1HgAIwZ42gaTQ8h8Yh2SxDiV 9DKkkQEJoG8ZXYGHfKpXo7u+RgTtpMPmRnls5uIt34qECRJGmXr1pC9iBx1oRIi6 Qdno4q0CgYEA/lcKRnpjrnWfGYgLZpIPEr4pV328BZ1I7FjzaCcfDEU70gxFpCXa ViHP8TEWG3+yH+WPodHMfLQ3UzLzSBu/o/XYfU0Nk4A7QrGt4heDRmPGGY+WEKs/ LoiXlLrF4rOKw3feuR2wagg6NpP5uDraVJFCDG5O0/SIyWSc5ZW7DEMCgYEA3v0d jfm0n6dNpJDgvCz50qhI6ijUT/Wvnl1VVXHpGSVJjDMSffLsGe9G9bHJCz0s3E0B NfGJlixmkpzmtNmb4qt4ahdEY/ltYUFlWTvY84JjvJTFrjV0if3LLlVWeHm0aEcB rBsp0Z+/qpoY6AJhWmN0jX2pS8WbsjHO9OM8xqcCgYEA603rm7ivcEAxqZVLtuF6 QITeCquwwCD7zm2dA8bt2pRS+8mOxIagsP8nOqWHJnnFee0QLU3EObshVD/XA+do LXDNkV8wKD6ClPl9PaczNHQqWouU8mb8VTjZxCfn3AzvXFgSHoFxLSffc48DgYYx Z/vbd1S2aTHbOzdyUJVuL7ECgYAUApC5YdQEk6XTA7E3Ea4lajaI1LsgpcJpqqRy s3Mgb4knDJo3NSpctW0ftSF+YbH53ush5RfcowVdWLkXN4PWll6K3qWjdwmKtayb klRIncXHcW4/0Moxa9XkxYGp8/ntdZm/0PwytGwlqghcIYKM8unNnJ4pj4UGO5P/ w7h7dwKBgQDYqai2lM4mtud8Xn77maR1olSScon+S9eG6GGyRQPVom4NyvfaQxvb qFQZnwoQuh5ugsbyCA0qkm2RhBIqNWo4j8rM7AHb27qkB9F5tHA6S+DYG9kEvgmn HFxiZCY+Lu6wRP5Ssnz444i2Tr6kUnIcj4XRyOQjcwKqhMYNod5XGg== -----END RSA PRIVATE KEY----- """ SSL_TEST_FULLNODE_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUfZLZhnra/z8yyJivw/7O2simIzowDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkzMFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDAkSC0hl+/EeP4XUtJDAWCBRosaU7munJ8XX4fZDcmXzsg p2zdv9UZp2zkfXTYP5zFAnjG9QEiiURMZ4rIKdr/cJXY/93H6dwfrjZTS1gCSlpc gkuq/cdbOeU6xCX8X/dotSQupbYr6ccPVf22iON/FotilEpP2yOFZi0d54uKnBoq x6GP22b9/Ij+tQNacPZavQjZD2i7ChtLigtMDmrrFMOrsQjSCQPpGKsXmyNqTo+/ BKAKEs+WghuoVh6G5BeC2EY/PoUohUxBUWlAXThA73yrq/nGQRWfPeNZ2r0d1z9m AlUakb4a54M8tDO+OOqw985KyhPYRGxOgPDFy4cdAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAQRNledZvjT6+Rtb29W8pN 11WfUj5+QW7DX7/AFd59PXQkPbTf9EPiNtbriPaeOQ/B+jJ10/hGGGUhft4IEzpX ffQ09CPNAFMiyvvnOQdykH9lvDMcoVYi4EjzFsCa7uVbKSZApeO07hCWRtlEeDrx QU//I1F/BcGQGh9Evh4LiZZUzRxqlGE11jSBNIpSNkVE0DO90lBwEujvb1OC4YUh x8Ef3hzI8EkR4VHG8SwX+VlasHAvM06ouKAQeMMNTWxeShaTI+mZkVUgkWJvTxf6 LwmU1B8s9M9hNUailBda/7ztvcZHWxghBhsWICZIngUvt8M5/rrgph+e0rI2QMiP -----END CERTIFICATE----- """ SSL_TEST_FULLNODE_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpQIBAAKCAQEAwJEgtIZfvxHj+F1LSQwFggUaLGlO5rpyfF1+H2Q3Jl87IKds 3b/VGads5H102D+cxQJ4xvUBIolETGeKyCna/3CV2P/dx+ncH642U0tYAkpaXIJL qv3HWznlOsQl/F/3aLUkLqW2K+nHD1X9tojjfxaLYpRKT9sjhWYtHeeLipwaKseh j9tm/fyI/rUDWnD2Wr0I2Q9ouwobS4oLTA5q6xTDq7EI0gkD6RirF5sjak6PvwSg ChLPloIbqFYehuQXgthGPz6FKIVMQVFpQF04QO98q6v5xkEVnz3jWdq9Hdc/ZgJV GpG+GueDPLQzvjjqsPfOSsoT2ERsToDwxcuHHQIDAQABAoIBADweEsPJH6MbBrzH A3Xultmclis/RS6rDorc9T7/nmgQWvk6y7X+6Zx0tH4w3IWWdm7a8rHKU2xgxj3E JYOP7ZrJnz57wtVioSIS1UrzvqoYZFV1KAJd8Br+3B2YlvNPUoIR6xXVDiZveYHE Ks0Nt1g5xZIlEX4Uv+Ypm/Q2EU5YGnxs238K8kwkPtNTLyAQ7v40YAyZ8uehUu+T vaMKi4GwX/+TaXWW8dek2fsktWGf10drMckvv0fyo3CdYlSMs0PFZkIHqMQuQv9/ E+XI8viMovrnhU53jLbs4Tt+f3kDtWVUrd+kqWw5MXzT2K5z6OGQtjK2enACwilj kbv/ntECgYEA8hUfsihlCFKZdJHZW6mldFY5Ld8YEsAqTter4r9iid8+R6yrSr2k ZcdAyNFcDBGWkX51nupteU/LFHojlRymxVD2AVGanknYrJ4DNvvc08bCgVZOx7vz u9KQb8E1xsi9T7uzoGfDqOapQSqPrFvxIPkqKWpOeqY5Jq4UZD7onmcCgYEAy6NA oqFjbz8/6ImpOaR7cQMFgPnw749qmiRoIMHSL0ULkKq/XF8pN3/mxzKxmLGXGYm/ yXbpcpuS5oIE2vhwxg1XAgUjpEG7stWtv0tlzpy230/TzwTJO2OOEaVcND+9nawV T0ufX7c9CRcH4csgG4eJR749rG7jdLiGoqdms9sCgYEAng8YwNQLE2IK+8d2qZic hNb/QmoVZ7i8Zvn+KnBXQDnYiie9N3GW8zUjoXrApMifDKQK3BWoILrul5IfxW4N nWt9E+NaFtuUczBAXRgZWNS/jn7xtQuM2idjUvRNzlqm8HZXk/XsFE12WSwW3qyx RZwp4Ryd3QrG6fBjNAi3DSUCgYEAoTvHR30lL8YSodmtZXh4TIip6O7895DERPui fp04ADlY6Nho34hxKAJbBUl8GHw0OQI6GhfOyvGnJF+53G5tTELvqyfKipmJNhW9 lgLqvuaSXMnl2LnfYuh2aj5VfQEi7x57WOd1buG0r+fOU9byuxlbdrSIPGkoKxiX cV2+EZUCgYEA3rMsb5/F1nCsuhPS1DNlurMwSmodFaYasg2+cg3hQPtHe4LO86U8 doW1c97sdKLLkH09E7ZmZafXTj4uKwQlLa35UmaRvPM+mWdPLr0Nkkm1dEAi298g zD1u3pg1jQE1Ta4kuE65u8lwu0JKvje8pvHBRRcXuLvr2oyJ1VWVfvA= -----END RSA PRIVATE KEY----- """ SSL_TEST_WALLET_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUZmWsnGgQgJO07P9Mrqx1hHBfQbkwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkzMFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDjcVLjFq2N6GKxvke2xGntOo62h4ze0fNrdj/OifXvpzxf qnPkhBcb7+6GL/gO9IT6hnTCDSjNQG/Coi1grjoPT9T+DkamwioBcFdIOYwEqPCd Fk5ZnqwAWWg94+dkb/jlRcFlShNcgDriH/MrgfQ03A4VfqzcNT8GzZ4zwFqAyhiV KQ56q0qrnIrHQDERII3QMH72EGCVX+32IIkz2CJvo56yngwF+tDzYJYHMJnNTCG8 iVD71v6qBM52G/6bKFRJhyZkKkVqPwptIXInDPY5ETgfZYgD67ffQ5+W1kXlCmmH PuK8w48Fw7LjRDzLTYRFyDSIT1H5sdRvHLIl9BEnAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBvOTJdNGUD5Zc976Q5SJre 15KN8PaOsLePPISn7e/2DwMGuq7GXnGa4JCb35XTGjX+Wxgnv/0/8asMimay6gwE YZBcRwakm3l3//4W1ELc6SREoFcUTV49rnccq/N3u7ZrDubf1U9uKvFEpwp9TM8a nq7tVOe3j+Msyvq4/q/l0nnHX/uuWYrZrC+Cm6tjytmOr6JzAhURFoVx3QnwaD8z qm+cisSE3/lLuyTzgNUiQkdIC6bCg5KVOrTXFo3T72F7+oeM7h+OiDO71y79x9UH r6YE8Ab1nYz6Cw1fwy3/QzxtazuTrJ5gBotF0oqCoayEtiOMZr+aQuM/qRs0EeTy -----END CERTIFICATE----- """ SSL_TEST_WALLET_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEA43FS4xatjehisb5HtsRp7TqOtoeM3tHza3Y/zon176c8X6pz 5IQXG+/uhi/4DvSE+oZ0wg0ozUBvwqItYK46D0/U/g5GpsIqAXBXSDmMBKjwnRZO WZ6sAFloPePnZG/45UXBZUoTXIA64h/zK4H0NNwOFX6s3DU/Bs2eM8BagMoYlSkO eqtKq5yKx0AxESCN0DB+9hBglV/t9iCJM9gib6Oesp4MBfrQ82CWBzCZzUwhvIlQ +9b+qgTOdhv+myhUSYcmZCpFaj8KbSFyJwz2ORE4H2WIA+u330OfltZF5Qpphz7i vMOPBcOy40Q8y02ERcg0iE9R+bHUbxyyJfQRJwIDAQABAoIBAHyCXDLPBmGqNuVA 2nd2XNqudNP9rqOIYe6RRGrn4Ye5kHZ6lIkjupbjqTsyZWSifW28T4yvsYdzX/s3 1wmXN1eMh3gxDoJZxq8U9eMnBbzDUz1bqbasA1MJnuRKsDCuj53LqwytGZ5I4HNL tE48DRkm4lroBu9iAsfRpmqEQcdAUtXGLvGGkX+V9j2exREyVXrxALC5N+4i4w7E f5aidhH79IGuMbfp88QS7NbjrpEwd1uyP3J7KCiyXwWIJnJyF8pcd7ZUsP95msE9 STeoKBaV+cIE03jvTT4fpuQ2Cn2WYSxkgVdWM+XdxGouIQvboOBNvPdWfdQCLSHa acRhzGkCgYEA/nd/BXmm9pkGKHm9XDHy97pYm1PSOihsgjZq148hY33gdA/ibUtK X7nSlmGAUzVTU01nfPmjkHp0YyoDn+NejAyPhBUqPoxfC7p2In1MiibOlMDxOpPl 199+gvadHk59g5Ap02iCu1lnlR9DhFY+42XcBSLba8MdplOL4lhnx9UCgYEA5NAk 45Dt0NXnaKKLbMW5EOZA1zLUcomO8AH1dEF+l3e5UOm9g+YnYtUVALKM1nBc0EJ3 fu8fmKhDqieLxb42o7j8yQqeKUXZW3XeDGPdLhR8coxICZv8f2j59Qgx6gwQ0ipy IUan/0rDUm7dinu+07Va4hqnvpuPbUco3VclDwsCgYEAvwScyVNkzkBYqxGX4Blu th+gXBkz+oxVx/lpgp7jBXh8gSNbaYfXMLyhJFnUpqGlBydXxCzxZ4dEzxu+1Mst MhxLr27j40gkIP27qHA+gIZZFLkxXDOhmccfhNfzYcix14zkmNofKNwYMYzidfj4 BGN2IjTkWaSCIVUd8K9EWHECgYB6wKu5pivfaJIgEWvJK/4P8ecBTFSrKd8UJYjg GK7oZaN2pB823sdsfzIoUKG7/UXduHrRD0odJNBAPbz/lf9MMFb1KAwXylBEf+Rj M0Qaj4UAEwAmn5eDZvcKHJ5imJyBk6Hs9jH0hNBqre2OeLq0a0vZl0E8wcndb1qd /D12ZwKBgQCDKNhzVlKwtG5hF9rG0FLxUtOduOEH9OI4N0BaptoJncGw/LEqZI9R ZWim7eYzst6zGvsm6hiCZXR9pt1IUNVC0YxaP38YoolFKYxwcraPIfhteXx5CF2D EfVRIx4ZL8Ec0nKeG7sfzl1AM30kOT1sZ74ZnoS6iYNXGbkXIeecUA== -----END RSA PRIVATE KEY----- """ SSL_TEST_WALLET_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUJg7OmxTb+nSse9yCvMecvDQ995gwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkzMFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCoMxRs8WLspmYqmfcq6MqZI2h1bNRqXkdXdDpRTNkdfusp 8Xm5/Oncd2ewVbOIWNtaw0c5Uq6futXmo3cMAf4fTCpQUxEeWcMw1KWK5vudfXFY w0VNxS9fAR4ByRbNGDcW7HXu0silleuD8onSKxBEyUpNHksqmuWLJ+Av9zvRfl4V P5WUVr84dpaotLXYx4PxoPINRloIKIrzsEAVwrmV8OxsbsxdlvokUYy6kezTRNqN 7izl2CCi5PvklOHYr9Bf5NgfAE4VMMTcVrQKebTkGAdlJipJ3N7gf75Yi/mMTXnW SjMSRjJWGub0iowNUEXLXLaSQurQRJ5iCoMCZr4tAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAw9TzzcnbQvjEC4zF4nPr4 w6cNUog8tfiUx3Oh2Hf4+//Urhu+9rO2ylV90apT2kR5qUT0yod3s/9WGMe56P1b 3qES6PTN2LipOT0js9SmmhHmcy+tiQxeKk37SWjFMHMmfpaZHLZROxIAsHUlisYo Pb45Lm9zd/yofyh0xTHC36KaU7R3mVzE0cKtFKHZIiwpd5BUp638lY6tngQzOOe/ hhxRyJ4XoafugAgW9nykm+zMG9LxhHpoMFIZuZQZED4RKG7gKA8l0VqKm9Cg9DTm xqhRHtHY9hS47dsHL9Ggv8XsBy4nnkemVhB33DPK9kYRmz+J4Y8gjoqlL7ZL8bnr -----END CERTIFICATE----- """ SSL_TEST_WALLET_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAqDMUbPFi7KZmKpn3KujKmSNodWzUal5HV3Q6UUzZHX7rKfF5 ufzp3HdnsFWziFjbWsNHOVKun7rV5qN3DAH+H0wqUFMRHlnDMNSliub7nX1xWMNF TcUvXwEeAckWzRg3Fux17tLIpZXrg/KJ0isQRMlKTR5LKprliyfgL/c70X5eFT+V lFa/OHaWqLS12MeD8aDyDUZaCCiK87BAFcK5lfDsbG7MXZb6JFGMupHs00Taje4s 5dggouT75JTh2K/QX+TYHwBOFTDE3Fa0Cnm05BgHZSYqSdze4H++WIv5jE151koz EkYyVhrm9IqMDVBFy1y2kkLq0ESeYgqDAma+LQIDAQABAoIBACodB/szARrRmvkF rc4vlTJ8nBXylsi/LEuoTUW34RCyi3zn+htoSMGrn+mVu6ri3KFADaA7pH9Xz2C9 Avydrxv0/Q85jSq1PNsIEx7RMKTBGNUppzuOqIq4A+RcjfnyGzEBKZIPcq+K9voF ix51K9CdOZ5PfHCBcgHCjS5VT8Pm4QtUnH7Ak+unT8QZ2DaK1PY9lnsburr2o7ax kk7DLSsb60pb7XBDLrv0c5i4/XIhSP/GBUJ0GLTEutWG9iXwa5Nzlxoz4UGjnljP 80KQB1TGiZnFYiolrKaj+rmcuXeApYuiAwFI8B58DYyol3KJXmUCzilw38ycArd0 nIkhyJ0CgYEA0TXHfUKZnF9X7Vig3hCCfHZFJy8g3L8RklIjZVn9VUGFZhCIPiMN zgSI5fK8sx1oLKz4vYvT4+4QoS3kb13pWGRoG8ooF76R/0soXckKG/0Nl2fq6YHR 9Bygxvn9XxxGHToIJfxfcmzfE8h+wmpdd4t1vuWzIzrAqyoBDf2nxIcCgYEAzdFD Bb+J9CZviAtsOAEiouZby/rtZ9ayLUulRTDZuKpVnVHRnzckA6cLEqECC4dr5WsH bDFasktvx5chl5SuE3NFR8cznMyFN5rpWOpYdl1QwwOQ15sBJ2LuT+mafXpu1/7x RhZyw5oaDDrpaqOLTvQbxlrXjpXYlNsIeXALyKsCgYB1uTtuIuHpekUyC6NKEiQ7 ARpcuEpXrTSoD4xXZdIF/X6hNkBUJsmH2klmi7bfW3bZXOQDVQGAyt+UswxOFpxN 3wIuUQ1KfzQMYjBuxcfog/b38cPgberE4K8gCGAo+vIBVDxtk5vp+ZV1vmaF4/CA antxVjP9aPwt1M8PHmMfVQKBgQCNrFYuRsJ3RV3Qj8xWYLGu4FKf/oIc0DSl6URC dHXqH5X/TKq2pgYsXXfJwvrdZMJokVvypaaAxFyVTvrYlIee6+HsnrpwXHf25rNp eSabk3BcTMAPKauJqRfR+kNVzEkwdVUvoZQuAI2djY/Oz/S8zFuyFiX7CDqlfIBA 11fFMQKBgEBlJNb5pEhu9tdULlOEroG0XeCcAKDfS0WULrbk1VCeRNOOXYdoiG2v YImM6jUSIrHmZaMu7aaLYKDbC3xwd4ZyRRq4KjBYKHM6o4h+bZbxl3Eagjb0UQnr vIsFw4+VWa5DOrdVtpoKBANUY0MSAfUPlBDBMGUuQ/q3X8GgxZ5B -----END RSA PRIVATE KEY----- """ SSL_TEST_FARMER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUBK/eOJ8iPyAfvjMt3GSSInfW8+owDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkzMFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC6Z/5RC7RCEceZktvq4CJeAaGlKGJFpF3z/THIWoVjJ03N KpDMprhq8N2HM1pM5I0HPDze0hDCRGpGh3wby3FmVAxb1vJyDTT/DLw5KYDBQaCY TXwschPu3MYfSJIUXlJVWRC7di3xV6si3L1ALdfmK2des/YWCYP0qIjc1E8j/OVc wD2PdyHR+p129SsO6WB8KIH/ocTw5YJisQBebUo4m495FhKLcKPiczUpRL4CmZUa dFkrTWz1Vcr33f6fFybYaWI3lxHHYxOSB3MilDd8Au55tLhkpwpkaqPKWDP6b7au WFuc3q8DegbYRLyq7qEudsG/u4afrHfI+vovHLVBAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQB/MflzZFEWhLZ/ZcHfmVkO nTs74yALWjdld24er665E/tbRUScuGwpGJDhxoLE3JrsM8wIyqw/dOLqGscNprl2 u5MBRMwzbQncE1kZ9YNyT/1oC84Fee3IFni47hBUJK3o1zOuRlU9cMTj3dttBEG2 hByAv/ZP56H/dQN1/LIGoOHNSRhdzuY33rFYg6ZjV5mnFh4BHQ8jElA6lTiz2uBL 98RePraQx1ONCXyrjBV5o0G1Ra1UmRo/DBvkQu03eZXIyqSrZJKX1xM8345p9SjI Ztpr9N0YFHRkMrj8SCiqYeRX0LdUW/D5e/gBf5j+dJzFiB6NHgyD6mKORQgxmIPY -----END CERTIFICATE----- """ SSL_TEST_FARMER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpQIBAAKCAQEAumf+UQu0QhHHmZLb6uAiXgGhpShiRaRd8/0xyFqFYydNzSqQ zKa4avDdhzNaTOSNBzw83tIQwkRqRod8G8txZlQMW9bycg00/wy8OSmAwUGgmE18 LHIT7tzGH0iSFF5SVVkQu3Yt8VerIty9QC3X5itnXrP2FgmD9KiI3NRPI/zlXMA9 j3ch0fqddvUrDulgfCiB/6HE8OWCYrEAXm1KOJuPeRYSi3Cj4nM1KUS+ApmVGnRZ K01s9VXK993+nxcm2GliN5cRx2MTkgdzIpQ3fALuebS4ZKcKZGqjylgz+m+2rlhb nN6vA3oG2ES8qu6hLnbBv7uGn6x3yPr6Lxy1QQIDAQABAoIBAGV238aLwWXJOcWN W+mgcPSMnMlCjyNrUbzSkDuHkl2jckUAK2tKQM3tKBhEyp1aNq2+iz+aRocIKHUV oGecuLBDhaqj+Lo+GB/QddADmFMZfuoIG1QyEEmPoMQ8g09U/Cn63hG8RUu+Nag3 UUhS69ccvxqciJH8Qfh1mHHjmuRyAMMsYlbiq2qJxcwPQQO8S+ieywfz5KtYKkLD 2Gwzvmit29r1APhp2jFaTIsrMkzY5nYc5+gp6K8+XZ3Bm2au50P/YnzBuXFDB6Tc gDSPfaho5HawsHHyIop15fajn8dvJzzMTux4kdxXcsJcpasTyc1bW8v1VrcGgHcc 7yhogLUCgYEA6A6Nk8gfcrN7oTW47ECy+TfwiP47lCm3Mi+XrW6TdKL6fQ0mhfvv WsvuHfmDH6b+yN+TZXQI49VTxJoIUbvNdKr+3i9rp+2vahib4+zEkos28ODei5fO FJcZrjsM204kVpVz6j0HQRHE8SjAfUYO1jHLI4h0FyEFedF22nMlwSMCgYEAzaOl HxZwiI1eUto2SdmT2TZZWE75uTn3ihk0wfJar//LG1uAxrqHN0g4KVMqgQN+IFJd NZ2FPtIQ2E0P42lID2fGtpwDnMCAn/drpvhxDU5i2gNEZQ7LIpeZOLKC6NDQqb92 8ReuKdPQ3QmMJ9uWn9A4IPkS7c1WvkIrEkTgYEsCgYEA0gEhlOTduOK+9kR05rEi hrFeJ8vTxSD/XhZ98IEKRtqbT4IQI968XPICuvOr+4AYQVc7v+uDhBPxrBEtiDIq G/QHlLFbfux1+9DrexgxSOFdxh3qqG+oGzAnGGruFqWf8w9riEbUgsl+7jPQB07Y bHVBfhWl4ayLlRO/uK/OMfsCgYEAvYLbkIvQh7eovrhFIcf3Xk2dByo5L/+A5m8W VMqx0tLsbjjks8CBDmxq/YKcgCsk2EqvhdK2Uk+roHtcchq7gx8DXZToK1So9UNC na0GGtordXlfVbbNdAK7/SleRYrzUgyWY9eL9RY0vQ+ob68J4Bw3LgP88tSy5UH7 iamaEoMCgYEAmuf1w3Sa8cunGBrzljwhr/5CjG3zDI1+fdFUePivoU5NocsKrLPp KpkaBa2jcLXxf23NQBNNDWBqfsi9w28/5kl/gURT7ohOcf4YR+Ypnywpb8HI5mb4 XxOG7la3Y9Mhaw/iC/JWbDgb2JORQmfEGhTn89ggy7yu52brz6t/MNQ= -----END RSA PRIVATE KEY----- """ SSL_TEST_FARMER_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUDuk4yYHfeEkTr0RtsKoTAPWmWRYwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkzMFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDjKy/CjxjtUi82UKxLzsR39LAoE9BUZwLlkvPrugeudoLq EHlKTolTuvlFJAi1e5PKjJiHdKW2vSrpt9yBj56qw2xt7eJOQKxIE1kdeCdLoK1M WaVWVekONJSlSqcHkW3NuBVtbAKJO+KIdTMMolYJlheQKBZp3JsSjLakDUQEoGyb GT/+/xo3OZciBk1acmOBh9mJ///p8LO/oFZXZCXSau3+9K9vzcwS5J3HkDjkNVxb AJny8gEe6ux0rXzkZLfG8WA7F0SVu+493kDHB4TO6o7UxAWatGVcyG+M3ujJ9iEg 0oeyoCghgpBSX02gM0alwW2cWNrkgisf0tyuJBRdAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAqtpdHxteYdjGDUaNuVzRN 1qmnmD8m+scvNpqYU5wQ4xawZVFyx6k9dl40BYeYvTcvSpBmNoy9fTpuTYVeeOae glreJiKnulsbMRHwxDjCKvhoCge8ZTsX/0Atfkb+AHNMEN/QXS857ovSy8JoV71Y S3ZGa01vG6AdHfpin+xHuDBh/B7bCHPBEwNc943PgAeQ09X0ZP/EFb31h2sK/eoR jytU7Aw/NwCnSaA689xoTmtJp2p7INSTXJNO/rJeRKPxKNF3Jcg9Ngtci7CxkXzi 4+Hs2aSkIAYj05UcYdiLs4TNR2ZrPKA4/ZSZUCCDQAogOEUg+SOMGPkevqpojYvf -----END CERTIFICATE----- """ SSL_TEST_FARMER_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEA4ysvwo8Y7VIvNlCsS87Ed/SwKBPQVGcC5ZLz67oHrnaC6hB5 Sk6JU7r5RSQItXuTyoyYh3Sltr0q6bfcgY+eqsNsbe3iTkCsSBNZHXgnS6CtTFml VlXpDjSUpUqnB5FtzbgVbWwCiTviiHUzDKJWCZYXkCgWadybEoy2pA1EBKBsmxk/ /v8aNzmXIgZNWnJjgYfZif//6fCzv6BWV2Ql0mrt/vSvb83MEuSdx5A45DVcWwCZ 8vIBHursdK185GS3xvFgOxdElbvuPd5AxweEzuqO1MQFmrRlXMhvjN7oyfYhINKH sqAoIYKQUl9NoDNGpcFtnFja5IIrH9LcriQUXQIDAQABAoIBAQCXviRUAQQ0mp5A 2NiOdtqUClWVH88cYgb0VRosTwKMjktakJCEizt+O7oAblaG67pIJWxJpyh+jZPZ tOBNhyMEjC+kqq9teBPcvVfcsIMHKJg6FPO1XQOlYogcdWZnTsSbEyj1A54aD299 mVP1T4bLNoAc4jo+kobfeDEUGmxh7Yj3LICr+D9yPzqKsNJAzbWILhtYzR/hNqb2 JGBdDXu0usls/oSjNUYTAmtATQjVs5TbL7Ver+bdfDYaScBR8GqfavCTOrjGUaU/ 26yPpPKpycxL4biULej6SwmQm8AXaftb68+TaZ767DpxY5/3goqBfjKlu20WQyj/ pTfxaasdAoGBAPdhtDkFddD12+tsm4F17RHAp7ODZ5w0Wd7/DuyRPbpq74fXCYuA 5VSj1SPE4t5tAqUn9Vo7zgxBoZIdeHWBAIdunQw4bst11PD0uckzE5oMDxj+lT6B 7XFZXXJgcRtYI8c2na9/ISf9I4WtE8Y422xPZl/U/FV1+k2sKuOLm6r3AoGBAOsV NiDuMqR1/IopAkdZIeMMiunaLCdwkfJ12TQzG4hGDxE5Nfog90cEoJO4F6d9IZcG qtmlLiJjLYILX5vvthoQ2STVxLxSWVcWdbhYth8PTBm6waAfJH/00lmZtI0bHxlu eK6jr3QK7Rm8PFKP3xbnKr6BkTeL5aOfs139EXJLAoGBAL0MMnD9BjspF+ZCulfl 6cSOSNo7iltp+mAa5KnOmLC0ddaGc6njV94l0YUjOgimn8Xc0nghieX95d5GnT6W 1fOpiWTEX48mvhNhwfTLDqjDnGoKa704B19+3pXAs88kvTrJNxndelYX8iR+zsTF wJF14BNOLYOVxDHFZ4U6tDyjAoGAWGfjsUKi3OJaFIMTjk1gxwgCfatEi5hz6mCT TGQj6H2gUPPY7rXTCGwfDy5eBuix5x/kxHCwBtKRXKR2Uig1rVvErWuOztuRKYUS xD7oTonsLojjJBpSGaSyLmv1UFNwwJmg3NxFsTgirljxvoLIfM52bqo/OEpuE7iN Nb1kAD0CgYBb60T8GmoWRS4rS20J8KMs2Cmk0XmJHHNlSweYwO1fNFXXUwYG+bWj ZNdOc5eLtNBi8at5vbK+c5fq+IRfgYZbdbFMqZwq366kUc5+BnCphdKOb4M9M60t PtpalMa4s+J0SM3snolKUz45Lnz2KXVu3vy+rXScdo5+RJCNsD/xxg== -----END RSA PRIVATE KEY----- """ SSL_TEST_HARVESTER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUF+41lzP8r7pBiPCZFG7cMvOPcnowDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkzMFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC2wkXkBcUaOlajfjIsrbJPbKnSspyB9PbJ2nT/Nga/za94 79C2tTntMhbh40hT6E00HHxmwDOpzEEH+C+vkmhR3zkTFmP9uV2jSyylwBwWnTru 9io58MA/G25FMYH7a/3lKYspeh/mSKWqhV2xN07Mov9JbNAUVT13oHvUMlmhxaoX pTKehNH6u3dm8ovYlZyimVRbu8d88Ke5atjV613Ci1zV63b/Vt5YmWR3bAw6h10W UMSrh5pDEXuKplS9dTYOwfkVLhIinFSbyw66k9X1qNZIF2M10rvW8FsZxwtHbdAI ArD4kB7FrsoezBW2+Drap4aeHD1cMOYZPh9XnW05AgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAs7LdVyhNjP4DiXaKCy9De 7skX66TzJiwBBQ+fXjvAcOZCmn6lrje5ZA1pEE2e26huygXcADPntZJWgaV8uQ0M SXml0t5eSbDFlxOOOVTk7bRyt3+Wj3kz4N0P9ehLKtemKd7A0kYrgcFhylQrEHFq Ijo8uEhv77AzhJfNHDbqw+qax3rvOG2b1H+7yyn6u6kdiOVbGUd1ChIh1zTFFYrT WJbF+67bEFy/AEUYFdK53x6M94NWoBKqkIrgvbjf6G+++6IiL+PpaR0j3Dnu86ea anXRdbkhy36143Kk8GUy/Vx0e0L+aAbLDwobngzvMYactqDo7pqcDaORLSLKiQT5 -----END CERTIFICATE----- """ SSL_TEST_HARVESTER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEAtsJF5AXFGjpWo34yLK2yT2yp0rKcgfT2ydp0/zYGv82veO/Q trU57TIW4eNIU+hNNBx8ZsAzqcxBB/gvr5JoUd85ExZj/bldo0sspcAcFp067vYq OfDAPxtuRTGB+2v95SmLKXof5kilqoVdsTdOzKL/SWzQFFU9d6B71DJZocWqF6Uy noTR+rt3ZvKL2JWcoplUW7vHfPCnuWrY1etdwotc1et2/1beWJlkd2wMOoddFlDE q4eaQxF7iqZUvXU2DsH5FS4SIpxUm8sOupPV9ajWSBdjNdK71vBbGccLR23QCAKw +JAexa7KHswVtvg62qeGnhw9XDDmGT4fV51tOQIDAQABAoIBAGS74kAT+hdBzp1h IpDD0MO8dkJ/Voq/FgQemFxPUBsKaUy0iosaiuo1sK0jVKuDIIK3rM4J5LATuEiH QOl6PmvaKSBfOBASyw0Fk39sy06frWsnXhD/pUdjfD1BU47ccF6OrnjXKpwIsN+z kPfsL0/WC/ZRtsNuVGoKmBZXBlaGqXqJyuK4ZUpY/qkhgmc16BZyUpYbe2dAjaEo PoVri1pWGCnrOxOiBakwDAh4NQ340WKROIZi1/Z6q+oTEDBiPh17TVt6IBvL4IOl fAXHocnksr4GatfiGEPnLkIeIo6OLNQ+bln11Qhpemmyr12eRbdpjBGcV/Pupp8q fqrrWYECgYEA3e6LmnMqGHNg3HMUj3nUY1K5aRtTo2O/SsCH7hUXf43EXG6cSgo0 W87cs3e5FgXmxId62CQsZF9jLYtvjN23TQMbqQnbSeUJH+gElRLowyD3x2jD9u2Q +bG3QlJIFGjxvfVd24+Zj9OvWRNdk/pzbqHq/zFCwdTNB5P3E+qWCukCgYEA0tBQ Ozw4HowUMJdwSLDgJFNAkeAsX6MnXUk9EIr+vP2fusKxKLpHBP/Ojk/X1MaBQyE3 4q5EkL253iHOJ6+IoKQANgtBlADpScg08rfzBdY53bvZBN48wQTDCsfRtMdj7g3j ALVLd2+zmx5KCYMab2nyLGSTgnU43KwXdRE9PdECgYAZptPeA0evUc61TFvpBYTm Ag7KNk1hikr3Ae/0Nd3kcWdr46EO8cUBg5SA7eqnwADfYGVzjCLRazEUd5RqLMpe DWjqDeiZzu5SEMhOzsO2oh3hn5te9DCYm9D5ynboXQTsFutFUIDIXghbfGCJlR44 gGCgJHp52vXj1VdupuO22QKBgBqI3+Bk1wd5SD1JgneT09Keq/zwg4VSKu1B/66q YB/3qHhAcz4WHERT0nL1N8xvY+vILZmZp8W0K8X66VDzdjYKDoC+7/UqHDMOQSPf 5XXxnfz73PgQ5QLCj642sn2Xr0tSciUvrJ0O8UNwD4+c8eHeKv5NdoewK4UTICy7 C8NRAoGALmB7np+s+wCZCpA+cTkgZpzbqnwfRnqCrBx7Yj+ZVAa5CDZWqztwmSkY u8Y5q/qsPB5Fbno7rVAWuyk/smrDLVi0w6trv6RaOS4dhhKGSOhsAK2jXka6OztX y7mCud9RuNytEuuLjWQFt5syjyrmVtI55TxHrF9Q9ylQAdvL9DU= -----END RSA PRIVATE KEY----- """ SSL_TEST_TIMELORD_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUaTJzz6JzsH2ZddKgtyDaLvK0+fgwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkzMFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCcusqOeHXjSZtVYgT32PKxIjsW/TPBlv/ovjQpFIkBZTCC Rp+O0BNUJ13Kv9MVyyprKlR3EMldjIxolACVS+UIieuIERjufyMQVBuqJg+qr80l rbBwcKmzB496Lopi4DpX3W3kqaXd1c65RNCAhiQ50ZfEvFwLIhRzxC/ZofRW/iFX 0B2x+LE7TZ8uEXhtzVPc9GYVnEk/I2hN426pX59WmF/+xQ+HKguzCCBQ/7V6TiS8 1dLw4z5aIKedBgvlX8ibDkCUp6jOOfUTh12Xx6nHd3TX9qhL5h9zDfWbdoBdr3PU tYEgNXrYVq75HTlHoSRCuG4SccoVCwNzdKyjJ4mDAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAKaLVA7Ogf7S4gIwv/3K88 PGJxIhTcgMSyCVdKnPLWRUEofdZVMZEDcVI+l+4iB8sJ0XOs7fZp+bAnaQfgXzE2 wyWAODuytYlYZYc42xlT0PhqNnRKLUKf6uLCtNZFgpmiVmqgvAkzk/SJXTPw2F7q hFA8K70Z6Wh08rZCP3hXLk5A8h6ejcNBHAoOg7B8Z9AMPlHW474xoGUrLjl01H4S 6C2/7D/URCQFBTrLt4sIvtxe+cAtggB4DVpJk7eoxk7JL4CsRu8flqGLn1wFraqr jIb+X70mOXY7cO1R0n0uJLgHTU1dDkMlV3xOVfqhE+pe7caknwI0Nfzvlar491Ct -----END CERTIFICATE----- """ SSL_TEST_TIMELORD_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEAnLrKjnh140mbVWIE99jysSI7Fv0zwZb/6L40KRSJAWUwgkaf jtATVCddyr/TFcsqaypUdxDJXYyMaJQAlUvlCInriBEY7n8jEFQbqiYPqq/NJa2w cHCpswePei6KYuA6V91t5Kml3dXOuUTQgIYkOdGXxLxcCyIUc8Qv2aH0Vv4hV9Ad sfixO02fLhF4bc1T3PRmFZxJPyNoTeNuqV+fVphf/sUPhyoLswggUP+1ek4kvNXS 8OM+WiCnnQYL5V/Imw5AlKeozjn1E4ddl8epx3d01/aoS+Yfcw31m3aAXa9z1LWB IDV62Fau+R05R6EkQrhuEnHKFQsDc3SsoyeJgwIDAQABAoIBACKhf3plkZ7sN79x Din5rP6I0sesoRAInnk99eaR3AgL5OEUW9NBlNPGcwoGwsyQ/Ml7K/i3I9dg4/GD qnFSuMPfPcTuCjVAsG2+N/KrwFB10f2eWFsv+b9OT1yvBfL9GscpbUvWVIkk4i27 z9pmSYDhGAjnmer3188QrYYILCZAXnYmTQrqvHAOJEpxf7/4z2rcSVbVdez/58He xjloGfKSWfITpPLhpcM0Fh4cpx9fUJHgK0rV6CcL369XXHiJZ/OtEY6n57jqfEZd SQMUCAbxyZnb5Trl73ucBdcAkELjyURstlEBXuMQ65/USAZd1ndObjt25hYRBVTy SBf6VnECgYEAyVvg3xBZduR8ioxnflQoyQmrgWBN3BNVNIypmMicF1fsaHVAXXB2 gk7RjSKLNCzEZGkqcIOfw7nmC/aRdb6K6xOxeA2jC76ZP65dRqczOzDR7sDtW7CH 3zrMGMtvvjxzhtA7JhWtmDBmVzC8M3JeXiaVKuAjtEfKqwdB34RXfBkCgYEAx0KU 1ZCsIHY0BScRg/udckakILTVI76uGkQ/lEnEcbnTt2SB1NE7ityEVhTlcqWoKLbL 6N7X6BLENAifVgi+wj/n/v/OURCmQZZIWSgJNpV7q2XEURnRgcLqznUU95A8S1hq QVeCABmzzNFX9NUsxG2MXkybqmgPBAtmEVYjZfsCgYACh1PYmUT2WEI0HzVBgd8N P0DXHBV+OQPt6AJNN9+171W5rhdD1SC33DOHeTKUUieZNzTgOtbrx07bQZpsBxuJ fjLRViKBCEC2awMi2wCqsp9AR03zw9DA/eUIPq3Fjs7Il57WiJkoexsd5y/F2Z7T wdpHso7gObKS2UF7hBbxKQKBgEFRPw6e5P2jIbxKqUA1e9AY/fZGsNONzu6HTrwi TkXlX1RvmuuTRsxnKu443Vnumaf2+/KzEd1eQXi5FtoR9c4hOsBpRE1ogsdfJwoq yJJe//IYYvke2IGLzoKs+JmKa2lba0FOGSxFQJ40RXvZYVpmeqvyuthqUfnGbsfi D6p/AoGAVQyoyJ3bgy2xWInoq49Dc99uo4bLmn4blaENuIUrEDV1p2JTd41jRLGx pcv80SfZZtMa5YclBoezEhv8mrtBtnxNnNJ1UkDPmGagG88+avl/8FiBNtB+rZru 9Kh/jDmFddfY831nOdwgCMEZB/x9qCmyRTtzE35sKNZoAY2AVfs= -----END RSA PRIVATE KEY----- """ SSL_TEST_TIMELORD_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUaXeigR1NhYcViVNvWOSNgb1hguMwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkzMFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDlm9CbdDwaD7gUkwY+Y2by3np+QtBFoJtk4hcbdAQ4Vd27 7sJGve+iYg4vCCg3fdpxKZrM7p8VlRlQOMu2+Nkel726yhvs9hALWx0UVppk4iKV rj/dzd/Oiwaf/Tk3DwMnfiv4RyUU1YnVusUnche1KKHfwHGCzLAnlu286wQXruug Xl6onBQiF3rDqkLVrHcqMiasCJHLS2S9xktDiKwNCphATHFuZtzUIZeJK+yNiF+M JKXN1xQFq8k9kb2q8y8qAgf1dY3wW9Xj4iP1Qo9Bzx1CxJTLpezIk3QTcCWKUkE+ 2/4Nly+M5GoJDv59gzjvPmyWPTr6TZ3lrls/Z/rjAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBQBbv4tGvdNY+P2A62GfhR cyNDjXUKk+YHY64hGeiXp61l8e2Hf58lV9lgBoMpniXUvMk9Nx0g+d1Gsoc9VWHs LP1MhVaf0zodeK45jJxuzCC+eDHSNmvhkUJEVD8LDgmHTJlddpwYBwKocyr4m3XX 2QMcgiKcYaqIt5MLFwCWuarQ6bXKT88qRVTxKTA4FoqXXqJKCbAsEMql1h+dvXeV yTwPK3vuRrZxyiIYlILG/tgNS6P+qUwLCnYjoPX2Ml3djMkUhRBdsTWR8wWTYkb0 qmqKNsNL7+OHzUI+Z8WBoja8MHVZohl0iDAvFO7Y67ovldeYS8mlb0Tv3nVRUhiM -----END CERTIFICATE----- """ SSL_TEST_TIMELORD_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEA5ZvQm3Q8Gg+4FJMGPmNm8t56fkLQRaCbZOIXG3QEOFXdu+7C Rr3vomIOLwgoN33acSmazO6fFZUZUDjLtvjZHpe9usob7PYQC1sdFFaaZOIila4/ 3c3fzosGn/05Nw8DJ34r+EclFNWJ1brFJ3IXtSih38BxgsywJ5btvOsEF67roF5e qJwUIhd6w6pC1ax3KjImrAiRy0tkvcZLQ4isDQqYQExxbmbc1CGXiSvsjYhfjCSl zdcUBavJPZG9qvMvKgIH9XWN8FvV4+Ij9UKPQc8dQsSUy6XsyJN0E3AlilJBPtv+ DZcvjORqCQ7+fYM47z5slj06+k2d5a5bP2f64wIDAQABAoIBAQDd6juzk6LnGVwz 3mnBcLc2ctp3H8JGGVU3KuFkcjwF6s+U7M0uLDLogdbtk/eyslum1aw890AgTuuZ Qlt564eFbuk8GEznOGcHYrd3ScCNUpZUjoZBrNHrwSjVBpv+3+6Pg/2hR7nKKhy+ ynX0iuvo9m2FYW0UGxsCGHiMB6T78QoxeHczwLq2c8isG9cW4xsXvFOls/5du6a2 +wHP0qMAk6BRJ2XNlEw5bHXcV9yTdLK+HhSyNDtzUGTQuj0BPAHKl31M72JsHpYn ofiIem0+P1XWj/pvPAofNp545vmjfhlVTkkjEjwXZbSujBQRhZ5JRshR9T3nlB5a +WKBHVJhAoGBAPVvqmMPbW2oOIg4drBwgTIXIgBvMtUvIMI2fDqyMm+aQXfKowty 17Q470D2RHZ4CKm4KtGxP7zoPnsJ39XHXTrr2gono3t+mghwkYuroFNXOs0y1P3U Y2BH++6rGpLv8yxMPaJo+1mVjXSIzeJSlGgKGaoy/+9qbcpf3NcUv1BxAoGBAO99 wPlQYHgrp9C0KDjh8OWXiI9HdCTBZ+qE7AuiM2HGoF4WSe+BvpeBWQTzPcEPB/sK nHW8GQ6u1TPpJamuvdg/hnLOmx7sPwsD98FkocMmbeaf/vnlSwXNZEdbypRNeggy 5utbfYf2520dmn73dMGEZSXfgj7ldJgouptBHmqTAoGAGcT0rdvz0FymOt86zwGw /vJg1ozWWH3PQbT4zCzjkMYwc4RqJAyVy01jCX4R6CJoPnGgxU2H9Kypyr9Zqhd5 mXMj/Ib26kN7psEy9ug5OCbjfKIGrPP8zyIfuIpsitr4vEDxA7lkEp7aME8g1s92 14mf8jfSmW+iQWpZRJfgEnECgYBIdu6LAY0PD3aJqdl5zLPNZJqHcAFula7RwUKD CqMtdKJVlbztYX6/7P14h/kpj1jE1yMcZLvYO4J7YJJq01rSMfaGiolZQ/aXaK3w sHhZyij63XKTPpQCv3EWPmn/kanZDT3d/SLwnv7Lf2ed/1Yur9bDLOwGB/vNhpVg IMYJTQKBgHp287GYTmfEIYQt8TwpFdIiehOc51bV62iD5ittj8oh98s+1+TxVvED rpkuO0w2IV/CCMPagmh+5zHVeEjr87w2qTEzukw/uhsyqDDlwgStxv5mqGTHPBDQ EDnFBXhZeOJsVFQFZ89HQ8hR4EyvkDRIW7X5oX54VxizlNpfpb4H -----END RSA PRIVATE KEY----- """ SSL_TEST_CRAWLER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUdCBu6ITWB8mIr3CFYUGSoidgl9IwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkzMFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC6CqdPjfQSDqwE+0QwTkW3Gq2z+SdyOkCbA1f65tpk9dzN yLx2xtHRV433IUFRxY4slpeO/ff/yWI11e8aubv1TJt1Df2XJWsrTSpasHiB0cQu sBIUPCw0KkvNsZ93UVRArKyiNIut3tFTvM54hzUsSpMnH3gUiF2osJP/qFi9Fm4w nHhhvjnm98YZ73r9qmS7x1pRLkduOLauQrZeMGtfqPbrDn+zrXISJz/WlVs1RFtj S//fsuWYX1mecsowyj2uPgCiWxd4uYcnYEmv8o1+3yMucR6dWQCQxxLFaN4vgksz vxQRQ+GzLYBG4rGXaJhuTd7zNX4MAvFC7dZF4Ey/AgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQCWFqbiMrpwtfPP9S5YKnFw kv6aDeUeq6GYfoBdKYnVpfaXQgPXzc8eiNXptAPuMIVoSn811Hg+p9SsEjKBjPlZ jdbbl44S2owhrJ7N4H5qTSoryBvuTwlh+aQDsDh+x5uO7PQzb2F3yU2cM2MvtU+2 4pYr0Pucs2A0XzqWp+cZLhWHcTOm391Ab+Vr+Q/ZguvOxbmsBCs+qwSlPaktd9Yw AqNKFau9hAnb++jd3k08EN8GBVlQBP/njdEoWEGjHD2SnTo2z1sv5jF+t9E28Swm QbkNYNrgryTYJzPDZMMrK6DkkEFnH0djbKjwAdkooHr0pa9COcuYMhsqNMZ8irgY -----END CERTIFICATE----- """ SSL_TEST_CRAWLER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAugqnT430Eg6sBPtEME5Ftxqts/kncjpAmwNX+ubaZPXczci8 dsbR0VeN9yFBUcWOLJaXjv33/8liNdXvGrm79UybdQ39lyVrK00qWrB4gdHELrAS FDwsNCpLzbGfd1FUQKysojSLrd7RU7zOeIc1LEqTJx94FIhdqLCT/6hYvRZuMJx4 Yb455vfGGe96/apku8daUS5Hbji2rkK2XjBrX6j26w5/s61yEic/1pVbNURbY0v/ 37LlmF9ZnnLKMMo9rj4AolsXeLmHJ2BJr/KNft8jLnEenVkAkMcSxWjeL4JLM78U EUPhsy2ARuKxl2iYbk3e8zV+DALxQu3WReBMvwIDAQABAoIBAFXwie1EA9U7ldcP QyaVYbr9xfP3SnOH2URCPSgX8BbnREKDUhwEJ/RuX5QjdosRmWWbgxN42lD8dDOu Sa+s0Ni1tLJT7iseC+2Kzd/q2SAPCHMQvqk+SqUmTLIONT3nAeaGXZDoeQWugkAO XcprmvKE2IkgDlZdz/YW66cT2zotEggMAubtRTRZy5k9UwhZkHCB98dbCrLKDS2T TECySx4OnhTbvVheIjXLZSHAI4KDyOfnkb4yYiiOYNnXaGMMqXJ6ITc4L055W+Sg aqPXxifgK04cuceyciQH74HxWypFQMJX1HyOJ9qz5dF8FsJO8vw+USEcsMQvkaSi +/iT02ECgYEA7cLr2c2vtAzEz/KqFH1ll5LALSmFlDfIr/s7ljDEmrgMMuJc8gQ5 2UPiZhd5DMUBD1yncAd+O8QjoC/GBecsoAfeRYwowCO1VFZ+EdbL4X5NwdL4HwLe KNiR3EzfWpEZPO8FAKHJdyoZhogV2aj8Wd1JgcW8xrIQHZIImeRg3scCgYEAyFAT h+h2zWk76JTAvSDLWSRXBDdYuMc3dINu0Nv3pY86Kpxjq8nFdsdsP4gIoHleG5M6 3RWljKFxALckNzgRoRt18GqX9k0c3svXWY1UhVgI+TFTwjm5JgkzIvAzWqB0BeZ8 scxNyAkn/sYBa+SQw4l66Cq7uS/4OS3sC90LCkkCgYEAtsm0KK5I9lMavAQDXd1J zU21EQNq/pgkYab0GHNFsuzr8/KzIhy9nJrj4zkIhxitx/GjiC06jxgri2svAjrH xABIkY8/hPfu3/fe1DgeZi2D+g8HUlASG7Tj7knrLOWAUagwYFwBVuu21AarRbr0 xuGpMWujxd3/JbyvgCBjmOECgYA4LNS9WYDvrCJj4EuI/ohocFuC0C6uaxfvMejC 4904bclHJ+J/y67314dQ7cpVjpPIsephE/AAV0oEhFfAsJWpE7VofcwuA4QkKxAy igL4/i5OC/pMTrnQo+XWV3xfXv4KpY+0oPHzNjYkKc0+P7QlUgnI0CsjDQPUrT80 OIIfGQKBgGSf00zTS9KDIHKtWkZi4qdMmUDiIoxlZ27eZelfF7XMNxm+eP5gtGPZ Hq0JKSswlMQZE+KWakyaVh6OnGRdGLM2yuU4tYjU5ZgJ/O5BuZykCFLb4OPq7Uos Wx8tJU4lx2r0q+TFzVwMv92K/p0sIGvHVfTn9/xNwtZAI561vEcu -----END RSA PRIVATE KEY----- """ SSL_TEST_DAEMON_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUJWB6PMvY6/sycKKe2rKlyk2Jhx0wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkzMFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDpNyGq9RLF09KE+uiFLgNAWUXiUWRDWS86+S+knZMa40Pi iDdpxcRxNgxUVioleNfKIuXQp1eKCwCuAv8js9hRqOIkEfZHtiNaai4iJWYKD8v6 /Mh1iTQ8evvsxR9Edlr2vpf86uWcIZ6NfD2R0QuDNi/rEQimilQr9O0zgpVcZ/rX
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
true
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/ssl_certs_3.py
flax/simulator/ssl_certs_3.py
from __future__ import annotations from typing import Dict, Tuple SSL_TEST_PRIVATE_CA_CRT = b"""-----BEGIN CERTIFICATE----- MIIDKTCCAhGgAwIBAgIUeLxDdxR+RmiMMvvCxRfsQJAL7vUwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMB4XDTIyMDMyMzE3MjkyM1oXDTMyMDMy MDE3MjkyM1owRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8G A1UECwwYT3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEA0Bvshi5y4VEw+k32NOOMFZJaraLoJx5N1WOJDYGqSDPe 7ICPjz4IWDQN+yPrFv+ms+es3Ys8WOKEOMWR8U9mAxG21t+n8LH7NAMlCRNscBZ/ Si04bqfrBc3adznorQLtShOpYxEfRdu7kpHo6+D+4Av96qMpMLsPKiZWjjy9O3ai oNzymj0mwlZ/1gaxpvfmvuqNNR9Kog8o7crLbp/x0ZPiU+Q0y6Kj4saZwu5Nq2cO JqLn6ex8w576/UOAN4u28S3m2pVgoYkqGqJSXORUqZj38Ro0zAYywIHjiIfhLp5a dhqDyf/IUCawltEzdXoOp3irYaV0SmAB8+e2ILZJawIDAQABoxMwETAPBgNVHRMB Af8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQAchOBNfaAIoP97Lmyk/S4Hu94I bGqj/BT6/q+UnWYcIt3UO6/d9a6WO7xtSPKiuObip8M6UQYVKQC8YecnAvXFwI6Q r4z2TdGx2MjsxfQSNX0BYASlv5EWd3LYJs+Ayi2lxh+3XLSH+BK/7R1nL1MaN161 vAN2rGOo5J1niWyixyGK/jrKTtsRTxDcpFeIYdk1r/qGiY5uxwg6ny0JYHXYhSNm AyADKnZoXw/kb6+mEHJHZaTR1JpNHkQ7azhNYyVMUseCi+5vYuzA2OoxSgBegSj+ 1fRUZI+j46hkr5Qspw9P++dDLzEGgarbxruRf6VsosU3sSYxq6LC+a9UHXNG -----END CERTIFICATE----- """ SSL_TEST_PRIVATE_CA_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEA0Bvshi5y4VEw+k32NOOMFZJaraLoJx5N1WOJDYGqSDPe7ICP jz4IWDQN+yPrFv+ms+es3Ys8WOKEOMWR8U9mAxG21t+n8LH7NAMlCRNscBZ/Si04 bqfrBc3adznorQLtShOpYxEfRdu7kpHo6+D+4Av96qMpMLsPKiZWjjy9O3aioNzy mj0mwlZ/1gaxpvfmvuqNNR9Kog8o7crLbp/x0ZPiU+Q0y6Kj4saZwu5Nq2cOJqLn 6ex8w576/UOAN4u28S3m2pVgoYkqGqJSXORUqZj38Ro0zAYywIHjiIfhLp5adhqD yf/IUCawltEzdXoOp3irYaV0SmAB8+e2ILZJawIDAQABAoIBAQCDVHvpGbrpsiEk dLqhGdA3dMrAtQOoXBlmRpAg8+kP85wEyATQsqb1crQ3/qzHMMJ02glfLhUBSsGC SjwVerO30CAAbdg/rzIF2s4uchGGksv1daAdRN6uJQBvKR5KwIQasVm96PpBTa+L iYTiBnUR0r+EqT6/P+0L/nG1BWOt98bITaxO5Cn2mXGP1ZZ8iA9RBx1pxMAUDG4d 5Y4+Xt8YMP8OfEeVIFO/djRTh0OSTugSGwjnJReF+clX19+dJ/aBXOUHrLdNCV8c 9GjqHDEy6rXIb9N8UY6nVVvzbC/ypY6k2VtDhnWUYaLcpuHekmrONJRKXc0lKR6w 8FDACpvhAoGBAOi72c+PH0FjT2pyVQLc/Ht5UDt0jvsGPEa+EvYYC+ZFEViXj98+ KGxtIrc6Jab3Si/eCMS+qPAO3F8wC1J+qHq34g6B2v2SH3d5KOWXZwMFkEcM3psO xBawVtH5suhTK86Lq/qi2EE5yT0NNlM+NM8zyhYtm/w8kjnly/5J53DTAoGBAOTp 3+mvSyah3pBTDHLlLUw92baOAQRMR+7DHOmtsyVwzbZXzES1IVMt02ZH5FNN2nk7 8XUldTNUkvnHPrGVogI3d8DlWctfh7ri0T9SgydudIOP9ETmdr379uepAHQavE8q fyxi5o1Ypp69rPWZWmicTbiNyhAoTqFhauA7XCYJAoGAayDlLuSLl5a2HKKKPSop 0lBSPTv3ANeq8UlXAw6ok5NhW61QXYuIIfjOjRbn9AZKkOQclyvIKdA9YleELrH8 rZhtJw5hFm2nrGAKEjzx/vMVqY7j/O38FxGOtVLCJqz6MjYasOE6uDN4TXECe6jb uDD3qePOtHnROXNsxh2Qul8CgYAq87tA9NRMDmldeUfHszrZqG1WdLS6IroIkfG1 4xLPPqhKw5Sfe8EiA2I8Odcczmnk/5th2MJx/DeLyJf56FK6yb+doStFHsqwBWkv 0YKsfmw8V2GFIB09rq54b1yXbIDS9e1g3bnW4cB53qs6dijhohpvO6OjfnyqiUXt hxXWSQKBgA//yaex8PP/QQNzTYVgFGLmy+TuI7rbrVtVRs1tUzpitzL66Cd4qdL5 qKeMxbohv6aeXDYQweemm5QFvrP63syIyphe/ZPwF5q7V5ZtFwUVwXYW96hwRdVk lA+tw7ba6RnXdDI+i2PoHfmdP89WJWeucidP8VcmhY0RiAYpG/vd -----END RSA PRIVATE KEY----- """ SSL_TEST_FULLNODE_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUFhEfo/xtdcjm/XhkbuouJaZUBEAwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyM1oYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDQEygAVJgviM/8f0wuEsmCJoiNJ3gvrX8EckcllVXeyg23 iXiIadXqtCdPOXQlJHw2fZ838o/WuJkI9TsrtUkG3e+VEJKku3GtDez7gDufVZd9 e7jmqbO1mMwvpbFwEUzR9IumsxiOqDVAzSJIJGnWKhiOLYkXdKI4D+dyniEMKVFk Y1TcI1huQngH+dBYujHlJZ4USOB+xVv5LfgrKYiZyHdKmRchIdhcjft5b7gBp38z helydqA+mEU8zFqL5iwpNOALmije5IQKDrVHThIVmlg+G96DakoVBcpEqttfHb0N E/oX3v0yAeV6IJ94VwCsSzndHt/KEG5PjsqQ60KHAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQB63tKOcuBjL8tjnIlDozpm t+LRcNiubKRc/rhTBYIoO6cTMN61ITe2FvogzNAPR/wmsaDO/sqG1oEHrrnJ7hXi zNVj3GC7XYlqXvoRsCTdqoZE4ATPVZkJqhDx+/5IruWo1Q7F3nPzjLcS3mpwu2xc Tl2HBEwCX2gTuG6lB5DUztrgGLNh27pqRLoGW4fzmVtHD/z54SFsQvPw0flYMRtc qA/4eoWLvQNGoqsfA2F+eFTlXiPr/jp3jFVJvqixlwEN1DJkTi7hfMTEty7xrlZq dZUmYxygqt4sy0AMbwCbemYJmvONlW8lN5GYo5NjB0BaMYsGMrehY2XHZg2npy+U -----END CERTIFICATE----- """ SSL_TEST_FULLNODE_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEA0BMoAFSYL4jP/H9MLhLJgiaIjSd4L61/BHJHJZVV3soNt4l4 iGnV6rQnTzl0JSR8Nn2fN/KP1riZCPU7K7VJBt3vlRCSpLtxrQ3s+4A7n1WXfXu4 5qmztZjML6WxcBFM0fSLprMYjqg1QM0iSCRp1ioYji2JF3SiOA/ncp4hDClRZGNU 3CNYbkJ4B/nQWLox5SWeFEjgfsVb+S34KymImch3SpkXISHYXI37eW+4Aad/M4Xp cnagPphFPMxai+YsKTTgC5oo3uSECg61R04SFZpYPhveg2pKFQXKRKrbXx29DRP6 F979MgHleiCfeFcArEs53R7fyhBuT47KkOtChwIDAQABAoIBAE6dPjrJu2oSPcq/ ac/qhznmRydVp0IUQe4zIxBfGL+BBae3h9O6cPkpMcTsBybVXxzTX6mquo+81Q0e YknER6ARkCh4x3731x40KbpoG566nu7pJNX5fg15eoPyDVUzJBwbUfwcpIWZpe0i 0/X/1AD3jKmDKM204mleEOssNX47G7z5GlLY73hRN93+LAFmiVzIRsNAmkgEOVKV NI7kj4Eax+1i6LfU5EeSi5XbqaEopWyxuUg/WtNFJzaTtVSnZMqUvMS7R0b3hWqL KeJCe+H5JXn/GUUiHUcKaFW4yTXLEGMOSXrxevEUt/+PwEKByVIa3Y3ljVh4eHMg eSykGAkCgYEA6WiLDxSPmSYzQRHkD968bztk0x/XSEbCoJdS8msGjwApJ7eZbLBz hW+4k/HhIPez0atU2TBm6XR3YauWxtu+p93KjvqieMHgudZ95+4hK3jkUTpnN4Lx MNfZsEsUpiZ34kv8sjJxr56gWPBdMUdyAorRqeQGYua3Ddg6nLFXbZUCgYEA5Dbk PewvLZLX7lbN7Y7r+uSLIOq2CuQLMirLuDKooaQFLdjhbxZqpQ1UlLIb7V66PVTW TJCWr9M3btWMwUSvWquyCJi0ppwCRB3JOiO66eUqUwjT6gv8jXy9HDJLRc8jHjbF Xvr+g2IxPr7tpVClBIq+NJnP0vAhPN0DGVGM0KsCgYAEo/53y0nbmqXUOl3VbvFC KOUlSXHHTxjZhoiwpy4XM8KdtonHXm69jW4XCu0V8bbSiVyDgPHa3GTvPTEfPQk6 Xy+CzjriucAVEc2pCdQBAENR1h5tPR48gV4joiqD7yndBvO8O0KFYlr/ya+gpjH/ GPF4Nj9mQf4LuWvY57G8TQKBgQCAfZNmdeteKnZfIAqTvUuKGFFpOB1E5n6TQVsw G32sfK/Zz2ml5SYoReggTGPC8vnC/FgoBaSB3FcylRPJ4UUltNPpWSklQWNZPLgG fwWHGVsKI0dFWHhapSfIj1yoMmbgZRAdWQ4hpRB69n7Q/CXc98z9yrgjWMYuAXX0 NGEnPwKBgDpMnmFVf9YqtIrjb2dfUFXi/xRM/0C5/fKOxLdMAqelQrHUCzkfjnq5 sRf+TU0gV63g0vmDkrHPDew7NAr8m/cehPgELvtBvouEbGNQOuvNDunVwLU6vaIh OqtmlgNu99SfZUJUg8pIOD2oAJKSSg+iw11bnPuKJxPyWd9HtMZl -----END RSA PRIVATE KEY----- """ SSL_TEST_FULLNODE_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUO/5znSza9Dx7FlysyCyStw2FDwQwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyM1oYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDFUvDaklLh3JqASKA1I6H/cULbcPCiXDy5CTtXJUzSRc8Q ckjI4pepWm2/qPKkmiW+6V3irdc1sGF5ICB0mh41UAu5338+0nuQ2n6LWChL4OG7 JNU4uBIbf5PXmlZhj8BHAfpAi0rvXIdlEUyVhDnjfnOnYK/2Eivh5gOvnmoHA9EA BI1KCvhIdv9H4Vdrl+iFTL42hPe1X4TBRcg7HuFVZ14kzxWQ4x9Ep/tzzq8eaLSM rlrRmBlrXMgN66ib65deEbuGPxVdHwY4OkR7hxal41ON6sduZ7d5ypHWGUwrT0eY Pga4/b10/trBHGlk7cFmLmqTDVEtPMgrHFrtM4YJAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAk17NlkhSre6JbKzlUdYB4 GOddsueSKsnathkvevXLM5Q2zhY1GKdeT6chlflcgLs1q810LwyAvVD/A5k3jOZM YxR9mQMAARuk1qZsxeYfu1ARZWEU77HJj2foWw0r5+1FmT5vCPZoqnINElXHMbuy DtgYUjAS/31pqHtFKrqFAV3IruQyosYoVOFmKb419s+7ST6u+FQZpiouKKnSpqfc 0K9+O4pcCvPgcrj8rTK5cxLeIYd7LwL9grxE9DrIJhsaoKUkwM4+tiimr+7OSYov byhFnXiLH9MEZgJXtV9jwQJideTpcI7rdVFVc4+tEP9A5Prru6asNC2UsXbg4kZy -----END CERTIFICATE----- """ SSL_TEST_FULLNODE_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAxVLw2pJS4dyagEigNSOh/3FC23Dwolw8uQk7VyVM0kXPEHJI yOKXqVptv6jypJolvuld4q3XNbBheSAgdJoeNVALud9/PtJ7kNp+i1goS+DhuyTV OLgSG3+T15pWYY/ARwH6QItK71yHZRFMlYQ5435zp2Cv9hIr4eYDr55qBwPRAASN Sgr4SHb/R+FXa5fohUy+NoT3tV+EwUXIOx7hVWdeJM8VkOMfRKf7c86vHmi0jK5a 0ZgZa1zIDeuom+uXXhG7hj8VXR8GODpEe4cWpeNTjerHbme3ecqR1hlMK09HmD4G uP29dP7awRxpZO3BZi5qkw1RLTzIKxxa7TOGCQIDAQABAoIBADJ/m2wUbmmnD1Mt QvLWf6rjzXxjVvH2MQQZvLn8rcBSZT+MP9xJQQ7yOYwHLLG7UVWeW4ybeKwgy5E4 C5ZLqtdx+M5EyEfHjh/wCtqWYRmqH5rJPlgZo2iuKaPPt7OYGlkRxH2oKDFBuNTA rJzHDhmOTwLS17VdySUyvFbBb9kDSQwaH04yRhsGoMuy+qmBc75eOCl6FtOFHtJ4 7EjdnpRp6L6lKU/pMflVx3kwepAjGul+xZXhkXdfyLfGsAVsZQwePiq8aMZ/S/Gj yqrCMQ+EqeTb57SSXWK9XYrOIsQZSJjuqiOOYgqKofv7HqJlmC1cLhgoMG5o0jP2 bTKvOxECgYEA/0ythY6A5KxT06gdYltsMlIcuamVw5EjoDpf8oyBwD6cbUm8Mb2t VOtPbbHxx4NqGSn/uxT8UgmOGZ4C04CwmgWmMmODCT/c9LBHNbWOTiy4OLIJdcUv 01x1tYZvdbe1FYKxga+hR+UnKJT1t0m5UjKjhXnIYGR+weXpm2hco2sCgYEAxd2K ggTm/xNtDHNxjygKik4FfEhGcgafnpCrm6dCGyLAe5+T9YOt6owGTS2AiJiG5PJR GmJxyJa44je/r1+LLVN8SmsLXTX74UizjoVNaCoy9Ze3Xb4RNsPYXe0wIgCi+hBP PEmFZvSxlxXpHP0ppknCxI08wBWXH6goSkcrDVsCgYAx/69gH7eIkWNdaWhP0f3P oRs1FUxaX7ttbuFJnFDw+JIkKTOtPiuLHQaSQi5K16bYxMvrtMFxw6NLyxFcoLB1 ibOx3KFWF2bLmRZpI2R6VPHDUMLfiL3EFDCNW4XKtS7GxrDC6EWa0fsoTHwO6GZd /cLeqiofDq9wg/mLURYLfwKBgQCcywLAJ1xZUy59yFl7pLI9iLgmFSvlncQNJf0m +jKTSEWZcQoRash9bXps3BrXo255rF+CdfJOjslxUdYPBbpHL7n1SsAVm/q+Ohs3 XADMA2ygWxpOKZiAek9RluwmdbSwTg5L6sLQpCS6Yf15IFBJ2neBw54ZZMJ9roZG 3gCKswKBgGRoPW6/tJRuf/OfVM9szhruhNa1tUJre2RrKnXzp4P27nfLHKUuHFoc A0NXSDu8b1WDFHi2d/GIQm/ldiShGqx8HLY4fgBKTMLZ6nJXZ4uhv98xjOYy4jdI X3HwYl1ukULFfhMVlS4qF6dQS2FF2ZxbkVwKYCjFrtyEJOjYcce5 -----END RSA PRIVATE KEY----- """ SSL_TEST_WALLET_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUBN4qin5jD3jO3rKq1yvO8YTCOM8wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyM1oYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCkLFKcf8jK2dB0dVNFO8ULxmS+4939oXH/TSF7JiNmUxGI WkPyUSgHQOatbhAK7Z91ZnmWyVrnGzXjccvW64uLLrLFA5mL4q0iiwroxPnaP0qv w5ZnZmDgH/SPrzt5yw8ndagkfpxLekG0Pwbh4Coffg1VgEw/gqjv//moUTSQB66i daNHd4bN0KVDXmycUdqI2ER5iqnDnb6Fi4DTQXSkwd29t/mRaHcQLrwiV58YqsBF YcpE70UWgV7j+e5qYUlzJ0P6Te8QU1pjqigWoAuJNptq7E9wenSJ+7RZB1c+R+48 bBuQpoX+UVQfTHIeJ2NSKiMN8deLUhPj+fQrCp+1AgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAccb5ZaUOWhp4FAwQ4iTfo 5RHaPGD770BgpIvl5yKAmfAN04iF6GgcCvZP69m5lFlNuQNaz0kOTIY8cNvrksHF OYNbm7aHHdCGKs8sjdXxrJrL07MwRsN+XdWIDECGQBIHmvcOeY3HLdxcGr1lSpuP xdT79hYrYeMBaHF3RVItts6fNVBGFmA9hf6/cDEIRt6TDbfBy+PCIRQO3OxKa+ch sIemO+3tJsyB6xJz+iG7lO8QCI3qtn02XoGM82WMjgJVorWMzTSoMIP9UWMECoDw Q9zy6Fqy4cOWT2qduWD/7r+5e2jmI22wEU9LW3QlNt9XziVBGqnZEiKfOdnf3XdB -----END CERTIFICATE----- """ SSL_TEST_WALLET_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEApCxSnH/IytnQdHVTRTvFC8ZkvuPd/aFx/00heyYjZlMRiFpD 8lEoB0DmrW4QCu2fdWZ5lsla5xs143HL1uuLiy6yxQOZi+KtIosK6MT52j9Kr8OW Z2Zg4B/0j687ecsPJ3WoJH6cS3pBtD8G4eAqH34NVYBMP4Ko7//5qFE0kAeuonWj R3eGzdClQ15snFHaiNhEeYqpw52+hYuA00F0pMHdvbf5kWh3EC68IlefGKrARWHK RO9FFoFe4/nuamFJcydD+k3vEFNaY6ooFqALiTabauxPcHp0ifu0WQdXPkfuPGwb kKaF/lFUH0xyHidjUiojDfHXi1IT4/n0KwqftQIDAQABAoIBADLetP5fLgWE9m2P iSzTt1vNrpvjmX6kjuEvsicpiyCCrtUUOyeTdBbDSncEup3YQWesSBKr86nWqZz/ Ps0qkUOgRa58ThClPUaN1OSJXG3+3JKXxTvm4i+wVyRKhOBZRinQ8DfWr3FHwaIr QWOuBP9bHKCYr4eiYdxz8ZTxDJtv9trGCajRnTv/zENoAHC3Jb9g4SPZ+bCNP54n gBEwY9c9tP9DKtGDMS0wfLO3La/VDO4Ft0KGMMur5hyNzi6xA0v+HJmaQS3h5nkO H3MbDQBDbuvjpAk4IlYKExFsiXbT3v+M1Fq3G1z/32Gucx9AraMngdOOyoxe2NvZ KgtD4wUCgYEA0lwkaXW64p+NE2hEorqBadCDyKmHnYhKjzG5/PuoOxlBsAwtx7Ce fJ40C1yu4OTANufR7VXWOgH1eaO5lCEe+VhX1NyVb5otuJrnAzKQ8da3lEIOLPcb fDkGS9LKdEWSIeA7gIRdi0S+EFHbBqgg2hsWO4LVAc/6N9OlPNnfmQsCgYEAx8rd AEw0mqE/UWvofI60b3pceDkcWtOZef2WqkVLYRvWjh72S2KSmhbJxB7aAQrSgvka 9aCHS616yo6tai07evd7VCRNmPzozRnG1NlwIZW/eFL0JYOXuuH0C6Iqi6q/VLtY iBfz7114IYGA8Nqj9GKRfZXFGuBZ0sbSetNhoj8CgYAf1NuZrbv64QPbBPMl4K0G kwvuCGFCIEaQBolLU9VwI/FBr4YZ6osA9nuPoJXB6DuB03B7xnplSriXkIPbe2uR daHMzxg5zA3RGneMj1FJlyEuaRR2D2p0ULi4Lox+LazgPWsjlmQFWACevZQ0HKrj 9idWGAUdghgt7HPbkmh4YwKBgDvzGkdplmtDsS0sVPFzHJ9Ktw54DJMQZUAeoKPs 8QZthP7WOY87P8QuzFIl88JWTf5w4u8LQS2rG2pGT7DJa8ylEAOadRJP6UcJ0giy Shw5w99F/O54wwGXpVQMT/nivVCeep0zmsWbZV2gb2FWKdY98WwekatT4IAHmsay QNyfAoGAVetKQkO9H3VvM8dloVF/Bh5ui6uKlYO/zNop01ClUH3KBc3WwdVXCasq BEsJ0HiuHTU5N3UPicvLddCdxkAJKTQkwqOFqcuHAv6HR6RFBWaWN/iz0a78Q1Bh gwCYEHjiPevWb3rLufd26SWtG/tIsrIEjx3BttKDRqqngLKSUvE= -----END RSA PRIVATE KEY----- """ SSL_TEST_WALLET_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUU/+7JgmNQiwRivfB+ypu3OtSTJEwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyM1oYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDT/HGxRGnq6IATEXgdHTrT88mmY+JRNzeBnD9Uh3uwBkai kJam31eY3oxEsQWVZRJ+Qsynr+VBgxFquNBnHmQ27JOqAH800oM1CC0bq4Z8ac6X O1SjCdUQdaqpjScUNfxWgk6gG3e9KiuHcvyOezdIvPb5Z8Lgz1Wk53IiUpjOBRrL jvBYVebvpAog12q8Flbf3Myu27ZsL3lUhVWpfl91sEQ7rEz3ollxl52Mz2JA1B2+ TzaU/iDctTQnRCk75RqDmVshnKXKXGNnClwZXtIea4mfVVJB4mJhwGvgsLRRj7eg BM6E+jzBfz181Cr0PrhpzGJnfuOtEepby5F71GbPAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQA5+/o35BCJRvrfMIp311Xv ybio+Yq7Jpp4wDOT+6XlpGMMIHGtDw3fYXhZeXDLJQ144reDOnLWBEN7of1M0NHu Y5ccTVeYaepZnvncyXtgokDtPZjegXj96zs1IDr5JU4F3x7xw3+zppTAZCgGQ4A9 rMwwFjsm+fbjITR9T5fLppUSW1aTCSii3i0VBzGyXZlLDuCqdOLYCOX6WFtx7j3y jQYZlqXqv5idx1BiEJT4vqC2N8elpmPsZ0TIR7xIFft5HvlU/U+aCO4NRetJaRj9 JK9D6Jt3shpKLbyJOfa7foY6LBf+qS5MpC3kTnfoeVNpI6DHKWKE6d5+au48ARy5 -----END CERTIFICATE----- """ SSL_TEST_WALLET_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEA0/xxsURp6uiAExF4HR060/PJpmPiUTc3gZw/VId7sAZGopCW pt9XmN6MRLEFlWUSfkLMp6/lQYMRarjQZx5kNuyTqgB/NNKDNQgtG6uGfGnOlztU ownVEHWqqY0nFDX8VoJOoBt3vSorh3L8jns3SLz2+WfC4M9VpOdyIlKYzgUay47w WFXm76QKINdqvBZW39zMrtu2bC95VIVVqX5fdbBEO6xM96JZcZedjM9iQNQdvk82 lP4g3LU0J0QpO+Uag5lbIZylylxjZwpcGV7SHmuJn1VSQeJiYcBr4LC0UY+3oATO hPo8wX89fNQq9D64acxiZ37jrRHqW8uRe9RmzwIDAQABAoIBAQCbj8xq1paXcQjT dWVckB+kfGlFNlVVXhzYey2qPUYSFXjuQQac7JbesqnimrlLOYGJsEF46MZm/eTh GUCt+4p1F8UA4x52R+lLGHXpsUSethKJvltMzaFSU9bqV5AO79L+NN+39JA4++I3 orUdZeRa93iR64gB64Sg38tMzqodvB/9vD1CgD/UFT/dy/FjMkg3UMU0oBZ0Zgjd WRZUePFIiMQ+/VtEq2PVuFfwPqyeKEy6DUgd1wVliQNomgqoUhxc4lPFr1KhWvAE q1Z8+H0Pd+uYzNTOUJWhhH1pLpinOu7V+AhtXWEhe0QXpoBELlCiqB5lMamTfg6j hY6wJV+pAoGBAP6WFITgdZHTrOtOMiflKW14kyuEXcPmUo3V6L+esH6r85JRAspb ceJulRsf/KlTZzh3wRRUb7xTNE/S8/w2WSoVuMbsmY3hs96oXByAhHS9SSMaQ8ms 2+SjxpSerPr6qGOxg9bzm0s2z3b+ZcgJrZ+bKtrKPvacpZItKO/BbW7jAoGBANUp zbhCcOzbKvNvRWc2BIMFy+x1PzW2ebq2XtyxETnqBVxW+iGbzBdiE/cpPn+P6Tch kiFnuOaul5Q0N+KzIa1q8MtwTKPPZcQQc3Rv4xw96tldja3ZCnOo5WlW2UuJgacK XXtQ2KQegTj15dytPhR+41v4GksjFnI5gPvb7SAlAoGBAPjHW+HFHd6UxQNj9Gs7 6tHI47fAr4gBiGaFw92Mitgd2/T9KQbpeU5V1WseRN6KW/G4RHtDT7Tucc4XTMkH qvYPJ/NrvVoCVqycRPatN8KEPfYJcnifbHnu+Ny+ejb/vpE9JKJmhzhmpTGYw4lI u9ud27DVtdVzmfBQJRK1J+UVAoGAFw+Is/BsKxOi1+cnyPytDEeqQhCFIBh3nt1v 8cwuIufQYKcANHaYY8c2hbyuiDpXbqFxH7AK7tngiCYGDb53XD1/g2LIx8f+KHHn K6eXGE0ShSV72FzspoqVFwpQQ73CiwGyD081wLuUG0du8KrFVo5Lpn12yr4nBYB3 Fcg7JQkCgYBLRw82I1NXVnqODF47PHuAuyNKY/ZT76zRY7UuVpraXrqY3Vc7j6kz 0ZrV5NxAxbZMpJVGEfc6B8YIQz3np3P5s5ME4+bbIzOBQcmIJXLWeMq+oZhTBcTO u300qymEVtlVqhWGtHlFbxSPtV+d1BFCptUShuE5BpvqUiyRIZHokA== -----END RSA PRIVATE KEY----- """ SSL_TEST_FARMER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUbgDpFoeaeAbCjZcmf9YI/M3IB1IwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyM1oYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC4vhXYgLWi/5xCrTP3efRW65MPn/vzynsCul7dya5vmTiO BZV2BkzUBRfZygARIUy7z9VsX22c4I/xRtJUkjAtDaSw02bnlL0BZSjZg8DYWjZO woO++FNweJ2SxvaPQypDCyRQuiIMGBcsqMX89owC2y0cQtYbB8kA90WXNeaSXXzB WTpPd0pRDx+VOs60hGIfH5y6S/MkgDPHLkXYCGMqRK0vBbKr9yWq7YNkFmgGd6oV qAspX0ykx3KOiubBO9WV9pw6Tn6Bzm+5yD2E4p+wmR6r25MEHExB8mzULoD3wQWE 1xRQDZ2dF9dr0CXSnDlOpCf3LcHX0z1NJzG93/M/AgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQC7rOkhmH/14hXD8dFxw7fv MBE07KvCbbYxoupD3pUIHO27Nuwy1ZtcppHB1yLztFVy1gk4u5HfRPkliVrsUlCy IQ6JiWl11TU9vPQHU6ZxAVYrmS4UhxKjOVQWJ9ZXHcQWamNZS31uCfEpG1AvLcQp rP441aWGVl9pn4DvYCcrGA9iOIh4t4+IP9KdcehXwf5aIip6j7FR7lRgoS65xx18 aekW99yqzJtyqtx+UCn64a9lGFlCvzdUvh1N8qtv5O1FGC0u5erCkTpdR4mwbljh Wl7fa/81yeoV1PM6sHrp3mEK1qY5yElHIEKlsoJvnoy0GRJXY+bhfEcZVEDvl9rW -----END CERTIFICATE----- """ SSL_TEST_FARMER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEAuL4V2IC1ov+cQq0z93n0VuuTD5/788p7Arpe3cmub5k4jgWV dgZM1AUX2coAESFMu8/VbF9tnOCP8UbSVJIwLQ2ksNNm55S9AWUo2YPA2Fo2TsKD vvhTcHidksb2j0MqQwskULoiDBgXLKjF/PaMAtstHELWGwfJAPdFlzXmkl18wVk6 T3dKUQ8flTrOtIRiHx+cukvzJIAzxy5F2AhjKkStLwWyq/clqu2DZBZoBneqFagL KV9MpMdyjormwTvVlfacOk5+gc5vucg9hOKfsJkeq9uTBBxMQfJs1C6A98EFhNcU UA2dnRfXa9Al0pw5TqQn9y3B19M9TScxvd/zPwIDAQABAoIBAQCzrr4Uq2r+tFpJ R6jppMYP3GRWqCYoAeIOzzIByW1NwdsN10R9XLdQ5/tAqoXSI288pHJSS6aTFJ8r 7tQXyW/uAf0Styq5RyNlvfwzQ0BHrcZwaCQ3k9Oj6sxnu/iHcq4iMy4JDmCbHrs7 hpO67BlVldOUTzVraPEJbXdUEOrHo1fMtWwb78sIYYTItX8a/rP5wuJs1EaQiVHR Db/NoGpJX9fdriLweRgi7pvdRo2So1ZoC/95fQNFstx8KdMXTj8QKHnXV5LOndMq 5X8EmtACBU/Bjcrjij0YAh1g44NRQN4jmGWEJZjLdTsyoE5tI7rsCt1QGqPs7gWT 7JX0rNghAoGBAPWfjVQkn0ZTer7672frYhATzHypX9wW+SvUMS3id4hqKjch9Q2w Z+t0lrpKSOtKghNBzrFms8CPhuAy417BmmuA6HRFaqp3Ac0uAyA1NN8QaPNeHf1/ +Uub1uNdaN8pA4W8qKvRMb7dVJQ2gjbcr/ALpwQx9T3M9Xxy9hCyoGkpAoGBAMCM GaIYczaeMV+jTkUSYdISC1rttJjFxEKuMWvNwajapl05kHw/fTt/UXcEsy+SBMQk ArQHx1w7NGbkBNaffE+zyPcUjlKwHoix45Tnqwj4VIha9rNVxPDZIeas+pzhcmgo KHWy1wflDIgBkeIWQr8Y/QWWvt+Qq3oD1MPlOD4nAoGAScL1bTxmPHdbWDkBZkLQ uyVG9nTi3bRkdZ4OesoUvXmsXcwrzEWan6HuldkzFr3UXDYZ/TprZrtzdKazk0Qu vHQE2s3x32lHuDdGJwjzbL1/1v3/oZ4p3mPZX4QwtzuY3DOwr5BuEPRkrvHDnvgd Ocg2CtN542pGmm3nqVILTCkCgYB0X7jWaaSo7C+3OAKEaLnKt7E5QdYXR+B41MN1 /qP/pDdMvRAAqHbOUQMxxhtusvhCe+lOWi06J2ZikYoDFd2SZn0eKMRkYaHyyGFe jC6pez3MM/5LIZmoX/PHceD+lJwLK8pYaMDiOqO6SAid9wpcaYPzrsqqYMvjMRGV XKMDnQKBgQDdmgTf1Ga4rBBXlc01bhQCz+TVD5eoKG2jy04eMxX94CagK4r2YFeh DnF5ARyYEZBE3GZfXRVR9qyW4YxWzW3k+nloAE3WqKbWYbmLqjZdKd+ppAhXpgfG 7FPIfDJX2VcARnCR0CkxXF6f/6eNKg0lKfkuEA5q83Cp9HQCVXj+3Q== -----END RSA PRIVATE KEY----- """ SSL_TEST_FARMER_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUcSw+1Ww+zDNNx/vNquiiebp0nRAwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyM1oYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCj34tYd0hFq2vNzARK5oT3ZU9MX0GNLidDDBPpDkXEYZnR yVqdLe61OWuU1dY7Imdoc72HCDQLEd3bV2dux2jE3ktHP0zELRIucyhBJvx5zl68 ZO004prWYH84O1GlTHsz/OQZeTyN8detpOgEmjZYJnPOWoMW063r5YAxfZ5BRdlx MTmnJjLIxX2q60RjoVZXNtl5DOOxnYdGX6w5L6KXMr/A/65AePP1RYW6ugkQwcKA +PsAbDz9T7qDmgu9gHcDtGUg30ua6kLgHPx3ZrL5RI9KxfP9l/r3TEXg1XhlVyv9 ogb12SQHitHR9HFcs2y1CraEw7HGTTfn1wqbqtzFAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQB4Z7WQTY5irFfCZzVsLjpa ntAiAe/EdaGbx/12Hy07efLQ29D7eMWOvjjlDUjAZFDefH6SPB3bZXY5rhY1qHnC 7l3Fut2SqToPy4/8m895GNOtvPJQJgw3nUijKA4k+tSdN9XZz39sDYGKzHPMuAk4 D0S6MWIrT00zEUMJMUoFfCF7W1II5phrlAZTczdEiXo3fn6nSgsDXGgZS6Y4QXh/ 5HCPCuI/F1qZWK3eVdrrQaB7u2LLo3+qfku7unZ7+/EgomRL27pMukrL/N2kGU0U 7P8mpcs7j+Sn9POI9h2fSbB4IElbHP1AM/mTfLc38bKQNt1bnXzMKfhnOWHshBrm -----END CERTIFICATE----- """ SSL_TEST_FARMER_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEAo9+LWHdIRatrzcwESuaE92VPTF9BjS4nQwwT6Q5FxGGZ0cla nS3utTlrlNXWOyJnaHO9hwg0CxHd21dnbsdoxN5LRz9MxC0SLnMoQSb8ec5evGTt NOKa1mB/ODtRpUx7M/zkGXk8jfHXraToBJo2WCZzzlqDFtOt6+WAMX2eQUXZcTE5 pyYyyMV9qutEY6FWVzbZeQzjsZ2HRl+sOS+ilzK/wP+uQHjz9UWFuroJEMHCgPj7 AGw8/U+6g5oLvYB3A7RlIN9LmupC4Bz8d2ay+USPSsXz/Zf690xF4NV4ZVcr/aIG 9dkkB4rR0fRxXLNstQq2hMOxxk0359cKm6rcxQIDAQABAoIBAQCFaZo9hKcPKVcT 7bPU8sVv0Ef16lsowFlwiWWwSFFeZwNeuuoNqvZ7Deta+Zh2/jRn4kp7o58TIBGZ 4BeyJaBTHpL0x0ENOZBixpgQKthDplKUWCqR8qaSP29zbT+0LobjNVDSuFQnT6wC j43hKVdy/qMrbZ7pt54Rvf9Wy2lKw3CSLuN9nijyzRdI3Y7Qgp7j5mbYTodagBEw rZUNxZgZ1Drtl1cGOpFzDhYfIgOBgBTMcfDJh7QHgrGNBEqdOTngBN8TcrK0jGT6 4Tzxra7yhmyJmCa5nzk/I3ZZ3DMdVG70I9earH/MukI1rH4BmLLKFjy7XGWRs13c EKe46T3hAoGBAM+RSuQbNZBY6QTQ5b0ppG8C1b+LT1+UOFlWnywNNgB3yc51zTcn TNF+YkNRb0q3VDcdYWxzMrU0F/30UEPqx3QguXZ4YYmAAlE4G9j3OlbX59CAEmnp +aWRq9sAxdzzQ+vGn7iTWkDPdgf8jsSm0BYP/NdKk57wS8j1+PPc2GG5AoGBAMoc Phx8XMUwfkCZeWNnaLHZGMbVJz4lC82GlaaLfdqR2fitxZSB9YAyNe3SE3FlThi8 sW1D7CxuGqQRKtql8XlpZhik9gGYtd+vricF2UiO3c2OKTg5FPiHanh8WtYCER6A QwdATKjIUyE5wS9Cnv96xg0DISlcwliOFbV4x8ltAoGBALMqDYPRvK1pIVGn4vYh 0K6FuuzIGe49aVor+96xVJCY1VfhtQ5LXPJjbfv/edn7XrToJmTPFtD0M1VgojvN lvY1HQEWrdJa7SUgEmF4HSJC4PTG554GeReiIr4575BlZpZIbyuJ/Vh9+rqwFKfH +Uth53QKClwhvLitIIOWeCv5AoGAedR2eFNa1J67rBMXgh0mlfZIoiqA4kwQhk53 TRJOxf8fRnDxZejE5QbfTUFR6Qvo/K5ZwYStC8c/FeEnVO+s1MP9ACQICsRT9cd/ khRLexprh2oHXNXD12BBhOlpFBHg4eLtBKT00NUYjzGyStu83kHSuqtFRRqeKCVV 3rM0sy0CgYB5QvJ4/TSqWhVodM6DVxSnYzoF77E3t2umW440Hu8grLsDJrA8SBMZ 0WKME6fXcbNm3p4eYZ+2sPiLpVf6w2JlykY+sDa+S1MtBAkgHwJqTIpQDd0egSvs kgCFy+t4irJ+X3Oou+pERFHP/cMiQGAMvstgpz76/4CQdTsAejQsMQ== -----END RSA PRIVATE KEY----- """ SSL_TEST_HARVESTER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUcr5lcnpo87wW1R4tGOd5W3U3m7MwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyM1oYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDFYItZq3rmZTSdcJK7m0sPbVSyexV4mIVkR1JLSYDkRUfC xWqPB2ZY1sc6a+Tns/0qVOEddjfD8j5GrRU1g9VluSnKp2bg9NgQkqTEuyLDPF9C iP1JOQudPSPQTeSwyOk2bQQ4LP/nRZXzZ+NnAEEHTkTD7D6LvFTGrIEShLIqxHdY 5EeFXF3zTpp6LOQYii91joqN6i4BUbbMr6MoRIgVUZeEdmKPHkyaIg2LJ+HiqrNw xc8Yg1ksRBYAKBbPptLsIPXp0T5ja1SUEUkyDaFclzZnAfQhB57+0VuA4/pIJcLV 9p1avjw1PyrHqV48AGB/NqWA/+4kXEkZ+DrrY1D7AgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBIvNub05nXZoxHcysNf39o DudZ8wmn1urJpYQQUhFfZ7eGyTTgNiEI9Mz+kVK9f+BR6ylw5yDGpIC2BY2uDdR3 r+y6bs2loQzfIMWAOEsx86zMG1XmYj8zQ7pjZ/AOInu/Cy/w6AwNIt7U3B8+nZEA qPatVOMPh0yWJ3CGjY3lP9mjhREyUBwBsUOq813JYXLsq/euFm5HPVptYf70Ms2Q 3qkSmyZFozJbW2/wqsb083kJ3djkVliqSDVQ2TnQCi8PT/9uE8LfMTrnWbVZlTO3 hxByAQAco0fiTQ7BN74FuhzqBLBadcnQ6HnWe87E/0OI9co3+vJR1H6xHSebJ9pu -----END CERTIFICATE----- """ SSL_TEST_HARVESTER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEAxWCLWat65mU0nXCSu5tLD21UsnsVeJiFZEdSS0mA5EVHwsVq jwdmWNbHOmvk57P9KlThHXY3w/I+Rq0VNYPVZbkpyqdm4PTYEJKkxLsiwzxfQoj9 STkLnT0j0E3ksMjpNm0EOCz/50WV82fjZwBBB05Ew+w+i7xUxqyBEoSyKsR3WORH hVxd806aeizkGIovdY6KjeouAVG2zK+jKESIFVGXhHZijx5MmiINiyfh4qqzcMXP GINZLEQWACgWz6bS7CD16dE+Y2tUlBFJMg2hXJc2ZwH0IQee/tFbgOP6SCXC1fad Wr48NT8qx6lePABgfzalgP/uJFxJGfg662NQ+wIDAQABAoIBAE67ShrEukt5B1nd 88n+EhzfQa/IRTJLtLnhcUQy18U2lX9t/Cl9jCfX1LTLIQ4Dz/K41OtJosj4sjrD A/jK0662A6Ogzvrg7+b8d9k5xI4YYO9Lca1poeZg4w5OY/DY054wMkSuPo3kRgJH 6H/HrCjb4bY9YF2hDDgLy5i1cdR4wsWlVCV2NkLQSYifPQxGHY4jcDGbyUNhY0wZ Nene3YvzbYLaJJtISX29K/k6Pfatteu8gu0AqzxNLJa51gPyrNFjmlj4hLhtR/Ty 75T6lIAciLkW0nswCb3ZgRh9xGgASyK9rqtrEVqW+mG4TCVd45aK1s83EBxs3RFO RcZzmnECgYEA4SaQpH0F3WU7aQMBw6T+jQrSwJnNlES2ugyDSrLX7Exu1tVgrz4y HzArBg1xHyKnHQmaLrlMPowcDhCtBO+YC+j+gGak9UbaeJbR4vcVuv2gHDQ1Wqd1 wvxoV1FnCNNta/TwKKoQfEZasTEq294i9krbpWh8sqR61dEsKDAV/OcCgYEA4GvK Az9jh3VkXv4Vlgvoc3fnnhx/NEXzd51TcBFp81zD3zH1GJ37bUMK2jm2JFW1PYK0 AyVEJUA+MWEISt7lOrjI1s6HZk3Xsh0Qqdv/WPA9OrG3eJxPH4Bo/M1HWVG72oWD tbjoOViXYKYd212hKTdUCMqGaW6i0kWIajFUVM0CgYBw2TOGPmPCJAszBx7LQNeV OeeIQY6Y0hgECGGF/z3aYjTr2Ocs7q+QkkP+NJ6OTIAWPcnZwWZFs1QceJ8/6hb7 YTyufsQPbAP0jSOF7vIlVxn5CPH1DhooMPrbSSGres1NXudAenzozRqH1Wz15tD/ QWX18fkOUQKASOco/XEH4QKBgByDtZQ6DqRcdxdWw1lgQ/W/6278gfEbXjb5h2t6 2vJv+/c0+sZY9GRKm2tk3864ESIypDquFn2BLyXJBWu17HxMlEAu16dZBqn75W0f pc8gHzeA8yXg/nCrOSu9zW3845h9VGHXj7IRnpJKKQsBV4PMIuJHEVL+GrQK361W fTeVAoGASnt6kmfgDED1kdDZGRMgb0GvyAVObjLRBu9eRX8nQEKKpFydBmdDM1+Q coUvrLhjqLb81znytV8Erb2Luq1xzlnZrWK3uXuPJW7T/m+DL+Oa2+e8pgRq2/Xi QJbqzpOmiuAeJzdT9us1UALoXHxdzAw/oSC9Xq3j66O1vArAm9A= -----END RSA PRIVATE KEY----- """ SSL_TEST_TIMELORD_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUPDgBpxOAo73yMiUGMFNbK0SvFvwwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyM1oYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDDT7pUEKAS2A96fkLb1IfDbHZCpOTUgKk7+uNQXTKarZv0 yys2/K/StPGJ3+mFlN1+dqubVHUILhPUpfFNHH3zintDsCjwu1GPKRuqgPla9ZAb zBft+KKm2CewqvVotYOcfIAUqZMmfWuyxZFL/ITJqnJKHqYU3yO8pNO3k9c9tKVe AVLlarcHJitjSkKz+s+3XRJYC/x6BsguRiNGSPVPAM/jV9PGhaQqlhWtQT0/kcEs MRICpIPiPd01bX9NWbSoEbCVN2mBBxPi7fV4V2Y+xkdjj0QtkLmJJTnatNNK9UjK 5npRqHyw1ogyguno10Jx6e5vd+3hWiJlBOzpqiT1AgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQB5xd/q0Z5SfPECusnXmAwF X48KLYhjc1/483R1gz2Vy1XNPWzDDs9I8MWD02BWr0dMMuhV6iPFmmQcJ76ejJD0 NMtBpjDFfCknFuMavbog9ikPEXhL3EtzXP3jC+xsdvYwi35hkBgGs5hnAkheKklp cjRurmsBAHJBlEsUc2C6kxq8FXcLM+WzJJYOitzE+fpyxrmeOIfpUd8Vwiu90Ta0 /w1mGD5vlXBTiFCwLEc2fVR7OPm3QxKvJ+eUdLTh+X4VgJ5vvdiqCodgAeqDZw/Z x4hOnAEktgEqadUz5t7fJzxuWWpNTL8OQLJgW1cE/Kt/P8F9IQ5rC7PS+XU+Ds7U -----END CERTIFICATE----- """ SSL_TEST_TIMELORD_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAw0+6VBCgEtgPen5C29SHw2x2QqTk1ICpO/rjUF0ymq2b9Msr Nvyv0rTxid/phZTdfnarm1R1CC4T1KXxTRx984p7Q7Ao8LtRjykbqoD5WvWQG8wX 7fiiptgnsKr1aLWDnHyAFKmTJn1rssWRS/yEyapySh6mFN8jvKTTt5PXPbSlXgFS 5Wq3ByYrY0pCs/rPt10SWAv8egbILkYjRkj1TwDP41fTxoWkKpYVrUE9P5HBLDES AqSD4j3dNW1/TVm0qBGwlTdpgQcT4u31eFdmPsZHY49ELZC5iSU52rTTSvVIyuZ6 Uah8sNaIMoLp6NdCcenub3ft4VoiZQTs6aok9QIDAQABAoIBAQCO9vlJN7I0mPsb ividuYB3SBl4xwLJmjRGt2tVFCNKnfIeyekkIusArXpwlfp10XYgb/VFihjwl+nk KmPrMgPwFVoNPhF5xWP6Cvk5YZclQcLu1gJeKzXEM006QKnKr7NbBLcsaMRR1FTV U1D78iexBpcKMk0X0g5ys6RWKF3Rx/PqdcDnH71hlZFKUVaKVeXvPdAF+Jo2D7Rv a3PktRMjB1c3JtVI5wGvvkIs50n2pZsIkh88qhwZRurvJiY/mUSyi2CgnIkLJLQO kziMr8gOPOmRzy1sDY3fUYaoI3cnQ2va0zqLg8GkQDfLg3UbirFYXchaRPkoYRSw fPGpnXsBAoGBAPvFlKjzh4Anob4CgYNgKnZHTeDHEY5iGQECbcFWnv9TJ/PapRUC MOPjW8c/SxZdz8neBt+pyl57nVrwvOWO4Q6ccJr1a+1a6Lc/BxL+wUw6fCxjfQN6 s3VLKkrALxgmbWjhAOACDOs9Uj4O1lhLxbhPStaSAMh7nc7OAOubi20FAoGBAMaX aYz+zF8lQnQUzO0zg+4VbS7bR5KfjLoMXF4B+TJ/n21oJUjKSPRTcBZmvSSxu2Hv 8Dj4guxTVezxis+h/6NFf0xrPD7zxqKNMZ71bszR0qfNzEkMix4inj10gUCPhgA9 k8buLFm3pIAJ9NeiEIKgZT4H9TItItLCfQC8i9sxAoGAX69Ah1E+XwMw4jC7nf1P RfJlc5bUYkN/8zVEFyVfefPVjES9VpWllQZUXA3+8HoovTSHcjtqMKxUKjqx36CE gfQMi6fYI7XYGcR3YM23EsxrYsdQvKDGUT6GzS/q9gesrx5MIdZFqKV+ex1Scu4h L6Ha9F86svbgC7eY+/H6dC0CgYAODRaFyF1zefJqvjIFsnhqNw/jmdZFlI5jd45t hFw6a3c/SXgh31YsG1855okJeJ3WfyCTF1pEGF1jB3AX4tFwnvEz2f6IQb1TMQRK x/jP+ySZhOEoZf/N4QsrM/wVMlJ739992so+itTTzmCJhUj/xROEwRFjPHhTSzmG /NA0cQKBgEE19gpbOu7f+6/mBWrS6AR7eGjZ7M2wRap7Eoh9M2VV/ou3tV8Z4bHW qcLBFa2HW3E/Qgh2jz2q+aWrRKlbJfzH/EtoQpwkUeKaDnONK5O6V/kR1VNBnUrB 0+C+ngvuEff4uTk3zmaCc+a04HXWXhuzSuG9LA4V7twmgNo9AlSs -----END RSA PRIVATE KEY----- """ SSL_TEST_TIMELORD_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUIDNyJc/WIgjFdIWtYp9/dZyhDFwwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyNFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC/em2gGo4JEdff7eRAMG3two7JlNvEzuTn95dcxWo3Pydz OJ83gPrGCM93zBvxsCOppyER+c34D9toxAvu5N7S/68eGOPlvbqS1aUJtMRXIoGg ghIlz1w97VOmQ2DS4PZX1Yw+563ah0T/kmKvrJ6Ti8MOqvJ28GNnDObBP1hSfezu /iRbiaGJUF0wRULFaPX8uNnOT8oxDXzsyBRKmZLN/O3bwbpX3hzIK2D7BBpqUza0 AuO4/zemr3J21QFu4rD/Wbd5/zX4uxSOAIXbT2haDT5KZEUYQv2jXbHY6+tzpMRC v+Bb3yAeFGt6K44fzqi0fj1pzoHZQ7pgqKwRKA0tAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBuL8MMR6mTzcL/0OOWVnQ1 phT2S9L1l6VmsZYK0/+kUNRphtglqiUg8TuHDUvXY6Bq5r+NY9De6ZhJMhsVYt5A XRkBjEwIPLC5+JZi8iv9uip5qyqsfrt706zGz1NfVIk6pS97Nssj4d2WkdB8BrD9 fnngf6tnQJX4K7fhE/NWcE6YMSBA4GG/JvpH9ouJx4aN77zF6PKyX+iO3GDHXqNH BAdEbHgr4pUPZuUg6c2x4T20NKnMNkx7C3Tx7tp2w49VamUwnwvm7vuzjajd2st0 q2O+l3iNwRuvzL+KaDhqexf3shDSCxuYSaInne2XmCiJjVW7QRfQmyA1LiUk/vfP -----END CERTIFICATE----- """ SSL_TEST_TIMELORD_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAv3ptoBqOCRHX3+3kQDBt7cKOyZTbxM7k5/eXXMVqNz8nczif N4D6xgjPd8wb8bAjqachEfnN+A/baMQL7uTe0v+vHhjj5b26ktWlCbTEVyKBoIIS Jc9cPe1TpkNg0uD2V9WMPuet2odE/5Jir6yek4vDDqrydvBjZwzmwT9YUn3s7v4k W4mhiVBdMEVCxWj1/LjZzk/KMQ187MgUSpmSzfzt28G6V94cyCtg+wQaalM2tALj uP83pq9ydtUBbuKw/1m3ef81+LsUjgCF209oWg0+SmRFGEL9o12x2Ovrc6TEQr/g W98gHhRreiuOH86otH49ac6B2UO6YKisESgNLQIDAQABAoIBAB8r4h7XU9ocIoWc 57SfbbXwH2inqCNg/xjYULbUmJcH2/dA94KEp86Hbqb0/nOZFiUvRQ31GdfRVQm4 KK0qay/0WeDPcoJbIb13tFdhKzl4L5wesK+hE0YtlZmSjHeoEdJ4vE0dUEssDEqC 3Tf2JRamAQopQDGmrrf+/K3nDwzWlRr+UcQF6Muw75vBvYVkfkCiImiV8oGlXRJ0 CP8+0XPOmgcSmDcGM/qWxjDNZNoKt5SBx83xMticdUTvUKBIvDmSMj2VxTsMPbcy elEncnbiG//Smz/tU8sggtrwhIv7zCZP02TJBFSNmE+orZFmHXAIBsDfW+27vN8w 75B/ES0CgYEA4d+9mpNDtxcphunjnoegwLDB7OApGY5SACCvt2HXQiWXl9DvPSU5 tAreJdMV6OOTkTwFTGQhOEP0uSd1iDrm0DUvtUjgrPd5JyVAlMyMpc4z8fEoB+jk lDoXOmqnP1t9w/GJB7YX2KI8qWsT/qvNGCa6XNBEFlp0fVzOzLJARr8CgYEA2QRG vBEtTTGi4fe+A8Lhb2izc4YHhMJQBZJceSTxO2hN+BxSzltyf/7QMyC98sUGfOmG bPzISZT9uFdA0ZXZjaoe+boa5HQJf1WxfAUlAOy50eetd+90+TmQ/qFePS23Im9m dXyR0O+eiKhMfMJnkf1s8xQB2Lec9G7AloMlcxMCgYEAsoW6P+/g91bRNZaqluOv hFywCV5qXY6E9SDggNpN3jQECrPSQsunPcvRJKgfiwBD4+hCb8w8DVJ4m9a6KEAV qb4/xNKi8VJvaSciUfkRuQKvP6xQ7V9/OkBnl34wTf0r+7Btk7CyTEB+HZFKLmDv KwWBClZ5WgmIRIUT1emUr9UCgYAJMhYxN+UchULqok3J6QMWbnBUL9S3umgbpFUI yRjztHrBTanwlo1mgQyfbf6+f7zDpD2O9rMh8w9BNWlIuDnMt+2yFUG4dnZEkAQC RlGIFX/WNiPylhH10YukToAoxXwiGGhWCB5BpTWpgsAi9TXgSMXKEwn0/erHrL26 Yvo+QwKBgEI2e6WELLT2ebBK/x9pxj8w0IevV0oHg3Msod20iw1omrkCyge/Tt1+ ABTK7xhmMPLJHD8ZiMl8sjEKTx8PkAZoKdfZV0Qr+BIhMneO3QTLcdZiuIbjb9Mo 3QvOzzxKKksub2JjN/VORKTqMuuSDQLeEBtv+sRGtkTHJrFtnqwo -----END RSA PRIVATE KEY----- """ SSL_TEST_CRAWLER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUMqlg7Aqc99ifdKynHggljrPnQjIwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyNFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDr7NWQ0b8tQSlXzaa41vexl0Zc3WrfF8aw4mEaMcXM6lkO hX5QLZpuTCs0RGwLXVAuqEcbQqA7GIbhq/ch4c9PSkh+yBUOB8SHx3UanMe9sH7S 80rZCX+8HFMVMce5mMEPIRA7WmGRPf7+Fh0yHMAaIsaqDbI5f9DqLdWE+FsrFrdC kp0RYTYQsYEl3YEPJfcYbfrX3I9GxKLSUX1iKsMlyohrFSlw/t2LlG1jeuxd5oLR L79QY35LkCAsofDK/lThovM0qqnescGx4feZsLMCL4rv0td2GWNhA+4UofhTdul0 zRcaDZVrNEhCJk0RNf4wXtidqJN90Sf3dvIjx1qDAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQCWj0tol4kMluTkz+sGjfpU xTnbVkoJhaOVI3tdK5+Z8WkCS/IlFLFoHX1I5CoAtFDUTCrp1tU/5e0BzA2VfLME B3+qgLQF1+Z2Qy+OBTRToUuOSg0n7qSQdG5zIsspKwRl+iobFKaxqw8j218/NKaa +RJTdhRRrmrokiBxpz5AJK1WnLjYe65N/ZdfxHYoBMDtzrkCrPsoZQpHaUf/9K0p v0tv8s4nr2NcAZrQeALoTvR0oJ5QlmRxfHY6xC170dLV9KHJTbV/FXXFmFQL1WkI L74vcnYPvpD8tdY3kD8AXUFoYNb3sjjjmM5QS1pYva9PQUiuHqr8MAqAF4sHvnLF -----END CERTIFICATE----- """ SSL_TEST_CRAWLER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpQIBAAKCAQEA6+zVkNG/LUEpV82muNb3sZdGXN1q3xfGsOJhGjHFzOpZDoV+ UC2abkwrNERsC11QLqhHG0KgOxiG4av3IeHPT0pIfsgVDgfEh8d1GpzHvbB+0vNK 2Ql/vBxTFTHHuZjBDyEQO1phkT3+/hYdMhzAGiLGqg2yOX/Q6i3VhPhbKxa3QpKd EWE2ELGBJd2BDyX3GG3619yPRsSi0lF9YirDJcqIaxUpcP7di5RtY3rsXeaC0S+/ UGN+S5AgLKHwyv5U4aLzNKqp3rHBseH3mbCzAi+K79LXdhljYQPuFKH4U3bpdM0X Gg2VazRIQiZNETX+MF7YnaiTfdEn93byI8dagwIDAQABAoIBADXUNrIxOSZxLKas 9HJOEfvCITrFBkJaoWnwbOlWG+RyP9mRWc2fahHqbR0i02gQZWAP4xF0NSzmnrfU zbE8XVmhAEN1EWC/Ivc76hslVGmSYI1vF0/H3A4mhEpcrk5JbRsvlw2DxKkn9Qsy Ln0llCsibiOUtmpqIFeeF46cP+jneMayLw4CCWoOSDPHcVLcdcD47qfkTJKlG83s AVhALyiTbLSnKLj0tkAeIMiCecQbFQDdp5scemRgaRscQ1dGi1qaX7Zj1LqIxZBL wQ/cqEKOZSx4apzv7U6U8WSZ248jUXTxBM6RxToAnYMITv8T/pDaB6QepvOB1E80 Re7yNuECgYEA+RUVa4So6gYBYoXLFNvgmX/YUDOCM0D2lbNmS2WVZjr6VHu3mGP/ TI6dFnJ94O8Fxssj2Ei4F48isXXT8vag3M3GHSbWzo5cREdWmXUUM2vQisWdjQHM kRBLHOAAxJ0M/3h8uu5jbQeaKiKvB9OU92W7FAPFIUOzJ3UrMFXZ/zMCgYEA8no0 sXyKJovzlhtchIGDtQ5pd+IfsoPz6edd2G0Jp3r00YJPuhpyivb3s2oTc08oEquf dE+OaHNYIGWYwbpg4eDq0Wsfu1xt75/nKSUlmILKltwyq4U5Cxye3P3+ly5/aCzK XRokBgyzuIl6WgSnHD72R4jiCobNhcXcHPdfd3ECgYEAm1rXHVSEtlJAkt64J65s i9D9bihyUN137y8R4nzdjgHDGOaBQH8+QNXCjLmkYaMziyYwmTnh+G/CR8UiCSxi cNW3d38+A18vlTaZgOVRUDEyxRs0hTpWCTSMZNoiIH+EF+NiiIUfZmWTdixj1xHU m+nLoVQoo/LBzx55bZBeg5kCgYEAz6w+6SxjHjSLQarZiFtstGtNhXHT+A7vnwub 4rswo5K5j57uLdRs+fwfljhpxD6tcaAwB2wD6g2wEr8xH+tDAvKh6w62tL+rIKpx T1oTYxXR8XdSpniJrKysm1Wm8VDPqieCgk7bP5stagXFFsgZYCXExOvFvYJLECGw LdbomuECgYEAkiL1w+snhDZaGUfmA41JbMiAp+fWf6dgBfTieY2PLeB2PHOIQR6D M3cX0bxsuFEqvTSer6/8Ocu+q5zAqEh5YxxRPiQ3zdqeYEMPGUWq+CGvtKY6IEN5 0ITdHQVmzbREwX9F5wiYXy0VzjhzMbXdTK8XpYfNm34B1tfTJRg9ZyA= -----END RSA PRIVATE KEY----- """ SSL_TEST_DAEMON_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUO9NYo6D7Fn6nsq5uHYKUMvoi2dwwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyNFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQClBJSKiguayx4ifSydXnEMoDWK+HeUkK/38DBFn/psx0fp joXEUFXWcDba1WH9RtExs7PYD2n4w4BPSQjz6yIh1oNWc2HOpyHl0Kk5pL68yxWp 3jFzAJQHJGgkeRdMH36lUQwEnQ3U8a6YNqd0j5qp24p2qyv9AGARvcrCgp8GeyS5 t6/tedqzzyujUNiOWzwdfCsdKo7Bv6VbPtx18b1EDQylQefSg3yxLXDgZEPlFPkM
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
true
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/ssl_certs_8.py
flax/simulator/ssl_certs_8.py
from __future__ import annotations from typing import Dict, Tuple SSL_TEST_PRIVATE_CA_CRT = b"""-----BEGIN CERTIFICATE----- MIIDKTCCAhGgAwIBAgIUaAgNa9r45P7lGSz9yjEAMmSYuA4wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMB4XDTIyMDczMTAyMDgwOFoXDTMyMDcy ODAyMDgwOFowRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8G A1UECwwYT3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEAnTwel56+tLKkGLedJB0CRNyiCYiWS0sNuoCYpRN6MTnj o5pYCN6rFQvdRvkaBRTodlU4stoEAy7b/v2ny7h00M8iWkVXqiDIB8u1pefEE53G p7ezsPNSf5sX4+1kvm/+TJd4UEeAnSYaN6LWnTbEov18Kb7Xgy9yoGPpnYHmoYme lmnV9rSXmI+nFzLIMWKTFfaGW4icTI3d8m53Teqhj0XiPI9VU7PHjUakAEkybyPM tGJ0f7yq4OG29haDfWicyAKjYm3KxAQwdRUR4AuUWjXhk3flSyEnFsu5aevHd5xJ 88W7sp7UJWw3NDPHIxrehVeo+ZWNiMJWC/Ff1bVMBwIDAQABoxMwETAPBgNVHRMB Af8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQCLXqq05Wp9/J3atNhSo+qoFETF aO2VokcUYonsiXxNqTKruNtTHMSIHZwerwhIPqEA0KGUVR1oyJvvdBu2VAxv8IpC vR4aJAtI8X2UgDYElsDkmahEiCja+1f3+w7AK78HGCzm+5d2kz3p4vQHGkE4N57c g6uZVoouma3LJMpKS9R++Y2JBjg1EfXoleYdh+CPac0AihHMvV64/7tkTt7Wd++O 4pe/yUy7qcZL1b4JKoSb2bKAwDTYMljJ1buLLvBlhjIwqxOiYjnEZJK1MHfEp+sF HPPfgGE01n8iANfXwjob4OY1SB0n7vxz2tCMEBMqAdOt0T7ThGhCVRGILcKH -----END CERTIFICATE----- """ SSL_TEST_PRIVATE_CA_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEAnTwel56+tLKkGLedJB0CRNyiCYiWS0sNuoCYpRN6MTnjo5pY CN6rFQvdRvkaBRTodlU4stoEAy7b/v2ny7h00M8iWkVXqiDIB8u1pefEE53Gp7ez sPNSf5sX4+1kvm/+TJd4UEeAnSYaN6LWnTbEov18Kb7Xgy9yoGPpnYHmoYmelmnV 9rSXmI+nFzLIMWKTFfaGW4icTI3d8m53Teqhj0XiPI9VU7PHjUakAEkybyPMtGJ0 f7yq4OG29haDfWicyAKjYm3KxAQwdRUR4AuUWjXhk3flSyEnFsu5aevHd5xJ88W7 sp7UJWw3NDPHIxrehVeo+ZWNiMJWC/Ff1bVMBwIDAQABAoIBAGI8l5h/VAMtwZy3 y3Qus6Y2ev6d2dj88Xzer4AjpSpwUqt62RnhlN43ZW7cX8dhAsQ8Boqn7+3VLxon fNipTELRx1LDFDx08sT8H2eiYD0pTF6pRZl+zMJxMgHz5gedjTJpSIBPzCljDupH 0PK0rzJuUU77r0aFNIbFJcaEzIWLrVWW2DiRjHrOc6gCW2T8refphTDzjJPP3Hg3 97N7aGW7wbVV0ObRbCKbnQNeWdky1VuFPh5JKa7tKZld4eXHWMTPkm/ooJrJj97F 3OP7d79uUwdKaUR/nzvzH0OOdilz//dS26XnURY+6OoUEZScEMD2Blipnxfn45ar E6ZnvlECgYEAynSTcsc0cy+PYNyEfw2ue0vm1z4f4bqZFv20ISL+VRP69Zv8Mu+0 kHrSOg3nNftLmdc036lAk5Es6edEXcF1J6wd//m2OlLVze8EKWrok4rXXL3Ez6R8 OADnM1Ht/f/+lFtKm4uvAls/kXboW60OcQCO77EXbZAUtfsipuzSh5sCgYEAxtHY s7EVcv9PIsoKzv1Dz7xpAfcal6/tGQiU+W1J7nej9U+WaLK7/HbgzaMieCXJ4Lif 0pyk+vBH5eNYxeQbYVOCjzr7dY/D/o/7zYyhSRd0tgqfAwBbXEaINayrPEtmYa8F YRgzYurF57F8A3V2iwW5KQeSGIJhs9TYaT+LUgUCgYAy6z0Geimr6sNR5kSAvA0t P3rQmfRkzoygZrC+QNHczgipa1Dz8qvkRq/HICYNwqVSDPlkY2o1cybrsVnVhsmT b8ufzMtTQfA6Oio+zH+wVBQ0ZBoy6zi+0SNVGf8UiiUaZRePpYMfwZlsWY65N/5Q 14YbrNuql7lNx9sARsHwjwKBgDcdxW1LEh8nF9EVIZnwK/RSzul0jzKt2pSuBF6B JZWuJQ3EWnX71pFOg1N+fffAwg5CIExKkJHgOo5IUDvL2KtKc08xkrQsfrD7SVra OXwBvKEaoKo8Vxdlli0LCQ1V+bPqyRr5koVBgEuSsEZlMc+oboQpTR7uRheMUdIb g4vhAoGAGVEUwhOaeEWRUwyzBmxRcBJTSijppz5AnX4QqzYfVms3biTsDve9bje7 deI9IEP1RRYMXIX5aSExF9eWQqEr2fvXVzpijQWLzzw6+vDSmUygM1p4UYQdcyPo 12dGJg8QCIW6kcId8cZCMOvyo/U/RH4NtCAFoJqCe63OwHKBTB0= -----END RSA PRIVATE KEY----- """ SSL_TEST_FULLNODE_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUHx4JBOGyU12gOWGuB5dBegczdfcwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgwOFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCqyyHVlhZpFR0rHSfSunLrREk0Q9MJSU/pcsbnmYIBpUZS HHnEStu5B984swApxNmBaPWiW7UaJ2jq8h4NS8Oo2tCasIJF2zWGWgJDEieTEU+d vpJ/Sfu0MZUpu4obbWERXkmVnCyrDx7v+kSsxukSAWF5iAHT3Oqnouc0AwPJCuU7 5MRD9/0xC6GFurSJQndquKcZJ8wGWkC1WNU9C3VwMy4pYLT84Pmu8bh/6uzupVet TDDDNgh0SGqbabk0TCG9kgS41ww3GTRf0sOoJdT6Zb2UYA6SQ7iGmu5ZPZ7bQykC 4zGkna+MtM5WldUilkfGN9rPt6xvCycBpif7nUOLAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBlSm8+WQWNqQ/6XZ6RFxCS Lq3aFKAGGZpX97Y/Q88ZcbJFd+67yORmhCa8mvLYfhIpXXG/IoX4E1PEBohskeah /nPyeaPAklwSjFYKMKbukYUb3j8hQgs0jFh6+mMvLUcf7bQbmD2ZgUgt7xKVPTHG 59KlnZv+cIMlS50JQU6n3oHv0a9+STMU7GZV8RN14INGGX+RD8shO3xWVZB/BzNj sjoud8pSpnBJYLH4uucnTXNjrzM8a+S+uaU0kxCdRY3TE8y6PsqC2XaPQctf9O3J hnFoH9yydMD2leovDedRyENxs05wNlVK+GzUB8/g6++3dqC0Sq4U84yemYh73Pa0 -----END CERTIFICATE----- """ SSL_TEST_FULLNODE_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpQIBAAKCAQEAqssh1ZYWaRUdKx0n0rpy60RJNEPTCUlP6XLG55mCAaVGUhx5 xErbuQffOLMAKcTZgWj1olu1Gido6vIeDUvDqNrQmrCCRds1hloCQxInkxFPnb6S f0n7tDGVKbuKG21hEV5JlZwsqw8e7/pErMbpEgFheYgB09zqp6LnNAMDyQrlO+TE Q/f9MQuhhbq0iUJ3arinGSfMBlpAtVjVPQt1cDMuKWC0/OD5rvG4f+rs7qVXrUww wzYIdEhqm2m5NEwhvZIEuNcMNxk0X9LDqCXU+mW9lGAOkkO4hpruWT2e20MpAuMx pJ2vjLTOVpXVIpZHxjfaz7esbwsnAaYn+51DiwIDAQABAoIBAQCRC6vzQOBNY7H+ 0GbmjpNT/A0TRtptk4Y7Is+LFpITJbI/v5Elw9EwJWBMPbBQyK1TOrkIpkt6J6fx h6c/8Wz79MCd7nLkMpMVQ1GSdlOHkXcE5zhww3rwf/9Gjs9uFYkO//0MArLonxHO CcPS26ZKNUP7uyaaL45UyYMCZ+EKFUOVvYA6EDsLSLcn7O4R4B7FgfLmbymx6FKe P4EU0RA/w8Lv5GfYwmHSrdgfouAJoI/vG5HDUDIb7fWR0kX6gIst4PEKLn5eWGGt xevgiuVUaL1nUHZQKeoLfXcqDTCdRpkmPSF2YTAxcF2ZC58JiPmmA+cXqWrCKmN6 xkOSzpLpAoGBAOD5p/kxe8ckFfV6cwspFt3Q97V5C4vpX9JOE5fmDAaMQdTkLciI 33Z/C/+vHrzcFb/99SbVTzcTT9mJiT3hXvuy0M2nVk2znjAI46y6EgBr9sS5cLUj qcTjeoJVkLjo2DBipp1kp2Z5JCKFb4GGdsRjtM26IZwanINTbLERjkadAoGBAMJY sA81RkQ6lGEXMnUdqxyc3UL/87MjwzhG+w9xi8fOW1a0kBlV1gjKm0Fbbyc07lPy t5zTyjYFp57fzmyz7MllGE8WQHiwEyc7QDNW74RcZhFwmO8KVpXB6ytZzSERbWlg by0UFV3ux5AIlBh/6eduR56B30v01Cwv0JeNgAZHAoGBANy2MQO5dyyki2J8Efdm BUfyZcJEkX5eoyIodPJ1v2CBI2ifvwbYuRqAg54BCM/RvwjPNj410PRAXvsVAm6R 9uRJxq2ruHCcgdmwLuTa2yRMxxiysQ8UgM5nOV46YbP2w3mcnscU42IWAMxZSk6x Qz1icBPQwn5qYRg5tQ12IrXFAoGANc4X8B3vtjQBoF+ruIDePq2vFD2IWrAr/Aiq uTvWVxrqbrbOrjT1bLmrAg0uWMxurw8jhmecNBicr3+GxtGJXLiAYmTmtIMKynG8 9Hm9Fgf+uhVSQdu63PszAG18PQt2HxZzsSc+QyM4XMgDOEUxnMELUvbhu0Ws+A7E 0TB7oUECgYEAhNcqwwzWtHK93YQPVzekpTeGoLgnFhTTx3Wh/sQddJuJeqzWWYqS LDObEYARXNGlGOoJJ9eObYZQ7pMFt9IXDSAtLSDHnh092rC3OgP+brTcUjHYXYEl 8yZ3z5xGm0Jou25wBNoAE8OKFPju+yjOcVf8L0RIsqMIOGOPRTbLQlc= -----END RSA PRIVATE KEY----- """ SSL_TEST_FULLNODE_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUFhaPwCH7jH8uqupV1SQQhWjqr7QwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgwOFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC0T15f3tKXrJr19pL+meyy+AxHrhlOfgID0n5BCn6sYGcg 7OzPjMf7JFBavWzj9WGvufAke4mOCOrQ8XbbeTW6lKDow1mSAQYWe29N0Xuz1SQH xwbFTf83tPzsbDWwxWZdDRG8SmkJ2WigJkG/0PGSlkPm+ttzga7Ehw9E+gUNTYNF wbVj0+2zNVf6VzbQ++vnh4atHRvTcuMIXXJ9kfJPg9HupgykSi1EMum7fTNQQSRK VYAyD/qnb4t7xbmzqIciC6uz26ziwMXLOhiV4zibe2gqoeLJBVboMV8WCWJnhSmA MEXaGgq4cgZ1MhfJdlWa1TB/tCFz7vCHB6o3n5/rAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQC229ik5XvaUZsMoNKWpzPe 7VA5XwAMPImgppwDsQrMlo8cLX7DEUOi0GPHstS8vx6cozRihVhr3YwfUh87MFIb B2WkIy9dXyutI+KMK9dQWSUKaPcavvLvWBvMGN4bkx/93/CVq/lD7aUkoZ0XNulZ Pf1SkL6qFjUYZb7l5xJhFeygYqz1cEdf/0u9FJpZPjyI8kRywTJv6cawDWCL3oeS de1AN/0IWU9ePMiBlFjVjM6dhxP+qobq9WwZkJon3zWHuD5dbegEjS5tmN2g5VYT 1hZaamRbV7aKDLr9Koq42owHByfGYxh1o5pBwnnOdEHB2SMT7djNC1gkDj+PxajW -----END CERTIFICATE----- """ SSL_TEST_FULLNODE_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAtE9eX97Sl6ya9faS/pnssvgMR64ZTn4CA9J+QQp+rGBnIOzs z4zH+yRQWr1s4/Vhr7nwJHuJjgjq0PF223k1upSg6MNZkgEGFntvTdF7s9UkB8cG xU3/N7T87Gw1sMVmXQ0RvEppCdlooCZBv9DxkpZD5vrbc4GuxIcPRPoFDU2DRcG1 Y9PtszVX+lc20Pvr54eGrR0b03LjCF1yfZHyT4PR7qYMpEotRDLpu30zUEEkSlWA Mg/6p2+Le8W5s6iHIgurs9us4sDFyzoYleM4m3toKqHiyQVW6DFfFgliZ4UpgDBF 2hoKuHIGdTIXyXZVmtUwf7Qhc+7whweqN5+f6wIDAQABAoIBAE4TWBA3UgUvTmJX BMuOJzpPwjF/p6GfWowBJ35OZw+JJt7Q+LHeifGrhcfk4jPLWyNWZi/F9og0QEl9 ZTQfxi4mkY54mF5qZxJxHH8byG7USie7/KiO34ZlrmdJa+5Ba9O7BwT7S4RiSbWf GzVN6mzI+FoaIdBgRScAPJJnmKxrO4aISBQ+r6eM/JTdIKvBKH4Juq+rxAMAuVAA PQ0En3MJajiZsU5n2PsqCFIiLvAOQfff8UdBsGcdeOwn2zQg1e2HcEAnVb9p+hIk oJVKx0iySmBaxeP/cuVyuQwHo59u1SjxkJgHH+RRpVGn63BFrZ19Wuejt+VieqXA eatCR2ECgYEA5X90Z5/1enWi+iVNddVArOxY8hMf2QwzjunWSmDbcsEEro2rBuWR qoCWs5HeikptvJtOt96vIa7xcT7gaU/rbeOVUHN964aGlEd/Y+GWHRI8wfJhLzcj Gae4r1eOXs1ZkUFMNxMDR3Zb0eGeilUsB7sRwm/j5PvQ5um4ooN+szkCgYEAySHL oR11lxHwp1G2Qk0s2u07vqUnP27/Ib0x023VU/zoIdO6uJiNG1+cin11AmIi/RuI YwtYaCn3HF7FmgmsAx78CF6XLzGvuX9EQK0N1Byrwi3i3K5S+gAsM42dv5Lb7uwS JDvFH2wlq7cN2bLZr6bnYmXHU9wjvRPfHrEUeEMCgYAOarxQSi8smzk6x58fGN9w PYS06Fim1OpkPvJUR9NhWRjHMmUdEMzezicpbq9xNo3APG1shZOw5QGL4KxOUVPz 2kkl/ataYWAQ7pDlIGXCu8OPV3+dbLRKx0uF0FVERVgsFNMJ3qrlEV1hSPAhtooG jkzmTwsc9mjAKMyNgP8zmQKBgQDEXzyi91JBxwBBPGRIY3Ux4oF8Z17kbgim9kNZ fFjWAYzayg/5/ud2HGmIRWkihJJIsML+gKs2OBLOHjGrbVoGShAkU8YkC8zXvUv0 IYHo4H1JvudKMuFMuTJuuwuTaV1V7iLgQYL6ZOp6tuTM8fPbrYcn6NsuIza5eldT bezgZQKBgDvsa1sqjJlQCSNYSk7P3vDVBIPaWa7RM9B1gwg/v/pmF3BWYxZNbV25 jOqJbmHeqWiyWX148jVLAXouL7Gxw4MglisrrddXaWSUnIJOrySmN42ZODVttvRj u8Kj4nm2cfosy42ar8FAqj0DfTo7GNo5+R8B8lbfO8/gcMi4j5hb -----END RSA PRIVATE KEY----- """ SSL_TEST_WALLET_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUPgSiFTu/c9pvcsiavcITg6l+XbUwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgwOFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC0AXXqjde3+iG4nSDVvntiMpMM+vm7Gg6R8yShZEp1zT/h uov3smxNzKpSAbNA2nPifDIsLI0oVOWgDrZXOi1kXipC98GMjXE0mXItsDojSyih Y78HKIAeJBtBfLkt2JvyoGxZ6TBBgfgemRQiz/b24QKLLIYjFIlH7VFI6XGMb2PT rzB8OqwxnBe9orFnCJkGtYVrSQvcrIUX2Vt6SP+7QVXxgJXmm1SpetNjcmAYQ1Dp QR9leIYRPy91TItvrUUnmP3pC2aJ7RmC7Ts2Fomqed3qnuMEgk1BhTILnZAC4oqb lKMo082HapNoxbGcjBNIsm/Ns85la/DP3V2FdZINAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBjkhqh1RyS9YGL3OOQumPy fYzt81tI9dfBcVDISmDYApgBQ9x2z5/JDZjReQuXacNbVYydJjHL2JEbhQvq5ebd uv56pvNAUwMiM8Ihkos1cgN2QvALBAFYxusFEP02rI5sb9GwW9eSCYDbuJtFsvdN D974kPNL4B2hLkWyO+f2/epxVJ3i4TSf5GwXIjJERIjNa+LKBCLEDq/IJ3sjQrbs KZOiHm/NlgaEoqEIZGDE8J0FfhTUrnXHd31/fWe2iFDcbQkOuUCbpphtr/3iChXV tgkL/OjUF3EID5NlttW4AbIXCwvW+buScK80DLtLEbaxueF7CUooOObsbECh6ZOU -----END CERTIFICATE----- """ SSL_TEST_WALLET_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAtAF16o3Xt/ohuJ0g1b57YjKTDPr5uxoOkfMkoWRKdc0/4bqL 97JsTcyqUgGzQNpz4nwyLCyNKFTloA62VzotZF4qQvfBjI1xNJlyLbA6I0sooWO/ ByiAHiQbQXy5Ldib8qBsWekwQYH4HpkUIs/29uECiyyGIxSJR+1RSOlxjG9j068w fDqsMZwXvaKxZwiZBrWFa0kL3KyFF9lbekj/u0FV8YCV5ptUqXrTY3JgGENQ6UEf ZXiGET8vdUyLb61FJ5j96Qtmie0Zgu07NhaJqnnd6p7jBIJNQYUyC52QAuKKm5Sj KNPNh2qTaMWxnIwTSLJvzbPOZWvwz91dhXWSDQIDAQABAoIBAQCaTuo7oU68q1N/ BEvij8ELpBlFNl0g1KyK1ymepO/j3oiVxCo6s5x+cSXM2SJGRT60eA02qxZy7ZxP Qm1zhy7kbIjEEcm86H+UPLqRihG8sbBp8a0PwNtbe05WLEo+kALX0kgwJ2OztGv0 JvwI/8hRSQC6N/fhWLh6jWlyHJS3clGyqI+SBT50EJGNhL3evIxfQT+dviff3ooe KmO7fkFQbAz3BjIqAyRk8z16qLYgAL9wWy5q17Bvg4oGL38BS38gHA9iAsPYx5LO hf4eSHTvlj5vQQYs9I6piRb9G6YYj8YsWQvvwjB+bBIpwiV5hxuwLNeh6JzJr8Pr L8d/GQmtAoGBANwjGRK1xWJBczvaK3PvYYZ6xwSzHgoGCYQUnQephc3VSy/TEWmQ E+ai6yxvojlV+JzI3Ly+7M3MwIEmx406Kx6vpDUXPSdKleiO1OPeMtOLvVwiJk20 pLpEeIiQWINuVhkbzBdLk9VH09UTKXe7t9q5qloRtDCeNM9hpLnFZmK7AoGBANFU qt3RvKGEOZVyM/2UjJ/29zmUikofCnNCc/hA8Hweilg/LrtCCmteX/8IrDyJZuhX XtYZWfNDIewXn2AcVbvz88jHOW0FhMmWv1diEQkxbVfi8qtB09oXPz+GDp0mVhZy VLyLXGACw3AAPl25BNzbvus4s1tUvUlFHwX4cQXXAoGAO8a8FDyPsLKdG++ORRkH noDQchJBYe9pvhfq3B3IW7BDjmT+IXAiN0qeGZ7mqjMSI2DXr9kYbHng/DEPluXo t5hyOoho7rZuJoxCeu3nV1JmxRHw3MDkyj+1iz/HCUl4z7CgpuK67ftnJkDhzcWH kzk/bN3J1DnhlT6qgFd+CekCgYBvv40/wXm7l8TN3RuYIbc4pjSwjnWMwClqAm26 d6BqAjvEhGZEHStGyijhExYvcwJ2wj2kegAk9w+i47F3M2kpX0AjTQeBBdMvcsRO t9F0YOiIZGU7u3aHFKX1GXGvvwlyDjLiPFth/dercNXaXq0T4lN3atuExCYQeU/o dgqQHQKBgClExHG7vW5XUuRNMYnvsm58V5dIqwNe48JVs9KN19q8R8MdH0Cg4sQ2 yh94hRTezAMgJTm6if6t3nI63xwPshwPnJ3sesh1zc03Onwio+GXijMfLFzr9LeK rZTS1woX8S0JWJ3TelbC7ocstOGbVwGEQFiWjFO+ig028I5wawxH -----END RSA PRIVATE KEY----- """ SSL_TEST_WALLET_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUa6usaYtQvU3SpCXwC1JZ+v6+V+owDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgwOFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCfSnAPjNYAaVYFm8sz9GPz3PytW3pZhdlEp41qyD7JKgdQ znBMLwGHx8k2eT//mKovi7/4ASCrtgoti7k06GIRCM34ltcHBtBhwksJ3nlzvW9b e2r/MzXN9nxNqVFf28Wpp577hngtnhm1Y6Jm7eVZP2C5nrEfOE4wwXkaG1wQn6ED TvIz5G9pF0BkuqCKFajygtyHl5s3GeuysABMOLnj02K8IClStUd2sD3tuXoOhxZ7 dqtmN0HHKgA6GEeq1YNMpPmHAorJ/qgTWXTvAsHvxHIYAOvmOAFDBwj4dKBR3vCz YpO7z/AfkHNJQjVMCZS+TilS8KvEOqrXg0jk8wf7AgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQCYJQ+LL15Qfnbw/Fi45U8Y oBqdURidfgfqYD2z61hIE7MalIKy8zqsIadQc3+3xnIJRF5QrQ8ctpZuWKBjZ7Lx 3c5NOENmNK4eiD/M5Ip9nA7XyyxLWkNIgpGLvJGmjTsH5XJBQjnUhxWP+hvapcox t0uhkXafa7iQ2PCZfhAkdS+4rKl5aC2+gNPNN9unbTyrI3pUKv+kfWiV1rW66gdh QMY98qQwlDA5FP+3Sldln9XbVUwZipEoBB6U4TwMye6ZuCvHUhi7eE037kN/RRWr vvQxYJQy+J/dMVfCZ+DGdBMp6Hdf/uH+C7Dh9hFK7txq6LvU8sRCJT7CM+WSNNmB -----END CERTIFICATE----- """ SSL_TEST_WALLET_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAn0pwD4zWAGlWBZvLM/Rj89z8rVt6WYXZRKeNasg+ySoHUM5w TC8Bh8fJNnk//5iqL4u/+AEgq7YKLYu5NOhiEQjN+JbXBwbQYcJLCd55c71vW3tq /zM1zfZ8TalRX9vFqaee+4Z4LZ4ZtWOiZu3lWT9guZ6xHzhOMMF5GhtcEJ+hA07y M+RvaRdAZLqgihWo8oLch5ebNxnrsrAATDi549NivCApUrVHdrA97bl6DocWe3ar ZjdBxyoAOhhHqtWDTKT5hwKKyf6oE1l07wLB78RyGADr5jgBQwcI+HSgUd7ws2KT u8/wH5BzSUI1TAmUvk4pUvCrxDqq14NI5PMH+wIDAQABAoIBACgVp1WCb2fzGf6X Ue9lFLINbliBqKxWjnJEZ8XzVjlxJh4jlQbW3V+52tymboB3fnwwgsJ6JiqPyMfl XVn/EI6Q1KQ18S6HfHDdX9y/63hAt4Eh8a7+yA9oc6dncF7bA0bKM6vADwYLvxRy Wi/ktc5bsI+Fa7UbijGivkLfl69m1o9jKScb/Kiba1JjoqSRpaNnqpmDseAg7Pjc xF0CSUi6+7vlJ0+h+S7QIRHNLfIfHL+Zf7wZVOWxXK3kRBolOUSoyEwOw4qeb08t NKpTKF/fG0ZiN9IZb0EmsCm3lwTDlZ3ldutBJtydvAyHLKKyNDjMRit547vYTQxR n58ZacECgYEAytCnPTFDldiOCFg6oW/vHKBRpU/KjQGIdfvQnfhH8FoFaUHyq7Pt g9SCYAYRNoOaPEgxApVWJ/9a24MO1s938gnstREc2snUbNUJE7BSbN69/XEUTA1Y 1/P7begrDug1gSu/N5lSmlq0y7KAFz6wJ4H1jvYK9DM2rr2zYiVw0IMCgYEAyQ/r cI0Sqm2zsKm616vfe2qC9UJiBUVbnC7OCrC5nXgaxgV+14Pv7JnmlqgqaO6gX8cD W10wEItMOCk0/2E2ZbSvvwO6GyXSxxvYfDMUoQS9Q5PG9pU8RsMAKR7x0opX36SG Se5VEUFnGZ1KM8E+fwJYfqye8ic2Y3jkw8egYSkCgYAfA8VvYCc7tQATWpqssVdZ g1K4+vi4k3FwyW9fmOY3ZSzKqeEYTM2XiVneoU7kjT961HdaM8gXGb+lLeeJBfUL uGTQU6ub8Z1gfzuCHUadi3p2VWKLNsdNTuw2JHjhMLVt6Wi2ceXl4NUhCUz5QQbj I8aPdCS8r1A/bJcP/TXBTQKBgQDAthiE/UI5xgHnvxcNpngCk7lHmEPZJ3xB+36T MoYGD1siF5xWtufckDo6hp53ith+VIK8LFpoUQtR/PUGHcgEvaWBYPIdGSionODn UhJgruk0/0xBhhKLBFaAE1/W27CT896et+gjLNvD6kV3y626EKZ/a7bBBKKVvwcN O6ZV2QKBgGbB2TsEWuO+FRS0eQzxx1+NsHY1jCkeSEadYZGMKMTAvro5TAkiegZ0 ta2ECvu/eTPrJ/vZFVXxL9bTLn/rGleKChvarYY8W/jLKkMimAhdVqjOo7pu3aQ+ O3LoYNPP7Wgx0+sisxU609LCSwd7aDlf+O+1tt0+iNEgb65K7ooB -----END RSA PRIVATE KEY----- """ SSL_TEST_FARMER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUNoDaXQ+0Go9hQxTxGLs0B7vxTDQwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgwOFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCwHxpAJMp1U0WJHLmyRi9bii71RoGv1NjkH+PuRZxigaFB VMsjZndD+Is3DdYDWvPD/yQbe+pA0Ne/h9gLA+JAyRClPAhvx0hl20OQ/5AQDHkO fFcgSyZsnIqqkzprHNHwEu+wJahTHNuRJb9iesNxDqXpV3Ve11wJf2Sh9o807a24 2zTMb40CxdhF47Y2ZypDO6c7DbS/WJmEdTihCh4T+kgqSscXHlGAGlq9M8Vl9Mtd uDxNzybWV37wHY0XNaHyJSmwlwznVE5Xz7BCjtyL2/Tw2Cp62mil4RvyHv3An3N+ lgC45Mo35mWX84VcBxqXfyNTGtw6oQ2SWllbGjUNAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQA9A7G1S48zTgsU7elNwxTm ctADVimn5RWpVSHWJnRXCM7XQjzqvZ6LDyQGZAks8bE6cX1yHjJU+bJYJ2foYk3k cVE0Xqozc9c2a54REY301NnHZB9ks8ptXjf4JZrifqStALW+wotqWIo1OSzcgMYJ vaP4cUo4Tx29eYCq51jsqW331gY2ZqClzMn6DbhRJVQBH7avnTTbWWShnZ4sZxM1 un7BkM/d3t2ehx3FFBdoMSTCcXa/TolLO4DlCH4b9dojvW4HN42RrTcruwMx6m3/ KgcTOMtluX0W/Ti8H+SqCghru8FK/6HkE3EViCvYnHsr4AyEVXGzk+owTXfJq6vB -----END CERTIFICATE----- """ SSL_TEST_FARMER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAsB8aQCTKdVNFiRy5skYvW4ou9UaBr9TY5B/j7kWcYoGhQVTL I2Z3Q/iLNw3WA1rzw/8kG3vqQNDXv4fYCwPiQMkQpTwIb8dIZdtDkP+QEAx5DnxX IEsmbJyKqpM6axzR8BLvsCWoUxzbkSW/YnrDcQ6l6Vd1XtdcCX9kofaPNO2tuNs0 zG+NAsXYReO2NmcqQzunOw20v1iZhHU4oQoeE/pIKkrHFx5RgBpavTPFZfTLXbg8 Tc8m1ld+8B2NFzWh8iUpsJcM51ROV8+wQo7ci9v08NgqetpopeEb8h79wJ9zfpYA uOTKN+Zll/OFXAcal38jUxrcOqENklpZWxo1DQIDAQABAoIBAFQliBU9fr2vm3l3 EAHtJpNF4kmt9ihcOYRE+FHPUHiAFttv995iBnmjNmCHa8kOm4j5TfcTrUhqf6oy 7TXWFTN+3UUU+bLuM9j2ecG9WMdSLkSNg9MaFLGv2VDGJxMmIefiJEK0u0d6ci1X K6mRne9WYE6sSpeVrZOcGiiH9MQEQCEvLcG9RnGoEPdkOfMDcM+I14GwR3vkI7JG mq4BsWP8Min6Exg3dS2gHnHThdkFG4Gdl/0fIM84dXsOzN0BRwNWVJc55V+pqsnB 5BA3ZGgOWQxzB2Y1JWYoFJekRBjAbkFDfRVipkMb4eJa5MsT24z5d2c2Vk9ktXR6 AJtgJAECgYEA1vkJCHs+rOnL0/qFxbp9HCW1na7W3XSrFNYJd7ML6Cm0/Oj3aWeL /PJDa3fE2OkxmM2gFEFPuVZS0hIlEfPQ4pP+8X3CfcQCmZOo5G3UNz0fo5+Cp5mW cVGNa+rt1WPfHE8UlBK7xHqUqWAw41S6CdZL6zXmsJ/mHpZKbuNX6Z0CgYEA0bvm +x/I0AQwi0wb/7rbPffmx+ywrubnVzypISuBKKgZa+hnZ3pgHp4l2MFtbA7KWu3Q ABA7rwz1VO6t++RbbU+FH+MtihbE3dA2pHBu3hWtydap/BFNSiwOqVvi1fmO94w8 wumpYpG9vtk1jwMLV+jtEWNWdqTX7yvQKy0PFjECgYBFHdagqndxQs4s/nwqIZZ+ CUXGR+N/WjZzQYnTuXZXk6lEM2bwtcEVd5Ljp6NblkZC+cHBIWqPjUidkAXpKrn7 T1gFrshshSvM0uPXZdR4WielBPEOD9yF3JGao/MJy819HZPhM9C5ECxh9LJjNOeH qCXKnw7ntNFY/js6QdAPJQKBgQC87RFdZz1CPHPqFs4l55E02gmWUBy8AJ2l1KvZ iFHZaMs1i+0RpofNLNKU1XCW5R/dFtnGJNlOj1KzhilNfV/qMLaPidnsySPfV37R U8Ja5ZZd+bO3r3I6/ULbxjyoWRwy262kOk1t0DDnKMx5Hdnq/5QFlME/MLCe7o2f RwCPEQKBgFQBIaa7ws2is2B5Depi3t9h/ho7WshHheSXVyzwOZpq2B2pX0+cO7Ar mrydNDqbYLkRXjiBRaut3NKzmYfI1YPExS2ldkdwVWC9i69gnNoJrTfgGAWzPSCs 5PyRUk46eUdzd9TDNoi/fdEL5Y+fjeFIcMhRwrNyjrGga1sunhTd -----END RSA PRIVATE KEY----- """ SSL_TEST_FARMER_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUIMjA9usezqPG812Y++0Upkri/xMwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgwOFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDLxomVu498bb2IIN/b6aEe/TAO7KlTEHNMSuSA9OtKK9Rn idxm41gWsyAb5JWqXkIOPg6mhuFCD5Xp1NOO3n541pEbE0P1Bc1XmDyDUq0+VqJp hoevlCEmDbnfTPpqUWcybpGLeWfteQBWaMyiesi+PD0ABQxdvgDfmoeBzL4QDUhM WkwHe2IthuUvAwW589PKiKFucxkZnHaZKYAcPzlWsG1+i2NSzL2TbCwFA9+pPOVJ Aw3QbPmTviIgrfE3/oJbgFY+g1yoh3YALpe4vUjo9g1qW/joqhzLq7ZRMgxkZwyR kZp/CXFUR4S2iLmU/4ST521avzBi/Mt+YEATvjbPAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBGQ0xssTKZRLCHx6yhG6Wz eA7v0UIrUUtLBIwN8/EIVuYScv2o29kWQ3ANYhO10Jbj7uh5Pblk1CGkJO+kT54V Xcl0okSDZ+IEV2D3ogUfOK7KLliHEy5WLfzOs829B38Sm5gQiAG8JdTHj9gPkb65 Cai4YYB2CESOdB16Xa0h0YKwtp+ELgaOOnGrjzUDEp+H+1tL6FOO4+rHxzE5wUAp uljmdZ4LMqHh9vigEf+G2qpjuQzDgB0yPaQlDNnfus2MkTkyGgRBwPr27bdnNmLF nJhA0ZnehIuVWm7CVRf1NJD5RbHBqVY3Lr/JElU9DAudrlHnxd6vh1qCquzBoRyr -----END CERTIFICATE----- """ SSL_TEST_FARMER_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEAy8aJlbuPfG29iCDf2+mhHv0wDuypUxBzTErkgPTrSivUZ4nc ZuNYFrMgG+SVql5CDj4OpobhQg+V6dTTjt5+eNaRGxND9QXNV5g8g1KtPlaiaYaH r5QhJg2530z6alFnMm6Ri3ln7XkAVmjMonrIvjw9AAUMXb4A35qHgcy+EA1ITFpM B3tiLYblLwMFufPTyoihbnMZGZx2mSmAHD85VrBtfotjUsy9k2wsBQPfqTzlSQMN 0Gz5k74iIK3xN/6CW4BWPoNcqId2AC6XuL1I6PYNalv46Kocy6u2UTIMZGcMkZGa fwlxVEeEtoi5lP+Ek+dtWr8wYvzLfmBAE742zwIDAQABAoIBAAJxpSDImRXy8vz4 9/ZZPPd0Lelf6T/3yIo3s7ngNhozoF6FhsEtJNdQ2qe6/BiI/N3S3LYelAEI0tF1 HfxuqrGkUSUz+/KqWSYdy0v/59gBjf0aAfKXIjakn4AQGkjAJS6zqMc1c4ujkd93 bkzckB/H9StU5CsTpksIPWvPGtByctkIHvbzjhjm4bhGCclmN7WASjrhf4i27xPA dmOGHuIBp9QFPdZy1VDWkn9N9gO0B3IZgRUxhBEd6fb4L2Yn7uQy3J1CAPL24gRj fKH4lLPZKPMGBIWlaLbfgeU5NViy661CFMGISS4Gy/5YOc3RpZNVOfNrfTMiij/o rJebx8ECgYEA8Nx6EYoKrTiKM5pn/ZcWpL7Crz4h/OiN71HPx/KugbtpqyN8sUe5 bLmHtCoIGKAJ/A0N5L2VrM28URpdZAGyGalS8y9PnvN1V+Ceo/0DCstrNyR3GEgE Ge551NTB1Y/FXV+Uh8MxnI8XQDfY7O39bRLEi03ygB1Vim3Glv59rJECgYEA2JVX b441FoSgpNPewffexunmmoUWWVqYCqNZBa7vsGZWclbM80i9aGiV3YOL9WUIMiYm 7t8vetEWTxvDE/DQ9A10H+0gyHc+F9i4qFj4jr/JHJB9c/QM0J1JFLVm6LFed8Sh 32YroTU8ozo35L1Vqw2TzvLtDoWTQt9xwwwC3V8CgYEAqylCZaxfIfGH5FvZglAX +0LEPpw8sujf1C2jJkfC0tZHpSI2vhRmJGlDkjg8QKOZ9M+iC+bdsksRg+DkdOjv k2TMWZxJTH9d5/DrS0XFH6qmqizzpQGoSHU7ho8an5TngA8oEcIYQ1U8BJqrQNNu wFAR85yUs44k95ZDBZIb5MECgYEAll6RVx1XlGu+kNGcnfT3EgmBFpUCIEV6vCAP BZggR8u1hyrmnp5JCr1aF3JmcJiVqSO98ii4cT/Lil8PAMA4gsj4b9YV5biMPsgz 5IXpBEr5WUCkKSYu44PgImWTrki++s5lSJJKBmHM2NLpzYD6gokprwwQM/3fcRVr iWzEbGcCgYBtM3zw+a9YZOOA6TVHWlcH1F3nEVXwjBd/DfeIfmOSrrke+nzUxEKb 91i0MZ8G77yrEOpLTOYHkrN6GZOezk4VcIy4LUmXXfQjKdfrB/Noj/ZKsQlVzVrc FnKAyeCwskveC+js4QOFcXNKce9h6ySg3Oiin5iax4e89NipSsfeYQ== -----END RSA PRIVATE KEY----- """ SSL_TEST_HARVESTER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUPBezel0+gYQ75ULotR1tSq2zBDowDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgwOFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDPpF301kklnHmr9lz++7iRev33RBfOlOugCeTFDnyjgaR3 +PQoAm5yUyVa/Xp8VCe6b8Ksrcj+2xslCwhTtei4TEL19yvybdlQb8ZkZ84WBB0w 22xneZur9ZAcNSx6+SjBVrmXb6f6UA/NXibDheYnGrNwoCJEy08+j1wSscu/9wok Lq0b/ftD9iHh59xwkuQEm+zzlp6KwdqTKWqzm8+Qpx/9d9yG4EesEGBTq2FIr6kK BYsVMURKJqmbiG4S2ZDTr2aaVTb3wluV4l8tRPk7vfU8NKJ50/hgIYf5PrjOEN+m uwlRojkSIPKQi6xWfFaknToV1+BmKPvbjIfRC6tLAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQA4Q1eMPOUARR6xJ9GiU7mn shWCKbiENr/p16ZjEoFa+uDT+HYkoQc9QnXH7tAkXDnzYmogGnkd/8G0QrHN/812 +yaN2agSlF852Hm3sODQ6VYyP9GjDY5OPTixZ1ZZnezENESGOdrO9FLlJPcEqgLR MUq82Opri/m3iceHOAz/Zl45dtPkzGhTLwoSmkaBebXPMBfEQyDuGZtahdoHL34o CKMdDUIe+PI7dKGgzlxTR56azOlxq08U4NkUzflyw8i/lo0nqWblS9i3fOcqxTUF F0Wo/vgqW34MtM1jmK7J89ob0Shyk4tp+lTFpKyZGYx6gsSZhPsvUKgFaWv5vO7w -----END CERTIFICATE----- """ SSL_TEST_HARVESTER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEAz6Rd9NZJJZx5q/Zc/vu4kXr990QXzpTroAnkxQ58o4Gkd/j0 KAJuclMlWv16fFQnum/CrK3I/tsbJQsIU7XouExC9fcr8m3ZUG/GZGfOFgQdMNts Z3mbq/WQHDUsevkowVa5l2+n+lAPzV4mw4XmJxqzcKAiRMtPPo9cErHLv/cKJC6t G/37Q/Yh4efccJLkBJvs85aeisHakylqs5vPkKcf/XfchuBHrBBgU6thSK+pCgWL FTFESiapm4huEtmQ069mmlU298JbleJfLUT5O731PDSiedP4YCGH+T64zhDfprsJ UaI5EiDykIusVnxWpJ06FdfgZij724yH0QurSwIDAQABAoIBAQCse7UwtPB+NcU8 e6I0jZV8A9cDl6TPDhXNE2rd5nLSv9aHcl4e/iYRAdB+DSG6NY3q6PulxZa5Xfjm hIuePfXbYj4dY/01nNpwXulGbpRa5X/6HcunCPWvmoTjaahRXrfkIs54ZV/8JpV5 20QIFypgQWXdoKfWzaw+I4gwX1EJXAR2Vu3NoSt6Do81cClPoG3/2oMnHHpmAXba hGD7AR40XIWXP1g+2beV48dZFIUTgY6nSi4lUKw+yKPV2iMYRfZl5zetRQrvvRqw 0cvEWLM9HomankYSJKik99Ew8oVkUXik3RG0TLTAjCpu4kB62BHAlDP8DROMUyzU ukPb9WfBAoGBAP0B0Fkr2SWOLlbAwaHAxQL/rpmYdGtlwxhyIXgp3I7rrK7f6Vpu 5uUofc6F0BPAFm08zNupTwFXwppYV8cq1rZIqKz/lrBYOQ9DySTvKQ8PFA1POqaG 6fGpQuMOS0eaFHWFq71D4iOCeWfOIVWELTB/fxepBMWMt1yLZH5kFvk/AoGBANIZ LGMwqn3HQ44q0gr8gIHNn8ckD37vmFXhGbmV0CNQK91UKCXvQsAAAG5hpSO9AkG9 1Me51jdJkdSCD8Sm4xJQgG9l3eZETyCKnpETsOO21NXwLLrApE3rkoLeXl1FLvOi yD2jmIqSBSmmQQk58rJP00m8dbxEg7/atn+r9l71AoGAdQ4OyALKb16tv8NkkqKu Q6nprPRlAH9PWRMMuxybB6Cv/yRnQUjIGMO4GQG9+DVJ6vZTTVmyzMs+pMw0qFgA iMtrBsclf6cBlzdka2sfEvGF9HZwizUmLYGDCavGVnVJ++mBQIqUqJsn8kfjEj6Z 7bM/KMIxC/kDqJRxRSynmF8CgYA1ggnG/Vb+j6hJ5ef2ulY0ON1Ph4SWzIicnqbB mEEZLUrupIdRGf2DDr0NX7sCPhn8Ck/NyiufixIj8Df52pMMUApV1LjN82m/nO5D fqNXa3ILRo7txTBTVALNZ7rawErz6+pZoHeyGvxLnjcEFYkVFrV2GxRVLZHsY9SE 8ZPenQKBgQDmsvYTyWnU55e/dLPxu/FdVxrCWHN7j+thboZiK/kOnAyf8jc3Ttxk 08ey5OgL6v6YZm3sbxgXoHjIHsBa7YUEzwzDImSb+jbGTCYZmXolv0GXWcRjEJP9 OdcwpREJMzZpGZ/QtbiTyXxHEk8vAgGur0HK1SCo6RBuJjtK2XkiXA== -----END RSA PRIVATE KEY----- """ SSL_TEST_TIMELORD_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUePevwBw17O1QxSIuitVeEUltmhUwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgwOVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDYCl75++jqmfKWVWn7sgEgX4IsHVVLdX37I7jnY4nrpdND ZFHl+JIUHeMPzlnlEHBZHn4yoimLXhuia8VPrss8YH2WcaKyxuTfeoKjxEbs8oqi rbjkmwTN8SkcMYoO6wXJqBPZaS2L1sQo2HJGPa7l0K6KjDdepuVJiEuoBro5zHLF Le7g1V0aRHbqDGB6WjbgFh36Jisw6yPuNgcYDDl6fVWN5PT/UxOg1qVNrxPmNUrg uGlZsCrI3/UwK/cxEv00H0S5qUcLNMb/9wVAvuPhG0UoTIkFPxelB5hSkhujaGRa 5S9N4Wr+k2dNMtdO1swClRjWGj0skG0DWiKb0COLAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAmIlBN0D+64rjkWlN5bk5L 7MVKhgRJmhbEgHW5JmbBkAMEUqf6reyuz+L0TbR2yAkujw69HTAMNvDuvoNewa8Q x0qtlTJLOgYz/D1lS+Ti/EHcmkrHIKK9O+lBin2RpPoQZHaYLSpRXt1QMqmfn/ct 9Jjx8AnKzTC/nOGDYOYskkPCiQ7JIaVyNFAmFBNoQHVlztDw6pR/Gpnt/jJ4Eyz/ JZSXHTTfqGm+4rRDfwM7yREwoG19ab6T/6Cbbfi5BbalJG5RqH9V7gLQspQIvwlk ByC8qnXsqTu5UNh6GweiYWSb4zIol6a6i1SGY4lZ8ejkQKezCX5mU1GKkZhX7rOw -----END CERTIFICATE----- """ SSL_TEST_TIMELORD_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEA2Ape+fvo6pnyllVp+7IBIF+CLB1VS3V9+yO452OJ66XTQ2RR 5fiSFB3jD85Z5RBwWR5+MqIpi14bomvFT67LPGB9lnGissbk33qCo8RG7PKKoq24 5JsEzfEpHDGKDusFyagT2Wkti9bEKNhyRj2u5dCuiow3XqblSYhLqAa6OcxyxS3u 4NVdGkR26gxgelo24BYd+iYrMOsj7jYHGAw5en1VjeT0/1MToNalTa8T5jVK4Lhp WbAqyN/1MCv3MRL9NB9EualHCzTG//cFQL7j4RtFKEyJBT8XpQeYUpIbo2hkWuUv TeFq/pNnTTLXTtbMApUY1ho9LJBtA1oim9AjiwIDAQABAoIBADaHt51lpk7A+OhV OuEa9wnS0aqM5OCdEWV4iM1u5HskagTSp5FigoytVojAzxPwaEs2VSg2okHZSSRg C3enaQkeWdTFbgmuBksaQytO+ZAJUFDrhIW/UyEgQ/4nyu8lB1r1H716vNJVLUIa EA4Gt8SuPcAe0EMF4U4EJwSMXikEKLgehaHMFJpwP1stdj3m3b8Z2z02LeCNlhkZ i6fo3HmFJp/MtmzcdONPiA3eN/CqkOIx7hqmtop6TNcVbhh7ygir8be0x8uMtRnm A7mkkzT7fmTszCo/vLQuLXSIhCMxveHLbjAR3/kNu3m+g8k2dFn7U5lwB/yItZpH UGbM+xECgYEA/8sAm1IQ6hpoAkAd1mXZ6OoKFz/VT3pqdQi8owDTJuvrkHXJEVHx g0qT9/Ejyw741Y38qSLUkcBKs7Do8/SOsOEa0WXn7Z6yA57AGhyvMeDSziLDebib R2BGkaGlUCPY2ur0G4TVbfZRiBCDt/24W8MiCxHMQqNhc4LfB6GSli8CgYEA2Dch 4NDCrcSzG5Ayy+SSMzBF3pEwtrbp0L8pZotYU9vUh7PeA4hxOqqwkJ3o0q9ky4rV /jttDS0XwgxdlO0wmOQmPlf0+/H3SRyjv/gDPVoIGG1j5qy+8XsXWwXjKJrcntT6 ZNrnppH/AjB9REb2jHgIpiEaXEWi8qV0KWYtjWUCgYEA5ZCKBdt8JK34RHTIkn8s N3W8AqueREsoOcrSiTQXTOoUqrya7HlvWBZZf/8h0X6pYfehFyaUQg6ivGv8Vd1Z JnOQPvfHU6HGP6t82rJ9pTUR3ECk0JwWd9N24gKBu8/AMpEE7aGkbqDPAV9Y54rE p04UQn0BpZi9wA5nHZErXq8CgYEApdZrsr8MgzHa2upYO9E+XerJvHOKdKqJXmYx QAjjH7b+JXPNdtJBXukq8lFcEbUbz47WoeA8vZ13movXf3IKE0rzFmBqdJBbxoUk CAsXmQgkK3BD7ttSvW9XM6apXCyjyWO8Bn1srnNOsAQ3IJZ5ZrZuk9XSHTIAULKd DV/k0o0CgYBDU4fugQUVcIlKPdNTp38QzzU70MJOYYorGnght+AmdahW7HA3DkKp MFaBOlZh1yLwsP+0C1PSFTq3X/8WODHMejvSqVZ7wPGVRVNNOdaoeB0xZbRppeaf 5sBZcuEojNjNtxF0uDd3GWGuZEJ6dDTDkhRaZTpioFS5o6+3nMBx8w== -----END RSA PRIVATE KEY----- """ SSL_TEST_TIMELORD_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUBqJvyp77D14V2vRSpQEMvr4LaOYwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgwOVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDaaW7GUi71V+7SiknlTlrVQBokOlO7l6AJ8gjq3UOvYs3c jd+XGO+hG0QpWhGMFwAD7Vfw2QLqA4MmgkE3xFvL+YadaOI1SkyoLMj+gM1W3NIu wYn3dWQiB9i+u/Z5nv9rOYtfJAEllQLxY3j+7B+HQsU2bP0oRdUOCgDS7BR+SVuV 6f4YkHxxdcwW8AE4fyqZ3R/ZUXi/Op4H+/9e8nqGPFd1TkARJtXErvS7zRwF7PT+ h0q3m46OyYqYLVmVTAHCNWgDJEnyzYCzzocixe/9EBwVcqE/DS0h4yfxwmJovhWe BMg+M+vaBQYOtz+23xbQfEW4/dxQecl7DKqmfCPzAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAD9AGq5YOxEAr2veRCi7n3 t+zdX1PCsjIyYRPCsLpjBXklC8lKTUK7QI3P1zAZFkYVxGGn/YZf3gVUMNufFc+n KY9glRor3qH8AlC7dhRkwj2QOkIS9442w9wgAiYUdofsY9JLV7gx04DK4UuBWuhZ usDZo7sw6IlvynHP8KOr60SLMlgXb4uKYNAokiC14PL4kCk31i8XaXPqcgvx2WLF 8z5OqUpJrcoIZPQwkAI7ajD2crsJbJ1IFv3ZDNTXfnjoGJBfCtWLk+mkZHpimMBH 7bEpyOLEL90M7zNkEyGmXN7HcxgyLY9LNnRoDvHTCuYMDzJEeN5EBJqi5lc6S3LD -----END CERTIFICATE----- """ SSL_TEST_TIMELORD_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEA2mluxlIu9Vfu0opJ5U5a1UAaJDpTu5egCfII6t1Dr2LN3I3f lxjvoRtEKVoRjBcAA+1X8NkC6gODJoJBN8Rby/mGnWjiNUpMqCzI/oDNVtzSLsGJ 93VkIgfYvrv2eZ7/azmLXyQBJZUC8WN4/uwfh0LFNmz9KEXVDgoA0uwUfklblen+ GJB8cXXMFvABOH8qmd0f2VF4vzqeB/v/XvJ6hjxXdU5AESbVxK70u80cBez0/odK t5uOjsmKmC1ZlUwBwjVoAyRJ8s2As86HIsXv/RAcFXKhPw0tIeMn8cJiaL4VngTI PjPr2gUGDrc/tt8W0HxFuP3cUHnJewyqpnwj8wIDAQABAoIBAAgcllKjRr8x7tq+ 7BOqH1GAOfhSej2jWfxEkvQ2F4dyAfdJBZ7U/EFdg+CNSc2MJSIANJ3rUWJjkwFh IQ7zKf2fXNKHzK7x/XrZfvWEzxuExAGcioU4ROnGpNQgovzNXOscjgKQkcJVkHBq o1nEZz9cyXpF/fj67vjAgltTDUfLXBmymdyAwafnOQDwYmk6HwbYpN2gMpRPp3K0 iI0psoGgJNcsrBoOXGrt+XpwNup17nmrGKOJg3UhhJ8/0pBXlXvl1mr9fh5LMrtV tgBVavWSR65x/U7gZ8Fv5y5dzaEqItN8IC8NYFr2Sj6KaKjYda3xgES++Ancib2w Odok8vECgYEA9at5cmAgi+19iRrCle31fpRwOleGAiEJRrAYpXwxFBK0wgE2WWQO kTAI5ptunzDVskh5dZVOp/N603H9Q6/kt4TwPvgpgGXs9kMySY02+/yrYfk7tsiG WyJcyTC6exH+oCxcuAR1snToEqLwK7lvj8vmG2xSkyBHduXmDDpq9dUCgYEA45iJ 1aYSUMm29O1Og0/zc/cn7lA/+j7gzRp3hJ6TKEIHOCDYPXm4TASD718WMapMzWBG YqKZkz0tS5PyDQtAZJaIBPxDqc811hxsI7TAdeVWgGWplZl5tj+CGRlGluHQ60gd 5WZiXLLgPgJSaoYML3fyRxeHp1bXSAqID42jrqcCgYBRQu0jJiTd5Cq4JT/kNBgW TKdqxPSw05ir5yff5VqelylvWtNNcklXQRpQnW1T/uVQ2aRDfqXL7D/enT/3GcF/ 6ttFGPUxYYWmV8fUiH99jrBp8fUMmvvGPXGPoyyr9OHSvZnVzLPZ2c3CDF+BNw9t 8zYkMAqIXA8Hhzg3J0OmGQKBgQC18jP+gI0T2K5Sj4O8piXSBzv84FrFC49baFUz yDGMdXyf+mHkg3I6E0IGEtYDTkmnxdd+8s4jTzzuto9CrkQEJfMHSUQudGBtkrtA sDdMCNNmQd+YoOEUOSEgP3yXEl+aOETuJzNrN/Tcna6VSiRjrlgZTU49EMd56DFt faXk8QKBgQDnISLybHaESDgFLCMspkHERh7RC3yvLb0qQLmxWGCPH4W+b7Zh9y3T a2b5saiWvXYtGEQ1Qrfwn6vmchq7sm7igqJsowyvJe4co3n7p0dtNyXJklp1jbQv e73hgWSXlZswTNdec8tnY3Gh6UmGMKpgll+m8bfDPpb5Taf2YfB56Q== -----END RSA PRIVATE KEY----- """ SSL_TEST_CRAWLER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUHjQDXM3yOfjn9cS6/zkVXNvAcPYwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgwOVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDlFI0WeUh9oK/l1+Kpa4JzUd0pgEWwyCKrtaDIMzuTPJEB XA7OVfkemL9q1UAZ9FljEYXzFXzTk+OXwN3I1S4lFgitdc8xBQLljv5HelEq5H0P ypUAE+HELxFQ0uWQqLoNvIqrEXh12mgdFvyIqyJj86Cvqv0J4DOEgtsXjxGYO+/4 ioJ+oO0yfe9BbL7rED+gfqUKabloEeL0s51sWrqlMOyOyq1MX1rP3cMmSDjQFcfV AqY1IF+dgzw/WXbUjvFJPO4IN2lY/v5x9N+i946k1pFvecfXIseyZRym41kpP+Xd JwxPasgMqcT/3d0BAaQCGpgNkpe3etisK4+0pXp3AgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAcxIApP9qu9aa898tHtK5n bnG1d5B0Tktv5BXkwS+BQ8uytnm6QtOVe4frxUdKUJEK3085Lr0B/j3bJNyJ4m96 fjpjScWHwk7N0egLq761XyBv7D1BjgDAsAYyYNOA4mgBqzfrJtLoDjnf8SMKpocr ZLDXb6Qy8LGj0D5oaO3kWLzhWEdhFBcEVN/PnnBcuj/vT+MhhLGGJJk8WMp7dajB I2+E8WW/RxHoXFHnmF3B7TYPhcEZI90AxmIWGnNW1cLArrvnCodpPvc03om+U6qX kkNKgCYDEIJ5dTJWyjA+hwB6XjRgqshNNcc6FwXb2TAyQm8JQkIlRX4R6bjm5KEr -----END CERTIFICATE----- """ SSL_TEST_CRAWLER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpQIBAAKCAQEA5RSNFnlIfaCv5dfiqWuCc1HdKYBFsMgiq7WgyDM7kzyRAVwO zlX5Hpi/atVAGfRZYxGF8xV805Pjl8DdyNUuJRYIrXXPMQUC5Y7+R3pRKuR9D8qV ABPhxC8RUNLlkKi6DbyKqxF4ddpoHRb8iKsiY/Ogr6r9CeAzhILbF48RmDvv+IqC fqDtMn3vQWy+6xA/oH6lCmm5aBHi9LOdbFq6pTDsjsqtTF9az93DJkg40BXH1QKm NSBfnYM8P1l21I7xSTzuCDdpWP7+cfTfoveOpNaRb3nH1yLHsmUcpuNZKT/l3ScM T2rIDKnE/93dAQGkAhqYDZKXt3rYrCuPtKV6dwIDAQABAoIBACaxx/sp1WLTB6Mt Si4P6OMNyuu9rQflZmXWsife74s5Sc0O/blAsGnIp1ymVMONkKO5TAT5djJO4ry5 aT0JNVgyVpjmM282R3z7IFx2fstd+Pn34B85PINk5+ndFcXPmk3DsTCgLNbLY5a2 UUXMkmyLtHK30TIf2tPhPpzGH9S0yS63lhqgKY5FSv5ROA8gPxiXyZTXfnwllWj0 cAVbSPj2Zh5JeWnaJ5zckOFu28SRKVhqw9xYxyeVxi/3SANSX5KL6Y0SUDV2Nj4B YhgqeF9d8HN1dUR5OI+XU8Ri2lRS4Qhad14fQps7mA/CGqyza6oPcaPX6JGrRqWC 8wXIflECgYEA/9/CklcL7A/19EhcQZ4k1WWEg/7QPfMR+UCbgYY5wh6Xna4ievek FReZ3Iy5eAtTeXOeDltkWu0+U/1nGEc2OMedjJ7RuLpnf0fie63FPxy0lgA5976U LbjKgGkTMdQtIrkrBEfc3Qt//8iGIj4+jXm+AqwyEUHY+tCPoOMjhY0CgYEA5TFq QrU+O63GEP9ZguONbXLT98ZWM9KEkkbCkW2Fmwvovhh91mY5dTI5r2wZSypOFECl A7qL4eY5BqaOJMVBV93QIH+lq//k+WarYwsPbMQo1OAC+dDnGioT5UdTlTKibuOF oop6DzUw6MxcKN25acAdaVHNBVYL3e6grzTGFRMCgYEA1JNig8+bkQgFj2hadQ1c joljmYGmIgGCCjDZwLbx30spLQ/Rh5WblQZhhnDHWWsXc4xRYJ4e9sepA4BAGVR4 QJ3eT0hW9gCvIXhoOdY5S+CeSwxvHFsRoham7h3dm4Up5nItwcWuQVpfgfJnNaW+ tCzTZkcG5X1uNZn16XUrOrUCgYEArPu279JLvk9SBtIzhQ6qV8krIv+XYFWrqZuu joTTKkq6x39EuuU8yK+3yicUkB7F/5Mq+L17hmx07ggXkLkwsFjCFUVCjab98x8C jCZ05erHxqOsm1CInL7VdV94PkuRPZCL9DoAFipXV92mUVHH94EAsdUDoNto6YCJ 1rNGLfECgYEAlkga+K/PXl9uWtSRUUO+tUdV69gflR0S5c8Zwx7qi87nm8ZWBK2M tv4KY0Id4rhk3bV3L4iiL5ZGW9gaFP90A7OR4MG/fWCb+UsTc5G7uOqj7BvO98G/ i/DjkOB53i786L34LxzhW7O/8XlAJeVIGqrl0/aC1X6CPUQ0kXhYgrM= -----END RSA PRIVATE KEY----- """ SSL_TEST_DAEMON_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUaYsQ6TR2c6krUj5rtYG1fdLox7wwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgwOVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCyZrrU3fBR88wFzlro0PddB8t5ILWZW5T4BqfGtJZUXgFR wC5beEeufrlXk16bFIxLV55QWEn9PUIn7W5dz6sVmcj82/v52QOs0BctIhkc2ZIn fj3++1C7hyNcYVAk0aPWXLvSnLx3jY2qGunO2vT13APoi00HeBxYv66ac06m2n82
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
true
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/ssl_certs_1.py
flax/simulator/ssl_certs_1.py
from __future__ import annotations from typing import Dict, Tuple SSL_TEST_PRIVATE_CA_CRT = b"""-----BEGIN CERTIFICATE----- MIIDKTCCAhGgAwIBAgIUZnoqyaLGQMl08azdwpafGGfEGR0wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMB4XDTIyMDMyMzE3MjkyMFoXDTMyMDMy MDE3MjkyMFowRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8G A1UECwwYT3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEAmal1SzZpSVae9RShUcN1MjM/B8rJD47K0c49Uxj/YUD7 oGuSKWpYw/nM7aylODTqfJt660KN+Q5AeiZemKZ+YfbiQJ+1YUZazTcjoqOghXFl E70KM6xyOiTr1SBSS1zf161BHPvTmbBQpkqsUStSZISBKaqU4lhJnBsllei8eFFN mHEO+bgGQbTnjVWwHS+xgdajMiemK+Cql+pIpaoduTTtNyfwp9m2wF45EUT4DyUu cU8En3NOOrarkPPG7x+FEANo0/UrqJwozY91Qsv6EPkhFUbBvF8l/p7uNCK0CIBK yTOoPkeHvEeWX+LZlbICpdJQXIdiZJAqIu56yOPqAQIDAQABoxMwETAPBgNVHRMB Af8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQBiRATAkJaW55BPdZ6TKMYfSFlJ 9lO3K0eS6miuX6HG7OI6DHCBf18fjDLxg7O/HeVxSgI5txB4iEulRBcv35veDti+ R6PuebE1+g0QTMlw0WXlRMg+6bVaV2XwXoWQhhSnDexdQtcDPKd4xC6VGfK3sPjQ ZSriMmrerVhGL9d1pYBtxolDbk9e/AwrnWKLPUDrR8W5DA+yJ/lL+k5pPrACNR82 cljDU3YA+bE+9LpNtfatPZwceaM7GupXJy9lngwlNAM42XFvWsTjH8Uy7ZJFOi0B +3rLUOIXxCdpb88qeUGBN6BAUMhItoflSktN813vgKkiV7I0gNoU3XnUqG7w -----END CERTIFICATE----- """ SSL_TEST_PRIVATE_CA_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpQIBAAKCAQEAmal1SzZpSVae9RShUcN1MjM/B8rJD47K0c49Uxj/YUD7oGuS KWpYw/nM7aylODTqfJt660KN+Q5AeiZemKZ+YfbiQJ+1YUZazTcjoqOghXFlE70K M6xyOiTr1SBSS1zf161BHPvTmbBQpkqsUStSZISBKaqU4lhJnBsllei8eFFNmHEO +bgGQbTnjVWwHS+xgdajMiemK+Cql+pIpaoduTTtNyfwp9m2wF45EUT4DyUucU8E n3NOOrarkPPG7x+FEANo0/UrqJwozY91Qsv6EPkhFUbBvF8l/p7uNCK0CIBKyTOo PkeHvEeWX+LZlbICpdJQXIdiZJAqIu56yOPqAQIDAQABAoIBABWbvuLUw/mMNM5C GG1nDxQAINz3p06Ixfy7A+Srnz4N5VSpy+QHEHR+rFK/9Hvy9QaQ1rg+o7hiSK7k tmjBAQTFswtjah5DxoEVP+2fFPOu/ofIDac2mNmUV5Wg9fGjHdc2hfGNeDQklzLL TXAcp3l7KK6zTjyGLdPF/YMXN2mzzWa5Z/D66q9xXAIZnY0ggj4wJ2oOJvbq5Vec 1/NaXZcKZ6uS8a7AJ94133ItmxeBxJASgy+yF2T1YPOq0lK7OpU4qrG66iHAtB+z LKao6dXiYZG5uuJ1j30Gk2V/QkT+NJSDnNcliK5pmmjUKHrDi8ow9m+dl7AjQTlj CBw7AAECgYEAzH17mJR2/eO5MHGhz53QI+R9fcb7DiDT7o3M/rj8VK+sk5o5hqQn D+5Ryy9H3UVTeXwDIayM23cpEmJFCBZ4cRnz+T11ZZ6P9RMIbfPxO6ooLFciHyHj MGvOGdH14Mj9asBa8pSthlPNF9zHQ2OuoS4VBclPrmiQFGRfQBcq/FECgYEAwF5T Rv7z0dttLMo2jaTCroorqD8FApGqK/hGol0PF6ozDXJqC77CBfocfoxK9VAg7Vn9 IRwWQFiIGdHpPuoN0bn4U75X43cUe7eodpck88Sy+KDwurWVPQ6ltO/hDcvxRqAs rAfCAqG/lRx7Gx08Fmtim3KpRyiV0yvGTH4UlrECgYEAqgouHFJYIAacl4vl4Z54 1V/Keixb1wO1N0jyjV2FdWYfOx2jeDJHyReDLFHEkFp1by+P6xBwkI4luQO+I1uM C4BpP3e7hySy0DdjawrOLa7weO57kSe8oycB2racnq6DC6Gn/s9i+6/ze0Q67e6V 57FKCeW8PGr2Y/6StdiOBgECgYEAoNo+qE7nccMZNyqfEzGB2JCQkM6hUdSbhsjD x2ApDpCyv7u8ELYhZv4MdYS56QZnghCNKPJjaMqeg3iSoJj1lTj7/Ipc00bvScP4 ibE4pN0FCgEJShYsBDILPZCXjwHJblThBbg28hxuJjD6f2GirNx+R51JDsdRAJLJ 7Yw/iwECgYEAqNgShZvjTVsFz1hRKTPfJbhJZseqquN+xypJMZyoYJHNF5Urk5YE ByHQAzAIcMYzsSvqGQbDK22UVP/I3aqcz9JAf1sl6pr+KGRPeIumVOPssKMIhP+x ivPcyK9bCjrJiirx+TSiRy1698pdp+dDwFhcaHRBFf6FJgxwFHgM9Gw= -----END RSA PRIVATE KEY----- """ SSL_TEST_FULLNODE_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUT5GDbvyrLH9Vkb7sFWPi1uFfhnEwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyMFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC8vFVDrrbPlVphmwXld9chzAuCt6cUwFYBTxaIW01Ex5Ft sJvGti6ve5BFx+B+wwA19Y1t6QOOnOn56x0Phm5/NqYidqYCBcrrHK28OH3kBhiO NZiJi+tybGhxg2kjZldPBmoVA2r9MU1qA0PrRpozYi1mH8W2f/7yCstAHaYxZcjn T70KkjWc7jMpV2g/6wLUaKJEgryQWqMr1Ru6BR2Q7IVIe688ptO53JRutPj/Fh6t J9jWyF7b0EwoYc0Un2lRrzYgGQ0gGXGJCax3pWjZAokvVG5PQEPqK9TXqWVj/J+c aA9jPEQcfivNW0nU8LmKHZyOaG/q39Y1wd9EhfOtAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAvyyCobTP0LbxqcCcNhY+3 /GPpUfYgjZdRy4uRtSLjcY3v604Azyuv07rMlT8qkvyYTuTzGXqpqVN1XJnllklH psdkdA4uhlzx2ewhZw6usGV8QZEcOl6kMUeZK7TDMRkE10EnH2Qzg7R24coy9cEr anGHgti6QrTK62aNT7aBGIDmteI3BRXc8Pb3BClDKLPpOC8DwRPD7nmQ/0awF3nN B7caCwX4NCUuL1/Kbpz5Nt8wZepCcnXwF8BrSsiBFoUI01tGTm4BQVc1mufCmAlX G8mCVW2JuymC6yia/bAUbvFhowbUrX55/z8SVEKQTLRQK2CglORjOTko0UbUcgN+ -----END CERTIFICATE----- """ SSL_TEST_FULLNODE_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAvLxVQ662z5VaYZsF5XfXIcwLgrenFMBWAU8WiFtNRMeRbbCb xrYur3uQRcfgfsMANfWNbekDjpzp+esdD4ZufzamInamAgXK6xytvDh95AYYjjWY iYvrcmxocYNpI2ZXTwZqFQNq/TFNagND60aaM2ItZh/Ftn/+8grLQB2mMWXI50+9 CpI1nO4zKVdoP+sC1GiiRIK8kFqjK9UbugUdkOyFSHuvPKbTudyUbrT4/xYerSfY 1she29BMKGHNFJ9pUa82IBkNIBlxiQmsd6Vo2QKJL1RuT0BD6ivU16llY/yfnGgP YzxEHH4rzVtJ1PC5ih2cjmhv6t/WNcHfRIXzrQIDAQABAoIBAFnEbf2CJPs4u0M/ W5+Xz2AIz9S9ix+Il5+JwVrbqjWzgg0c+gqabjwS1j0KY1GHaBtCDqGfOYzkPzka RbkzpGynTn+H1U+S97+55Txn1iDVcWp6PXH2deb3fvm2mhQ3QgGZOG2EMaf5giuR IAXQj9kusg8nv38dA+KVlbSKJZjKUXVYrlpixfpzz9Z/CuhouRundF/yNBVbSnzR v70ywjVGykf0YD6y5ZDW3BRAg7lRJ/fF1bK3L/sbLj4BugMs9gjt+cMRcusJdoP6 nWk5Z6Mo5VdZspb351EcpNs1AbTb40MaqNQuNg9jIgs9rZd5ZOMR0a77QufSMzML qNFBQqECgYEA9AmL1/goSocUEUYRiioMrMkm0OA5/xwrpp8lcOYUVAhL2VD+lFNa V4htxyUOuE1czQPXSmfioxQrbfHm0uxPMYUDWygdc/zyOlRbvMqmgimNFqRBiGh/ 85NuYMSf6AOe7i+hwqZu/ZLDlzA7mEQG0csVLkPphe5HEBu0d5Wu1LUCgYEAxfzM 0xXeyocyuJblLOQxSfnwonG9d8F4hEO42lCEEDh8zVIk23vJ5E72YPwuiRU49Zrp PoKiM9TjzsmnQIRany7BmNjtuhlvMirwIte0Helc0ks4IpzjymWSl12msOE4Jssl 6cy3xcX+E+JE8rVcrxDu2aAOiBC1fmLLQJlhNhkCgYAzbWuWCMrc4dh9x2lc132y T/WpIQe31kTwqSsnvqTcDJ+HXYU41tP8DFkuFYYjmtIKtluBZ6EgQtjgI5FEM96A jgpmBG8oiU62sh5fC8nJNl5wPg89YuBMAW7KX8VfDJxKj6kkLxTGxU4Ip3Z3oSZa wdRl2pP00IETSPNgHCAq3QKBgFWw1cHirFvB6k0EWkp0tXSMLf9Q9S042n18hixP Pul6WWHQVM1+JWKgXniZjVadjdqXYq5Agg2m7bZZhv8gicxtwzLxaOrsCTmQZgDe lUGA+EC4d6JbfyfhkHHdAcF6qP/5Wv53MW7zA8X9X9QgdO38iTQ91yxC9xqtjcT2 3aE5AoGBAJ7clDveQugUC+OoXgru0emb3sXRk8kXDqUTjUlsjU1m4f3D8ZIx7+E6 4xVBExXHddMx9QYiJ5uVkcNB6UxhppqlsJPoKyj8dvDTYeC98Zm/TFl0B/P4iY8D 3w/REN/c8t2oYOpy8/0kgp2szliDeQDxqiijo9LeRRmxvTWYAJMI -----END RSA PRIVATE KEY----- """ SSL_TEST_FULLNODE_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUBV+nxo/NCVdtZFyXlpmq8HplFQQwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyMFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDXf+htQ1YfVlp2jqHJ+EUmB6bhxE1tYl5i2VaZVanzjYgA 9LDKeRhvUnaOWvLkGQbyzqvnAylXHXSNe9KAZrphoxDP40Ogu4IEGatxkAKafJ0s KKAB3QwJlnOm2NJNuH9vOirw66ihkpz6Ydg7hmdWCF7bJgG82qwzQvEtIABUxZeq EMJHLuTlVC5fyuIyggzzU1h+ss3bleM6oqT54yxJPoZYmvy067jeLGiyPg95EP+s nuxLFhzeW1OZHMGmniDvO0zKGr9chiXKUSgugtT3MHUndociVCmc2OQaqjmWKwGr O0mU5+lMgP2SojC7wpItyHSfn62YTLQ5VduDd5+fAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBeYWzDc79lXdOi2iopi50n Hoc+91TiUr9Ubbd8lHWhidHcRYYWo1vFwM3of3eJ4rhAKPgwx9aclkryUEcZ05U9 tzs5OrmYsgnzdoX+zJenx/7NwuMO7Oe+XBAd16/4vGgSU9vPge1Ny4zN+zA1vn2V zVlSBuGzmJI1ugPOVK9e0XAzJNsG5/pPRB29mbWWrrmFBmHvf33+PJms19aSfKrV lJXYQV4Q9/xt5ehTPo20HF2r2CDiEjhV+P9QVRnwymuE/Zap+e1v+N+iWJVUB9hR il4RskorFB1oY+FcNvDlsfO2bl29hGX3nNBQ0o8k1fjvuLz55MUNyGTeeqBGKkU2 -----END CERTIFICATE----- """ SSL_TEST_FULLNODE_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEA13/obUNWH1Zado6hyfhFJgem4cRNbWJeYtlWmVWp842IAPSw ynkYb1J2jlry5BkG8s6r5wMpVx10jXvSgGa6YaMQz+NDoLuCBBmrcZACmnydLCig Ad0MCZZzptjSTbh/bzoq8OuooZKc+mHYO4ZnVghe2yYBvNqsM0LxLSAAVMWXqhDC Ry7k5VQuX8riMoIM81NYfrLN25XjOqKk+eMsST6GWJr8tOu43ixosj4PeRD/rJ7s SxYc3ltTmRzBpp4g7ztMyhq/XIYlylEoLoLU9zB1J3aHIlQpnNjkGqo5lisBqztJ lOfpTID9kqIwu8KSLch0n5+tmEy0OVXbg3efnwIDAQABAoIBADq0WF+zcTmWL4yO bFp1rHigqwBjlmgO3QF2jVW19Vconf0Mq0Bs3pAs2akL85DZlH/+duu2e8OEfaSx L3XVBj7kygantVuK2O8/AuorvdnRyosmAfif+9B80MKJ3DhZ4zUsllgNCmIBa4v1 rY8BnRLdsuFmKCEHPNO2D7coOY7dyIc+MHF249nKyPYMjfeyKyALqF5EcQPL/2Kp lSaR6dJoQyMo/f+IvF3r2UCfLMWWpK2MDuLpSvAISy+GF4OtL4wBZ+R3BG8p2dw2 tesFIVLfKYafpZiVQz6Pa1CIQvp150EFtilZwSbJByK5qyubKTOT1u4V+ANF4gii Sfh9FxECgYEA/gjYjm28swTPlh+7s4BUSbWZMJ5FgYjFuGHaRKQbqD8kyfEIMie9 Pu2iOaS5Ym+0Z/cI7mqmepQdfkL5NfkosHZVA0KR4P1QhrfcnXbIinfYDlPaG4Ee syWkDYIJDawTWDMQvBnGlyAi3eO7nUJoWke5ozHg9VxRWe1NWDNqFtcCgYEA2Sq8 3DK0H16YMztn7aKIWMS/17E11F8hZaSWiRXTNgdnTcye64Y+wLzfQaw/nLFw+rSO qHjcTK333l90l0gKflJBePORhEZ7/5p/o3xOCdsRKH8itH+21aq/K+p4XmvodgVd tnY93QcRid6U7e/ZDW3od6pjMLllJNUkKjJtTHkCgYA3p4x6N8R9m/I2u6ENxHGy 7FwxcJtds69No/KD00hT5fGTZIEdK+OkI7/EzTfoPvzRQifsw+TROh30CYw7rOij MGmTm0QGfLjlquZkgR+SZospKGnCWNl2+iok43ZEToy2aAmkjCkb9uhsoHX8EA54 qPocrNLSLnWMNBcb2bfGZQKBgGuUwm6LJ7QKlnd6zGdqhwUCos7lWPdWESNbP7+1 ciZn0IM4BNpEbL3qUucjv3eOZ5uq6qkHBott+0bMHuP6qkgd05VphAL1L+RV0zlY EQjM31kicjzcr+R1a7MDupF7/3LIAb6sIMVoBQY5n6mnke0XL3xoii7PCQ4QEJRe 2spxAoGBAIWBbVLqYSzFZzzmxhPdGi8tNLgj3idkVAO+Ovuwf4RLiulatJcebI5A HAuJZY7XMzGKsrTX0ZY/j5uYuParAy0kzyBpXlh4FvxswFC+R2GiAMXXJCqXL2N9 tbM0dgomIxudh/4gfrCUid4mNEtYALqorXhMwJLPDaGZ1KbyytSw -----END RSA PRIVATE KEY----- """ SSL_TEST_WALLET_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUXxPjAJgu/kDoq+EOobX/wSYZjW4wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyMFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCzYrIdaNeAReJVfaMXpHtY1JgjpAAP3XipZfrmRj0SY4pS zHfEDSZByX7LLwde8B2ivQHDDmmIgDhL9TZ3pZlYmk2Vq0BQHJMciaI/fzF1+FNQ imkccmvsC+LXft3SMG61ldFszMkVWGOLdflBzBudGa7z034czq3/Ucj2mE4jEsPI OxnFH06DBadMDtGfaiyFPvEc1Ywr+LdJQ24LVrih1IZ2dmQtS40n2K77UUsvUs3s jNx27qISfUI/tspa8DnKujuY/9x9AIzo5ldq8N20Ccns6kXxSewsxX1vH2uNH9RP ReReTFsZU3z8xicFx8SBE4VcRXXTTsqm974QMYJlAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQA52jQ4+CoZILaTRP3mFYpg 1OmD/bwzBsHbDZhB1co6d6lWel07fj3uNekBigyHgnciMGvXm2wSJIxEvsMoXIPh yyBjdLb8IwaZRldnLPewUuTuA6WQx6eNwA+qEn6vT9tBVLMO0pRNXy1201c7oeCj QCJQzn+tZweNdGuX06xgPX5q196gFS+BZDw/sn3ctQ/xCXC6gno21NRqyM2VdSCM UIzCBQLoL9DVvpmC0atV9BO7LTvOYlEuCF58IXpBBi7P+3i1Q2z4SLamsKKcU1Pp dJkK0lA+FfIYEGsUV09ddxGXRghU7YV0kU4iPMRs/ckin95kPiUOQx4lLo3N6u8+ -----END CERTIFICATE----- """ SSL_TEST_WALLET_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEAs2KyHWjXgEXiVX2jF6R7WNSYI6QAD914qWX65kY9EmOKUsx3 xA0mQcl+yy8HXvAdor0Bww5piIA4S/U2d6WZWJpNlatAUByTHImiP38xdfhTUIpp HHJr7Avi137d0jButZXRbMzJFVhji3X5QcwbnRmu89N+HM6t/1HI9phOIxLDyDsZ xR9OgwWnTA7Rn2oshT7xHNWMK/i3SUNuC1a4odSGdnZkLUuNJ9iu+1FLL1LN7Izc du6iEn1CP7bKWvA5yro7mP/cfQCM6OZXavDdtAnJ7OpF8UnsLMV9bx9rjR/UT0Xk XkxbGVN8/MYnBcfEgROFXEV1007Kpve+EDGCZQIDAQABAoIBAE9OfQx/g3bUbqH5 L5eOQnIdWz22jch105ig23He77UniMneV7y3S4ieOo49tnaElbWS9ip0Prf4Z+s8 992hus/vOAnJcl94opllR/PmmclcBgl/h8Tp2Ui8YIeBMTRx8SAaokIFr4jeUPQh Lhem0zZ7Wlu1zvWRcl+EmuJap4DdVu3jpbddccJ00nfuw+GDgynhbJjRBmrS+2f+ a49qfH2HSoxDEHeAJuLap4b7svvyGl1G685aDGgx/mqsHxPJXiavFYQaVY1MBUiq NMx8NUZtxFahZIsj4ScuzOx6mVhDudMlqtfBZ0c4ae0OImWqWDRyx6kJOA++5RNE 0gLxuukCgYEA5qoghL0ZLJk8UIyBI1/XECK1DP0cbOVTPSOuYBu+9ur36BhS9XPG Ut4M3YAYLccfvV9wqolZz3811kT1E0vqWHNgyZ7I2VWP68rW1+k+F7vZld0ThXrm T8QbH8IFGjGwPEJ/BE2OYp6r6wAaAQ2Lr8r08b0XegZLbYX+eoX9c9MCgYEAxxax 0G6uqy67z/b5/OrP6S3/XSIGEYwCrAqHikDBX22QeTop5Medzf3MFHmxS7VOYZ0X Tuo5oieSE5DHY8Ih6DJ1hc+8LyP2aVd144A0f5SIQFJxfIxMJCp2w/9rKgyYlwRs RqsdJ75a3jBpo7NhwbQhr4+xKdxTUWBKNBRtpecCgYEA2tIyHzq1ExYbnd5s8/4L rAcA8t17heLX4HxlBE/ODbhCji/lI209i4eTdN38EhGBDsnnvCCozqvDiw3H4RJ3 soliHGNB7su4yNuYjSN8AE/4zq73wf0hWDKV+L660Gqq4b/Dd3WLygr01O83vB/5 kD9dt6bHCr/F9pTTIbDTDHkCgYEAqbXE2gKfzrjFzN+h9mFL3mAhgQiR179cP7+y Dr5omKpTL6PPNoCbGo+wufuKkRj6uecpiVHM01ecBCW0cmt4b/EjkW+l4SFs2ht+ GPKezeqVww8EQsFt3p58I1PFzFB0ereAfTU8Yza3SxRF2Q/+0xp0ZK2+vgpc08+b MY4Ach0CgYBM1qpAPFDx1fkIUc6uCr5+CJmN52djuNh5PQkBuoN4S9c98lKWXi+q eVrsNKfDS5+92E2O4iKgWd9aCRzqxxq/0mIgT+3QLUj84SyXxlrkrV0QiU3xMrnQ L/CjF5cbKXcixbuIlTfKwoqpRj/igThAKNtBGLKZqw0eV6uISbbDNw== -----END RSA PRIVATE KEY----- """ SSL_TEST_WALLET_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUIlcBc0KB9zljlWlercBlXSmz7i8wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyMVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDFXFmZ+JAM+10oeWht8WutI9nkQRV2oMtCwmdJYerOQXEx NGNAsUZAYQi7pUi3WFfKIOXcr+hwCFdCaoXG8A07kpAXnKlFYO8agYCwcyiYGx1Z raB2UtUik/6j1/N6bluG4uMljojWRIAK5umAVALAmEHj4Qu0QSsv2Bi9cjqlPn80 /mM0iMqXhuQ3u+ae3t8yxbI8pQ2Zt6WJV1q9idiu6JB1ZBkm1VSO2m80rVIia4JS nK5y/psDK5xzhi2NMp6WrCAc9ll0uNEysW2c+1ZZ5K5Sx6aEuOJadDGmZwxaHBdg EUxrKtCTFRppHmgsr/pBwwXtI1g6rHY/Zm/8SRsDAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAn8BB5RX1ZvKsKEY+UMEEZ 7u/yoXiocrxFsRyHGgjaB3Lh4ArMsFM6I3xIbeKjojidci2d5IxWACM4V4A2MQoG FTiX192lg0a0VgutjcylGfXQuQuC4vQux+WaShksDTYn+CKl4vSDaZIkGi6j/MNb lqgULuMUuilLJyNPqGobz/b1jE2N6uqMD6YUJHakD4ph/oVKOcxyvlcV9jGIdOgd UlEk/zn3PPC6CadBQ3diEm9LYoLi3QPcsLYIFRSt2YcmdvMSl/9+uLAlP2Ja7RQr 8KPvq4WWGh7S/9tblPBrPeab+Zw405qBc3RfAYuLvk4+DXA0iXIBO5yNSDpXzN3U -----END CERTIFICATE----- """ SSL_TEST_WALLET_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEAxVxZmfiQDPtdKHlobfFrrSPZ5EEVdqDLQsJnSWHqzkFxMTRj QLFGQGEIu6VIt1hXyiDl3K/ocAhXQmqFxvANO5KQF5ypRWDvGoGAsHMomBsdWa2g dlLVIpP+o9fzem5bhuLjJY6I1kSACubpgFQCwJhB4+ELtEErL9gYvXI6pT5/NP5j NIjKl4bkN7vmnt7fMsWyPKUNmbeliVdavYnYruiQdWQZJtVUjtpvNK1SImuCUpyu cv6bAyucc4YtjTKelqwgHPZZdLjRMrFtnPtWWeSuUsemhLjiWnQxpmcMWhwXYBFM ayrQkxUaaR5oLK/6QcMF7SNYOqx2P2Zv/EkbAwIDAQABAoIBAQCNG2cwz+fmcD39 9zf0C31qEEz0hpga9gH93FLOw8SG7YFJpeQk19qbowUEbLtd4zr5WKYgMGEm4L/K y7CUOQOtCTAewbLA2Pp7YAYrolpuzkwg1yP4FWcvztJsQLVjXs3v1f6D1rH9SIKn yMtAJlDFdNb/X+LnYQTIs1+U67wEcjONZqCEjVedUvQr1ciraOKIwPRuMZK4rSjC dJbIeD4LOyafv3SKVptaWfP24tGBLHCYcTbMDnyDNfdRvLtUK9d/9u/Wgmrjm6mP bemtc7gnhvZ6nWySVSvzpo8V+VtVJL5ypsUcs8csOfZJpzuRput2BOYC2ffSv96q 1aHdEWfpAoGBAP/sbXcDOa9G8DmiE27FTTuOB5//ZPooJI1xTa7dnt5xNGzisGWN ZX4U5JxgaVXR3uE8PlSdTQP5wgJV8b5bFRY3cnpAt4EgH7FcktvxeQUzDjzn/IsX B1xO+facsl7Ssk84QWciS1w+oHteVEmZGYbHrUyk5HBbBSvnmE+LS3TPAoGBAMVr cZRRW7cjnxPLiIEb/YJwUtmz7rFx2TFp3f1tT7Q4F3cFpYtS9phTG62NlLSmnttE okmRkZI4PKmSvinnUe8sRrvgIlF7Xn1p3q891BiFmw+bj305qUAbwXV0mdFkxk6r IqmWsGo6Xe8tKDnP9h7gQShqTKXnfV4B6xyj9SuNAoGBAJPvG7uOzrpl3BjEek0u mZ1SVVAENl9v8ukb1Ja/HsVgVLiYNPUOzdsawqcuB9WG0joKM9F/d/RTW/UzruCl D8Re2rqWTDzEz+0bIP0oURdTUuicBNx1vFh8gnsuSuELE+09DHlMVpmEzgliFoDQ kfPZ2nASZMYZpxyg6+cXEs/7AoGAfNfpR4X7neDk5Du94we0VRx7CDkFJSl91AXC 4FSUJr+h9x6XBXg9gS5tPl9ePq9vnfHVPvjTOchedE3b+9vQsJMrV/vxN93wbxbY P7G1wpwa5s/U+bfRFD15JbHK4+P6lB0dGmm0vjiS1oGUAptEZVojWk9+kRvG6AAG kmIM1LECgYB7Gfaz9h0a7mbyiiMd7gXjYV760/7sgoJhmeg353FrKGxfRyowndXu O8I4aDwSbCqtLu/Q2XOZoW+jchmvHqs/Kg9PWait7lb8bWcAxhcuC0d76OpCyp5y S/qbLTKwRiskQR68jBd7K4TM0vYLiyc3GUEhaCUXGHPNoKtvZQyVXg== -----END RSA PRIVATE KEY----- """ SSL_TEST_FARMER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUH4ybLZJDdYBBZEXa7rRC0r1WLYUwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyMVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCr67MRDiKgPiH15yQ6ZJeEcghZEoYXb98sCwHKTk7cDMp+ 9Q92IP761jOmqXn1BTXNZQc62a1kZ0yIBUdqCxH5R3+BGF31fDwK0VPQhSh7Np85 iv3SHlrJBmNF+JX6A+aiKf0f6Zaq0pK1NiTaY7mfXMynSVdxJwwTgqQR0qfvqXEm XWBeARhXpUelIyUexXHrGpXumAWY4wn1YEW+SpcGNXElidd/HLbJ/OHkCExd0nge yKDQBabCAiIb6fm0wmL6HcD++mqsEt9II8U1qoUPfpUWxFpUSWBoZWcATqrPIPYu LeHPvl3ZctQCuTthWHvum1zRK3G8YUXcTWwWsNBHAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAb3eNfxvPPv3QjmDEIcOhv fyGS8orMzygz0eCtX0ODKsIWEBZw7bSym6fhEYvkltSf41KkeBInjDJnqiCJ2Yef VvXcGLyHw/klmkafcvcVCoa95TNTuKb9ElJbdIuoQ3EWk4uQEK0ARH4K+mXA5lzh RVbG9EWvmdYXaG9BrnX9Hr/lCEPXynGtbgKvglpFn8mAWz2ru44BsrkiZgMFBpPF R6VJV3SRCTib0nsYXkLXyRgG5JcH/VPpFfyS+sLi/98AIG2mTWXTpj4dT5f9epTr Cn00kytB4+9ZUvCMUrg0BciQkCz6lr46gcOwbMpzoxXWnK+cwPcr9zu+LLEs1NiZ -----END CERTIFICATE----- """ SSL_TEST_FARMER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEAq+uzEQ4ioD4h9eckOmSXhHIIWRKGF2/fLAsByk5O3AzKfvUP diD++tYzpql59QU1zWUHOtmtZGdMiAVHagsR+Ud/gRhd9Xw8CtFT0IUoezafOYr9 0h5ayQZjRfiV+gPmoin9H+mWqtKStTYk2mO5n1zMp0lXcScME4KkEdKn76lxJl1g XgEYV6VHpSMlHsVx6xqV7pgFmOMJ9WBFvkqXBjVxJYnXfxy2yfzh5AhMXdJ4Hsig 0AWmwgIiG+n5tMJi+h3A/vpqrBLfSCPFNaqFD36VFsRaVElgaGVnAE6qzyD2Li3h z75d2XLUArk7YVh77ptc0StxvGFF3E1sFrDQRwIDAQABAoIBAHmFHQmNKESEJpUe UKlFuSPRRr1PLqEaXnFPRnCtcWhxUiDzL36cTB8ZkWDYom/iwujv5HBgtQMnUR1E Pfpi4M2HEEU76A5BRl+PHuNhe/+72EhgSpFfC2TUsw8ea0RRxZAShe0su2b7eN/F 6b7EhsxyV+ZXHQvKQer4iOhgMnxf68BuYpL4eyYfPlKFlSN1YcBCpuh+BPBuVdqV JSHBumr4SBHFrG/Gn+IpzAJ3EyB7idTYn3jzr/iXqtwjhSI+9Hmh8rs4ctBElrxO of57t3uPO2Z12cQtMN29kJTplXud6AJBacM1AWlY3jbUcAYlqQtyFGNlWwqjUdP+ zXyAtoECgYEA3EXfLDNnulR4so5Ab6rYhxRmb2c+5He7BNc1fCri5U/bE7GPh0Ew uHDLa3mc3XrHEwd6B1DpnzpiV8a7Lb9U32xPYoX73753a5RaLxr/yrZZZyuirtTE vKdyOVufoOzD53XDvlUtkDwYLywFKpiIVp++wsf7BeKuuJ7oHpPuwfcCgYEAx84n 7sr6MsKizGMELYtjIQ24pHdzDQW6Uk3U2BU2glvzNJ0KIOgdYN3nQ/4LBhENgRL1 +mtDgQ/+NF9Q4DgpriAQCp8Kth4hosgHOZZ9mbPwMvL40XxXOtk1POHWN8SXWdU1 tHw69yMk4vS1IgjGsG6QvNfoNlscNjzW7/GD0DECgYAjmadYHXbGRqC7OwJvCc21 BzcHCki/5Bn1zlJ2nvfM1/swU6I+2epl5NT7qcwQf6dtC+hNBma7tVPvm87kteeh tH+gDMeIgeALIw7wTgzJVm9cnVDNsNWbJ/TuEEDcYWfIIOBiAqI6jXvbI+Ix4DUo yuip0mhfqyNR81zQlFgiQQKBgEs3KUM0d/Fp4d0tHSKECWIlBzAqo03wrQ5UrF5X xfhW4vwYbfqrRnvzrR6kYMP84WeImr6VaIkKWzid9RUjL1WUTlWhP2gFecYMpOOh 6lBVM4QKgW5i73eA0xDDN2AxCoTPxXLXHV9xhG5HjnRsd1dtl+DvKkRkEf+88XDM K0HRAoGAIOufId2qbyFGxWld5DpWTb2RPt7ghbxYK6SNXk5mzKOdKA6c5La9evDF btn0mfIQf/4qftgACHTYcx/IYtOHzl83rLvuP0YE7+8ErU8TCUta1lAOIBqm/WO2 RjFbl5GxJxthIxT0CK3BEj8rSuwk9pXsnawEPN9/Ca0BuseIy5o= -----END RSA PRIVATE KEY----- """ SSL_TEST_FARMER_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUQv7oQqnVOgMJxwGj1o9mVlDjSV8wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyMVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDWc6RPgLnigv9641Ig8ro/KxVnUM3ORHs2hgp9Cj4lljnn 3Pl1IOlZu4pI8nQ0MGNVaiRTH5iqi1PmxfngFSsCAKjLFjty/Av2HpFiuYXQPxrC suMPbF+KTpxi0QyxM/04inX9sZZpAPXbRtJ7XuFq71jB1mHvvyq/7/0mzTMwdUnX LRfTMSN8TKVc+x0nGaQynIQbFxW2UcWLShaeNpfk0++2MeHOqrJo1LRta3uN8MBT tdd7ISMv85gbwBajJ833BeE5/hxbDuohWnN6NOko+lKf+iaiVZG6LIqg4YLO8nEC 3eCtPSqZDeMcojF2TpfAs7RYy/uPTnrurq1I3M1VAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBQPItY6FjeAmX7cpd0BPdo lWYb1yYOUVdVkHV5S160tGhLCcipZF511IOvjH+UUh/YVRUPyAhb+tCURTxWMAmz xKiMESk5uJWoxWKZYOTkEE1SzTHdOLIO4gVz+z5ewovgSHOQ6R95AtCCeFNf+G8K JZux2BbxkHZTiUK21UiarheTIOvdwn4W3NaGnDaxgIQncptLlLUSHKcc5FbLNhU9 4dlPe/VMglwI6R7euYFBdcJCpAnyhkeGGiEGZMPgu7oG8AY/PnbiAq4EFQa5rwB9 KtZGtuEvHhChxuCJrdhS3arkhq7qNPQc2iYRUeAnzK+CqVMMP+j9SqJA47YEoLKN -----END CERTIFICATE----- """ SSL_TEST_FARMER_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEA1nOkT4C54oL/euNSIPK6PysVZ1DNzkR7NoYKfQo+JZY559z5 dSDpWbuKSPJ0NDBjVWokUx+YqotT5sX54BUrAgCoyxY7cvwL9h6RYrmF0D8awrLj D2xfik6cYtEMsTP9OIp1/bGWaQD120bSe17hau9YwdZh778qv+/9Js0zMHVJ1y0X 0zEjfEylXPsdJxmkMpyEGxcVtlHFi0oWnjaX5NPvtjHhzqqyaNS0bWt7jfDAU7XX eyEjL/OYG8AWoyfN9wXhOf4cWw7qIVpzejTpKPpSn/omolWRuiyKoOGCzvJxAt3g rT0qmQ3jHKIxdk6XwLO0WMv7j0567q6tSNzNVQIDAQABAoIBACsYXiKj6bb9QD3/ xJdeb9MV4105vcH/vQr98Mmj7006XTSdEXxaOsqPh4CVSIjcWHnntJkHtnQ/P4MW sdo4JsZmP4VgWF4JDJZPGkROp/drVwNdU4fb7W8r0P2CqRxLKE3edUugDmvXh5Cj MNUeAgqtQpbhcBjvv7WGksbjYbAQ43UH8/zDFpSDmMbPjUHOnKoCZSFC3IfCoUPg 8U55AWBQVQnqP5E0R38PpAeTmHr80HFBPppYteCH7/OATr8/7ffv7Vd10/bVL1DP Lqa8YZdNP2UOtKCDnbxq4CLFm9gQ2jIwhjL5c6YDVvXeOWiN5PKybhgU0yX3mQZa UMFL/RkCgYEA+9l7oRtXt4Me1AkSLSstQlyGaMEEnYAwf6iU/HBu9dH7ZAadte2g an9sciJUlODvcj3fK8rIewgJFY/wzdZPuCQv3fQGghrM9gXMgz8NiU1hK0AK/XI2 zUwVJpiFXjemRly41Ss5UG1H3tHQObl6QyEeAzpJZrNENALFL6exwQ8CgYEA2fxi BRGr3yHq9t/RsClpPlSHuE1IM1l8G1hXxrkROo83dILEsvIcHInntoJ03SPJI9NT 0Oa/XQ/Q/21xPOmjYl+b3jKBn9Yaad0l/mwoG1M+NXEniZ2/Fok3EGqu0hoaPpJ/ ipCtnNWurA8BaSnQJD/2Fu0UnZdexlHlsr32A1sCgYBZpHSjyJa1RB+R+1ST7T1j 1Ikm+iUJZppcpgW5wM9OAhrH5K74FYe2wHo6Ocv/Xfz8ndc0wC4R1K9fFGfy7Chd 88tx5iz23FE99JxxztyjlX5Tpa0Dv0aQVldk8H7wJUCy5MgJYCQ7Y1pkjivekA1b nYsQPQvpWT+af63uI3NaswKBgQCKMry98/cf7nP1ce6RnZ9weczVpoFItMm+2GJF xZzLoHKK9kDYJjB2U2PIzKpkbMSfZuIzhab6zAU3et4YvRLtUioSU7jkaauzRBZL V6yRrlO5M/TaBV1ZX0K+sLQG1a+fzeb4JUM8NCiaQqUlU/H2mWpeHI4+XvIiD1ft 2wr2EwKBgQDMM22ppSf22Cv9aw7VQW2OJHI3+22LyL7SCqQDqKGPnnDlyKtLz/sK iQozbZbSmVHFbz0DJMNMpIWm7irD44cdpnDxxO5KDd1FJjH2Ha/RiPA6QAiJkiOT oAFJ/tFPZF+faEhscTBdGU4yS6frDVDGJpyFgqAvTxi7H7PRrfRP6Q== -----END RSA PRIVATE KEY----- """ SSL_TEST_HARVESTER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUCg9lMTGr9/8DyLNEaafobyIYAS0wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyMVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC7v3qmcCjmcREbWhZbtKpeZEwUPVkFpHg9yd0YQW0ZACZf BZsJn5S9fkpfpJ9E758wRqvntAoKUwh0yntqjSNVEF+IwPs8eVV85yJLjZWzRlYN FyZnr4ihtKAleDkXnSwDKKuWI3tm68GCmGlvzRvv8gR9/8Wut01JB4LjUslzaL5B dM36gzjWGSxUD1A0gdG6leCMbJkRV6VQDLKMzMqfkrkleNZMfarrh4y2odaxGSlt YGvIkeJg4R/vhUdWWnSCSZk8EtPZTC2ic/dMh0TZTw6zsaq0kkSf17a9HQ7exjgj AMzTl4/O2mPQ1/j6t3nLqxXAMKRmQwe0RhW47fCzAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBSd5/DP0a3Pi7gQeYounMW 9qa/ZCn2JyIlCSKPiQ2lRJeFLzXzG/e1hEiNtSBWS0oMi5HtyhsBSbmPeEp4Enl4 Ri7UR4OhyEOddOAI98IEPtditV7YVczQi0h8a3/518yxvqVcUUOmIsABIvNWWtB+ jov5sHygh2gQ9LK/9SXWxguvI4U0AiFteJvLKSFqqcUWbNXQn09fJNyM8Cx6mnTG 5pba3FCnr39CdRgzn21Zp+plodI6xu2T/VmvkBcU4jFVY/i36LJkJ0EBjcaUiE3h /1+POQXMivBuERizoRvtIx/xmsfKaFSp26iBW0I/AkQjCAJiVS+RF4DfaHLzg8jT -----END CERTIFICATE----- """ SSL_TEST_HARVESTER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAu796pnAo5nERG1oWW7SqXmRMFD1ZBaR4PcndGEFtGQAmXwWb CZ+UvX5KX6SfRO+fMEar57QKClMIdMp7ao0jVRBfiMD7PHlVfOciS42Vs0ZWDRcm Z6+IobSgJXg5F50sAyirliN7ZuvBgphpb80b7/IEff/FrrdNSQeC41LJc2i+QXTN +oM41hksVA9QNIHRupXgjGyZEVelUAyyjMzKn5K5JXjWTH2q64eMtqHWsRkpbWBr yJHiYOEf74VHVlp0gkmZPBLT2UwtonP3TIdE2U8Os7GqtJJEn9e2vR0O3sY4IwDM 05ePztpj0Nf4+rd5y6sVwDCkZkMHtEYVuO3wswIDAQABAoIBAEZ5IXjIMRIO7vTt Y+cYcbrsuwH95SSRD/FhjHRGWsU/oSeZ2xBJrnNSrGgqSv59U6uzW2Ol2P73G/16 48ijIdgURUf36FZS1RwFRoJFqyOYC0Tuo6PX59mLC3IFJqkOfi7RXVcGCpQfeoui 2jD1NL9kgPsqvvFOLNx0zVS3Bpci3L+HgQHRgSBJVjCuLnB+CF5nlb8abzh4gv5n zE7vyx+sZNJW+qk3TN8yM7D144YxKXZpzzK0tQCjmf2m8P2L4vuJLhuoi43kFgfm fgWUNFSfNrtSkVcYh9VEiaN0ZtpZbDgfNOixXIDq5N0whK3HoJSM0osST/C2Cz9V uyXAwUECgYEA8FUVMek74XOXKWDrvC6wenyKXQ0xnHJy3qAvH5amO6LvnXWLr0Ex ZbDz+BSzHBbjyY26m1z48BUS3GRY52mROVTlWJT+RMzdjEDWZdxjbCqrlCvx6mfI ZmnAJJ2oAw2ndw8a/2vtoVAzayxz62LUOY2m1HwotXh8/RS9/0UcoXUCgYEAx/zQ KSp6WB2MrwK+r5fLlmJtNVZEvqajjcD8g/1EggFN5QD5a/mLeoaYYREOu/mmWeJH GSK2FnSCeiTYzcVbao3BD7u9pt/6s+ev/QpiBAxCnyKAQ7zTiVEvzvruEhLi6TBq 3rjvjzsOz0PYgNTzK01x/ZU8BIr5czcKRJ78HIcCgYEAvkiPRHpHCAUOLRvo6ZEJ 96D9qBkXK6hOHMg1J0yPB27FSyVTWIpEgyBsugIhod7Zsa5+jh45l1UIHulwnqCt 8/essssc2vpde3umhPXO3kiWmvWET7SmLbgTAqq06N35tsGF/a/FcNBgNb33depE 3+Cws1IupSflxjeTCzb8KTUCgYAqFvI0h8UiAG4Yc0pwqFDnwKVdYV+shGPNtL0w hkBB4EZlmRPlfqq1SdiOLUndlAhHyJDQIHcUOMcxL8oVXKEFxvnH9upOUbtw26U1 a1b/pRjsZxV5rCcVMmoOdM9gLGtnSpJjd6arjXFre8r4KllXVsBT73GnPxyK/B2E HbXPxwKBgAkjgd/D6v8LLneuqLOYvuEwcecCuOrkkVl6S24y/Gn7hS4awojpraoj lZk1ZlWJwEj3KYp8toy7Wpz5bvVmZT6nVDudP2uMy3BrifIK5zZ/mKZZ4JmU7WSV R5+9lwCKYXUDvK7dVBY6M8oh8WD5F6tHAX1EV/b/PEnqRpaqsjGi -----END RSA PRIVATE KEY----- """ SSL_TEST_TIMELORD_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUZZmj3NMn41MJf/JZnA19S7GWBEcwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyMVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDiAHh3GaeWWIKsNlwDE6s8EfKs8AKvq7ThxFGtTAbZs1MT ckyg/7/phaihOVXmpdl9Lhul9nUxr3pFkW3pDuCXWeF/QB4pJqbbDUdOl1fu1g6z 8H3hLIKK8+yKm8SliLKGlYlm0lrCh+bR1gn46ACImMxs2PiLJydaG6TH/rnQZo8k 8S8unwpjrI09dwnwdhTGG6F3789bEHyZbwzmitHRrzYUKDviazaWvyspDNg6CJ9x +ufdVyY3vTAVsQZaGyTZMqxE/3cLtT3CHCGZaMddlVmicEIkgKh4vCYV//6suVbW cQnzBXYCbAC0jp+TaHFoLztoB++ODJbQ02kI6xylAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQCMUxFYqgEUN06caqVcTTZ5 rW3V8oRETxkCZ5okxRnKKJk6L9YhdkiL4Mjsbn+9ZwmWwEZJjlqOGUC8uZZgrRjr fqyftmYjvRVMZNZoh1wqp3kcEDXPLOqM7ixpK/D/ScOZc8G0EpiTykj4lmgF8/7t 11fCyv6vHYLqsDFNC3BJ8g8E09Zej2bEBwTXp6g52J/YCuJ2xpu9g8mOF2xs3ECv M74JEGlF0eNjuAQ+R5J5DaNwojHDoVYMYT5X/KaPxmLLl6b6n7ZvKuCZHs1CoLFn 1Jg1JGLOczrHvHnRPr4zLqffdnq/SFQP1MLFs+QUORLpHved+PPZJogSbRn7HzGQ -----END CERTIFICATE----- """ SSL_TEST_TIMELORD_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEA4gB4dxmnlliCrDZcAxOrPBHyrPACr6u04cRRrUwG2bNTE3JM oP+/6YWooTlV5qXZfS4bpfZ1Ma96RZFt6Q7gl1nhf0AeKSam2w1HTpdX7tYOs/B9 4SyCivPsipvEpYiyhpWJZtJawofm0dYJ+OgAiJjMbNj4iycnWhukx/650GaPJPEv Lp8KY6yNPXcJ8HYUxhuhd+/PWxB8mW8M5orR0a82FCg74ms2lr8rKQzYOgifcfrn 3VcmN70wFbEGWhsk2TKsRP93C7U9whwhmWjHXZVZonBCJICoeLwmFf/+rLlW1nEJ 8wV2AmwAtI6fk2hxaC87aAfvjgyW0NNpCOscpQIDAQABAoIBADgCidhqgUAfe3MW ncMdcsiWYiA980x6L3/sWZmrR99YM/ST1S3pdDR5rYsXXJSm8bm2XZ/J7s17gcAQ BL9Hsp2P5vTUfSURsTSEm/F8TIyifE5YAbp2f3vUbAEGDbxAno4ALWdQJrIjYC8M 7rfDN66iv7cSJrbF41jPlQ0DsiVVbkmUVQmb40o5iymROxj1as8ovDFqPC2mPIux 94gpKNf0FcwN/WPhz6uqHdkD26E5lIKSHy4G0Ko0uBWyITYPDQnp+57IRsm5goz9 8FzzKKlQOOh/MP4jondCjNbQXUMND2E/MUZoa/WH5JOthkrGnrupayQ9WSPWjmDd Ru+DMxkCgYEA98ESR2Qaxu+LvdjLTl4c/G+I6/6pKmKpAhomWS1s5a4oz5llJZeM 3bGxQJYM5Zk9f5lhBgHtM30N4W5sX7aKgixeK+rITqneX0jE9eyH/WisI4WHOwxw EXWuWhOK5MkctZPuruzCkaLAvhxtsmOQKhrSO5oCsBes0VK/dlglRJcCgYEA6YYQ Suam/OckqmYlbu+N1km4AtRO6O+qbkRsDT88vH1Z/PAIIbS0XYlzhfc/jStZtUOE k5UmEVqMeDHHHHg/ejczbNPVaTm0oWfWYH6D1UQdaQsI+AFDfYbuVc69ik9idnpb +8yUHyI7ikjowKvf0f/4rgHmZX4B7Ga5gtVupCMCgYEA6fp/zcZfd4MhYSDOGGvP SiP3lpDBqFLWtDKIBu5ciqkox65hlNgEZBZ9hLZw5aEMMGZk9+x33Il8w2qqlNXr BzbplOY9V/UbGre5s1s3rv3cnAtuBDkh2YtfJpiQMrMwFtfnsXHN6wZequxkOPXI X8tGwp0XbsBdKK7SPOzP/W8CgYEAxUSNCtjhg462+IMlaBtRVA4eNbWnmzqqXE/M fzxGUGwL0pHqLJ78Jm/weOCufNB8DZWlrw41hD9bnkVej/w8kz+CX5JrG2K15gtT m1wEfen2dj/uKaLXoniTaUUl9GqvIKqofYMKNWqzpVOF2wzWHA4Bwuyz9lSFx2/X kmA+AMUCgYB4x8hb035umUb+lh3EyS06edJPZdrHV3teJAZ25RAU76OQzGzfndCS VhgssI9LPWYXaO1vS7u9jSg56f6zNPHtpngSOZc9uySdSIIKM7pbucYmJB0Jrdhb 3HmdkTpb6wlZD/69AF6++09b3iFk67xsQCSSST1jW/66ZqLBkp57fw== -----END RSA PRIVATE KEY----- """ SSL_TEST_TIMELORD_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUCo4bPbI2+6ucwAKVWOVvza/5Ve0wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyMVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDTrCQBeTfXl3xKstyCxQpGelFNEagDRZLaJe/dPLN9FiBq N25JmL0mMiJfSSI1HQQoMMM0ayilEU8epeqWkWLi+Pw2aR7nuayPzlqfY411pOVy I0lZWi/M+w+ytyHA+/ORZHqSUf3Zccs8PouexC7bU4ScLHo6X7bOSiLfezNsqPAc RngI9C1rPLrzQQHUd1m2aQOhvMmbXfawaofZzSRZT/Ipdhm6TsTy4325XM8BtoXm CQtEUyM8xgmOkQF/4m/N51/+7Jnchcb3pBP1RujmibOwH4fAlDwu6A5kwe1oFMaq ql15KdElfkRvzbVDdyAVjUnW2j0WZ3WnumM0uTSbAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBGVJ1SnI7UT7M9BSt6Sfnu noJa96HgjVJTwMBkGIP7phGY8sm2B9OSVlaVUC6tZkJaXSPDqejdHRFleFrMn+yS eY3apM70u+GHRIjozf6FtQQ8D9AWY3sL1eDVfoNh/w6UPaLtt0GtvLXhR9gCvPgH WKNJ7/5hSsJHRVKBRZtuLwrU4nIwrdvcFHh9btAeNU+ZQ9BPx+jD7G0b3MC4aePg M/mUQkCBShhQPFIuPO5B5hYmyqvSfKfRCCXz3yObo0/DmEk1XlWu5fUStUXMoBRl JQ8AxL5aH9GLLkdhMqzInZiiEgFEEEF9OjeA0FpwG7qmRMwL0d6Mp/VfyMV3CwqT -----END CERTIFICATE----- """ SSL_TEST_TIMELORD_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpgIBAAKCAQEA06wkAXk315d8SrLcgsUKRnpRTRGoA0WS2iXv3TyzfRYgajdu SZi9JjIiX0kiNR0EKDDDNGsopRFPHqXqlpFi4vj8Nmke57msj85an2ONdaTlciNJ WVovzPsPsrchwPvzkWR6klH92XHLPD6LnsQu21OEnCx6Ol+2zkoi33szbKjwHEZ4 CPQtazy680EB1HdZtmkDobzJm132sGqH2c0kWU/yKXYZuk7E8uN9uVzPAbaF5gkL RFMjPMYJjpEBf+Jvzedf/uyZ3IXG96QT9Ubo5omzsB+HwJQ8LugOZMHtaBTGqqpd eSnRJX5Eb821Q3cgFY1J1to9Fmd1p7pjNLk0mwIDAQABAoIBAQClwrZnmP/MC0tA TBU3KwrC6mLkkaEa/s7jmrXecPy2Ri+YPlRVuhDV6ojUSbdKFLD+sEENuaUYrxdg jtnIk4325LjN+0BCgzrJWvXIv/M1X6521X9JQ8EPKsS+VX9PW38AKsl58E90ixJ2 2RwJduSiySKeEo6dS/siTRhGHnrE6ZFG9QsMTKhsLU0WfQFY3h9NzmAv5hN5eOta vVofMnOLRPeAEpvw0SzmnHf/oBs0cV/JTez/G1LB/xtG6QX2ko/DbjjtlKPr8kT+ Jz8i2pJvh3IA4ZxJYa7PiBxLszKvDgiOvbI/P6yKAwbeB0O1YWeiEdzQwujdEpzy 0+tNlE1RAoGBAP1qNZvUBJDGCVFKLKN+MU31K63nzGETV4kDsurvxMSxhSeOJILb aSx62dCWKyU/mrqE+uUrpAoV37Tp2rzyDeqyOSBoW/d7shsYk0Y+/oYQp3t4DB7J g8CQdL3ihgUvONwBUcG7MW7/RyXP29Na2eASlkkRdLPlP+jG9Wlzt1qHAoGBANXU 69QRx/4g/LyYCinkgeHqNqu4VORbyd5bnfCXkPwDppV317rJuMOJjye8IQngX6G0 fOdFXaxGWHE+w26bGI5gRvuPrG44NnD6xLfp2fFa+iUaW8qtY9z9qLK5w6RK7rGf oMV/cxofWpSrEVQu4ZojswpgBQH+hxo+c6280bZNAoGBAOLrgVepcfEltGA7WF+K d6IEQXm3UFc5F7BURJmF3J/5CnASI3Wd/b7bv0G9xqLTIr2UqIogGwMA9VIt+jYp VfbsYqU3berds+35gp9rd0Ubkq3IIKpM7pK3iCIkvrfTwkmXUNt2wVxQcShVydWn y+OPIU4KuIMCbMkHp+gmu2/vAoGBAMWw2m7wGYQbn04FCrB8cJAa53yPKP0O121a KoT6u7Ii9eoOKEaqpMUy8kT8K1dkN0XbBfcTLG1PhAj+y9QAVA2deUKuK+6izcJa NXELJNF9GPMgkWiqMT9ozISgNf44wME7IXo2QIYQIsB7/8NirHTDOI4JA9g6J1He Fziy7vepAoGBAOqr2nikLpb8vBozfHmXcTx72cRHOm53L9u3UwUwnyQML0JwDNe1 xrmKS/sKZgVk+TcjEIakfLn04wmk2ZmEPA/n2z9Xc17DQlstlC10Mg6eIga/Aw/s ocV3tE/6LBAtsPRjqR4U7JK4so6w64zHc6vbG25YBZunSnuegy73OM/3 -----END RSA PRIVATE KEY----- """ SSL_TEST_CRAWLER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUZXUt4iAbkAXAUd0mDEZSMXmcl3YwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyMVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDxVh9zMP+GF0XYDAqC3vehKpK2gTXSZTdgQWn0YMOkKQFZ NNHHkWAtePO5p7wSbysSUnurh9GlYtsK4kDnkj1eVBCWfVyPM/0cfkbhIcv5Jpkr qKABv+6b3v1mikl+erJ2SE3GEWY7wThZuPvNh8kDAYs7MuN766jQ59wSIxvCPlpp cObzbz21dHRrxDl8zCzNOk2z41sY12sGvtR1fWTIByqxnNy7mfa15/uEtY5qVaVz uQBm+gYV+lRoW3sHBJz9TEH92s+VnSpZj/hHbL8kpN8y0zichH9vG17E78LcCfCR B6fd/Civ8mZZNhH1cCGlm26w8y7qM2PnEwvsVJ/xAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAyQKtGaSz4s/U85m3zSqTm fykoZVo9+BhqPEK3bqiA/wQ4RnQushPEuaLqdD/qI9l6h6jKgnx3hyJ0Ht8CYo4r KAEhRVSoImdqW8TpFIOG2vNgK09HuI0ahwT3NfmXz8uI87IkzHco+QS/i7AMvU7V vjyFXSjWWQYmnzb7gWw/LEcpqScMB6/4UOam3G/xznMiFCmUDn9CEh/VNFaE6YK5 9VcfE2mcOftm8/jstoOgz5a/XduxJGObE/esMf2XeLLvfhIJV5yL+AkyVUrgESeB /SVfSH0gcu98o+jp3fT8zKF6Q53D4Uyf28HUY261pvvvZFnshprKR3Tzfjo+LcpW -----END CERTIFICATE----- """ SSL_TEST_CRAWLER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEA8VYfczD/hhdF2AwKgt73oSqStoE10mU3YEFp9GDDpCkBWTTR x5FgLXjzuae8Em8rElJ7q4fRpWLbCuJA55I9XlQQln1cjzP9HH5G4SHL+SaZK6ig Ab/um979ZopJfnqydkhNxhFmO8E4Wbj7zYfJAwGLOzLje+uo0OfcEiMbwj5aaXDm 8289tXR0a8Q5fMwszTpNs+NbGNdrBr7UdX1kyAcqsZzcu5n2tef7hLWOalWlc7kA ZvoGFfpUaFt7BwSc/UxB/drPlZ0qWY/4R2y/JKTfMtM4nIR/bxtexO/C3AnwkQen 3fwor/JmWTYR9XAhpZtusPMu6jNj5xML7FSf8QIDAQABAoIBAGjyLZz2+rcB2dJ4 cf21HfQMwl3w1EnYz/rgl0W46nqxhi+Xo33oPu2nQj1CrqtJgm5mRfcyib0kvuH9 v4Gz+1HQtqHqg9yWHARO+V2fR8bhvQvaOTJpl0Za8tCrZAhHLOH40TFHkbB8dpe1 tHINESFog3ZLy9awhOnLWczdTY3qnVLl/SuK7hK8WTjthl5ZBIXiv+gvXs77eahl Daa9q3KQRwlaDpjrkHiM8H3T645TREhatMBvpExO89bnMHPNTiLh5UF9SBrjF7RR xJwfYrgKmf/GPSeWvb4+RBGUwCHCmuFHibyqJ/VLT/pKeTzQWLKPxavrgmEIJyqN 9R47Xu0CgYEA+Jx6iKhdJM3Egp6k1mLOLQ2m+yjTU5D39/DjIhdEu/fI8zBGSwwO JtAGj9qUpNG0m74wqd3y8++LIxJmTjSqG9Z1jxT/sri4UvT3bqZy6Ry4/iwk+KZr 8IOYLzNmdxDhazSTa3UeHouvNmeLwmzCCNCQkHAN2jKsdjJiIe3ZkL8CgYEA+IJL diWOyBcMtcIH+bCaU80OYRiMOatexktBHu07r1eCETlXJPn3ifmcrM9JXhCKqlVc 9ZLunPq0NwqHdNGVTBtU2gau0DhomrXr7y4WGOdiB27cV1FsuU9PmpvL18/8AWxZ jEqmd3LuXphYdHWhn9N79Yxwdl7YKHAUXYB3S08CgYEA1VIfaiddVPkixxmtQy+g zdPLFfOf8TKRMzSFEHl6xvcEfHdNuZNsiS0ylDjwFsTB/mkhhIAnudwvPTbKhgx2 clCAqvdPuGD7+GKt9Unpi9DTg3UJfDoAoG2qJcYrA7t+UOjaHfhukbM18q7Co1+C 1uFvSiB8ImAcz4bH4WkfqC0CgYBz3WwJneFAcV6/r8PAKxMJV2YI50UZ7ki184hd PwbA7e/6z91NpC5B6lueRtdSQCwm1r4M0YDnOAymTQZy9PTDE0swjEUdV++Nkpx6 W+Z5nggapxmcrJ4gmFXpJBKagKJil3345yVONAvnluhHBEFjH1uAVQZqajYmRHt6 TNdSCQKBgQDB8Q+Vmqt34P/5gipoYFHdBaipLGupamJ1CBX1KoqtmMEWDgSxhGI4 Xhtm4AC2f6xwlo3S9R74QipeDyU0gN1LfGMdX8nsWUP2gcy6b1m1kSHI/e4AzJ4l aDkjJwkopaytAEq/SVAhqNPHdtH0ihLkBOoi1xkl9u1tNpMwZHv0NA== -----END RSA PRIVATE KEY----- """ SSL_TEST_DAEMON_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUQBjubkcEz8Ame+evhVR/P+08N7IwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyMVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQClp3iVfH6FLpZut6UdSrfkIfqED7h0aj8rkUi934BDFQiP I87MuuAl7N3Nj3U3my+vppp3se0kt4cro79KStORGGuKm6EftkWJj9PIx/UKU0jv PmtU2T7jzmohwM0RFwXSUUpAnInGUptSNlngbDJSQo92KYqCnCCw2Kllh8tSnaqn
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
true
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/simulator_full_node_rpc_client.py
flax/simulator/simulator_full_node_rpc_client.py
from __future__ import annotations from typing import Dict, List, Tuple from flax.rpc.full_node_rpc_client import FullNodeRpcClient from flax.types.blockchain_format.sized_bytes import bytes32 from flax.types.coin_record import CoinRecord from flax.types.full_block import FullBlock from flax.util.bech32m import encode_puzzle_hash from flax.util.byte_types import hexstr_to_bytes from flax.util.ints import uint128 class SimulatorFullNodeRpcClient(FullNodeRpcClient): async def get_all_blocks(self) -> List[FullBlock]: json_blocks = (await self.fetch("get_all_blocks", {}))["blocks"] return [FullBlock.from_json_dict(block) for block in json_blocks] async def farm_block(self, target_ph: bytes32, number_of_blocks: int = 1, guarantee_tx_block: bool = False) -> int: address = encode_puzzle_hash(target_ph, "txfx") request_args = {"address": address, "blocks": number_of_blocks, "guarantee_tx_block": guarantee_tx_block} new_height: int = (await self.fetch("farm_block", request_args))["new_peak_height"] return new_height async def set_auto_farming(self, set_auto_farming: bool) -> bool: result: bool = (await self.fetch("set_auto_farming", {"auto_farm": set_auto_farming}))["auto_farm_enabled"] assert result == set_auto_farming return result async def get_auto_farming(self) -> bool: result = await self.fetch("get_auto_farming", {}) return bool(result["auto_farm_enabled"]) async def get_farming_ph(self) -> bytes32: result = await self.fetch("get_farming_ph", {}) return bytes32(hexstr_to_bytes(result["puzzle_hash"])) async def get_all_coins(self, include_spent_coins: bool = False) -> List[CoinRecord]: json_result = await self.fetch("get_all_coins", {"include_spent_coins": include_spent_coins}) return [CoinRecord.from_json_dict(coin_records) for coin_records in json_result["coin_records"]] async def get_all_puzzle_hashes(self) -> Dict[bytes32, Tuple[uint128, int]]: str_result = (await self.fetch("get_all_puzzle_hashes", {}))["puzzle_hashes"] return {bytes32.from_hexstr(ph): (uint128(amount), num_tx) for (ph, (amount, num_tx)) in str_result.items()} async def revert_blocks(self, num_of_blocks_to_delete: int = 1, delete_all_blocks: bool = False) -> int: request = {"delete_all_blocks": delete_all_blocks, "num_of_blocks": num_of_blocks_to_delete} return int((await self.fetch("revert_blocks", request))["new_peak_height"]) async def reorg_blocks( self, num_of_blocks_to_revert: int = 1, num_of_new_blocks: int = 1, revert_all_blocks: bool = False, random_seed: bool = True, ) -> int: request = { "revert_all_blocks": revert_all_blocks, "num_of_blocks_to_rev": num_of_blocks_to_revert, "num_of_new_blocks": num_of_new_blocks, "random_seed": random_seed, } return int((await self.fetch("reorg_blocks", request))["new_peak_height"])
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/full_node_simulator.py
flax/simulator/full_node_simulator.py
from __future__ import annotations import asyncio import itertools import time from typing import Any, Collection, Dict, Iterator, List, Optional, Set, Tuple from flax.consensus.block_record import BlockRecord from flax.consensus.block_rewards import calculate_base_farmer_reward, calculate_pool_reward from flax.consensus.multiprocess_validation import PreValidationResult from flax.full_node.full_node import FullNode from flax.full_node.full_node_api import FullNodeAPI from flax.protocols.full_node_protocol import RespondBlock from flax.rpc.rpc_server import default_get_connections from flax.server.outbound_message import NodeType from flax.simulator.block_tools import BlockTools from flax.simulator.simulator_protocol import FarmNewBlockProtocol, GetAllCoinsProtocol, ReorgProtocol from flax.types.blockchain_format.coin import Coin from flax.types.blockchain_format.sized_bytes import bytes32 from flax.types.coin_record import CoinRecord from flax.types.full_block import FullBlock from flax.util.config import lock_and_load_config, save_config from flax.util.ints import uint8, uint32, uint64, uint128 from flax.wallet.transaction_record import TransactionRecord from flax.wallet.util.wallet_types import AmountWithPuzzlehash from flax.wallet.wallet import Wallet def backoff_times( initial: float = 0.001, final: float = 0.100, time_to_final: float = 0.5, clock=time.monotonic, ) -> Iterator[float]: # initially implemented as a simple linear backoff start = clock() delta = 0 result_range = final - initial while True: yield min(final, initial + ((delta / time_to_final) * result_range)) delta = clock() - start async def wait_for_coins_in_wallet(coins: Set[Coin], wallet: Wallet): """Wait until all of the specified coins are simultaneously reported as spendable in by the wallet. Arguments: coins: The coins expected to be received. wallet: The wallet expected to receive the coins. """ while True: spendable_wallet_coin_records = await wallet.wallet_state_manager.get_spendable_coins_for_wallet( wallet_id=wallet.id() ) spendable_wallet_coins = {record.coin for record in spendable_wallet_coin_records} if coins.issubset(spendable_wallet_coins): return await asyncio.sleep(0.050) class FullNodeSimulator(FullNodeAPI): def __init__(self, full_node: FullNode, block_tools: BlockTools, config: Dict) -> None: super().__init__(full_node) self.bt = block_tools self.full_node = full_node self.config = config self.time_per_block: Optional[float] = None self.full_node.simulator_transaction_callback = self.autofarm_transaction self.use_current_time: bool = self.config.get("simulator", {}).get("use_current_time", False) self.auto_farm: bool = self.config.get("simulator", {}).get("auto_farm", False) def get_connections(self, request_node_type: Optional[NodeType]) -> List[Dict[str, Any]]: return default_get_connections(server=self.server, request_node_type=request_node_type) async def get_all_full_blocks(self) -> List[FullBlock]: peak: Optional[BlockRecord] = self.full_node.blockchain.get_peak() if peak is None: return [] blocks = [] peak_block = await self.full_node.blockchain.get_full_block(peak.header_hash) if peak_block is None: return [] blocks.append(peak_block) current = peak_block while True: prev = await self.full_node.blockchain.get_full_block(current.prev_header_hash) if prev is not None: current = prev blocks.append(prev) else: break blocks.reverse() return blocks async def autofarm_transaction(self, spend_name: bytes32) -> None: if self.auto_farm: self.log.info(f"Autofarm triggered by tx-id: {spend_name.hex()}") new_block = FarmNewBlockProtocol(self.bt.farmer_ph) await self.farm_new_transaction_block(new_block, force_wait_for_timestamp=True) async def update_autofarm_config(self, enable_autofarm: bool) -> bool: if enable_autofarm == self.auto_farm: return self.auto_farm else: self.auto_farm = enable_autofarm with lock_and_load_config(self.bt.root_path, "config.yaml") as config: if "simulator" in config: config["simulator"]["auto_farm"] = self.auto_farm save_config(self.bt.root_path, "config.yaml", config) self.config = config if self.auto_farm is True and self.full_node.mempool_manager.mempool.total_mempool_cost > 0: # if mempool is not empty and auto farm was just enabled, farm a block await self.farm_new_transaction_block(FarmNewBlockProtocol(self.bt.farmer_ph)) return self.auto_farm async def get_all_coins(self, request: GetAllCoinsProtocol) -> List[CoinRecord]: return await self.full_node.coin_store.get_all_coins(request.include_spent_coins) async def revert_block_height(self, new_height: uint32) -> None: """ This completely deletes blocks from the blockchain. While reorgs are preferred, this is also an option Note: This does not broadcast the changes, and all wallets will need to be wiped. """ async with self.full_node._blockchain_lock_high_priority: peak_height: Optional[uint32] = self.full_node.blockchain.get_peak_height() if peak_height is None: raise ValueError("We can't revert without any blocks.") elif peak_height - 1 < new_height: raise ValueError("Cannot revert to a height greater than the current peak height.") elif new_height < 1: raise ValueError("Cannot revert to a height less than 1.") block_record: BlockRecord = self.full_node.blockchain.height_to_block_record(new_height) # remove enough data to allow a bunch of blocks to be wiped. async with self.full_node.block_store.db_wrapper.writer(): # set coinstore await self.full_node.coin_store.rollback_to_block(new_height) # set blockstore to new height await self.full_node.block_store.rollback(new_height) await self.full_node.block_store.set_peak(block_record.header_hash) self.full_node.blockchain._peak_height = new_height # reload mempool await self.full_node.mempool_manager.new_peak(block_record, None) async def get_all_puzzle_hashes(self) -> Dict[bytes32, Tuple[uint128, int]]: # puzzle_hash, (total_amount, num_transactions) ph_total_amount: Dict[bytes32, Tuple[uint128, int]] = {} all_non_spent_coins: List[CoinRecord] = await self.get_all_coins(GetAllCoinsProtocol(False)) for cr in all_non_spent_coins: if cr.coin.puzzle_hash not in ph_total_amount: ph_total_amount[cr.coin.puzzle_hash] = (uint128(cr.coin.amount), 1) else: dict_value: Tuple[uint128, int] = ph_total_amount[cr.coin.puzzle_hash] ph_total_amount[cr.coin.puzzle_hash] = (uint128(cr.coin.amount + dict_value[0]), dict_value[1] + 1) return ph_total_amount async def farm_new_transaction_block( self, request: FarmNewBlockProtocol, force_wait_for_timestamp: bool = False ) -> FullBlock: async with self.full_node._blockchain_lock_high_priority: self.log.info("Farming new block!") current_blocks = await self.get_all_full_blocks() if len(current_blocks) == 0: genesis = self.bt.get_consecutive_blocks(uint8(1))[0] pre_validation_results: List[ PreValidationResult ] = await self.full_node.blockchain.pre_validate_blocks_multiprocessing( [genesis], {}, validate_signatures=True ) assert pre_validation_results is not None await self.full_node.blockchain.receive_block(genesis, pre_validation_results[0]) peak = self.full_node.blockchain.get_peak() assert peak is not None curr: BlockRecord = peak while not curr.is_transaction_block: curr = self.full_node.blockchain.block_record(curr.prev_hash) current_time = self.use_current_time time_per_block = self.time_per_block assert curr.timestamp is not None if int(time.time()) <= int(curr.timestamp): if force_wait_for_timestamp: await asyncio.sleep(1) else: current_time = False time_per_block = 1 mempool_bundle = await self.full_node.mempool_manager.create_bundle_from_mempool(curr.header_hash) if mempool_bundle is None: spend_bundle = None else: spend_bundle = mempool_bundle[0] current_blocks = await self.get_all_full_blocks() target = request.puzzle_hash more = self.bt.get_consecutive_blocks( 1, time_per_block=time_per_block, transaction_data=spend_bundle, farmer_reward_puzzle_hash=target, pool_reward_puzzle_hash=target, block_list_input=current_blocks, guarantee_transaction_block=True, current_time=current_time, previous_generator=self.full_node.full_node_store.previous_generator, ) rr = RespondBlock(more[-1]) await self.full_node.respond_block(rr) return more[-1] async def farm_new_block(self, request: FarmNewBlockProtocol, force_wait_for_timestamp: bool = False): async with self.full_node._blockchain_lock_high_priority: self.log.info("Farming new block!") current_blocks = await self.get_all_full_blocks() if len(current_blocks) == 0: genesis = self.bt.get_consecutive_blocks(uint8(1))[0] pre_validation_results: List[ PreValidationResult ] = await self.full_node.blockchain.pre_validate_blocks_multiprocessing( [genesis], {}, validate_signatures=True ) assert pre_validation_results is not None await self.full_node.blockchain.receive_block(genesis, pre_validation_results[0]) peak = self.full_node.blockchain.get_peak() assert peak is not None curr: BlockRecord = peak while not curr.is_transaction_block: curr = self.full_node.blockchain.block_record(curr.prev_hash) current_time = self.use_current_time time_per_block = self.time_per_block assert curr.timestamp is not None if int(time.time()) <= int(curr.timestamp): if force_wait_for_timestamp: await asyncio.sleep(1) else: current_time = False time_per_block = 1 mempool_bundle = await self.full_node.mempool_manager.create_bundle_from_mempool(curr.header_hash) if mempool_bundle is None: spend_bundle = None else: spend_bundle = mempool_bundle[0] current_blocks = await self.get_all_full_blocks() target = request.puzzle_hash more = self.bt.get_consecutive_blocks( 1, transaction_data=spend_bundle, farmer_reward_puzzle_hash=target, pool_reward_puzzle_hash=target, block_list_input=current_blocks, current_time=current_time, time_per_block=time_per_block, ) rr: RespondBlock = RespondBlock(more[-1]) await self.full_node.respond_block(rr) async def reorg_from_index_to_new_index(self, request: ReorgProtocol): new_index = request.new_index old_index = request.old_index coinbase_ph = request.puzzle_hash seed = request.seed if seed is None: seed = bytes32(32 * b"1") current_blocks = await self.get_all_full_blocks() block_count = new_index - old_index more_blocks = self.bt.get_consecutive_blocks( block_count, farmer_reward_puzzle_hash=coinbase_ph, pool_reward_puzzle_hash=coinbase_ph, block_list_input=current_blocks[: old_index + 1], force_overflow=True, guarantee_transaction_block=True, seed=seed, ) for block in more_blocks: await self.full_node.respond_block(RespondBlock(block)) async def process_blocks(self, count: int, farm_to: bytes32 = bytes32([0] * 32)) -> int: """Process the requested number of blocks including farming to the passed puzzle hash. Note that the rewards for the last block will not have been processed. Consider `.farm_blocks()` or `.farm_rewards()` if the goal is to receive XFX at an address. Arguments: count: The number of blocks to process. farm_to: The puzzle hash to farm the block rewards to. Returns: The total number of reward mojos for the processed blocks. """ rewards = 0 height = uint32(0) if count == 0: return rewards for _ in range(count): block: FullBlock = await self.farm_new_transaction_block(FarmNewBlockProtocol(farm_to)) height = uint32(block.height) rewards += calculate_pool_reward(height) + calculate_base_farmer_reward(height) while True: peak_height = self.full_node.blockchain.get_peak_height() if peak_height is None: raise RuntimeError("Peak height still None after processing at least one block") if peak_height >= height: break await asyncio.sleep(0.050) return rewards async def farm_blocks(self, count: int, wallet: Wallet) -> int: """Farm the requested number of blocks to the passed wallet. This will process additional blocks as needed to process the reward transactions and also wait for the rewards to be present in the wallet. Arguments: count: The number of blocks to farm. wallet: The wallet to farm the block rewards to. Returns: The total number of reward mojos farmed to the requested address. """ if count == 0: return 0 rewards = await self.process_blocks(count=count, farm_to=await wallet.get_new_puzzlehash()) await self.process_blocks(count=1) peak_height = self.full_node.blockchain.get_peak_height() if peak_height is None: raise RuntimeError("Peak height still None after processing at least one block") coin_records = await self.full_node.coin_store.get_coins_added_at_height(height=peak_height) block_reward_coins = {record.coin for record in coin_records} await wait_for_coins_in_wallet(coins=block_reward_coins, wallet=wallet) return rewards async def farm_rewards(self, amount: int, wallet: Wallet) -> int: """Farm at least the requested amount of mojos to the passed wallet. Extra mojos will be received based on the block rewards at the present block height. The rewards will be present in the wall before returning. Arguments: amount: The minimum number of mojos to farm. wallet: The wallet to farm the block rewards to. Returns: The total number of reward mojos farmed to the requested wallet. """ rewards = 0 if amount == 0: return rewards height_before = self.full_node.blockchain.get_peak_height() if height_before is None: height_before = uint32(0) for count in itertools.count(1): height = uint32(height_before + count) rewards += calculate_pool_reward(height) + calculate_base_farmer_reward(height) if rewards >= amount: await self.farm_blocks(count=count, wallet=wallet) return rewards raise Exception("internal error") async def wait_transaction_records_entered_mempool(self, records: Collection[TransactionRecord]) -> None: """Wait until the transaction records have entered the mempool. Transaction records with no spend bundle are ignored. Arguments: records: The transaction records to wait for. """ ids_to_check: Set[bytes32] = set() for record in records: if record.spend_bundle is None: continue ids_to_check.add(record.spend_bundle.name()) while True: found = set() for spend_bundle_name in ids_to_check: tx = self.full_node.mempool_manager.get_spendbundle(spend_bundle_name) if tx is not None: found.add(spend_bundle_name) ids_to_check = ids_to_check.difference(found) if len(ids_to_check) == 0: return await asyncio.sleep(0.050) async def process_transaction_records(self, records: Collection[TransactionRecord]) -> None: """Process the specified transaction records and wait until they have been included in a block. Arguments: records: The transaction records to process. """ coins_to_wait_for: Set[Coin] = set() for record in records: if record.spend_bundle is None: continue coins_to_wait_for.update(record.spend_bundle.additions()) coin_store = self.full_node.coin_store await self.wait_transaction_records_entered_mempool(records=records) while True: await self.process_blocks(count=1) found: Set[Coin] = set() for coin in coins_to_wait_for: # TODO: is this the proper check? if await coin_store.get_coin_record(coin.name()) is not None: found.add(coin) coins_to_wait_for = coins_to_wait_for.difference(found) if len(coins_to_wait_for) == 0: return async def create_coins_with_amounts( self, amounts: List[int], wallet: Wallet, per_transaction_record_group: int = 50, ) -> Set[Coin]: """Create coins with the requested amount. This is useful when you need a bunch of coins for a test and don't need to farm that many. Arguments: amounts: A list with entries of mojo amounts corresponding to each coin to create. wallet: The wallet to send the new coins to. per_transaction_record_group: The maximum number of coins to create in each transaction record. Returns: A set of the generated coins. Note that this does not include any change coins that were created. """ invalid_amounts = [amount for amount in amounts if amount <= 0] if len(invalid_amounts) > 0: invalid_amounts_string = ", ".join(str(amount) for amount in invalid_amounts) raise Exception(f"Coins must have a positive value, request included: {invalid_amounts_string}") if len(amounts) == 0: return set() # TODO: This is a poor duplication of code in # WalletRpcApi.create_signed_transaction(). Perhaps it should be moved # somewhere more reusable. outputs: List[AmountWithPuzzlehash] = [] for amount in amounts: puzzle_hash = await wallet.get_new_puzzlehash() outputs.append({"puzzlehash": puzzle_hash, "amount": uint64(amount), "memos": []}) transaction_records: List[TransactionRecord] = [] outputs_iterator = iter(outputs) while True: # The outputs iterator must be second in the zip() call otherwise we lose # an element when reaching the end of the range object. outputs_group = [output for _, output in zip(range(per_transaction_record_group), outputs_iterator)] if len(outputs_group) > 0: async with wallet.wallet_state_manager.lock: tx = await wallet.generate_signed_transaction( amount=outputs_group[0]["amount"], puzzle_hash=outputs_group[0]["puzzlehash"], primaries=outputs_group[1:], ) await wallet.push_transaction(tx=tx) transaction_records.append(tx) else: break await self.process_transaction_records(records=transaction_records) output_coins = {coin for transaction_record in transaction_records for coin in transaction_record.additions} puzzle_hashes = {output["puzzlehash"] for output in outputs} change_coins = {coin for coin in output_coins if coin.puzzle_hash not in puzzle_hashes} coins_to_receive = output_coins - change_coins await wait_for_coins_in_wallet(coins=coins_to_receive, wallet=wallet) return coins_to_receive
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/ssl_certs_9.py
flax/simulator/ssl_certs_9.py
from __future__ import annotations from typing import Dict, Tuple SSL_TEST_PRIVATE_CA_CRT = b"""-----BEGIN CERTIFICATE----- MIIDKTCCAhGgAwIBAgIUX9kvHEjir5fniTg3GRQ8wO7zOvAwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMB4XDTIyMDczMTAyMDgxNVoXDTMyMDcy ODAyMDgxNVowRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8G A1UECwwYT3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEAykxn/RsW32xbKhz4CFSnngEwji+mbyOREJihRy/2ydPI dQ1vgMJdgatf3GUr49imIYu4r1PfvvLTHCCXLjbW4zk8K+Tf+gGfnm/rjvGvwO7I J7qZj2slknkZAqq0jhVKkt+xkM4A3fbk6cy2DC+2w2se20fKvPa8Nwgt1GzBGpN4 ditUWZwhVz3Q+4QMnZTEiKkfkKBYlJntheIiLPTReDiHUlMIfl1kBqYZqLmX3lsS J29o73BMyjNhQBMKe5F6TIcYeIME5H/DAKCfS6JR3HGMj1aqeunqVZ+Wacs+HOtD hHLrSsCwMa1XVzPPNV1on7JekgSpEXTd9DEtpHO5TQIDAQABoxMwETAPBgNVHRMB Af8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQAk7pLuj7tqbztCXhLMD5TqIfml HB3K1nOKwNEIJ29J8Xc6lKUMB/z3UFVmPPuuHW3FBXsrf1ZcZLaTNZuY2304yURV uzpH5GAivGwSbXmccOee1HV8Rrvii/Gd8c2qdxBsypaiMaNAOCOUHqfGAQCWRefO /8rn8TmXWikNFL2YygcR+XI5jWTAF6LoXCxV0y48X4Kg7G7s5QHDqnHYhakfAtyO 9KpUPODd3UIZoW5k8A0vn0xwrvyqwNhCTHOkt178jCiqCR1b3jnvmVHTw1rIOnXE rhdGfc4ywMBp+Rv8hFZM0RPmt+aDy+O2XvdPqFCky6R4+l8RtlYP242urN8q -----END CERTIFICATE----- """ SSL_TEST_PRIVATE_CA_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEAykxn/RsW32xbKhz4CFSnngEwji+mbyOREJihRy/2ydPIdQ1v gMJdgatf3GUr49imIYu4r1PfvvLTHCCXLjbW4zk8K+Tf+gGfnm/rjvGvwO7IJ7qZ j2slknkZAqq0jhVKkt+xkM4A3fbk6cy2DC+2w2se20fKvPa8Nwgt1GzBGpN4ditU WZwhVz3Q+4QMnZTEiKkfkKBYlJntheIiLPTReDiHUlMIfl1kBqYZqLmX3lsSJ29o 73BMyjNhQBMKe5F6TIcYeIME5H/DAKCfS6JR3HGMj1aqeunqVZ+Wacs+HOtDhHLr SsCwMa1XVzPPNV1on7JekgSpEXTd9DEtpHO5TQIDAQABAoIBAF6z1hqPC+4b87GL TjHYL3+wXuKxO+DbbZWvXhDNS2LAWh8x4vkMBGonqACs/Bb13Q/nMNYjFaN2WY3Z U+y2j3Jf4ONLie6nw+mPy15nljdjkR/IIwsYxcYEGsk80LmTDg4j2iRHy/AdHJy2 0KJz08M36oIM4cQEXagFlC7VmrCtc4fYktJQwxD1IzS7+9l+bgjYeZe6ItZS6AEo CM/mDZxrjcPJRIRM6F5oeEqwGOpxnDQJB0H6QsA9dgF8rIzuJf8mWr2pk9RfS/E6 2KRDyW3Hpk4O1Cd5urKA/yuc5UBdWyhhozh03snG74M2rMrNPwmq4a9cMrWOBDhy fzlOFKECgYEA7CipWGKjp/haF9rsxeSpsfE8g6d61geJ9Sbsl3MbvIO+9Wi9eigo O/kWmlUG/rFE5g/rjmgXldGkVoMdVb+oeLVbvp2JSntIFJBKUWHgLGk7jJVx9EAI 3ocYWxqelJL5xPGU52cRX/0ETOwo59w8UWjUeeQwScT10kNf7sP573cCgYEA20t4 jLqphsYWwUFwwSthspsbru8OdWWQJqn9ZwNrfkWBBzQ5CHMIhq6QLP5RCpG63Vef INylG65kzTM5i0RD5nHAQzFAeXoUf+g8lq6T58G0Q3uvsOdjVLusRBUQnljbkeJl ww3fUMBC1Iex687urSblir5ExJ26tWQg0ZHLtlsCgYEAtIHb9ufmaaRF0MgQhK5k GtPmSkdAd8npZA3td1GPmMcmtdPqSC3bmwOoiCyHnTOIE0WF6iKcLHLCZzHuwTUu o50T1B3764dRsA4eEBh8zdVdo/Yy1NwBK34dWr19CtlQun1hMIKyYCk4GUfFeHv5 SsyS49xMIIbA0oeXExyOtL8CgYBGJsWAl3IF2DaNSgbs9JjDTxUzB+xjJ8NOaxDS NGjdsxRMnqskBdCTbSJYEl8Qd4AEsLQKCiuTSF2cuydMYuEpxffQRuAuPBx0snE3 bs+H0xJ8iAOzHsJK5+J6wRZY4WoUKA2PsU9gALEgVexX2BHIOGoz0RwknaSNxGMv R2mYgwKBgQC33VmlG+adWfH5yaOj5twnrETUqs+ehc0O8qoNmn+Ueop+AHgI7lY6 tkkf+ZKkyT4nJz0VRZuVL+jYFq1UeaY2m+fO7mg2AOWl2zWH2UaY+vlh2mAYpXiC 26qkyxUI5VRyVyQ7g7NtbSJGlzMXDVxzHI6jliR8YKuLOEsiRECQDg== -----END RSA PRIVATE KEY----- """ SSL_TEST_FULLNODE_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUJxG4nRreZqpC8YFg4bfgBgnjp8gwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgxNVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQD7zuyb/gcsWCWbuLrEJSjVJWSOAP3YYVEnUIR949nIE+xS 32Z01a2/y4lcUf1DoB2ADYv4LqSrHnBasgznXJHYWPNRQX5hOGeJzC0Gb8B4MEWF 7gPC+v6//GXytGl2fg5GyGHDbKT33f6c1TaJXY4P2iummoFNoOX13EzyYEWXeBC1 L9p8+fkpSC1C1eCwRQdzrghqagP06kt4gpO2OSJ0xtBX5fz8NY4pZ2CP33nyG8S+ yTJLZweWMFnueUL3b9JJgticr8RteyrKOGoVhcFnymw3GnsbGZURUxp/yXM67ovN Ud487CNHHOJl3gDK69LcALOMZAHS5Q0ZQECpPWSxAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQCOzjCPbMEDx1Q1XJyJDF8l c2z0Tk3xhlGY1PnaARt4xNHh5gFodCeFTb+f9Ywoy0cYQ67PRZyLgDyuRKp8T4+z wgWmG4NmvMKO+9h4F76+VGqYX7Oc5QADPF+hJrAWUNNEN+NbUpDp+W8E1aUzkIBE HK2aNM7PAapereWXyR+U/mUXrOtiecBD72g0zS4hp++Uxn3uEaQobBc1EaT/GS/x HWy2tmWaczUf5TydC44lF8NZCuMm89ldF+Qmz8b30ON2OsFzr/2WVVaj+k+j0MsQ +Urzepx4+8NnlBGwgAyzlA1nEoDIsKMqUyBQlqv7cSFh2m05q7UrAUk/nFw+tNOP -----END CERTIFICATE----- """ SSL_TEST_FULLNODE_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEA+87sm/4HLFglm7i6xCUo1SVkjgD92GFRJ1CEfePZyBPsUt9m dNWtv8uJXFH9Q6AdgA2L+C6kqx5wWrIM51yR2FjzUUF+YThnicwtBm/AeDBFhe4D wvr+v/xl8rRpdn4ORshhw2yk993+nNU2iV2OD9orppqBTaDl9dxM8mBFl3gQtS/a fPn5KUgtQtXgsEUHc64IamoD9OpLeIKTtjkidMbQV+X8/DWOKWdgj9958hvEvsky S2cHljBZ7nlC92/SSYLYnK/EbXsqyjhqFYXBZ8psNxp7GxmVEVMaf8lzOu6LzVHe POwjRxziZd4AyuvS3ACzjGQB0uUNGUBAqT1ksQIDAQABAoIBABnN7rldouaMce4v VBRdqn2NQ2y59UmDT4mz2p/8BYlXYVRsyFcYvqF0/jKTxFx1wBArUzivrvhKOkFR Fblv5xJAq06cY5Ma8KFSZxrNwO+QIs/CwGfuyMRr3RauHlCiQlxGlJ4uOAmemkUA JIKXL8O4G9kK5E1MO8SiOtBrxTXsR+BztpMUEw/gltjSd/h8AflnkmLjGVG/G4/z XMALCeZqhR9G9lCsTJtAStLA5z8Atho6R/VSj2WwfOxm8y1GfyWYRP0QZgAR9QDm wbarjp4QCgGHS7KAaFbW2yyrvDFwZgUzLirI1Qr3JGqGMeaaGnwQ1aWXEGn6tY6t H8U3oEECgYEA/iAdgpaCYSKAtv0fLlSGxyjpFLbf1GRXt3Mb75/zLxMEHBpvU9b2 cMB+TDlCJNFZwv0glSJN4S6iPBf3VWb4KMd+2BMBRkcynKSS9DD58C478qrxsyGW BtpBVjg/reJ853VW30CdfRHk87vAMDeicnLVAGs9Gj2xxVkO9wVXzwUCgYEA/apu 7kiO1ybPvn132SBHr9j3bZXATi3oN6i9N9rRPFxBbPeg1a5fFc2o9lZ499Gga8PH VHJXVL8UCiKYgoVF8LVrvKMXbdE0sWlaWEJEkFzUJtkbnzI6t95cjbZtOcoDRecb CgqGdeHPNTIFjjhCx2YlsCPejn/jQBMI8R4Mtr0CgYEApGPsEx0ADIwATd+iexsM 8OsDFHZUhxW+NJsPGE0VSH95qiBjog2t8DRlvzNPGXggI+YRXMgLLz82jb9HLYTl xaN/55ErwuWt1O0Vb0f7dybBevKgVivE3Hv1xiuu7fJUsHoUj2lCN7UKsazj340t 1fF43sOAjGgahrpc1ukq620CgYAHlhlLNxBOjvKXl9kFvVlngO2lcV0W+XiAcaN3 ECxByeCLCbzdpyFg3Y24EE39218Y2foUJHdIKY7H3tEA1kuJL2PReG8y8ZbJ14TE Lvct+hi+MLAKys3GwfeypUoO+GOwq4C7hCURUXeI974Cytv0arGl2uzFBj4dpHQY AfYPYQKBgQDpeXIsbEfBF5h0KjLmU+4lk8OK1MsiB+UWUR61g/hl90tEWvsGNMCQ T87fzHmiVuDrU4B0KUFgH1kfQtqPu8VMAO2mrsBoNjFRfIkkUjkgpKQ3zTPgBWUN xzIOwhFaj7sqSxlJKhp70ENopk1jv3uGSnYw+B+7qyuPePo7gcLwsw== -----END RSA PRIVATE KEY----- """ SSL_TEST_FULLNODE_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUH+vOBpWm7GZBImUetpmvvngiuUQwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgxNVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDSMjjzEEqoICoK7gBXrUhkhzVLmNnPxTpod32QWSpnSR9/ R81bPlxoaWixzYfNnAntIOr6txh82sd3lPqT45zT/Ji7iTkcbmh10Kw2YMPb1+cM GAy3x/K+ASUMP911J/4E+4jFqodY7EccfxbnZir/U7IktqxfxiPZoDC5Dvf5YtJZ ZJLITRaAnoA66OC/cUWjxbzOGGPt9bJNbQXlgHGmJx6D9vaUE3hnIm03HpO+74S0 S54b4TI0R3H+fuU1jxgMuCHACcQTKpZRi5h4QT8QQJXoL/70dDG0DNFsI5RIEgf4 KS6wowbJLdqpZpeW4Sh513/xQYeEsIWgFnV6ZM3hAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAJKLQAkQBXoI8LJ0GRpLT+ wwdqXt1xdrLwyRI2Vf5hrxkRtYuvmXUjHrI/HxlIvapVUns2W9g9b2Eim/mb7FNJ jztgEEP4V2OjbTOJOiqZakFA2te6FIlV4otaj6GOMwuCt8q2L+0m/KfHzLQYqn3X YGUi9TQMMvJjVHmuZfEbVEKiNjjrT1DVE6YOQQBZKCCyTQccMXQSGwogtJOf3EH7 ruOiBExxyAFdntsE3VjSCD7U/jA2pnXD1KutI2o0g0bO1twuz7EzVLZFJNey0BUB HtXDTP5TCJpf3lybcssjdiDnfARXUMTN2ka5WXgvebDwb1pqmuDlrVrA8UmqTYcy -----END CERTIFICATE----- """ SSL_TEST_FULLNODE_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEA0jI48xBKqCAqCu4AV61IZIc1S5jZz8U6aHd9kFkqZ0kff0fN Wz5caGlosc2HzZwJ7SDq+rcYfNrHd5T6k+Oc0/yYu4k5HG5oddCsNmDD29fnDBgM t8fyvgElDD/ddSf+BPuIxaqHWOxHHH8W52Yq/1OyJLasXIYj2aAwuQ73+WLSWWSS yE0WgJ6AOujgv3FFo8W8zhhj7fWyTW0F5YBxpiceg/b2lBN4ZyJtNx6Tvu+EtEue G+EyNEdx/n7lNY8YDLghwAnEEyqWUYuYeEE/EECV6C/+9HQxtAzRbCOUSBIH+Cku sKMGyS3aqWaXluEoedd/8UGHhLCFoBZ1emTN4QIDAQABAoIBAFHwmhrG4xOfVkRk e2Wye2IVA0WxFFfWfupyilRXLhyNeOXZS8iiCsv5K4MEqEgS6Bu0lWWfMsCZWODZ BsXYGS7abX/OAqF+uOIUss2P80okZEFmrq6GF67SK2sXCnG9YVz34V2NGK4ljaMi N/+E6IYYTn3ZaF+5Owh/Vf8OQsTIeGcFqLd+kpozQz8luM9623LEq/YZlHqsaBNy rF8RxnSjbYNzUPqsAFCxN+apEHfjuJiIM+dUIu2ZWH4FauwRZ/FbOaz2Cue2/gAk zL0XhspQfP69cB7YppO6fu7Y6WcsM6rqXEoJMt3XIdWw9iAmaWnjRo0BONJnYIIB 5h+t+EECgYEA7YGMaaX8wRO5OGKKXx2y+UZzXO8H7dJ84Kf84M/NVt3pl7Icuw3S NaVcIQgXk7AiIH7bMkwZ3De2HiD+aTA4SGfFOhLYYbsj2Ke3VpnCCUiHqpf9/5lX StuLGXJgwfQ2hrG2NKB9CPTfR2tsaI1FngqJRNWnmWLsiRXs/1m2n6UCgYEA4pBH RNvbmHlNW4qFd0dc84cgIAixhdESbGbscGuc2BpEo7rMHpsWYkEEib/9/ZpxrigL QFP3fbrfGsuvxWUhYenv8tt9YT55t56oj0mXgCcfkxoPnnntguD+Q9inw53pbMMp g/qwn8STMqM8KNqWMbtLBR2HCJbhqFrXfl5dYI0CgYBNiu9iCuyDyUG+1AVjWpn1 YvgFTpFjJ0bYPmCEsbPT+a3rdh6FP9Ty6OM0caTo9ieePmyodko3KQVPvuvxQeoO UbsF4+M7vVLNyKxGHPtJ9qE8pFUsX08txJIco8hNasNmpJzdf8xy4SgI9Fy3ofAp 0jzQ+YS3wqGBfGQdVpgWdQKBgDKxpcC6kQAk5DI/ZG20AhBbg8ynJVGT3lNzFCRz b7zK4+Dewx12BiQl+CX6V5KPJDCbtSjHoPD5B0KvoLzCTB3kglQM2JkRqZp0XbLx /HwoROBdTHFhRsuqHDqCF8elZb14TanCRhL5oRYLgEKD5mdqSPb0DGrXl9ZbvSwB YVNhAoGAYuY7HJRgnfwqAhdDagbPlJxL74f4VGG1MrWQ3LNQAK18vC7qem3MWoNN ShcbfVoevcC66HBfqvKVLlRpf8n67zs5uOetxBRtA52888s1P456JsVaihTKo7Lr DSmPIkttRAJAZAr/T+aLncA/x80bUaDskUbhDUVu3r3bxPieU68= -----END RSA PRIVATE KEY----- """ SSL_TEST_WALLET_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUHVa/b7E1IfWxhidTznNrmWBa8rEwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgxNVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDLKM3aHoUk41DT3hOcg4HMYIdu+p6iIchg/LxlzQW2QLAD ALcqP/u+c+a2ogqpWUC5Ub2o20UgboUJ67XdfqdiC3fBZ4hFpd9fuy0RYYtbPtYX 3DQkqY7U2eauRW78qTKP3AtTuGy25PmwtrEEMHpWTeeg2D3AdG6MGiiSzQHkPW/S 5t9y7UzNIKKsr5sCKNmEmxde1g9z0Aa7oJPXRLr93Y2YkQcsszX6DC6Q69VnhgC9 4CFfqp6kRk7DUxunJfNh0cUN2vHIP+0ICCr4o3FUslldpJrFvCpq9oyBxY1Gonpx KaPhxkPJRmGNTxoubffDqwW0IjfxTMgGdjb2ZkytAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBXWejEkaLjR2YNUnUddqq4 Y49FDEmprs8tBY6bmpaJpKMCwLbBYBSnxRODlV2Q8MITeZUNSOwLhi96vsYFKRdD yvYRXkk/aBl5soFCT8ihDFvx4mGKRNux0ouHEVveVJ5RJcMFyGAbI4J/L7XHgbXW PSuY1Zdtnn/Tg0mkPvl9z+TPluxgLUBIvdzQIzcYNsCVL+iNZzjnbfz9qtvWGNXs 63AWYpgl9TdIOUsa3biOl1ou9QS9t35LdNrKg1SMUHOcHyW6gFJI1d4l7XC9vwVN z8YBWFgUNLUjSaW2N0Cv54XUQS7pAxo74x3R6t7u5QeIIc4JcsxO229bzGfYVGKD -----END CERTIFICATE----- """ SSL_TEST_WALLET_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAyyjN2h6FJONQ094TnIOBzGCHbvqeoiHIYPy8Zc0FtkCwAwC3 Kj/7vnPmtqIKqVlAuVG9qNtFIG6FCeu13X6nYgt3wWeIRaXfX7stEWGLWz7WF9w0 JKmO1NnmrkVu/Kkyj9wLU7hstuT5sLaxBDB6Vk3noNg9wHRujBooks0B5D1v0ubf cu1MzSCirK+bAijZhJsXXtYPc9AGu6CT10S6/d2NmJEHLLM1+gwukOvVZ4YAveAh X6qepEZOw1MbpyXzYdHFDdrxyD/tCAgq+KNxVLJZXaSaxbwqavaMgcWNRqJ6cSmj 4cZDyUZhjU8aLm33w6sFtCI38UzIBnY29mZMrQIDAQABAoIBAGngsx+o5kTqPxab 12arVrsX151r+b6PkqmRLfJ0HjT0k4aNGehn/iAssSGfY6UMgeHTCt/0npsfXjBk apyrxDohteDSvz9lCfwPRZaYWpNMNTGsLnSo9WpSwZkzUHtXBqXYzQJtzCKpRMPn Amwng6p04XF/IPeq9m4Ht/uB4il7OVxDejq6xGUqKSkaaeJ8eKcioW37He8F1Ggg wkOa9O/LNnpxZMrAWPafYdcFKvTLb2uXRP7jORLpXngr5VxRa+TW2+hbZTVDE8vK qKIJyuzq6PikTcnm2Ze5rRe1Mgit0PpqMmu+udhAEWZRDfq8lD3Fnyb4M5qCsDf8 sH4we2ECgYEA7jSZd3DmtzgfPt0Tpj5qHz+a73kFVONFzrg/2N95dmi6xFtEobeR PInrFvAqOO/vz446Yf13kK0Nq68WAnBOs5gSrluv0DBHiUu7U0R6mjsPf4rdNtzO fS2CjRIpvexvbtKB9GIHcKgDHJ+En+GeRnV+3OkptSZxuTlcRdwsmAUCgYEA2lX9 TvUPGRQ/fEvDeoaFbtU25ZkD1ucvywCxfReMuTmzRv9Io7Jrllf4Md2j3N3VdyGr 0Hi4kzj9GXZdF3lF1RdiTpQxVy4AGg0Bai9/gCClOkpdB5EjrR2mFwFw/8Pae/L/ Z1H8YPSAeHSt7RdbyU1wYbE6vAz76VemzcVRyokCgYAZ+EAXBocQyJyXdPDUeg+F 0qBopVAQfiq5K9tCILMUVryt9alY3DOIXxzzRkHELVx+y2nQDxs++a743cDPiUD7 UYQP4E0drHXQISKOJHQdZnz9Eb2mYpJckV6fVLCaVTGc6nRimWFoRdj5AOcrqyRf WCX5na3/Yu6ZHAjUUPnHpQKBgC2rBszZHUtVnOHWxxB9yrMgDdeAZfkxaiHAB1/u 6RRlKUaUZxE2ZKKRy+xCO+Aa1meQt2tnlNPWe7ozs80RJLYpqfpdrORbTtIkHkOj o7udGHJU05idlyTCqtbtCkG1KaH7dciasXtmKOkJHsgUtrIobHVCqNJktNxd5Rnt R+phAoGBAKSr+OhUiJZU1n+Tn1eri/CTw9g9HtmnrdWAfjBhhikZoD9qBDFlf8qn 8ZYxVOYiFpiR7iDskpY9Xn5U/jvX8TTd9OKL/SH32VKMKNtA4JmekVFauhF4NeM7 C2ZujRSJ4KOeGJFdn7VksHMB/J2UY2AWgR/r2FfUah72qUis3ud+ -----END RSA PRIVATE KEY----- """ SSL_TEST_WALLET_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUDQl9lGAFVCp4uzp2CyNIBevz9ZMwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgxNVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC+u6XURlYwJh3spBKnYAgu2pApo1dPx2lT8MrjWRlrafrG N+eSEryqlnUzuUBb9ps5RbIB3Ojux183ZzuMal5AJGBMUz20WvoG24bp756Pi+Vw kbWxw6U8z6CIDNF1gzokIhgUxQOrgcTXM3beR47CuOw9TPsjyHXp8EuOP4hvcVEO XK9TiqKE/655j5DoWzcR5iR956McJ+er8uUgEuHDGWUld+7PNw7xeKUn22G2rbXU mdOTL6uqdaKFsLM1Rpc5RYDn99PiSmtOEMr7hApTZHbzMGyQQlrRe44TBO6bAv3L 2c/eGQ1c9vapj3242NS2T498uZCQmP5+XBKQ83v9AgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAoAt81WNkFGQW5viqHVOy/ Yrgtm+FP0wWKI8bL+elljQoZv81Ya/sgfw9A5X5+5QcKGpciEg9J2OcE1Xijtah7 tMBS0oqupNw5EgPc1q0uelS+2///K+K3AwM40O3kd/S40Z93vSs/VstkljmgsWfL 0Umpq0Cn6TQLwCnZad7GBA7uUpCameM8Mz9Bqk/5Qtyq5cOepKcdCPFH3NoE+aZX 4tYMWPXMUy4NvFWMsCMWrRAvOs3uMZJwLLSGpV3Z9NElilPcQeFvsSiWCzMITvEy MipcUFAug6Cz6oda1XkNmK3QOL4ZV9cxNXATvAb4XsE5CHcMiUq1GEFGEd1Nz/L/ -----END CERTIFICATE----- """ SSL_TEST_WALLET_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAvrul1EZWMCYd7KQSp2AILtqQKaNXT8dpU/DK41kZa2n6xjfn khK8qpZ1M7lAW/abOUWyAdzo7sdfN2c7jGpeQCRgTFM9tFr6BtuG6e+ej4vlcJG1 scOlPM+giAzRdYM6JCIYFMUDq4HE1zN23keOwrjsPUz7I8h16fBLjj+Ib3FRDlyv U4qihP+ueY+Q6Fs3EeYkfeejHCfnq/LlIBLhwxllJXfuzzcO8XilJ9thtq211JnT ky+rqnWihbCzNUaXOUWA5/fT4kprThDK+4QKU2R28zBskEJa0XuOEwTumwL9y9nP 3hkNXPb2qY99uNjUtk+PfLmQkJj+flwSkPN7/QIDAQABAoIBAFdyMvpa8SMMJsYb B05jsfzBSj083Uf/diP9Dxgi/ouHwGjmsq3/Fy7i4oM/WOmQ6+PbN1yxSr5G/Dmr g9rB3cpsoxX7SBwLZfyE45sXuEu56QyuUW5Z88UosEIQFmxZKOvuEbpcBW25hmTf /Iy2pBZUsEL+q1nhi2YhPJLQQB5PPCgwumbmNF/GK8Ua8OEU2b9FYGOzp1eAS7TI +dB1vu3bOdnvyTpFJv8phlAIn9+CQRAMPzL/PKRm8SIhmMwSp0v76TYhu5jWEWuH khneCW+SaRUVsjF6i6zfJOs+MQQvhuq5oeOobbkRn9jjn4F1CHKteR4ynztiyl4e Dks47SECgYEA3w3h/satsDk6N72ZfFBnEEGDnC8EvEeWMWTee0iWJt27pYz5g9fG l6uS33f1gAzczqyfHi3NY6HysBpU0OyuhFtSmREVceK9EN6xBeLTrWIrUffi5xq5 aBVUGKi3VWp1CzaYHXAlK151Kl2lmc30m1244TxH6bR1/kJYArB1A/kCgYEA2uei ziKC7jThy/Cz0hYch39tS8xtjjifWcri+bKvRG3P/KPWRkduIz8LBH3egQUfpfeZ p8MQ4m980zXFQE3uppBjwEw7BL3+ZO00si2nyhP+nXeRlcpah62EsdPBCJF29bUt JDyrnO95jSi42rt5IxpTQVfz6zCr/MJSQUPRcSUCgYEAiyziYlIddeN/S+BlsIeK hz4ZnI5J6iDQuikyGMKFzeJ0fyujVHyCUYigsAbti+R6sgpLjk0N5qjaAL+tRF8p 1TQWKaPbOaA8UBZjZkTNx1WFqjN9xK2MGkGUo35CRm2ScliyOUwMJS9e8/xSo9E6 WubzwLYYON588RT8TVFE8iECgYA44u89EFzkGFwBSpkAZHyffa7ifsqNpgtLI11e tF+1sa/WIKGDe/aUNELhtPAIqVMzJygIH7oYjg5rONL8xgPZxzYU9/pyXglpIveJ wjGTYyTMuRDdU0u5bI9KQxQr7Nl0OtPzUczrKJR26Xk4ZnWxeJrgJUIfAXQAaGNF 0KDx/QKBgGWQw8SzVmPlEx9WSmoRyWQaaCD5ZAfwOg6Ph0FOSf0GZZXjApjno2Ri g5lYAtTVv2vix0jDlD0MD86Ou+tGmZ/x7/Y/cHOYLiZJKiUugeX9Asf+lf/03mEs /qXGNK0JOo8699Lbq8ZflN79bRrEOFyxlGKgtFSrcQniDTW3EGKR -----END RSA PRIVATE KEY----- """ SSL_TEST_FARMER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUNt5wFFEHInmQV+maGlazlOTq18YwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgxNloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC9icCXt+50NDRtDYOA9SznDkajEonkL/tWDRgkWPfyrQjs MgxK4thx8h2pzFFO0orpKhcBH9D/yJ+IyhOzrv9MqWIEXQ4I3BUWQvwUyJiAARbu Udj51pFZiNcRJPGg29eIf8cJFfSTQ3LyU65BkYjxKScHi7psh3t6jCElxDnou5yY brMytE9zUzV7xC6wTiN3BJk7A0W/d6fKpOziJ/487IlaBP6FIxUS/o5u8hG9VPXQ ZCXBWpGB2xLahQS6xANGSCwYKtkFgUeIJLZwX+6+XAYppXthrffos2jKNmXj3GC7 XCKUEfp0rWBxcw6jlJZuOyqHPVOXzAmVlKVPnPQJAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAJV9THcfc7PMB8oJxoL3lu gP29VWYHaSxblJ9OPsMVtFQEBwa72q1z1pCb9wKWQ0B1Hkz4YBtbYDHLqdsK3xfz CXAo8zDEk+D5QPPzScWM3R/tK1wYUZ62Y2J40M7G7NP24aNzmlOKZOMOLbBqJ1ZU vbuZ3XPDDv/CEWv+RkXUjc5ICzHCo+MtOJ/FlMvR5H8j3l7nj8sj4WjrhdqBh7AA 74eHvlVqpIZaZw0HVAtDASJAYO+PTh0G61alVDWfoRmNtCeS9f/CXsNeiOwwWLBZ ZO0evHv/iAaNk2FTTGwglURsIjphpOnVScLQtc9lDc2dpKm5d9rqs7binU4dupwU -----END CERTIFICATE----- """ SSL_TEST_FARMER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEAvYnAl7fudDQ0bQ2DgPUs5w5GoxKJ5C/7Vg0YJFj38q0I7DIM SuLYcfIdqcxRTtKK6SoXAR/Q/8ifiMoTs67/TKliBF0OCNwVFkL8FMiYgAEW7lHY +daRWYjXESTxoNvXiH/HCRX0k0Ny8lOuQZGI8SknB4u6bId7eowhJcQ56LucmG6z MrRPc1M1e8QusE4jdwSZOwNFv3enyqTs4if+POyJWgT+hSMVEv6ObvIRvVT10GQl wVqRgdsS2oUEusQDRkgsGCrZBYFHiCS2cF/uvlwGKaV7Ya336LNoyjZl49xgu1wi lBH6dK1gcXMOo5SWbjsqhz1Tl8wJlZSlT5z0CQIDAQABAoIBAQCZYOHzZKqYaq6K GUdzkfP2Pn029YeUmqd/KTWCJGTxgskXqiB8cTnKa61JfMfHS2WR7beT91U/x/Ah 17U90L1UIjXpZgw3azG9RBOOFg4id79AuAcnllUk6TFw9D58d6rhENXWKmgyy4A3 TTRUZxs0XKLy3kXMEY8AymkAkNxz0gkVmKKJlwoSPheMPNIOGG37eFgX2YGrnuIY mUUAfWI8mpBCAD74vfleM4Y8c4jaKMbqn9O1sxdIGh6mGDlTFQyc0wCtT5rRNUnZ l3WS3bKFGZ7xFWtnR6eZwAcnMU+axccXy5Hlvhiqz8ZT3DlUGNnYmofzbqr5xm/G vREX+fhJAoGBAO1I1Ue9N/rlKSbZqr1m9W1U3Jvv+bLiLau3yhzDDh8wxV7MNHqn TyOU2TMRnBSCukALU3d1Kw6/FF98OF200vyKG0298IxphIj8QHyn78U1fH3jFAng TUXcJJKmWCZtKCd5p4rDEve31IYsAHdWaKOWglhE8m0g02lXBJjqELUvAoGBAMx8 1xSUcGPDnmQekaonpq2jYrLZSLlZpsqs+il7VdR09vB9sIkm+RyFRqve9rckGitG FICWWtWCwKTT/8AAfqeX+8x7JarqyMLWm8td0iLIVFaNnwZDaXx4oPGA+wN2aF8S /FM6CxiDXSrYy/kvBVKOj4wI21qVR0zRIOGdK4xHAoGAWahKhmfVziRmrzpRzG0p 0RzemsFLLS9PKHIymTmOjXSFLzOjpLCxM3WbuDMwMYPP0kE1UY7hLRpAHXA3cBjS HAAnHvHlAXkhTg1aZH+kFnUGTB7QRIcPS5VJ8GuQJTzbjkbmaoUZFqbMU8IujukE csN9DtNGcruThlsN7qWKmJsCgYEAvi2w/sPbDv3E1oqToLOF0eGtjnaEq1VUyRQ9 CM1bEt/BNgM/Zx8m+b597qTLwaJC8FIaCUlMq1wSfHlqVxBeutGf7hnt+1qmYoaj mGzmXVEBFwpZhsK1XXz2+gSh7yN1iE6o+2J1JVQvFwVQFq0Dfzd1C6DFGSbSi//H W+0HrksCgYBm21cIB4AWBMyDnMAS/pEqhBvHbGO7L6wELhQ4FYchRKdS4GHctbOW q1E6zhGmLXql67567l9lHTF+78KxxKGzpAzXrz7EjRBSvIZUFTiWj6obhXqNPynr ODifrZzJ7xQxDRqR+X4vSpvY1TOKM7Rkvjd9bIVCcbT0o/rHL67zTQ== -----END RSA PRIVATE KEY----- """ SSL_TEST_FARMER_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIURDIvwbpBQzGaYcY5NjIvLi2K2z4wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgxNloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDFaJpx21ia50KpGQRSKamxsjHUHVDHRccMQlHTD1urBNpE 3ulAJhSiJVx5TAlQCZeaP8xq9CG2I+hRqZDq32JCW2RuJKS0NgI6HU+L5OLkLXYf MXbZe9rMAoexVHNLxHdcTPBeEJWJhd9H6XjVJ+o0UudooVzUrGbl+xzGUxv8dyzi LOIisbo9QVPf+MNgKD9TaH0aHSuh7BBd0lEJiV3kDntcBwjqfoC8FWMp9ykjQOQj OICPVGVwAPo0sox7/WgKoiGQlSyI8als8NmGuLvqXnIGv5M7dDVUZSRIonmiz3k9 xnnc/bSxDorWTzgZ725CzD/8Aev3bJYxbSySe6jfAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQCppINk17Ykk89Jdi1blQnp RYEHvrP9q4BIK9g0nasjPq+GQLoiiJXT8LbisEV+0V54PVHV+Y1wcIMDXVTqhHnA OpNgvud31bb1XQOoRdbtsS88QIB2ab4/urWLvuHBmksG/C2n7VKcbdeU6+xkUbfm rPNWiN4vPyqfzz3FKSWbLKy52+HOp6/fQsdoH1TUO7keC9qG5JDLHvsHP/qsJKWG D8LczKzlqVgxvxUrMdYngQcBlrP8Z4Oz0NCe0AF5/LI0q3YRLpLPLdsdAKDm44Lb BAe1y2G1jeOvkSQBPWCpW5iTFuW+CMtGAiiDXRhkxdORDvW3YfBCjiWO0tOliydz -----END CERTIFICATE----- """ SSL_TEST_FARMER_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEAxWiacdtYmudCqRkEUimpsbIx1B1Qx0XHDEJR0w9bqwTaRN7p QCYUoiVceUwJUAmXmj/MavQhtiPoUamQ6t9iQltkbiSktDYCOh1Pi+Ti5C12HzF2 2XvazAKHsVRzS8R3XEzwXhCViYXfR+l41SfqNFLnaKFc1Kxm5fscxlMb/Hcs4izi IrG6PUFT3/jDYCg/U2h9Gh0roewQXdJRCYld5A57XAcI6n6AvBVjKfcpI0DkIziA j1RlcAD6NLKMe/1oCqIhkJUsiPGpbPDZhri76l5yBr+TO3Q1VGUkSKJ5os95PcZ5 3P20sQ6K1k84Ge9uQsw//AHr92yWMW0sknuo3wIDAQABAoIBABR0pWRc7U6H3jF1 hSwaYxols+Id84vioCCWErKDKeWLyC5Qxuy9xW+T3YQ4K9LeW5ZBPCZtC7069UzY /EpKQX1MyRhctbBy1EI/XUnKuvQX/eB3mLAqlF6FeJgYfyX/wrqOwm2M3GH2vE9Q UxQLYcpwOMhvyBXFk5gLME0guYqshBEe2w/2dYRoY9dmpypl+IpDHHhFvrFxs/d/ 0wtk60k0avgvdgBaR6vnP6FHPC6qGSliY2IRODNqog4G2TkuthZ0IKd/7FurhHpX FwO27/Ur8FjOg9pWXQHSj2vG7+6lepHl9RxAOIj/cF1QrCLFMoZPx+4MubY8IlTs fTKebxkCgYEA7eZjyQ3lp45apRo2KyIj342SwRd0NKLfmvW+VrGggBAeNWl6fTb7 2Pj946J82QPUkdq+xz/hL2n/2MvyucjK9P2ZcFeYFIDoHIMufGGWvOgxymwsFfSw gEJQW2/8cjPJwXi5QgA80mq3vKRGt0HHCU4bOr1tf3hksOcOVp4MCWMCgYEA1G2O z8R7pbTSsaU1gudiZIOKAudlo63L+zkdkfPJtARtkkLTyTEkyfvnc792fPxkX7kE kgz3tKlGs4kPKmtsrleNfpwSeTEYDuXHlyFdazt6SnbYOUbU6/zzEwVrRTwUCNd3 LxvYfYCoQUF80bAJIelVS3FLkIk2/tjL2cu8uVUCgYBSuH2R92cXcARMzGRxcxmO LigNRB5//vJJa5GXi4QHg5M9d0PELk48D7gYYvOOciqD3M/hcHDYj78Knz/zIcKQ lW25Bnw3BOuwnlyXm0dSwFovzJU3vTFyJ5zRbosVGrTYtSWVsYd0ku74hRahuhl/ Ps1xC1T7sd0xNeZib+o3iQKBgCk62m0ZBaaz4fD4z9oIbuBzZ2YI44FRSjYIb+TU HGIEOgAZWGHEWA+cBOBCWQ0JL7Ikhu6R9cHq2P4frAHft8he1eetAyjijnjVwFdk 8mzNrn6lcnIrfUgQYF1gv+FAN+M/brKGBQ7W2dFQlJleQWeDkjqCUthKyZHNIkOz d33BAoGAEnkimK5bjPYsCBm7uhmrRbzfZQ5cfBLUMSBlG2dzcvVc2eFmHX4lVYZp rHQVghmK2/4qup8Dmkm2gWV4WesOJGOc1y/luItTStiOmFdex1F1+8MOY11zWLqt 51hIXW17KNSZHiQBYUQAtH4OJvDAoir9nk2RvdR5SNvAdV+InNQ= -----END RSA PRIVATE KEY----- """ SSL_TEST_HARVESTER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIULUbwce/xEqn+x6vr9oE80QQ3d8QwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgxNloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQClktgQ/ipScugjip0UN0Ukgkro8RUsfMKWCrQTx2THJhBf C0mCuci1Pu4+kiJAXUkIs1zzYTE2Cus5OQOoIzkB/dFbn3nf1WSNrNsPKfsSeyoL EQpBX2xxiPxI6zDzEv6NpwhaKSnkfVuZPn5v1PeXb87KZMLHlXZbS1HB1VcJqb9K vDwvdOk9D/RjaqwMjlmtShMf4VAprWxtYZoKEvqWTeiBLQt1UVSa2Q8wQGsWHthm 4bpQ/v1VqOBZvLbn1zkWBAvhzzd+yvMK2lzphjNnP5rFJ7Baem5UY9Dg5TP4Xz5l /gDQZDm/bMrz8VN+IFfjb3Wm/33cGhTQX9YGzPUJAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQDHpjstiqVts7VnJ9fueQb+ 0CDiYjSkvfEzNEkRnoBunNW8/1ztJa1RfZlcg5EyI2AdneFNoiKFbJU/GlEeo2M3 hyz2t26/IsMjLOpLMRdTn+lOxdRd7qtC7KrC8/raeRiD5w1puS5miCi+DqRLbUfZ oY212iyiiPDJM87ubwxFfySMkdKBd6Ai0gIYfHQnorMVAfgbDY4vfuvfzYXWKJyo eP1LnyTGjcuswo1+1lMCkjcwyQdnwvapi+TqzlS8Ay4lSnbDhyK67jUHDZDNOuWu +oDWpIWt2PPpJZUnBQu7XbHNup91PaWG3lGokssosgybkvZoNKTKtpe+XJDZ7j8T -----END CERTIFICATE----- """ SSL_TEST_HARVESTER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEApZLYEP4qUnLoI4qdFDdFJIJK6PEVLHzClgq0E8dkxyYQXwtJ grnItT7uPpIiQF1JCLNc82ExNgrrOTkDqCM5Af3RW59539VkjazbDyn7EnsqCxEK QV9scYj8SOsw8xL+jacIWikp5H1bmT5+b9T3l2/OymTCx5V2W0tRwdVXCam/Srw8 L3TpPQ/0Y2qsDI5ZrUoTH+FQKa1sbWGaChL6lk3ogS0LdVFUmtkPMEBrFh7YZuG6 UP79VajgWby259c5FgQL4c83fsrzCtpc6YYzZz+axSewWnpuVGPQ4OUz+F8+Zf4A 0GQ5v2zK8/FTfiBX4291pv993BoU0F/WBsz1CQIDAQABAoIBAFXzfdCMcKHuXo2c tmA5NN53+LUl+Wznswe6tLKTzsAHBXahYF7JXOShr4Gx0LAC/RfULIt3R9mbH3LM IxbUehKLlXPvvI+ysglN00Xy8BAu+atXBDDdfWkOyJB97yIwGQ6lyBMtzT58yOEr bO1W69SkSQAOAIMlFpTb66wouI8dxnpxqY7x+csWmAwHERMPLUupe+YU7L/YUvtc dP+smTmpxKTrjgxxv0IdLuk8yjfvL717JaqQgeFzGIqljEGr8n9qlO+VIusgB48P Jm3R4xT8XqrqgySZ7GxHDTOZ2NDDVfXs1A9TNnPUQo9vQRVPOMmUTKBjcuHXZ4N8 zBSoCVECgYEA1TlD1s7eOlylsu9E2/yN7lq91qz/QYT0oLo9/xkSNcRAEgtR5omI C4rZWtN+zWz2JVY0aQZNjuPNGlO/UN0e97Qfu9otjtKQqVe/nc+72ly0MB0pfyeX WKbxsa2UtJ8IheStR0eCko5QQVPCTrpxD2fcKDfo4pgcOqiwrXZS9y0CgYEAxspe JF+yWJrO3ke4fBPh7RxdFtnM8ajnsuh0zWEBLvZ/HPwcgxftlkw3WZhv/cbTefhA ouKMjoXtXdKI6n26CZk8YygR+ECxEZRK8kq8lAddoYwW+nKfDZgrchiKfNiedsJi MJkOwhmfDymYQ3qjt4MZeZlgfXkN2N59DeaU3s0CgYEAzmawlK+Lz1L/00ZqkcjY W3LbcYPlU7cwVqXyfY33YrSmkNEEZvWbDBFMde9lP9XKMDpSYZgIW9mIIYQQHmbu Iznpvh5lG2wZPNQEWO9OGQLEKg8QrFXW26o/LI+q820/At1qHyXJ77RzW8mIvk0c RJ11MDlu5mn4aZAB9ugjR8ECgYBGGsfoe/chWDbsHM7qsvhR7lbF4DluX+qWJXRL mZIZRcS+LArCEIYxIt/CMQgNrziVIv9ocgyvlnuHQuAWEhCxoeCx90efDPFlCa8E k2a9rXtPpV/VIucEnE12B0GPlbUMnLCUAuY5fV+isUCJS47BAPLS90wX88D2YkAn ztFhYQKBgGYz3CSBBOYpdic3yQgItOx3Ytvb/g34Eac3y7uQuOMqJAIe6snBSK/J Nr82Aey3h1YnpNn9J0x2UKV5OoVupgvYE+DOFBjTaDL9ZlqVArJvKlKSxgN7if8a 0BNmTXVsDiPrEucK4AVRrfFTJbzRkLsDruScQpFnytCUB9wyWjrc -----END RSA PRIVATE KEY----- """ SSL_TEST_TIMELORD_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUPASsrsYzDmz/DkwIqjt0/8jCYMswDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgxNloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDTC7KkVFiP877ALH2osPDSkV0+ElIk6dTIJ4dnMo6Caxq+ iL48E9xXK229yKBayaUHny75umllbXpAv/WpHDR9PdK6sy27d9PFRxIgysDEwNIG AdfnXtyDnjuL2AUMdXByBUEATl3t3L0fFe1CZOQRnTdpr753tgkUwgnycWhYKlDN FwkBG6OBODhwwwZ338Nn9G9kVWwZe5kcDxLngrYjvm9oZoGtep5zO7GJi+ccppul LCwzkstJIfi3U7IYEEeHHn+r7jZb6kgFv9EOySfzPqWukkokA7JcQvoggccf+1Dw 12pQ/wCLDjy++8bwsCh/BlbvUvaQUBbWFhw7egpHAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQCnaO8umnXPXwTOJiWSt2C7 hP3ybwzmGrPo13RXia6QvaSH71QwYUi1NmwmNUVgRy7y/8uOEIVf8bXqa69I+b9+ qviIBgk45yPDfbCHGX5bbd2qV/XyYybT2X2FawTM7bN9gVU/EjMrvu/VAyiW5yYl /O4WO+pvnThlXiEAJjgT1T8vXtf+YjxSfhuRfTRK1AW3SQCtYw09mREjeTCThlFN zeAtI8H1VSgdUe+ATJ9wWDkqDSFP8Jof8Jv0aT8oLFfXrNCff+nTWPEpXkMqwoxO wIn7lnNJMpehGLgCm/6vtoT8VvQUvcViKIkijwI4VcoK1tRWFURNm3YQZ1586wo7 -----END CERTIFICATE----- """ SSL_TEST_TIMELORD_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpQIBAAKCAQEA0wuypFRYj/O+wCx9qLDw0pFdPhJSJOnUyCeHZzKOgmsavoi+ PBPcVyttvcigWsmlB58u+bppZW16QL/1qRw0fT3SurMtu3fTxUcSIMrAxMDSBgHX 517cg547i9gFDHVwcgVBAE5d7dy9HxXtQmTkEZ03aa++d7YJFMIJ8nFoWCpQzRcJ ARujgTg4cMMGd9/DZ/RvZFVsGXuZHA8S54K2I75vaGaBrXqeczuxiYvnHKabpSws M5LLSSH4t1OyGBBHhx5/q+42W+pIBb/RDskn8z6lrpJKJAOyXEL6IIHHH/tQ8Ndq UP8Aiw48vvvG8LAofwZW71L2kFAW1hYcO3oKRwIDAQABAoIBAQCCWXFG6gmhL60b SN97931msP3kPrCZuAsCbNfGt4UprDligVbuCF5JQLuRQn84U98oK/t5ptc+HDYs E+QJRTBuQmcLhWuzpDkaWeEqe9BANdACgdT2RLLyYCLrJstHfKms4u3Y4I5HQdVV g9d88I+lCXOWRUPg8H//YDGAmucVvD0ficfN594SlAX83lEHJFlB9hY97vAliEST L5xaEmMS/f5tSLMsiwf78ksaME7IN4maHNbd5/8bLmuRPlFGI1espG/b7ZEWKKWT Nsr+DzoTKlWcl0yTiFzW2Nqq1A19RQlekvuOA3AZGwiPlLyUjH2SbL6e9DQs6kA/ N9nBMjVhAoGBAPrrGeKk4Mq9V/oPa8lXSaiwdXfi8PK/R5153106COBamfunlD+0 qXW5dc6cUXaUgqFCkdROJOPSIAKwkaNWsT0a4X6tBLl4eK/Ll4bWqKw5NDbF0M95 2mWko/bABAxVtExPSmqerg6SYbUn1AZ9jyl33DU6eYtbSqsddHvbB3pZAoGBANdR 3/XhFTD2dUTQF5cnDckEE4N6OcvbmR9YPXMB8LOjQ9ZuceVZZv51rrhCUh/uFpWG hdiUsuwprPTAQQx9A1M6yxKTSWKOJ3yaXLfUKWMih8DKvzhkYmTrZRJn3533u+oo 0/VBRGWXTwGVrgfoVsdA4RcyePBavMIqsrI+MdWfAoGAD6+c2adXCjWWB2LpaRfU 2f/WCB2e1H4SuwyAYzKalXP0hl/ui6D+qwZiD/2DtjcIh45C0ZPlCHz9VU22fRCR WfGRQTsNvY6DdPH0UhCfUMzur7HkIORMO+hz+5v7ZM4CzHZ0f3/V/8E07H9F6PX2 ejAtCwLR0F1vqIzZ2FhT+lkCgYEAguIc7hwkwn99pxeKz3GI2qDkr63zRey1di0w JSGPy9I5YTX/e7dNeO3WB+EghJI4HioIYC97Vzy6Coh2wf2XsNbzK9Zl7EeWzxIR vBh2E/GgbVuQwtmaSdggtwB3GFHHYz3wIYvL5KkF+GOgxuO/JB1W9b/Tbd7qEGjd +KT/q+cCgYEAtq28/NaNeKx/0rPAorNGKYWeeUftlVY/Zb9AXdnmuieKkRvU6D2u nppPdtr/m/OrO8whggpMYAt5wCvFN5YPCsjm/X/tuUtyEqIab3PdC/8R8VGXCgNj rSTc/FNwCKfX+aS8iti4XETgC32z36SKoh+k2ckGMJdv6QybS6Vv+q4= -----END RSA PRIVATE KEY----- """ SSL_TEST_TIMELORD_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUfp7Qhve3TfaAj3jjcY/WUN1nozMwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgxNloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDN93Shy0G+A51fMBzkH+j0LwpNhKMTMeNxsc7QpqwolyAm /KBvbpFYO56c0o7zqNU0PdyO7D8x0qX19znVdXsYweEMhM11cTl3QV5QCjN+ldQ1 i0APjCmColWk9hfF5LX136jLurHhQrMaMTVZj7s6m9Zun7t1FOKqCliCGTP1mSPK E1uxZi4Y9XCGwTjb6B8ffmgixPMxbb91YxC9FSa8m3iH+69cQ+edqvDCbmZrnJf2 5qVlKpy3fiavqmrKcuD9eYsfngyfgMGb13Rswpd+gfaQP/gWUwSNX7VaHU97wkCN OwJ+VX+4hL7rxdpprYrkiBlWoA3hUxhjtzIDyhN5AgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAz/00Fvtg1+h6addocNGW/ y4RyLP14YefUkyBDJs3kxcDq2HvbzACc4nOMvmJ7QkE/TOCfDGCv+3pFd+a4SHdk ifCI8YXTY3dv14CK4oLnHCCffnM8bzSCd0s6aTjYvGkiDKVOC1K8bcGBPjCsqY/U U15vlfHAOkN5wYbDEFcoN/izozHOFiY1z5X+CBdVSXmqQv69jqXzQyLr9ul6v0gO EOoNyl/yqfvjND7ytWcksJOM00ogVc8mdbOfVddq5od5i98KRwcDni79GXrELs66 ebCJ6M4lmzuktRiOzOskQmaXiVgYXYtR6EsQl1bGFv4jnES6l1EyJxaae9lm4cvw -----END CERTIFICATE----- """ SSL_TEST_TIMELORD_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpQIBAAKCAQEAzfd0octBvgOdXzAc5B/o9C8KTYSjEzHjcbHO0KasKJcgJvyg b26RWDuenNKO86jVND3cjuw/MdKl9fc51XV7GMHhDITNdXE5d0FeUAozfpXUNYtA D4wpgqJVpPYXxeS19d+oy7qx4UKzGjE1WY+7OpvWbp+7dRTiqgpYghkz9ZkjyhNb sWYuGPVwhsE42+gfH35oIsTzMW2/dWMQvRUmvJt4h/uvXEPnnarwwm5ma5yX9ual ZSqct34mr6pqynLg/XmLH54Mn4DBm9d0bMKXfoH2kD/4FlMEjV+1Wh1Pe8JAjTsC flV/uIS+68Xaaa2K5IgZVqAN4VMYY7cyA8oTeQIDAQABAoIBAQDEYzPxZZYc8ONo NL8Hgamk0wmW2maH0eTVrr3NU28KEPdWVUFAnwO1Rru5OkeV6yDHfEjGelrTTdBy 1DVv5GHoPE0ym5owZjJuFIUx+lgZVhGOsGT3riSSa+kPrpsCVU5uz8Dp6OzdJbUS v2LoL9VNT/RJbMLYI37wtYapHhDeFlvCzxxqKmr6j/Q3z2V8sxrl+siZAuyKtp8R BsvSCiGxR3AGACOTi41lAgLAyUMos2s/4kLrqrLsKQVmSgumlxvo4MP4aE+SCF8I 7RBZwljpH1E5Tl3AWGuzThIZTSb0+eESU4RJDAccuMyfPDhb2gUHJps67mHq7EPK WAuvSfxVAoGBAP6Ebau1ZW5vzJA+JcroSWgJ9rZOJoeHKdfVdi9D7HPDSwUlaJ3m RgzM9QAg8Agvkr9+6DciMtxn484aZjp4F+3N66BZrqgx8MtX5txxGnR11lAMB2Rt 7fHgECD8wHfXWueKGKIgE8s0A8Wv9imOFpu6SpF7ozIP0xg1XmJA6zTPAoGBAM8q nyXth6cx+3PbTubKz2PUh1gUlkUZnQvWShPjYQOEkLw4B4Tsl1axmC2izOgUxesF g1RCj0YzWA4AQSdAyATc+EsMrRhb0MrUqxqdq8nTapKXccqWeqmY47+DkVH+jX8F Ucwt5c6No81vecatNpFLz3VbRRrep2ErHYLr91U3AoGBAKV1mApxsZAa9CStkkoX umj9WTrpEVk4AHbE2cEeaiBTzHh6+kj0Q4Pc1kWQJBteOgttyC7Xd7MbgtghB2Zp Xj0FinHC+61yUfUPnxCeIrGlTX7aYw/h+zcsD7AyQDlocjtl5l+3dMa8eNtSajhX m9D/SazMcKqB6RyqzUIYrA+3AoGAA1w2np/ermiSIovxGK87c+wTkesrkM1cjb+Z Df+HKE5zJopmHNLVlZNl23+jgTQtDaXWPnyh5Eqa6Ac7B072r5WB9X2sJRQAK/oN GG5sRebG+L+6GcYdETkooIeayNCvLNtCO2SXMKV9fayMNhvDIdIv+EBVu5zW7C2N 2fzH0zsCgYEAou6RMrCA7hPRVJtB/mDCi89maGDYRokwd/6554Bc2/QRtAXgmv9B JkwUcfKEtMK81sZ27ySm+/WrkpkNIvTOdgcplteN3xncjtaf68SPBkDHkps2atQA ubqQMVhhsQuRmd/OAOabSUv33MGzqvISV4IaQb0XEgn0LCzsBwNThXk= -----END RSA PRIVATE KEY----- """ SSL_TEST_CRAWLER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUY8wJZA8KJ65kDzfXRlw/GtLkNLAwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgxNloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQD72WS1saIIDnLCq9rqmzXiyHJxMshwXlruH68D1kLKPpjD L/E9u1KacaRr22g17yuJvwumRcGsDBEN0g3uDPQ8c1EVIuobm2pRd6nmTTrKWO/W T2TpEQxrs6U1A5/xpkkCItn6z9V5ukSyFA68x+WDY8f7EEtwsJ2dJMx/7MgtXaab ywapOA42YCX5V8vh1848hWw5qBLjz3JtmfqjMAEMLP592Wpqb4EjIw9EqUEAkjBo JeJD4H05oFMfRFcA/30n+SRBCIAw8rvJV9zky9rbh7imLOf/EEGwvntnbZo3Mcil Q4zvV90HGN7RZim+NopdhwnAyZ8ElXCDIL0CJXqdAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBca+x7FGg99wVVnCibFKCi MvFM/csSYRbdIU2SEc8Odudy7o62rOnuBv3Pvt7hTNVcOFl8KjWAkDTheNqD3RdW GAf+7XIuyHm6icXFNb4ODeLbIZwanWaa09hOSLfMkXUWe72zkGRw5Y7IK/vSF5F4 hFlPai5p+YJ+x94quL+mZM8sBgOLlY/YhWq8PUqEti+w8+iwHtgOHIks3XW5I2oK 0aCcCbx6gs5XNr7iYzKIi/QinICAaXjm9AAIU5D0u9GLFm7YlWajMG+p0s0QgZlJ KLa2WhXRqWH0i1g2xTaQ2Gr8+PyM5Rb10+DVFoREO3wXWuQpsSBPKAEpjxbGKBRB -----END CERTIFICATE----- """ SSL_TEST_CRAWLER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEA+9lktbGiCA5ywqva6ps14shycTLIcF5a7h+vA9ZCyj6Ywy/x PbtSmnGka9toNe8rib8LpkXBrAwRDdIN7gz0PHNRFSLqG5tqUXep5k06yljv1k9k 6REMa7OlNQOf8aZJAiLZ+s/VebpEshQOvMflg2PH+xBLcLCdnSTMf+zILV2mm8sG qTgONmAl+VfL4dfOPIVsOagS489ybZn6ozABDCz+fdlqam+BIyMPRKlBAJIwaCXi Q+B9OaBTH0RXAP99J/kkQQiAMPK7yVfc5Mva24e4pizn/xBBsL57Z22aNzHIpUOM 71fdBxje0WYpvjaKXYcJwMmfBJVwgyC9AiV6nQIDAQABAoIBAQCsOakOO3BT1BWU nNNzFjsOYAcq9BBwD4ZdSxtzI0W/ankrGZD+pyhA57AJ9hvYrjr20sfTp+Zekk3j Rp8yCHfJEw8CxkKUKH7XQV7VWED4+ULiKp8WZws4Z7x1eYoaRZ2tsUmhpBkXSlMJ +H9vh7+jT0wFm8oLQSw3t1+Fp9XodsRcBQgljXANUTF+emCOTJS0lOXcIhGYXgv+ kxUJylEtHEYumyCFYY/gRnhMhw9kMhopZUEQFu/MbleYWa5IoiajGC/FjJTHC6VI vzg/NUk8Y2L8k1v9SNL9GpEsH+jbsYs6U5560LtxDDiQFKklPuQkQ8kzGJza3jSJ yYk8YzUhAoGBAP9aB5VzWRDm534jaJ56dRqFXtD43rUhXQs7b+tp78tCZFYwQsEg +nlrHd9u0IdlZkX07euvReuxvN1L4hGtz/Fk3ctkZTM7XXgAejHKIsMMMcCcyAIw z7K9ogF0XYZUC+f0NKirAM8h8qdwSKyC98P36ddQwOsEqp8QhXOGEXjVAoGBAPx9 FldcGVLrWoZ3pSR0bmaA+T/tc/FtPznmqTx8uGeZ5YTjfWhDU9vA6vKkNMscwPuh GJEY1t3Bxjm5fUBQSYXq0BFgT8aytu+TCDH0EP/mnWcKXnIKSxcJGv1Y2i8XNizB Q6rCtUHO37sjmaEdkJlPby7p90gMoFpIEWnchN6pAoGAW2Q9kp/WINaDxAGoUBBE GVnitahdDTcDtiFvzTH9QSJiBvb+7WCARTSxXGas+8iu8hrXjKMOw2y5y/p8zxcG db9EIqesEMoOigSht3BBQM38gJOcgiw2KiL0+NBNKOar3DjrH/MUNw5Pat4lJJk7 VEhGyWl9op/o8UVYfiBd4IECgYBZvCtAiR8G9VaLC+LJfgfurk/nhID8gRNDhNMJ CFqRl4SXIjLj52naZEocSnfo6CM+SxbsGqPi1Iea5G27ec1npvij9FLmD4Ysx1jW SCPyjwfKI0lFxprBaR8Kg5WnvtwmM9nUyraY2OlzHUfwlw1ZL34YclbMaJBlBdAK i7E9YQKBgQD47sj72TSpCt+xL/Y8jzwZNx/ZggwCRrYtHcR+8RxwQXQuFJJ3b5Nd +7vA800/kS/FPCVmgTW/BaqZwh11ma5eh0yXz5Jms5jUb2hmRrrSznLwzXVE4mLN aKvlwOd6LW06tVK0CnTx9LwvQ4wAtzCAmnxiJm6Z/A6O42oDus+mww== -----END RSA PRIVATE KEY----- """ SSL_TEST_DAEMON_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIULEE9q3QPcGx/aF56Kcjpmm1ioFgwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgxNloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC3vG+t/eMT7XSPOqYmHBKFP7McTUIanto6rHDJPqU8A8Wl 7SexsxiHFxHDCRzy9Khcy4UR45LyfVKl3CkZJtV9CH6s08iXjmEeaFodkwOcPpFV Bx48Id8Wcru9623+4zQJxrTRZXH7sKoTggSn0r2yAtCMzLiiMkko8EmRi20O79uz
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
true
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/simulator_test_tools.py
flax/simulator/simulator_test_tools.py
from __future__ import annotations import asyncio import sys import tempfile from pathlib import Path from typing import Any, AsyncGenerator, Dict, Optional, Tuple from blspy import PrivateKey from flax.cmds.init_funcs import create_all_ssl from flax.consensus.coinbase import create_puzzlehash_for_pk from flax.daemon.server import WebSocketServer, daemon_launch_lock_path from flax.simulator.full_node_simulator import FullNodeSimulator from flax.simulator.socket import find_available_listen_port from flax.simulator.ssl_certs import ( SSLTestCACertAndPrivateKey, SSLTestCollateralWrapper, SSLTestNodeCertsAndKeys, get_next_nodes_certs_and_keys, get_next_private_ca_cert_and_key, ) from flax.simulator.start_simulator import async_main as start_simulator_main from flax.types.blockchain_format.sized_bytes import bytes32 from flax.util.bech32m import encode_puzzle_hash from flax.util.config import create_default_flax_config, load_config, save_config from flax.util.ints import uint32 from flax.util.keychain import Keychain from flax.util.lock import Lockfile from flax.wallet.derive_keys import master_sk_to_wallet_sk """ These functions are used to test the simulator. """ def mnemonic_fingerprint() -> Tuple[str, int]: mnemonic = ( "today grape album ticket joy idle supreme sausage " "oppose voice angle roast you oven betray exact " "memory riot escape high dragon knock food blade" ) # add key to keychain sk = Keychain().add_private_key(mnemonic) fingerprint = sk.get_g1().get_fingerprint() return mnemonic, fingerprint def get_puzzle_hash_from_key(fingerprint: int, key_id: int = 1) -> bytes32: priv_key_and_entropy = Keychain().get_private_key_by_fingerprint(fingerprint) if priv_key_and_entropy is None: raise Exception("Fingerprint not found") private_key = priv_key_and_entropy[0] sk_for_wallet_id: PrivateKey = master_sk_to_wallet_sk(private_key, uint32(key_id)) puzzle_hash: bytes32 = create_puzzlehash_for_pk(sk_for_wallet_id.get_g1()) return puzzle_hash def create_config( flax_root: Path, fingerprint: int, private_ca_crt_and_key: Tuple[bytes, bytes], node_certs_and_keys: Dict[str, Dict[str, Dict[str, bytes]]], ) -> Dict[str, Any]: # create flax directories create_default_flax_config(flax_root) create_all_ssl( flax_root, private_ca_crt_and_key=private_ca_crt_and_key, node_certs_and_keys=node_certs_and_keys, ) # load config config = load_config(flax_root, "config.yaml") config["full_node"]["send_uncompact_interval"] = 0 config["full_node"]["target_uncompact_proofs"] = 30 config["full_node"]["peer_connect_interval"] = 50 config["full_node"]["sanitize_weight_proof_only"] = False config["full_node"]["introducer_peer"] = None config["full_node"]["dns_servers"] = [] config["logging"]["log_stdout"] = True config["selected_network"] = "testnet0" for service in [ "harvester", "farmer", "full_node", "wallet", "introducer", "timelord", "pool", "simulator", ]: config[service]["selected_network"] = "testnet0" config["daemon_port"] = find_available_listen_port("BlockTools daemon") config["full_node"]["port"] = 0 config["full_node"]["rpc_port"] = find_available_listen_port("Node RPC") # simulator overrides config["simulator"]["key_fingerprint"] = fingerprint config["simulator"]["farming_address"] = encode_puzzle_hash(get_puzzle_hash_from_key(fingerprint), "txfx") config["simulator"]["plot_directory"] = "test-simulator/plots" # save config save_config(flax_root, "config.yaml", config) return config async def start_simulator(flax_root: Path, automated_testing: bool = False) -> AsyncGenerator[FullNodeSimulator, None]: sys.argv = [sys.argv[0]] # clear sys.argv to avoid issues with config.yaml service = await start_simulator_main(True, automated_testing, root_path=flax_root) await service.start() yield service._api service.stop() await service.wait_closed() async def get_full_flax_simulator( automated_testing: bool = False, flax_root: Optional[Path] = None, config: Optional[Dict[str, Any]] = None ) -> AsyncGenerator[Tuple[FullNodeSimulator, Path, Dict[str, Any], str, int], None]: """ A flax root directory can be provided, otherwise a temporary one is created. This test can either be run in automated mode or not, which determines which mode block tools run in. This test is fully interdependent and can be used without the rest of the flax test suite. Please refer to the documentation for more information. """ # Create and setup temporary flax directories. if flax_root is None: flax_root = Path(tempfile.TemporaryDirectory().name) mnemonic, fingerprint = mnemonic_fingerprint() ssl_ca_cert_and_key_wrapper: SSLTestCollateralWrapper[ SSLTestCACertAndPrivateKey ] = get_next_private_ca_cert_and_key() ssl_nodes_certs_and_keys_wrapper: SSLTestCollateralWrapper[ SSLTestNodeCertsAndKeys ] = get_next_nodes_certs_and_keys() if config is None: config = create_config( flax_root, fingerprint, ssl_ca_cert_and_key_wrapper.collateral.cert_and_key, ssl_nodes_certs_and_keys_wrapper.collateral.certs_and_keys, ) crt_path = flax_root / config["daemon_ssl"]["private_crt"] key_path = flax_root / config["daemon_ssl"]["private_key"] ca_crt_path = flax_root / config["private_ssl_ca"]["crt"] ca_key_path = flax_root / config["private_ssl_ca"]["key"] with Lockfile.create(daemon_launch_lock_path(flax_root)): shutdown_event = asyncio.Event() ws_server = WebSocketServer(flax_root, ca_crt_path, ca_key_path, crt_path, key_path, shutdown_event) await ws_server.setup_process_global_state() await ws_server.start() # type: ignore[no-untyped-call] async for simulator in start_simulator(flax_root, automated_testing): yield simulator, flax_root, config, mnemonic, fingerprint await ws_server.stop() await shutdown_event.wait() # wait till shutdown is complete
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/time_out_assert.py
flax/simulator/time_out_assert.py
from __future__ import annotations import asyncio import logging import time from typing import Callable from flax.protocols.protocol_message_types import ProtocolMessageTypes log = logging.getLogger(__name__) async def time_out_assert_custom_interval(timeout: int, interval, function, value=True, *args, **kwargs): __tracebackhide__ = True start = time.time() while time.time() - start < timeout: if asyncio.iscoroutinefunction(function): f_res = await function(*args, **kwargs) else: f_res = function(*args, **kwargs) if value == f_res: return None await asyncio.sleep(interval) assert False, f"Timed assertion timed out after {timeout} seconds: expected {value!r}, got {f_res!r}" async def time_out_assert(timeout: int, function, value=True, *args, **kwargs): __tracebackhide__ = True await time_out_assert_custom_interval(timeout, 0.05, function, value, *args, **kwargs) async def time_out_assert_not_none(timeout: int, function, *args, **kwargs): __tracebackhide__ = True start = time.time() while time.time() - start < timeout: if asyncio.iscoroutinefunction(function): f_res = await function(*args, **kwargs) else: f_res = function(*args, **kwargs) if f_res is not None: return None await asyncio.sleep(0.05) assert False, "Timed assertion timed out" def time_out_messages(incoming_queue: asyncio.Queue, msg_name: str, count: int = 1) -> Callable: async def bool_f(): if incoming_queue.qsize() < count: return False for _ in range(count): response = (await incoming_queue.get())[0].type if ProtocolMessageTypes(response).name != msg_name: # log.warning(f"time_out_message: found {response} instead of {msg_name}") return False return True return bool_f
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/ssl_certs.py
flax/simulator/ssl_certs.py
from __future__ import annotations import itertools from dataclasses import dataclass from typing import Dict, Generic, List, Tuple, TypeVar from flax.simulator.ssl_certs_1 import SSL_TEST_NODE_CERTS_AND_KEYS_1, SSL_TEST_PRIVATE_CA_CERT_AND_KEY_1 from flax.simulator.ssl_certs_2 import SSL_TEST_NODE_CERTS_AND_KEYS_2, SSL_TEST_PRIVATE_CA_CERT_AND_KEY_2 from flax.simulator.ssl_certs_3 import SSL_TEST_NODE_CERTS_AND_KEYS_3, SSL_TEST_PRIVATE_CA_CERT_AND_KEY_3 from flax.simulator.ssl_certs_4 import SSL_TEST_NODE_CERTS_AND_KEYS_4, SSL_TEST_PRIVATE_CA_CERT_AND_KEY_4 from flax.simulator.ssl_certs_5 import SSL_TEST_NODE_CERTS_AND_KEYS_5, SSL_TEST_PRIVATE_CA_CERT_AND_KEY_5 from flax.simulator.ssl_certs_6 import SSL_TEST_NODE_CERTS_AND_KEYS_6, SSL_TEST_PRIVATE_CA_CERT_AND_KEY_6 from flax.simulator.ssl_certs_7 import SSL_TEST_NODE_CERTS_AND_KEYS_7, SSL_TEST_PRIVATE_CA_CERT_AND_KEY_7 from flax.simulator.ssl_certs_8 import SSL_TEST_NODE_CERTS_AND_KEYS_8, SSL_TEST_PRIVATE_CA_CERT_AND_KEY_8 from flax.simulator.ssl_certs_9 import SSL_TEST_NODE_CERTS_AND_KEYS_9, SSL_TEST_PRIVATE_CA_CERT_AND_KEY_9 from flax.simulator.ssl_certs_10 import SSL_TEST_NODE_CERTS_AND_KEYS_10, SSL_TEST_PRIVATE_CA_CERT_AND_KEY_10 # --------------------------------------------------------------------------- # NOTE: # Use tests/util/gen_ssl_certs.py to generate additional SSL certs and keys # # EXAMPLE: # $ python3 tests/util/gen_ssl_certs.py --suffix 123 > ssl_certs_123.py # --------------------------------------------------------------------------- _T_SSLTestCollateral = TypeVar("_T_SSLTestCollateral", bound="SSLTestCollateralTracker") @dataclass class SSLTestCollateralTracker: in_use = False def mark_in_use(self) -> None: self.in_use = True def mark_not_in_use(self) -> None: self.in_use = False @dataclass class SSLTestCACertAndPrivateKey(SSLTestCollateralTracker): cert_and_key: Tuple[bytes, bytes] @dataclass class SSLTestNodeCertsAndKeys(SSLTestCollateralTracker): certs_and_keys: Dict[str, Dict[str, Dict[str, bytes]]] @dataclass class SSLTestCollateralWrapper(Generic[_T_SSLTestCollateral]): collateral: _T_SSLTestCollateral def __post_init__(self) -> None: if self.collateral.in_use: print(" WARNING: Reusing SSL Test collateral that is currently in use") self.collateral.mark_in_use() def __del__(self) -> None: self.collateral.mark_not_in_use() # --------------------------------------------------------------------------- # Private CA certs/keys # --------------------------------------------------------------------------- SSL_TEST_PRIVATE_CA_CERTS_AND_KEYS: List[SSLTestCACertAndPrivateKey] = [ SSLTestCACertAndPrivateKey(SSL_TEST_PRIVATE_CA_CERT_AND_KEY_1), SSLTestCACertAndPrivateKey(SSL_TEST_PRIVATE_CA_CERT_AND_KEY_2), SSLTestCACertAndPrivateKey(SSL_TEST_PRIVATE_CA_CERT_AND_KEY_3), SSLTestCACertAndPrivateKey(SSL_TEST_PRIVATE_CA_CERT_AND_KEY_4), SSLTestCACertAndPrivateKey(SSL_TEST_PRIVATE_CA_CERT_AND_KEY_5), SSLTestCACertAndPrivateKey(SSL_TEST_PRIVATE_CA_CERT_AND_KEY_6), SSLTestCACertAndPrivateKey(SSL_TEST_PRIVATE_CA_CERT_AND_KEY_7), SSLTestCACertAndPrivateKey(SSL_TEST_PRIVATE_CA_CERT_AND_KEY_8), SSLTestCACertAndPrivateKey(SSL_TEST_PRIVATE_CA_CERT_AND_KEY_9), SSLTestCACertAndPrivateKey(SSL_TEST_PRIVATE_CA_CERT_AND_KEY_10), ] # --------------------------------------------------------------------------- # Node -> cert/key mappings # --------------------------------------------------------------------------- SSL_TEST_NODE_CERTS_AND_KEYS: List[SSLTestNodeCertsAndKeys] = [ SSLTestNodeCertsAndKeys(SSL_TEST_NODE_CERTS_AND_KEYS_1), SSLTestNodeCertsAndKeys(SSL_TEST_NODE_CERTS_AND_KEYS_2), SSLTestNodeCertsAndKeys(SSL_TEST_NODE_CERTS_AND_KEYS_3), SSLTestNodeCertsAndKeys(SSL_TEST_NODE_CERTS_AND_KEYS_4), SSLTestNodeCertsAndKeys(SSL_TEST_NODE_CERTS_AND_KEYS_5), SSLTestNodeCertsAndKeys(SSL_TEST_NODE_CERTS_AND_KEYS_6), SSLTestNodeCertsAndKeys(SSL_TEST_NODE_CERTS_AND_KEYS_7), SSLTestNodeCertsAndKeys(SSL_TEST_NODE_CERTS_AND_KEYS_8), SSLTestNodeCertsAndKeys(SSL_TEST_NODE_CERTS_AND_KEYS_9), SSLTestNodeCertsAndKeys(SSL_TEST_NODE_CERTS_AND_KEYS_10), ] ssl_test_private_ca_certs_and_keys_gen = ( SSL_TEST_PRIVATE_CA_CERTS_AND_KEYS[idx] for idx in itertools.cycle([*range(len(SSL_TEST_PRIVATE_CA_CERTS_AND_KEYS))]) ) def get_next_private_ca_cert_and_key() -> SSLTestCollateralWrapper[SSLTestCACertAndPrivateKey]: return SSLTestCollateralWrapper(next(ssl_test_private_ca_certs_and_keys_gen)) ssl_test_certs_and_keys_gen = ( SSL_TEST_NODE_CERTS_AND_KEYS[idx] for idx in itertools.cycle([*range(len(SSL_TEST_NODE_CERTS_AND_KEYS))]) ) def get_next_nodes_certs_and_keys() -> SSLTestCollateralWrapper[SSLTestNodeCertsAndKeys]: return SSLTestCollateralWrapper(next(ssl_test_certs_and_keys_gen))
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/ssl_certs_6.py
flax/simulator/ssl_certs_6.py
from __future__ import annotations from typing import Dict, Tuple SSL_TEST_PRIVATE_CA_CRT = b"""-----BEGIN CERTIFICATE----- MIIDKTCCAhGgAwIBAgIUD5VUdvJQlRhGJg2WJ+/K8I2sYZcwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMB4XDTIyMDMyMzE3MjkyN1oXDTMyMDMy MDE3MjkyN1owRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8G A1UECwwYT3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEA47sS3nsWACyhnX2pvqdSMSfDWyeF1t+kmVvap2hk22yA oAM56XCtHifhP8Zu8nI8uumP7Bnh8sW4yqE1Tl/Y5gkYD57r4ZH9o5lj1FvnZnoJ lERpCpgeR9Lpw6xqfoPt+9a/KR6mQ93AwqH6tyqSicl+7TTNp8UAdAN/oFnymQ3T VcBXV30YgiX3GIYNvcV0f+hglgA3BsprZLJRuaCv9fLT8PlhCqrFyJ67XflT98nE 0pyaGIAEcvPCPQstAkcc9nnhmARkoAq7/3dsOWRr31paoWAnrSzXJtb+NWomlNEQ ZADbNd68TIV40H6bcN45ff1nOfC78NJkXIjwdnFmuwIDAQABoxMwETAPBgNVHRMB Af8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQAnl8bxBpQL41lIPB/o1Fe629IK pFpJDjLC8xyUZrcoZigEYZ+O06Kbc8W52n3awRlLgSMjPUjwb3JExhPW1JcL2DAJ ARoiu5XDCoTVAADeUAyf60YfARlu9y+hRDUSgYrUknuvJ07fTobJ4JbpMvP/mI9T ILNZNJZVcaSD4ectURKYkveGtm5R9F3LIO0gscEFgWkhrPeLjiU6Hm1uuZgjRW8C o57vHwW4yfmiWaXb3dwIjh8SBMgv/g9iDZskIkTCfRBEp8jM4ZlCAII0sNejSLkG NjUDOtD3AYD46mLU9uOUkv/ecDn13usCaJSnQ7RfO7S/yGZQEcNw+DHHQXbS -----END CERTIFICATE----- """ SSL_TEST_PRIVATE_CA_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpgIBAAKCAQEA47sS3nsWACyhnX2pvqdSMSfDWyeF1t+kmVvap2hk22yAoAM5 6XCtHifhP8Zu8nI8uumP7Bnh8sW4yqE1Tl/Y5gkYD57r4ZH9o5lj1FvnZnoJlERp CpgeR9Lpw6xqfoPt+9a/KR6mQ93AwqH6tyqSicl+7TTNp8UAdAN/oFnymQ3TVcBX V30YgiX3GIYNvcV0f+hglgA3BsprZLJRuaCv9fLT8PlhCqrFyJ67XflT98nE0pya GIAEcvPCPQstAkcc9nnhmARkoAq7/3dsOWRr31paoWAnrSzXJtb+NWomlNEQZADb Nd68TIV40H6bcN45ff1nOfC78NJkXIjwdnFmuwIDAQABAoIBAQDbXQOTDaumpVdU loyhGxngQbY7ozmYPruWAlYANl4Yw06vVAw/4orP5ohiX2nV3tbDEWLSgigVLAKS JXFsuoT7KT1lJqd/FJrnMUVpdNHU868whClOzDM26mLFWtsGXV0r3rMrD9wGuaAJ m/Ae6kJXuaGrKtcDSY/jMM+KjbpTVJ0iWVS2yQtOQffgOc2l9SXi7EwxIccBGrbF H+a+JOZIbLsPMXwCzo1i0PMeAkG/FneqkCG7BEc2RWeQl6nzkoxANydlLLwnJmzG Xd+UPAJo2TTRlkXpK06Jb/+wsPSpEq3Sim9IQQMHp8kxtFSjgr2sDG28g0SRfV/K 3RMX8A3xAoGBAP8qXGX8QNl4IbGJl786lk5cCzVlEzmCSgPcKVv7V6hPWknRUInO rB4UbI66hFAK3SGJrs6+gyj/1GB4mM88TSdGJaifZnt4dekA3NZdZbrMINoIcS64 KFGpFyFlj81zxwXyEDitchwYrkMEQ8Y+wO20lepCPoEuMnhbJ+kH22hTAoGBAOR5 viyu7m1DU9qv5ZWhFoS1+tDT3g3zHsKSrrKz5sE07tPz5t9FQztKfflmv9jCurDq C+Dro00v+WnxUQSuDYXNk9JXU0Ly+Z/Tt7S3AEZQkarjya/jkDECsEQJuuHtOo/C Lc/req4PeG3IHqoAIwJR2lLoSmA1/bFkBqzwvZr5AoGBAJ75Rm3n1oNm/B7/aYKj vsd9QyJ2IZ8f1HtJLJ95HajoH4mEFlh1Yfivot7dx9eSnSjq/fUi7taZZTjhidr7 Z9pDMu02uoPMjjGn7u7Da8EQspsEzXddFwmhfp65Bvnq2yGSKZcWQNTOb6ujOZKG wG6Ypxo3QXf8T0d7C4d89K6vAoGBAKbwxaJEl3ZCsayixbAVKi0CAyg/BotOz3UA VKHCjaMymCdKmbEeHMff4DgxeZBaiKrn+JH52zJ1EVr1tmsi+kKAObiBkhbjDr5X pm1nIc4+5JDnK+FW9264Ni8gpOqbuiR8j5jSyKsSJr6gcLdqrintwQa/MEkoahwJ qE8JAKGRAoGBALTTp3skePMl/wCpdzvOqNMvJzoDV9xX1ttPCKF0pNOKMmFdSRib 8JN6dpRuQ5CugLYqNQgMExxgpytduGVRsALp/hKNo7MYCmLRsRAcSIe6YpgvnVYw y+ufj7QhG3hCPBMCAC2YHLTAAAkzdiookyhTmtfWtSZJuZlUYgLsMQ9g -----END RSA PRIVATE KEY----- """ SSL_TEST_FULLNODE_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUI/qIR41vNfZrImHDASkbd5CdhdkwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyN1oYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQClBLYsg7P6WBNexxAiF04sCZN6saN+dI0Q/KAN1Rp2jfTX nApvuNImoc2fozCViausJmEWKtx7RHQheDJmx+0LSpQ0fgdJJSNK5UVRme/pgVyE /FACdD+fBuiasX1LoaBUqk7mpfeyQpfwKW5D1q3HgDK5ROmiaMe5VnMD0BvW/QYc 1T3TDuBLXYZpAg7c+fdqmBKx4wnE1v9PqChdUd2AQF2INdQuz3QOHGAQ+cJsXqvy cwep0LvlK9/j9dy08qKFvc40EZwsYqOh0HT6KzUupVh80qhZxOz3QSok6gNhGpnI JHOFvJ+i2P48Wb05dCiqBqYkEnNQ252b1l7o+grjAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBYYc7lM9pM40R/SUMzhI4C D59d0VMwKjTqXRy2ifrcZYVxmc9CAldj+nk04piXC+YxUihsIRSOxppd2I72lbo7 bCRPxj0rYK/iNBlkzFwvVCQ2e/chcKcFOEcXzEpKGzVpL2GyLv/NpxH87hLLJwSG FPGsMm5MznnMDuCX1ALedLFKyvMoy8SSg/+z7TNiblJxEabxgEADpC/pbkLnJvlv qQBTPZk9LD02ZXivI624ltlQt92tqIUFZBfQXKe6WDjz2IzeeaYSlhTBKvqzXXXg aUXnGR1lA3Q7dBaCPSNkUimOm0qT6t81DLkvoSyQu3P0OvKFCmZNLxDbxEO5LBAK -----END CERTIFICATE----- """ SSL_TEST_FULLNODE_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEApQS2LIOz+lgTXscQIhdOLAmTerGjfnSNEPygDdUado3015wK b7jSJqHNn6MwlYmrrCZhFirce0R0IXgyZsftC0qUNH4HSSUjSuVFUZnv6YFchPxQ AnQ/nwbomrF9S6GgVKpO5qX3skKX8CluQ9atx4AyuUTpomjHuVZzA9Ab1v0GHNU9 0w7gS12GaQIO3Pn3apgSseMJxNb/T6goXVHdgEBdiDXULs90DhxgEPnCbF6r8nMH qdC75Svf4/XctPKihb3ONBGcLGKjodB0+is1LqVYfNKoWcTs90EqJOoDYRqZyCRz hbyfotj+PFm9OXQoqgamJBJzUNudm9Ze6PoK4wIDAQABAoIBAGKIOa7CxUiKJqbE /eEdQVQSM7ljMFhlh4XJEliwEikQAk5rod+r3++pVXoomu3vUk5sbDQsS5JfAWiq uI2eeu/vDCd7ySXnwvcJhyZ+YD5xO6k8bxnIB+UQ3vrfWA086NslBg+6sfgCw25n jqt7GDCzX5Y4i7iqD/eeovZ34OexH+J6dE0rtlO6hblbnrk8jgJJU/CsK+fPybky U/Dpls6AMEI/s/6sC7Ajieq4HN8lJpnOS03LD7Xo5XQRzHDHzKfryFP6y/Ng0lGn H9WD1kRWtvQ2JAct9V2VTgNUFcdVGICqn01uiob+3jI/LyfWylMqhoPOJv/K7i3B pmi+FIECgYEA0WIeWEAREuLvs2sFFdxkUbfzJpEVrPiVy57csc7+q/5db6fFd4nR Arcr8VoFQcVbEzMLXcJQzV8lXJUacPetjwNh+91NUdM6dFRotG+AYc9Gb0wd/YMg 5PCyqwWQfRXHj7OLB2iQ7jI2oZSi+MSNLBuNZiPoP5D1qSvyJlY43JMCgYEAycH/ /dWP8/ukyxcZuwf+qeseZ7StCprTXY1+eEm6ov8okegvUfPWXUSFp3vu7nUf+jQb j3KyemkUcDmxNXNKsWGyxpdUG/2kmg0Mktky+ndVhXIKJ/bkiBFfZagxnIO5MyBU BoD9Kr55dCw4BwIDQoQ8h5SjBuKcQNe6Atx3WnECgYEAprJHFltrPG4QB/ecBNuB ws2Ad6Pqbds65vGDIsx5VNUd7lbTj2fZTyAli/DvXn2RFKf+1JZvXhHx3NOYSXfm ZYV77NkzRYG1eAf7lCtxOm2a1eDzv3E2Lw6yMBYuAmfkiTOX7D4DpJ+1fs6nMQbK neMRn8/Wh0URT639Cyh5/KECgYEAl1DorXd+f348GhU5NwzH8qhkJWNcZJe57nAw agbh811rEAMTemNmYo0BsJtCl5VAZmauROfA9A3bRk/+mBff7SlY65iTfGq/CMrA o2JC2ZamjW76Lv78ZxCge52pl7kzLSUR387eETDJ5ldDrf3UdA65VvYjTwamKfuh hoPTAAECgYBp0yhXkzMrGtsTfiiKSWAGe0HSakvz8H3bQDuQnUw67iEH6FbMhRtZ Pu/QTafLpAMKrtbDMuls+2pxf2BN294naZyB+fI0zAmefXtTjx23hxGoFnh3FEVx eMX8OdBvkvk/Ifbfa8PqD9/bTQTcez+RkCnzANn04+h/tUCzJExfhA== -----END RSA PRIVATE KEY----- """ SSL_TEST_FULLNODE_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUBJH2JfwoCndkFqwVE6FeUMjDVx4wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyOFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQClPnyntGjxicj7xn5m1Ujkgid5yz+/d/g6kdRTJt0Faeiz oqm+9o0YUsLeKWSjOhjgcKGPh542JPzYqTaV531R8gIYJEDs9hGR3dbjmeu5RzVd Ycv3Ru9BInMudjH5GeelUos0nT3OUJlb75QcNB2Q3miP2SfPcHNtGHa72VXCP7mN zmiadi6gEJyPz32eBAh64CPoV177/sJqqlrFERmo+LyUgNNiTpFqwbKYIW2dCozG 3V/8dz25xQVvOMbVG7GnmRHXr6M6wTOefqsciOiGpPyfsTGfx++W+poGHrT1xqCL IQNUVJZ+jip0BkWheR//bwe3RqCR/fCpbsd8CwTFAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAP3lZ7n12+Qq96lT5Q28/m rldsTbJguDNPxOQYx8rvZO21Bf3YjJZmqAFM0H6wBgQf7d0CBru+3NxlwZs9RiLf bpThwzl+oWWVw9dxyYmcBl6RXf9DvisbIxKvQloUWjPAGfRS64qyOqjjFwBc5dlc r9AOzgsN1pM7f52o5Ks5frq0vfO20lVbkvFb9TfzcuzRh0xNROlrAVK2q3XEaEab nBTNTYt5kq8KYU+s0jstlPFF9gGx+NOXKfZmdKtOfribuPJIQ5ADvxGDaWEmQHhF PlgF7Y0kmP/vUknuY8rwMrGi+cncaafO+GIiaBXDGxa92SNWe2J7RtRWDC5NF1en -----END CERTIFICATE----- """ SSL_TEST_FULLNODE_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEApT58p7Ro8YnI+8Z+ZtVI5IInecs/v3f4OpHUUybdBWnos6Kp vvaNGFLC3ilkozoY4HChj4eeNiT82Kk2led9UfICGCRA7PYRkd3W45nruUc1XWHL 90bvQSJzLnYx+RnnpVKLNJ09zlCZW++UHDQdkN5oj9knz3BzbRh2u9lVwj+5jc5o mnYuoBCcj899ngQIeuAj6Fde+/7CaqpaxREZqPi8lIDTYk6RasGymCFtnQqMxt1f /Hc9ucUFbzjG1Ruxp5kR16+jOsEznn6rHIjohqT8n7Exn8fvlvqaBh609cagiyED VFSWfo4qdAZFoXkf/28Ht0agkf3wqW7HfAsExQIDAQABAoIBAQCEiL3KdLTHJdAB wI6ZQ/AW9x1aXl5e34ZE07oMh1s2gF+X1Jt5Ap7gJ2EMdv60vGA/g5bRW+DVZI03 6WBSkzy8gPKVEl7Qr/wflmJIYqfiDu8KWuoRBt/Wyh6/4STruo9E1hO4u3VbCOI4 DswoYtRj4T7UQUPg6Txq//gbapGSHefwrZ5hH9A/YB01ouVafnSxxh33JqodIjqe 1uL1LInxF+ghmH8hlifP2xmD6O0Y9Y7kq+6715gLmz+UToGvLwrEiJoN5JLfbCnI lw5z+1LDzlBfS2jlyZTg7nUQrJtTnlcg5oQdaaM5nDo+R2Cl/kU7/2Rir0sKIefF Y32lvkfxAoGBANlyjRYTLuvsi5yQo+yrMspDiWHrIkJZgl8Zp7DAWPz6BwsOqLFw EuBBE+OtTYokLDKsprrWPLNKafXAQrRdV3WfQuEvM5WMUK3qMGb3UX1L6S7iMa3u 46DPbk+TYkljLH82mvTmg595g9UyTJIEodfWzkNT4R69TtgtHb5kzR+bAoGBAMKK iughFvrb9dnEOFnFgWTxfFt+SRzZmJQDhu50dvjKmSB1uvxHfswdX0sJINVqylOB x74bCQVERGOrEwfcp7lqGHEvxHXsoKxo0A2pYvIPz8pSvkMHFU8ZMjhpukb8eSeq SmGOB4I3FvoXxl6XQVIfNzKaCtWIpRyyaz3+xiMfAoGASdPNuR/8P1fJsvec4F7j 2K6Dd35o3FQdooJIYAd+by3ItGVeuxfNINyXjyao++z6IJ5j4W2ZoFn0jd6gBzLl 3eabw27OOckxH0sy8dKolTzvx94+dcp0+IVU86mbpkUIt4xnohydtciBDSKNwsnV 1T12PH+/IDuwCE+RGLKKvl8CgYAn7mAMvZ4F59hS1p/qbUvd+GNaNFW1gkR7PS4Z C/bPomZD72ZuGg7AvtashDclF0JoWZ8yOkJjvlt7ScYiOvyCZnCV6wQcYHGqceki pL4WiYBROyKqh22sSrOwOKNvpqsHpUCXPZv08nHY68Bf8hQKUzX1QQEwS1f4x/aT RxRMaQKBgHfwK+DSGjtojrwo10CKYQ94ZDwPnviuIPcZfNQ+X/KxRY+wCl2ft3iC H23dOdNZ52NDlRVXafCCI7FFhy50/jojJ4MupVX3pTQ3oDiHkii0eHt4NwgAzqm4 Um7BAuOB20ogIzQd5Hozd2eQTI0AFs4Zd3yBxTgG2B6BHPSwvxjd -----END RSA PRIVATE KEY----- """ SSL_TEST_WALLET_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUT34idpoOlGXOYcUny2DMZVL5T4owDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyOFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDCzGdbpwHSb2Cr1yhXKPZ2aCWtHEksIl7ao2UCDO+ljCb0 n6PxHAbgVHKJ0vy7mC6Y1VXdstr4FS1Ak22V+4ceo1UW6Tsls4I9RunAjkfAl9J6 CzKCVr31L6GvWhIjgQBkxswmYK9AFx3WbOQfz7kN46usBX3YgAWiUwBseOS8KBuh EWfguDqxL8yyPHf6v5kWy2QyfwUBITuLQE6AanbLrkoT5bRrE+06X7+PeKidHzXx b72fSvuJ7ERbNPiHmmVoila6kb3PegcKnKsm7d6Blg9MwCeOcvTXRrXsCFHlJnlZ YWczAKAvtd/OJeTEC4de4UTuuyuDm2+00FUjVKITAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAgc1DcbsLsxrKHZEoIENxp 2pB5LM2Kq284Pll7Ix5x7OH8JRenLLZCGMLK+AeW25UchHZ8iagHYR6tQrc+7CLI piE6YKchJu340c3RONXcxDZUKqXBxalUyVcb3z8I/syiqsvDrE94hnGfp4X9Yg/M 7EIdv+I4y41qTxMD4HvVTcXVU5gapEC2mpOQ7mfN/rnIU1Gv6kpwG1FrnUyH+aP/ 2lpVSke8eSY59W4hThqZNf5cSGw/t95CBHigePoTqoD5MfmGhhrwGrjr9JHXVMpX IUNgsbuPb6N5J7a63Ilgr+26X2ZC2zco7Ff5zKz1xKPMvLQ4tGBjm4rwQ1r7F4jH -----END CERTIFICATE----- """ SSL_TEST_WALLET_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEAwsxnW6cB0m9gq9coVyj2dmglrRxJLCJe2qNlAgzvpYwm9J+j 8RwG4FRyidL8u5gumNVV3bLa+BUtQJNtlfuHHqNVFuk7JbOCPUbpwI5HwJfSegsy gla99S+hr1oSI4EAZMbMJmCvQBcd1mzkH8+5DeOrrAV92IAFolMAbHjkvCgboRFn 4Lg6sS/Msjx3+r+ZFstkMn8FASE7i0BOgGp2y65KE+W0axPtOl+/j3ionR818W+9 n0r7iexEWzT4h5plaIpWupG9z3oHCpyrJu3egZYPTMAnjnL010a17AhR5SZ5WWFn MwCgL7XfziXkxAuHXuFE7rsrg5tvtNBVI1SiEwIDAQABAoIBAQCnQns85xlZZujK o+OvcyysXqB7E16A1sI7WTDRoenja4PHZ4uM61O8KsZuMQtwyCq6b/NaeMgrW4OP fwcJUP+j/vqAwaJXrNqXYtwyyfgyFipTQGoOIAzbChr6RYxtj8aWwVtpWHshvLeR 9c2qwuFSW7p76fs0ejhcOIiUmvlL1GTF8fWvZ8PibxcMEHbNaclx58rpWdBKOZpI WXQ593AOGwufWX8EJFSdv+zjJs+JIIrVVOqLUMhww3B9SKRkYvMGABTRFY53U6Ru ixR5jBRCrSdot5S7YIktZ+BoyZYDl4LNzcEsWv8KDqD35RbjRUXH6pPRD5xaTucZ nKCGCGUBAoGBAOUyXq7KRqkrDlXpgvbkfI99ESS9rHCBa88SLjIKIdGszE1AIUVy xHjXH/eYWQQ1u9ghqEgU0uyPcDbGwR2DiKnV6M9Y1RqOxgMVe7b02SjeIzqp+6zw ZeqJsaaUPaRQFOG0gKSjpxA3FrQZO2HRnnUIZT7jmXXsCSMxcsYmuIVpAoGBANmU Og7mag5iTgpsP38O+vHkCi9dXOif+20xI04Wuyt26EapPC3oNW3TwsDkCTX7ljpo yI0yRQQgNUvPu/trsBaqDhTOXTaFCvH3+EA9SbXKKoFD7XiQ2iPJ5s/wv9aAsu/p zpE8UI619RWx1NNp9qzPPYRaT5QQWbw0vG4ASBAbAoGAG/XQHSyqABszjYGGK45m L68HN184OSVgvIswPYSE6apV5hqrtGgy1bcQvEjGmz/e4ZgBioGX1aoN+3C1wF76 fhWNaDYjETFXsKqfRAuMrnKjA5YXENrm4/zWQkcVWgU29u3pP6yDRfQifegSGXXU CdzzVP+5Cey4lKWEpe21VvkCgYBQscq+j/Ixl3/+GZuLEhE7+SlV27iDhiIHozvG 0GNmgVkwK7/n/sEiFHGcfHZ2EPLsgsQuqcAzAYcCsO61FoFeRn+mc8raV4lxqFfn 61MVGv+cpYbDOmXM9CqoYE+lzGGQ3RQBhW8THqThAO0/44LbIJleJuhwr4e4Z46i 9XPElQKBgQDZDFu6mSo2MdYpEQucOgJAaLrwyUPCD9Ja/Gd+Mdb+2AC1kovp6v6u xg+COGdQaLddU1yWbxB39lKC42yi7AKDb24gCBRmyj5lsgaipnlQkGtNNK10MWg2 ff90qGZpBO6tE4L/GMNsEcvQxxFGkbrTnU08Cp9mz8zJr47rlRoRig== -----END RSA PRIVATE KEY----- """ SSL_TEST_WALLET_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUUFx52dcZRD27Ek1S8a4FJOg5WTwwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyOFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCvCRPBz1Wjq7GEdOtWDZUp0BTB4pTIuXP2F7bdAwPTJ7Pd T6mjIPxM85E5sJL0pHvF49BZSFPm3OcrVv/4CHSZ9OV9aDGeioHZj5DdFZJDFv21 0E02uZSDZBJ6b22zbA0dqq/wWm/s6J6dbypcW4895QeH/OqMU//A4dFPeDJzBf0b 1BVjt/1QsFoEymb2nPRd0Pi05ROhuEaM4QuNSmncaFucLnDnn2UE3OB/O5K8zfyG hsXxJx3RwS+0SLAIbzde9GxQUbU3SS0CFHN9J+UbeOX+fIBOvPrQsWZwRdOveTFS tcqiEe0InWYXIIsfBxfdI0JNrsSrKlwMAhITg7yfAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAuBrB0tzL1s5Eaxv04bVeY s2bktuk6zFw87kN9mJBEAQSkVAzx/5DfL/XT4uFhls3VyLOU2yMu7Vhxm2ZuMVXk QdnhZ43T87lBnDBbZHd1NkrCY8UBqePB6cgA4JpmR1R8ypZmT6/V+POjqKGGwxJu sxjF0f5VB78yJlPEoAnzYiqZUitZ1Lptq8K4ICORtN2yWG+dsq8Cv/dIvMOvEMpy O6ozbk1qY0EaRuZAl7S/xghUq3QQOFZLQIkNGSJ5Q5xN1lqPJiDBinAjSb/r/zYn edxjLvMjHDSLEfzyD9g1nmNq9z/8QsiYdc0mVMkkuvhXGDdCMOFmnZ0Zc3nPdvQ7 -----END CERTIFICATE----- """ SSL_TEST_WALLET_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEArwkTwc9Vo6uxhHTrVg2VKdAUweKUyLlz9he23QMD0yez3U+p oyD8TPORObCS9KR7xePQWUhT5tznK1b/+Ah0mfTlfWgxnoqB2Y+Q3RWSQxb9tdBN NrmUg2QSem9ts2wNHaqv8Fpv7OienW8qXFuPPeUHh/zqjFP/wOHRT3gycwX9G9QV Y7f9ULBaBMpm9pz0XdD4tOUTobhGjOELjUpp3GhbnC5w559lBNzgfzuSvM38hobF 8Scd0cEvtEiwCG83XvRsUFG1N0ktAhRzfSflG3jl/nyATrz60LFmcEXTr3kxUrXK ohHtCJ1mFyCLHwcX3SNCTa7EqypcDAISE4O8nwIDAQABAoIBABWYkx14jWJyTqa/ HkIxztOn3sfFQwI5D3uvlVpTgudMoL6Pk6iS6047RxHNHXSdzr+tygkaCXAUlVkd lNtvf6N3OdFtR6H+CONk+USt4qvwbEFAgCZeY1qKwFTm5qwaisu8QZTwM5sRYHCg RKO8kEHcvj8jD3Vc79NGiWK6u87BHAUp84GLLgyuju1aNaZ8n0NM+P6wEWxlduFU l/yNoSJkQXAs8okIIA1yR1BGoCcgzXJnGY+WGglQpmSxWigay7mgg6odLoWGf2jh eL7AsB389cgGm7xfxDj9cfh3lSnZJCbSDFcD2nl3DlgktrDq2JpndI3IL46hBp4i rJnVPQECgYEA5EVznienuuGegGAod0Faaj9W+eEngZmikB0JaykRJpR9D9NsXXxM P5iMAhbTl/HWh1ISXD5M8DOBdNYHHJS1sbxflWrHxR4yHqPboZw3sFUOEp6yyZ1K 5eGfXPEWm4s0w9hytC5YoLp+8DP8wqBdEtYLL/CNKRhukzwYmkYEtkECgYEAxEwm 0u/eYHOcBnnbJTDZwQTzjySAlyVPa2DaLlEtPfYhP93Uy74P7hh4e4yABwVxhO7p rnES/NFDOMSOe2hsd8E4amknI76C2/xNaRP92we6jU/Rsw2HFbuqapFvPzApY+rm mtGu/kEG2TKCOqvTUar2azmV8jtFZrGavR8Oet8CgYBQ8Yuw7jDc5Lo2nWJb/1GX UUR/MOa4Xwk0/wbi99n8CzVZkkff0n6bInWrG/sF6xx+OY0HJpRTrH/gNTCqYtUW 5EwkiIu0CyQMl1//K4zXuyFVWu7c7Sis4VeINnkkyLT6KVtrJvAIdnkipdygCwtV 7Y5j/nGfu+khznKO6fsrwQKBgDcdbpUxVk3ciAVld3t0wN8qJbyeMiC+EBOFKR1y G3LXRbSp81KVdeGTK1j9NQFDrQD3F9Or2fn0Q5yPy7WotzPUo6N1DNFDb3iW2aFU RKWYAPAmZimQ9cnLXGj5lrO2MRjl3oO/thObbHHVda1Fi1rV1sR6cbiGndDcsybA ro8fAoGBAMreL4+KxIzdIBQ36bN70pxqUYREoeT+d3AUFhfFyYaH0U0PFXOf/XtO kC7k75CYwsLiarYne531tuo6AvY39aDePK6D0uHF4BqI/PZ/rsIKOVAkUhWSNDU2 b4NkEZRl1ejdxk/PjGR8oH+9S1X4Y1+kzJKpqt/k96Uct2eSxiQM -----END RSA PRIVATE KEY----- """ SSL_TEST_FARMER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUR15D8Dk0zvppH7mRgS1FK1xRwf8wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyOFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC+v0wEABCQFqugGlVovy1kKU9YYWmPmK431Z2Gm8CECi6Q GujhMJ4WYp9g/NhGcP7U6uQnuI1Ab0paDkPW4mMhqpfrrFE+dy0q+G/vlJZnD32U BvAPHHd6z8QBJ3bM9t1mMZMPwi7iCadwQMDHaz+DOLC9EJO1FhsATAw8FLri8lJz Acvs7LUwbRqoDn+7gR5lFg+kxSkEr/E0rVQZW27n+5nDE7lwU15O4czbczN+z1jA ELSn/wJOFNyVsrDANALQ7ibHafWzk7T5wWDUyMsOSOd+E3uYz+myOJej9XpfwL2q ANPkt8sa9XmJwiG2O/O45Lt/6nsjJzQbVuOW6jcHAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAqb3wJxEyRg3Z4UFzufrmK WeWqEOCndJj5l3ppvf3yVW2VMoiqVssnfhtQ6LXJUZrl2qrkAYE0LFlWLpr9DQPG i0Atr3dFH6+6f41pMe4GX2uusR/MdmRoU1mF2TpjxgkS8B5Q2aB23h/q6SR4n4bR SWO7i3ARFljj9iAMVTOqrpyWbb+wuGWav709BqAXM7ZUYga6ifKaxL7ahr7K7HTY yXbmisTBUY4yT7RYfvau1GyT93fU7K8cdtXBDHUBpVOWUJFQBHPKVKRivO7DkDTR sPcphGcNjvGSNqjwGmN4Hzp+WC5/uJahRlhL7Y3+v3pfIeGUnOSatau6UuJpXNl1 -----END CERTIFICATE----- """ SSL_TEST_FARMER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpQIBAAKCAQEAvr9MBAAQkBaroBpVaL8tZClPWGFpj5iuN9WdhpvAhAoukBro 4TCeFmKfYPzYRnD+1OrkJ7iNQG9KWg5D1uJjIaqX66xRPnctKvhv75SWZw99lAbw Dxx3es/EASd2zPbdZjGTD8Iu4gmncEDAx2s/gziwvRCTtRYbAEwMPBS64vJScwHL 7Oy1MG0aqA5/u4EeZRYPpMUpBK/xNK1UGVtu5/uZwxO5cFNeTuHM23Mzfs9YwBC0 p/8CThTclbKwwDQC0O4mx2n1s5O0+cFg1MjLDkjnfhN7mM/psjiXo/V6X8C9qgDT 5LfLGvV5icIhtjvzuOS7f+p7Iyc0G1bjluo3BwIDAQABAoIBAQCK62N/XlSxu/EO z174xJNYaUWiRn/M1xO7ElaBnJmfEJNM3GxS5UedYgJVbpBM7SqLAu9bhmtJTERI Ri9eJs6vzECMoZkh90XsD7fmMr8/G+cHke3v83mI9hv4AzfgmsIwFVbXmULv2Lwb Yu2DzzYYaYc+iv4oWosbskcO0sIxWax7UffFAM6fw1SYboL4ubxQrCYJKMvSCPE7 tDtuvndO1tr3EFrAo84E5KuPFRR1ncaI07FPC2H7tK8qMf8N/ks9CNxA7jmnPS5L yaIoNtwk4i1rFTVzZY4hPQD5cN/b947XEMiWSZtcKF8W9La2vbjcJk2U6dTQUre2 4ej1dx1BAoGBAOKrQ8jFjB/eeQ7OnrKsyh+Fk52F0qEOWdnh/OmZ0BVPrt1R4Rtc hEbYk4Q614AlHApiSP/SnQ0vtBx/C0If46ATRmh76hsmqeH0dK2FHNgih2IYsXdM T+AiZDzhTrNdSiZu6ZiegeQeNUhx2dbJfLIaEbP0l/A9xPmrrjxaZCRxAoGBANdu EqG/VTxxnqLNEsIWfPT4SVTXAfOHOMyxFvMJe8Nrqe7yAuIfybw/JNJHE8J7grvB 0aZLYwDTo6kmQW7cviNIkcc7TJCUczJjqlu0XxEIcu70J+1cel2Ekh/2l6qyUG4y WaputvX2pgWcFiyBhIG0SGfjPn7Izzmk/th6Cu73AoGAWDkYtPhOxcitjZnWIu0l 7obrIZCInq8bQba33aREXUcaZIIN/7xOr9Rz9i+A2RuYgmImz4uGHS/IBp9cHmyT CCb4bIpuYAr4bD3de/wncehekUvTJv/IxxAbu6ZmH2HcDoF04jYvkD5BtuS5SOQ7 aIbFBSnaSWOBWzv7IPp9p8ECgYEAmu/BWq8fAE+/BdtzqD9AM3b2Vpwj/R+9jAm5 NaYWat/d4coQpMyz7D2Fn+4amf72cU7eFzmUxJ1x0U+AM9lyrjGdFqrhUAJUL2Na vIWm8bsf3hefN6kRIH0eEvro7Y09J2Py9Q6Xa6KumM4/bFbiE96zTHQ1GD4YO58c 4lgz0NUCgYEA3vVVE9JMVlN/KXW0rrw5WHCX3PpYhs3ohvXinur1vHSNdYi+thHp QoyG/jA2t1jVQlrsbe245QNXzoh+2mZKtzEukY2B7ivoszSF0k5P8CK52efof6Ss nejt8xMdtQlTxcFx2EOnsvPjn3nmMMuye4bUsZPprPqNrDtzkzJVccQ= -----END RSA PRIVATE KEY----- """ SSL_TEST_FARMER_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUbNfOeBL5Eg+Tt37NytSIPVDVDKowDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyOFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDdwdMrIMRVxTYSO0s1krlXy/sAk/BYSKWEUIe6Htzc2GGn gAVNdvOiVsXc+T213Euw7yvBb0pfRUmS5f1O+uWZespgDTsZUy0SJYOuHhGFmI9I UelOX6Oy8fRDWVz8lovFKRcr2ytywXTAb1mTGad7VHwPW3DlnE/xeAfmLPjENQxy qiUjxqgqK1U+mdhxIxMg5hScsFjWdZDvngKzH0bojgicnKwWAymG7eJDd31TFQ3d Cs0SNPzXmNAOKCRkiAMgaln3hG3FXASQbl09JvEdYPpxcJXUePxBIXh6D8KhkAGS LoFq4uXSw4cm1fMO/TGHtZgVOFS9+EprA8L2KSjpAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQC3ZKaUzSnUlaeNCdUvyRL4 RYVbzr5RuUPL085/JEtSpXUF7cZPMbpvpw/EWIUp+EPVG8h4/89F4L67MmHwCxgU VwL2N87lk0b+TpOkLO93mO8gIGy7jJuIvDGqhWS13ocKI0Mm5Gl7n3zPS7pbqj2Z F82nU6532WK16UBiYBYa4k+ZG4puYXpJc33/M8eiUQK5eY3sUL//OTJVz6WO8vCd QVUn3+FwKZSJIaMaosKgb1SdHSqeti9RDNdQ44k6bfklZoz/NLOXi3bGUOt7RUp+ PEWLB7UnsI5qUY8aUU6g7PE3qt96dTy/9c+NTcpEnHj20wykofuPkaZOgDNgx51X -----END CERTIFICATE----- """ SSL_TEST_FARMER_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEA3cHTKyDEVcU2EjtLNZK5V8v7AJPwWEilhFCHuh7c3Nhhp4AF TXbzolbF3Pk9tdxLsO8rwW9KX0VJkuX9TvrlmXrKYA07GVMtEiWDrh4RhZiPSFHp Tl+jsvH0Q1lc/JaLxSkXK9srcsF0wG9Zkxmne1R8D1tw5ZxP8XgH5iz4xDUMcqol I8aoKitVPpnYcSMTIOYUnLBY1nWQ754Csx9G6I4InJysFgMphu3iQ3d9UxUN3QrN EjT815jQDigkZIgDIGpZ94RtxVwEkG5dPSbxHWD6cXCV1Hj8QSF4eg/CoZABki6B auLl0sOHJtXzDv0xh7WYFThUvfhKawPC9iko6QIDAQABAoIBAFMzntRGpgN8S85J Wu2N0GaFjPZpizrEfv2G7XXCkKF3uiQLX3HyGHUnU3OWPDYYonmPMv6Pj/rw1yr7 ia/xaOXN8VJahHr6/yUY2DAi7fYPCGtc+ElEjvnb2AbQ55eJsIVX5m64+7NBrFlr LdOIQ5N9XlKwv0oW/NOfcm9FHk0W23qsFG6+lsPnGuCCvzJrzz2OxFsGhRD66e0L 3Zv4xMjxIKV2nHyI8Ca/rWgQnYJ465TWMbz8qfIcH7FKK2T7/poajaOBqiVQ0FvQ JxU5LPoCDfqN1IQxt354KhOEy33a8vOlt6NkbN+0BUdB6Mw5JPTg1I6EVMKwZMlr lN98wbUCgYEA7u4p8+WM16VoUWmwu+4C/GNziQdg7sDFD5sALARgaAle8ql+/pU2 v4PbgY0H7AQ4YdLQkMG9k/JyitL1uIcdt9I3NErWahFZsxu6uMa6loqERW1/1JZa +yJbDQk0s3P4XxJ16XEB9RHVpjM4K+70I2Hj6wBZ/KCABPJ9+lMkGGsCgYEA7ZmT 2Pf7RPZZUBDx/BcRXvgFQp0UBzcUCW+gEfcmuXUFsfxpEML3p6jkYTG5exmiu74V JSMfJQbxgjx/8jV6qjEWrOI19ONmrLwAn6YSi4kTSFOzy/nunbO90yZS1EPWHTgt 1KwIpVV3YQwx8unAj3w+ioNKW2pNdKqgruD9qPsCgYEAoRnrJa2oupqn7QUDiqOg VcdE1qcn/7Pw62XKxuMokd2HrL0GiOfZY2an8gFCzyvFTIhV4tUPW5tFCj/WONa5 /gD7AgJX8mrCfZb73qz4kJrTNvDvGUtMCzsOA4sqgrl2RbxvzrhI5pJg6VBt1omn CdhuUj0Jb+JUj4Fl2gyHMQMCgYBbKzHS8BxnMsvEcCwaGdPdh/ekvtcfiZ/TmxRl sFsYkHGWAQ9jkhwrJiAztzu/o2+Q8Hf2nwplT8u9uG8zxheCVIGp5sbjZ5pPL3hh yfyVtAxFFXEJFKbdtklhSvQ/ZKQ05AiZ8UUEA85h26cS2WS86eSpi4UtnJWJ7aro T4alnwKBgGQfkEQvkthUo1xwkYQEgbJzk5aunQ3aZ0467L/kkEJZ2SknAXKLURin uErwhm3wgKHMCy3p5SLU7uv1BihG6nNvLuskrD6mAkUPBMJmXCX1NEIBLwcMM4YH H7IipX9XJOjCnauv9AsChOkz9pgG4/0BaaxkQ/Cm/zKm+wUXIfUx -----END RSA PRIVATE KEY----- """ SSL_TEST_HARVESTER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUZGh0kY4W3yL0nzJVIYYmCTQM0LwwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyOFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDVy8kOTXSTWhLK3BILK95b5/tY1dq7ARqrv4tVDWcXuyGV vPPNj2BibF3Iv+4Gr/6XeZEWmH2ybbEKrAws9aBIw7ETQhTNjoBlEvkoKvISBkkR KaQ3lUQ0Km0BONsdSwxkgcgzn61TeSOlWgpOuW8EOXZNSEUJTxp82GbbdVH1TAXH 28oxUvrV/hPltxuQJ+3tcqN78VD2cGPwp4+RNYwklG04Jcj97wjv6v41jVrQ8IR2 k5GYuI8f9V6y1zw45A4XasZDb1/UmKk5cROSI/nJgOqZLmAhjK6eQMx1XqPYm2B/ e5J7V2nrOVhsasddwNH8fx+QhBz8cZwd7uK17oWdAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQCpby2yro0LmC4xuhhuqs8q pn4r6E5i5QTDHa5uVZ/GtNgYDP7x5MsSaWcVFHsq5TONiQY8rFg3iTMfoQTqvVqg +4Eyopx/b7a8SryImxJXNVCNnY2GZ9DQIojYxDqiqsqDpIlgeR7FRCrjdy0W+5h3 Icbugg7sDeLYnerD9RAQciuClMC8jgAUc8LWXvI715kxTbrr2//8wu0YpfBLHln7 zL3zdyKcaAnqvbBx1FHgj4YI6ozfdpqYX88Uj4aeirCzHzT3QQGoAHXoDLFdg2yX s44rft3s9/+MKiFdcvaxVkh5UIajc2q2ZZJ/mqdRtW/paO9cv+aNSdgPoRcn9hzb -----END CERTIFICATE----- """ SSL_TEST_HARVESTER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEA1cvJDk10k1oSytwSCyveW+f7WNXauwEaq7+LVQ1nF7shlbzz zY9gYmxdyL/uBq/+l3mRFph9sm2xCqwMLPWgSMOxE0IUzY6AZRL5KCryEgZJESmk N5VENCptATjbHUsMZIHIM5+tU3kjpVoKTrlvBDl2TUhFCU8afNhm23VR9UwFx9vK MVL61f4T5bcbkCft7XKje/FQ9nBj8KePkTWMJJRtOCXI/e8I7+r+NY1a0PCEdpOR mLiPH/Vestc8OOQOF2rGQ29f1JipOXETkiP5yYDqmS5gIYyunkDMdV6j2Jtgf3uS e1dp6zlYbGrHXcDR/H8fkIQc/HGcHe7ite6FnQIDAQABAoIBAGzlaJotX5RyS6Ii J9qi1JaReZfNDaU0scYLQUfoFLukqD2hybjJL7nSIo7PG8kyOYYj+H++2j9Y2dVq vqTj02lcq8P4Y6ozzDgvStNn1HbT1sG0KR3anKvJdE4sDIdGI6DJ7hRFX75ltH9T dm6UyvQm5JgGmIteTEqM2w8rGbzLtsg6SakuNoyGSL17wlc6GmYiO1N383KZaaqR yfKz0yQDRIzHiGv9bQP53uPNZv0YL0+LJQg8lNGyq8+grwslT89zMw81pnCcWEjJ Bm3g+97tyIzxBW3CBh3KCfAtggrYNZ0BAvC+Hh0+mExQSEJOK5Xh06r/OnUYLcKK JTeK3CECgYEA7W/aWfOXwLz18qt4AqYSBWV8/MzAj2UGPvbHbyM/y5FOpBNHWRge vwrCgLXWAFLYnSrbLs+7CcLdlURGo5aAT0Xfxefa2MKUK9HVBLGjzQAhL+g1Z7KU RibPgxcxf9rEE0bfS59AamD9y3psRm6yzqfatYvvAQeMy8aKx30hGHUCgYEA5oLG eNuHxRICGZNbV/4Hgj1dn9Sc+28wVU50Km0aT82rTddH2K7xX3EqN3+bS0npdOwB 2c47MeRJWwa0/QII+5MOPNcbhz6pHy6WhPkfbphjBfURtTlInJ4QBbe5Zdm7uGTs zVSXyQ5vA2bhkGHlLR5pTf8hbQ/UipAglRXQ04kCgYAbMZ5egwm0Z2/71Suvkfmq aI9CHOlJAxcOCxGYZv8df4z0OckIKT0MQF06hJj3/IUWqxvjZqNTYOAkAmfcwJX9 flE8x2tHPDHgOu4c1YOfLQ6gAAZt1AQrbLKDnxpqPFIMqydT7+9ev7ERpvnTr0YH aS4hcN90zLqRdDHc2zX5KQKBgQCU9aeqTDtlp6iBvI8Hwto5WMyaz7uOZCD4z5UU IaMiNQdhayA7r3m9spSUfrrtIVtjOmxLwxDPwfWBhEkLQvhpEnPd7ygT8vM5elK8 pXyhbIp5PBBwaw84XpB+EWcWoWjE1TuNyP+5ZsFokmBrfEesK33jcF66asNvs4nK relf+QKBgQDREMabtiYvEmJhG+oVnqcWCpQnYetgrUYeXKj0sOeRvC15XRSt0Jh5 TjxpY3OV37lvXDi9QCst2akbKxahzP4CDX1//RQsT2fgzLK5yc6xmPm5hdLb0EtR K3WDy96qj7+5xWNpqSGollLAFxXmdZ4NOrnU3mMHxsLDYe0+9diGQQ== -----END RSA PRIVATE KEY----- """ SSL_TEST_TIMELORD_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUBingUaQUNXQpmRUh3SWSFMUaSqkwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyOFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDTqgBgTsNxYUYJrT8MLFe8Myww/wTuLUhZWTkCqGzQ7grt BPV1d5BTN2gthV1sltE3pjVowQrakbhnYyKQtxkuuaL2j+99cd1ZAC7BopxnDgnw wNp7lkwsuV9de5GcykCz5wLzkfj5webvaOWsYptahtFkAv2Q2EgeXp8ZK7xoiW9p uTZ/74+7i+FqY4M3DcM7/RATcQTtKW8qvqF3oFUXlFxZb7j0UMjqPGfzjP0ccze2 zKxes1lgcic8TzCHWztOC4sYpSEfK/djDv2vSVjBBsGOWK+hi8rDCmoOKJonO9Fc iw431LSHlvVyhg73Xp3HmBz+92IY1/EtJDrMGooHAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQCpHVgrVBHGBx+s+CllkVJS re1AACf94K1PUrnCe3nSPIjsjlauMO1vJEg39XnOdxz1GIj0ZxPVoanRWjJWRC6E TGivunOZzfREEFrMmvxO/azlgLn2VjhPxXxgyvyhjVE1ZUTabuNCMQtvwvon79Ko TX0Na8Rkkdx23TPR33YIkQXeGnFHY3Cikc8UiXPus7LMMP89PmVh7ACi4t5v+DRu CImEvP+jr18Sjhul9aA+CtL5PFPzn8bWlROCAgGI7GZPMhJvugCusHHWSzG8UblK hWV8Aa5CTndzTOya2regyeZyy/ftXEmjqKjKSH5kfL83MI5MWr7AJMJ2oeEoC1W0 -----END CERTIFICATE----- """ SSL_TEST_TIMELORD_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEA06oAYE7DcWFGCa0/DCxXvDMsMP8E7i1IWVk5Aqhs0O4K7QT1 dXeQUzdoLYVdbJbRN6Y1aMEK2pG4Z2MikLcZLrmi9o/vfXHdWQAuwaKcZw4J8MDa e5ZMLLlfXXuRnMpAs+cC85H4+cHm72jlrGKbWobRZAL9kNhIHl6fGSu8aIlvabk2 f++Pu4vhamODNw3DO/0QE3EE7SlvKr6hd6BVF5RcWW+49FDI6jxn84z9HHM3tsys XrNZYHInPE8wh1s7TguLGKUhHyv3Yw79r0lYwQbBjlivoYvKwwpqDiiaJzvRXIsO N9S0h5b1coYO916dx5gc/vdiGNfxLSQ6zBqKBwIDAQABAoIBAER9H74J/meziAwd iOcReholnMkF27yN3nk6y522je9U9ygWkK4/z+19YjJIkyBN9MjC+Uk6HZ73w+mA RHD7LiTWYIrTrDS1IWBpFLgHPACEpGbIoGmZCnD2UotXLpjDQQh1WZkixKNcQLN7 B8Yt6gLy2NI5vX6e3UcmauikJETWjMm2CBa4O5s0sKl/ZtzCUrzy4osyDdaOwpHW 2vPTHNgTVkETlI9UZehqC6iXOsOGzZR2lpcY9KGoS9rXAnc31tfRCfolyHvKHm/I YCEFLzLypHp48hI5qgikkBhJFC9GnvOWJtvz9XQlkUahBIGx+xRSvNXHZS/OVPqG dYZJp2ECgYEA+AttR6dXwChtGNjEwOI/F2X3RzBKMxS7tLaqEGD1SYTM3y/Fz7FY aqiE5052Q5CXJj7juVB1YMfPXhq6ae6wCFqjZC9mzc6DhDs9NZ8Vx4sCsIZQI6uO DAR9P4FyXW8mMAijN8oRQb4dkyk9NgWJ+1lA83cYAXWn6hGDHvT8cH8CgYEA2nPf Hi8AOu0aDYWrBRyobttWvvy8t8+JT7qvRcyLgUL05mblKkt7QzrJuv5WvRYdMhiQ Fh3eaXZpmBrb0O1jAeTlzOlkJtKYJlq0l6My9gLVEJuDN2TjZpcqSYQswUQWImx+ wc71MUI03rLQnsXbuTgpzjxSp2nZ5XDRCMHnonkCgYBUz1NmFImkYi4rOLLNYI5B 6dNKu/Ai1wv3Fh2/y+cSZB3IkgUIppKcpVIL5H/7SgzkPsyOKDx6AtecTXc/kSUP Ni53qt1zsRC2vaqIEwTXXWhmAwaTq6y93ysT86au27oq4kksYiLUX7StBISxW+N5 1WKn3CiRFzF6jtJOW2WU8QKBgQCPew2wAITxLywud34VlHYYod3/AXdeb2Srxl06 xhdW5kh+UFTyi7NBPAql1EnaVf0FG1b//8xGjqzaZ8G7H0ApTVOWXDEYwreGcYsu EdX1+XRCPTJZHt2xU1ZGBRd0NSkooQQ8fZdULD0XjHEz55bit73VpI9RQFgKuCfD zcA7WQKBgQCTBD1+CnwFHqrgp4tSjz+4kgclI89Hf+K0wSzi9hL5I4uvaJRvfVVD mNs+eID0NbRALpNc9M+P6+EBdYFsSMdcOEeV672DFEukdy7e2ldbiQ221yTU3mSs SHfBOBR7KJ6cmreUG9Cj9QLdsBuF2FEPfrzpP/YX/d7z/OdmStbX8w== -----END RSA PRIVATE KEY----- """ SSL_TEST_TIMELORD_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUcWOy/+2e2VlxzEedhpSZS3UdmKUwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyOFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDHS48UM5B+l3SpuKg1ZncimLWwOSyHyCASgN1dTFhFMW7/ WN1hGGrB/2lw8CAdEBb1y+i2+PHo/HQq+2tn6GmT3744GnwS3vZOqvhN0LBA4Eg8 DtE6utFBb4TZKcU2GQqGOHS3BdewXcVdoMfzM4IslqmHaQOXiqVwMrCGjiVKzF2l SFzZdIsUBFiwSv02ZvWKhb0IbTsm7YK4NTGYKZxP4fsTHHZeBICjL2GEKlkXx47Z JwthnpxB1AgeIdD+6tp8oCGPZxzd4lJxxTV385WH9zFg7jSp6poAOETra8ZnnceT YgfHVvY5PEiKB+uZzMiPf9VIoVE3KwhW7JLWktnZAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQDGEr3k2P9Z4lOIwghhuVRf T0YYzq39Vd/cDpQ/v1Ohs5kMdAEP/sDt5JWamtNLkbUDhbdgrE4Z5uKd2zTmL8Nb aiT4vJ8E9hYYEheatE0qNJl0v3qxhz2mDGDfuYxGPPnssuxr/6cGWA2u1FasInYo obLx7tBB3HNgKAtqSJZSwAMAhebJataR3REtkmBkn8s9zaTczwGsavH4AFit9ipB oXkddyfvr5Ogpo1BEydLIOCv1c94zh9yI4gn9/Gz1uEgQZq6xg+A1VV4p3Oy0LWf 4OjEohsV2dX8KMVbVJwht4HiTv58M+iL9kxvcYe2Ao/z6CnvObxiFgD0eVZjNsVq -----END CERTIFICATE----- """ SSL_TEST_TIMELORD_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEAx0uPFDOQfpd0qbioNWZ3Ipi1sDksh8ggEoDdXUxYRTFu/1jd YRhqwf9pcPAgHRAW9cvotvjx6Px0KvtrZ+hpk9++OBp8Et72Tqr4TdCwQOBIPA7R OrrRQW+E2SnFNhkKhjh0twXXsF3FXaDH8zOCLJaph2kDl4qlcDKwho4lSsxdpUhc 2XSLFARYsEr9Nmb1ioW9CG07Ju2CuDUxmCmcT+H7Exx2XgSAoy9hhCpZF8eO2ScL YZ6cQdQIHiHQ/urafKAhj2cc3eJSccU1d/OVh/cxYO40qeqaADhE62vGZ53Hk2IH x1b2OTxIigfrmczIj3/VSKFRNysIVuyS1pLZ2QIDAQABAoIBAHfJS4tp3tyn7gAh NEE8gDj0LqhoBQLr35Mfj24HeDrGlp+16wH0Kh7GhLrUKYkuZY6BbDOl98kBDFXV Xl5LDEJMRkn0aUTybHsmOi6TU4z7AY/PnCS/qwy4mdHpUFbOwEuiXUywn06rXfiD rgrYl9JzEByKmxUXyY5heUa242VL1YxVgKhtU41cTxo8TaaZ9mhQdjnMY09piuKe Nb1pK5TzjIl/ci9VXp/JWtOcES+EGNLlboQydZAM6RXC9/GQKcdA39bibq/nLg1b u2ha4NQPkxYUI3Qlzjz0X+uPvIr6vUHsvzUo5e6GFhVM3tm26iGtojogrP83/c6u p12TDgECgYEA++fbGx/5q1Qhf5bbEZykseTmbOk+Qm969IEYpcDS2ENGVntc/zpf xbwonZJB3gk1P9YWfOF0wR3IueG13D4cifRbSCfW8gkT9DzeNJO2QXsOFM96lb7r +oUXIYqecno5T0V0Rhs4miIoj+M5owJiJcQHEbolKblFEWoKLb7AAxkCgYEAyojM SM1mO8bT8WU4AQ3kGq0Bhy3fpQtAmkoOKWkcYsWwzOLMQDl9RM11r3k3ha92zzQn 8z5Dq+CMreO/7k2AO+iPQUxbVxSWcDfeBgFzUgRDrhGfVfInn1BFeyqTu8achZV9 FVwg/b+qhNbnoOOL9qjsw6LYyG6w2uDEbzeJJMECgYASEb6QwolpNb61ZT/Pkpnp vM6ej1iM8Wwzb7Mx6JP3OVQpTe4MzMYj6+xJ6TzaTXTJYHT6fj2ewKEuXDdsVfQ8 HRATK/BqKiaJRXh28wWGyunmqj9T0H8i2Dshh8z3zzafLg86HCfCPqMENztiKwCZ Tudm6SBTTtvadO3H/D/PuQKBgHM4yB9S2yp+vuzCDM5svKyAaDIjYuxeLm6YWt4s Mj3vAdpN3K1dB2sxCBa/+1pOrGTM4z162rzZjq8Oto44ARAUCgu4CO7Ng5hr8B+y i4zJaEeLNv6KOQhlfmHHoyxcnYdRuEuCkjJJ7BSOvk/FpEa7a5cQ+gttDag33wj2 q0sBAoGAchejiA7NRNoudW5Nj5AZz5Lao2mY5VABIQEe3fbZKmNN8whsDul0bpEi AboLaJVCj71HEwBKEPGcqgK9eAWRJqgmkZXQm1nXjmJeFo4PF98L98TBsM7JxnBr IDrNl1cpFWosD7XWnabJnVLZ3ZfRbXHE1egjnTjtJ9fQhlI9Du8= -----END RSA PRIVATE KEY----- """ SSL_TEST_CRAWLER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUDNXuwE8yqviMvf47HApsgcMIG6kwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyOFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC4r+RhnufHjAar0Rj+PEnVQFi2DtJGOVh4u96xaEbiY2EJ 3Z+jZG+pV2ivKfKZJiVCWsMa/XZ9GoDckAM/7/BACMozRYdBXGXJQ8luOaBLh6oy w+nCMQ7zs6J3meJKm8AXiEpq6y7AGJ2P0EcG5qY7jiKqkNckFvJayuJ7mt9DGxS8 OCNu0ja4waEtcVsMerM11zl4hQAxpm/+zRbTeRdHe6jY7Oxg3/V5e7W9kj6klzAt LEFq3GNqztXlxEvnNCf2ItJ4RZ6P6dzho7hKQjIICkmzBrApcEZAj2Rhr47q2Prx Ztw9E3iBTc3qpRkadbhQAtXUHDxTX/wUUzXgkBfXAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQDH2bDcb+NYjee2vV48E2Bc 16MvrBDfgQLA9Nv6oczcE2yfD1qOQTnoLs40QtKhDq2PMivTLSS+x6pstg0R63bH 7cCbWtGOYRDsjbjqTHwAFczQCgxZA3uKUeTaOv5M1jhQ4oP7Oz/oQv4yH7Fv9T0j QOyCHe+CnLDP5VY0+3UWDSudCDIBWD/BxvsCBva+dstPfz3heIDciGiCRqrSXCh8 ROiBKUh1TaASOtcIKYIJfrLFs5zpHT0zZSppKQcxPeKimCR5q4ZC+CuPXMJzvzrX xPlO7OvgQ6dJE1/nOnXdXvl085ycWrrefNb7IvJ2Oc2/yB0957jbm0+13tuikXgG -----END CERTIFICATE----- """ SSL_TEST_CRAWLER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAuK/kYZ7nx4wGq9EY/jxJ1UBYtg7SRjlYeLvesWhG4mNhCd2f o2RvqVdorynymSYlQlrDGv12fRqA3JADP+/wQAjKM0WHQVxlyUPJbjmgS4eqMsPp wjEO87Oid5niSpvAF4hKausuwBidj9BHBuamO44iqpDXJBbyWsrie5rfQxsUvDgj btI2uMGhLXFbDHqzNdc5eIUAMaZv/s0W03kXR3uo2OzsYN/1eXu1vZI+pJcwLSxB atxjas7V5cRL5zQn9iLSeEWej+nc4aO4SkIyCApJswawKXBGQI9kYa+O6tj68Wbc PRN4gU3N6qUZGnW4UALV1Bw8U1/8FFM14JAX1wIDAQABAoIBAQC1MsVETe6jpitp aXY3AZmC42XmATam9V5q3hAISQG63bv4PPuCCGlRYNPxf5toTLejmX7wvRsCdP1W 6Oh3U4aInNcdZKrmIqwuwhYf0eQGFq2Srwpqn01HJshQxabygkr+C5bPvbyZdc0o qzT0fVk89x/l7sNVwjm3gHSixvkjUQKBxDwVDVLbNJLdeN6LIkep2PJoZCi8R441 ySR1GkMlJjpCCkrv35/syAQpevbdM+7wBnuZkgfnzE7ECNKPvSMtTcgSf7Gs+943 ydMau+e7sL+uDME2EIq0cveNceMQaHn6mYr2PVULsD6Sp42YlJWWZCgO053jPQxd +qKREFZBAoGBAPGt0E5nN+FCsRXgYI3dAD9HOqjp2NjVF+qUtnHIw/rRnfsxPhSg dQxjDMrBc0bYk5vim7q3Kd5W59ElSLFBjeUIbE+41dlJot99D25eD54ipWZqWJ89 410y9O8/BOlmAalrlWmFUPvrIo/afVt4KbfZShvtCYkVHU5Uu7+LKmYhAoGBAMOh iAGl6eP5KJBLJMe1ANNt7imVxOCzsEDryP2SPUk2tBpapxRCoYtHv0NFORKXUSX3 g86eJL2EzFIvTHta4ksWs5xb6RdTET+CZlcA2FZik0kb50URt5R24HhwNuvSP9ET E31E9n2V+gX5OtaqHJUqRpf2FY9Y9LyF9PebWc73AoGAHoP24F9yE9RK7ds19dOo 21SQGJHmWoKVkX4Th0x1Sm87RmNSVmJoRRcgn11Lw+9GvBEh3rKP684HWUYe5prD Yt7sZiiNf/EnSpbM4v+ncy0mu0bER98VnUf421iWsy25Gf5GkFtP/W8UHxvUZj9G 7TrXe60zXga3e5OBXU8iHGECgYANnibrhnMbjXKHaNOsmyrtjM9xUZ2czqVMP52E GTPu7sHmu7y5qlG4ckwcEKuCYcoiTHJ+ZX/FOYNHjUdTpuXtuCzUi4lUOFIRC7C4 CbUFfmMmSaz1n+AZk5TYjWclT0Nl+F/47l4CK/h1hf3Uh47py0GSvmyNx/FxVhnR Sp0bzQKBgHPyCjMEW/f17QG+NOTth87uBn0qxQ/3N5u3TK8j697GYz6GrZk8FsxY 2dO/O5Bp87LxlrDmI17SpbhP4OIwT53eQoMESa1MrUuOSl5TNQDLfP/ZRS2A5FZR azPRUP1FibFtIF9+Oil/V6rWU+oOnvSSYt+P0Npy+WXnyDdRi+qm -----END RSA PRIVATE KEY----- """ SSL_TEST_DAEMON_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUaVjP5toSZjz+kCPgpM9eyglT71IwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyOVoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDKT+/vp2gbgVymuRMyDDgpefM0auPvmIFcNGIS7MiCIc+N qpYCfjaCdZc5gCo0pgS4Z1rqbl88puYH47Awav+b6YXz5jvU66ZssVlRHXdrnD1r kXTdRGQxEMBy/iUfEdQgOgsk779QoEpAWAyxyHp2r3LSdphnRpHua+04cMdpWiRN
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
true
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/__init__.py
flax/simulator/__init__.py
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/simulator_protocol.py
flax/simulator/simulator_protocol.py
from __future__ import annotations from dataclasses import dataclass from typing import Optional from flax.types.blockchain_format.sized_bytes import bytes32 from flax.util.ints import uint32 from flax.util.streamable import Streamable, streamable @streamable @dataclass(frozen=True) class FarmNewBlockProtocol(Streamable): puzzle_hash: bytes32 @streamable @dataclass(frozen=True) class ReorgProtocol(Streamable): old_index: uint32 new_index: uint32 puzzle_hash: bytes32 seed: Optional[bytes32] @streamable @dataclass(frozen=True) class GetAllCoinsProtocol(Streamable): include_spent_coins: bool
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/ssl_certs_10.py
flax/simulator/ssl_certs_10.py
from __future__ import annotations from typing import Dict, Tuple SSL_TEST_PRIVATE_CA_CRT = b"""-----BEGIN CERTIFICATE----- MIIDKTCCAhGgAwIBAgIUWzGLmUq3RgS/u2oYomRSyKsXWwcwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMB4XDTIyMDczMTAyMDgyM1oXDTMyMDcy ODAyMDgyM1owRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8G A1UECwwYT3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEAzB+IyNSmoJt99NpPQ2agYv/3Bxa70ZKHmCRHT6h2eNFg 87Mw6Dntpq8uS4zAa2pUohWNRPFrWLkHMxngQuuCJqfu7sqTJwwSNodYK6ajoidI qKyZGZd4kj8AYhKe/2O0cefjWbc1leOzXwqtQSdlr65pXaJMWG7jckNGf8hj+Dfe ZqJdonS9w6LYJPFH7l8njHaECLm6fWusJjq8nhVlAbbjetnl5wYsWjdJZCWfcSG2 PRrHncuPLSJVPn9Gdo/bqC+zQ3VJhXLELM/Fz10+cxWpaUvjEJEnhaRjAYsD6wk0 yBoaNXzVo3e/gsPcppG14dgFC+bdfFytDHMFqw2kHwIDAQABoxMwETAPBgNVHRMB Af8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQBNwno+FoJnwcJpltsDfPnTYAMD +9gm/dMBrwVtYZyB6OJKrOUYY49KA5p5/O06n0S7DOYKXVGZmXPownj9Hc1/0kUE KKg3GTzekBIso91wUL9isR5eEUnLfnHwa1OAsu2ycv1pQWwsyFvcl8ttBdmYWN5z 3EgF3kDtIc0erz91hpkixev4ZpWQzf22UKhp58EehwODI5CRRJKeVUP/pMPkrfUm 58aU31u+rCSX+uJWH/wnWeE6WZDBS5/4abcY8KLnW+ArEXrZPpEqWWsuj0lWrM24 yyfyhCmRMmeS6XSgpitKZk6kWG0VUUF6NKSilGCYUD1tEKq89oUCdDoMqJIC -----END CERTIFICATE----- """ SSL_TEST_PRIVATE_CA_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEAzB+IyNSmoJt99NpPQ2agYv/3Bxa70ZKHmCRHT6h2eNFg87Mw 6Dntpq8uS4zAa2pUohWNRPFrWLkHMxngQuuCJqfu7sqTJwwSNodYK6ajoidIqKyZ GZd4kj8AYhKe/2O0cefjWbc1leOzXwqtQSdlr65pXaJMWG7jckNGf8hj+DfeZqJd onS9w6LYJPFH7l8njHaECLm6fWusJjq8nhVlAbbjetnl5wYsWjdJZCWfcSG2PRrH ncuPLSJVPn9Gdo/bqC+zQ3VJhXLELM/Fz10+cxWpaUvjEJEnhaRjAYsD6wk0yBoa NXzVo3e/gsPcppG14dgFC+bdfFytDHMFqw2kHwIDAQABAoIBAQCP/GqLZ92GC0kF L/2biMf4LaB+Ip4oDdmSC302BppTTTa7kRodpccqvgXFCyssWhwLHXLCQB29vv8C H+2epuvvAqS7UrAMaipqxnv+hpSErHtHaECy2bMWTlSh2YrIkfdWJgGsZlzpN25u y2Q9QmIrU7dFcleyRb4w+p2/Q4apLtUgx+IoJfwKq501LmdTT7/sUyRrg3wi+Dz4 pxrv/RdFbllPDww85vl5e6amwhcNHZ76KpV1aK7qqvhQ2OLkBvRe4eKAH5O/hHWM tzDC/x5Bnn9O4n3mOh7aVAun+98x23KakPvqQBStkGAqUGQeWKI2tSRr8p+441xj U+fLTy5RAoGBAOnI6XrnAVP2MaeeokiDNSCUGY5YhjLVX+FJZsvPLdoVKU+p59cm CnSvjTQjfOSivkE+GvWQlPu2KQo/AchdP/NFZ/3VFzx8OE1EQgRhQ5frTTlWkB0V 2XGtvxhJvXRs9n8mwkMVGSmsIWqRkUteodfXne11uOJg3nmbL2jaH+f3AoGBAN+F EYs1ofve+euarDRjRzQscFZd0XXHQ+ff/U26veGpsvgUIFb0ONLFWuvsPp5KrWUr sMih0h2gjRTzmYlj/9CE/YQUXRDg7287dZYuFIEvmlCqw+X1+i8PXIA9PDlSloDE jFnoa5uLIC+orc41KmzFXqxSZgYTG8ddqMHOcqsZAoGBAN4dzwbAF9jn3gF9jH4M ext62lUN8mK1q6TmEk6thsjetiNEMEuPjvuSFzxkQzMPFGf0U7TgK0yDo7ZiapUt U6cUWFsobC1BcFSo93gl2QyruPEzNzULH08MXrT6yo+lPwVLk+IcV43qRs1zhHHx dR8Xcqq74G7kzjsHoCGkrA+9AoGAORteaBrDz/4gDDnwVVIoFwRjjy1ZHqZSiyOH LBzR9p3Mw+UgfhbXjcIugKhTN04NDxQijqAJdthWM0wpphiOe0//FYe+X1mY0up2 GHCdfIQVARcgBdjamrtp/rmmcV7QZQXSdgYTuCHLj2GhRlX/CNtEXPKQbmzjZARh 4WJFmcECgYAe8b7w2RFkm4VvMYLOYOGuABJT9mpfEZpIuJ7/qtdM93IKh+ZdRKE9 ZyoWerb1TmY+Ug8ChwPrIadj2J1e6Ml/TqcufsMGKm6cMfg9Y+AuuGyd9ZOzYid5 IdfCNbUvD3PrrwClHqY2XEb4GkSbDwxLsguIq5IP92TCD8WJiOmS2A== -----END RSA PRIVATE KEY----- """ SSL_TEST_FULLNODE_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUSj1pdOwRwJrEORU+fqWLTHMZr3cwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgyM1oYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC76QDovPz74lN1tpHAA/sXtUXVu3UiikJjnFpgUQIK44wX +QSbiY3W4fvvmrDv2c283ZiH2td080R/sACUVW3o87hqYJI3aSsuoE0AtOkBjPbg xvn4T9C0DpJQIiqhBWXBZ7JnLVcgihCblRd/LsjWQOB/G42VC7ikLe5zW5fto0DS sTwFLmY6wKMmuSN0HoHvk/fv7YSTFKPNW6ofwwQ7gaeqwBRUsRqCXoREUe0wLvUP 7HRfJ6+mDn3Yd+upymCuUOhXQNTjD5mfiijxawq8MYIO3niObValyqNU6mHUyaOj 4abGws3Y8Mju+5dlHmQmBBL/HXme1Irw/Ta4G7TnAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAWfUyskkstyDNjFG9EseOZ YPvtjkjbrlk+IKPfACfpiwAGsEMYS3P/GVQXkA/VYAUiaqhZqJvGvb7zceXKDqcD 3/UiId3YtlcZYzaAcAbf7xmPkmb/kMjtsmao17lm//YldbM9zp9kh6JJS+8Gh1cp Q4c4pR1NPS5/m/dPHNe5K/BrAQZUEV4TBlfEUSkQ9vYJeOIekHGWVTFOgJ9mfML5 aP01qLcDOvTwV9BewpjHL0RXPqn7w9v4nUQa9Tqla5ce/OBgAOfB9xO2+9IpWI8a NCigB+qkSal87TL2/jGgry1aPpT5SHP2iGaLYbG5//Z75rTZzGHQJQxgJeR5zm+7 -----END CERTIFICATE----- """ SSL_TEST_FULLNODE_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAu+kA6Lz8++JTdbaRwAP7F7VF1bt1IopCY5xaYFECCuOMF/kE m4mN1uH775qw79nNvN2Yh9rXdPNEf7AAlFVt6PO4amCSN2krLqBNALTpAYz24Mb5 +E/QtA6SUCIqoQVlwWeyZy1XIIoQm5UXfy7I1kDgfxuNlQu4pC3uc1uX7aNA0rE8 BS5mOsCjJrkjdB6B75P37+2EkxSjzVuqH8MEO4GnqsAUVLEagl6ERFHtMC71D+x0 Xyevpg592HfrqcpgrlDoV0DU4w+Zn4oo8WsKvDGCDt54jm1WpcqjVOph1Mmjo+Gm xsLN2PDI7vuXZR5kJgQS/x15ntSK8P02uBu05wIDAQABAoIBAFN0LfUvSePMJmjX BnAS1Ic4+KTtth367XUz0WeJUrDnUiarb4JsWtQeVTeaqg472wWQHNfpN1s3Vyqm TfuS3VdiNnr4HLgDOyxgARLZRcpsgpBdjlLbj8MH3a89HVWaAhEdLrxoBJPs/Wc7 lc3kR0nwUkPhRsX1CLHRvF77RMRCwuUgcftPypGtPCBLsk446d+7VRzdQwmLp1jf D75Azy3JsNI47e/KVqSMpTU3LXBTBq4S89AhQACRhABdPNsWXcEotgRZUN0Urn2W A8oBxr0L0VSLy/4yyAbSHvoD470r1lsakgs0vwJLdDuubpwnm5I2gULgb6pfJWHw YRg7v6ECgYEA9IN4w4fWt0rhqDL1zY4zZZX+7lqxkgPYFnDGwJP4uRNWjAK4zfkZ jr9LRvAxLOqkSntGQsVZRglXzIw84TYfrrzx+DKoQlPbhAaJSzwKz5a+NbWsnNQF qQS2ut5ly3kvpt/Jo4zJyRJleDqBRqabOnnW78PaakkW2470Yzs4mb8CgYEAxLzR SlnUGsqUgJOc5OmjDsOb/vlSrP+DVHxY4wafV3cbzHIG0OouYkZhNFdF97Ryst+2 ct77WydwhH6wHW304tCByvbQFCFaOaOWsWobvkLthC28QjHtnPlh9ea0dErk1zgC b6QXbm9Olj/TrKs/mUDIij/Ek6V5JzhUH6IjHtkCgYBJ306lBG1Cg0UZ5AuPRt8Q WfjjWlM7oh2u6fOiSxJiGA2Vz1y2HgQytGixze+NenaYahYYJjeKiVgVXGkoQYng 6QTRz7w2Dc/MW40vRbyeaxScdX7pAsWTAvGSE479omdbK1FoMCjmrsApSsOz7LIJ QLZHSgy6/8oAG3iKYmH/UQKBgDz79rhgbgI8B5pvp3PCBJyAACwiZwFfVvtqbDc7 h0sajdBrDDfYT7aA8ILEBtlI40EVXb3v5uSTrio0By2oNv/T+FfM+CU1TX2OexjV tnHc1zlg3/l49pnxJ++MqyVdTeB06TRoHidKc4bZlCjzEIzV6xQHvkyyP4Lr0A/a N57JAoGBAKHqP0V/qOsdB5vjFaI+mgRZWnYz9V8w3iJ1y0tYOOgZ4LvuCZcQG9P1 8PrZ5KKcUCxlpBXljEWery2Q8c8FZWft9hEcklYCNRz7q+TarnDYOvzLOSmQkYCG e7iszMYB+s4lVAYr+vd8bGY+e9i/C6S1hM4ApT1F/g3/VU0rBvyR -----END RSA PRIVATE KEY----- """ SSL_TEST_FULLNODE_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUU6xhWBWAz/LanKKEiMOFsRIw0mAwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgyM1oYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDC7U3QVRjBkgeNtXO74IHz9vlkL0MA1DWGglxzPDTUArgx qaOySonFeh5kjMhYqRNulUsdCoRyNIUz02cvg0UAE323BkJUPJBaz/F+jS9rX/f3 KLqbbsxDc2l+R3uz+MqD6DAiuBJuqD/273oIdGmhp3j0be2/DGCPpfTeh8h9lM8u eIvBClLWPsVaZAD93ahflId1XIji+D3xsRao6ss2zWkYtQC33giSTC30+DVmVbJG wsTGkEki6SZa04m8nrCcMAMyujspmrO3Z9ybDMq77HzF334QSkG7M5Jl0Z4lA0R5 g25Poi3Ej0GBU4nPfJoChSnelV4emG6G2FxZfXZHAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQB80O3SW7hciWlkcRKrl6tL iBVLFxobmIVUVjSeXfSx1fiVzdSoPKy5S1NLzisGqPkFQnngz85CWb+frFUSiCQw jKepxTKluiWzW2IUTgu6lwPFcupd2EfTv3RLiN6NY/ivjYKtMvOGP7c7WFf21r3B 39SmTfwJoEfJAkRmi4bTOwTjVC1fV8j3idyjWudvEtH/QdOIMp7+CdDJAa+loPCT V5jXF2gVyaLZJkilr2ZGj9+uy2w6LGyrxU2LKvuaMzFWRC4X8EmnFuO2o0Dbss7Y zSofQc72b5XtaaTkfHaGWzLBeebu8ICo5zJwCzMkK2fWp4tAegetnlUKlEWpvT2Z -----END CERTIFICATE----- """ SSL_TEST_FULLNODE_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAwu1N0FUYwZIHjbVzu+CB8/b5ZC9DANQ1hoJcczw01AK4Mamj skqJxXoeZIzIWKkTbpVLHQqEcjSFM9NnL4NFABN9twZCVDyQWs/xfo0va1/39yi6 m27MQ3Npfkd7s/jKg+gwIrgSbqg/9u96CHRpoad49G3tvwxgj6X03ofIfZTPLniL wQpS1j7FWmQA/d2oX5SHdVyI4vg98bEWqOrLNs1pGLUAt94Ikkwt9Pg1ZlWyRsLE xpBJIukmWtOJvJ6wnDADMro7KZqzt2fcmwzKu+x8xd9+EEpBuzOSZdGeJQNEeYNu T6ItxI9BgVOJz3yaAoUp3pVeHphuhthcWX12RwIDAQABAoIBAQCrGAfY+RiFr1uZ 8s7m9aSbMwir+x/gtmNU8U+chhgIj2qFjNT2RZ6wCwRqVXf0+lLoGXqYvwaKB7dz SfekKKCD9Je/8mp97br3OtZJsjsREGdiNgm1LId2HPNXt/7IdXOsXD0D/HWRU3Tx ljmS+jtNfOYaBfNMYdzPuWc5fA1qy472ANA9x/iENhce/ubi9AYbo26G4IoIt/W9 x9A1Ogsd00w3rV7rFnH1/UBk9B5exsaCG6GdUvUpfp3dffDuBnIJ50XHZzO1hm6w KgKB7ByXZUDXRDaQeZyzfsXhq6wleMMnABqCrGywYbTf1IIC00LJR22jNywOrqkY YM7lEgLBAoGBAOCxtWafc+YBay8pZE6bcZ48gwf6oeja5U0SLiFeuCa6746s3BiL Phv1pawYg48eXfA8nsySmuedFBKXNBJuuv4a0n8NSGa85lXQQvfxu8tCVTYx3mPC K7HE1bPWB2/ZSOFcouiB+PEeKSN8W6WiwqTe+ytR5KpEocX4v5dlvzSJAoGBAN4V 3zm3OV4gb0eO8eR4Di/FNpYPFsKqzeWLMqXWkY6tigkndy8p6bAjmvYhE8cuyq3w JCGIgxFls7hxdACbBm1hp8jUVnSUUhXHRticOIcfb+XzV9ukQkjFKpPrQ3h39c4U 58djf8NHAlFZ9pVoNmq2ulRgIUx9MGOPx4cRCkBPAoGALAyqs2OvJPhCOwyyTXbL 32mdhoLsGupO6b0WrhQTpgQf0qiwvV8O3gxaXlKv9+7MG7zGpPRYye9RcBOUccij gA1iFuZTu1BtF4Wsm08YsdBfRDCimIwIZOFhw8/BxXujfgrbJRnV4+81wW8vyFkQ L6JHO0bivT6XOGh7pwKbaYECgYAFCD/XofQ10sxStcV7ZNEFehWDjvH4FUC3G9FY +qSvs/T1wiQsOGnoKNZhD1zQXZoQGOnorJwzr7dDzaZQQTMDFXxky5Lt71Jw1eQg EmIhha/WaQ4rluw9k+IkGeecejNiqQybcwC5HwnJaB1zQzpAbsWIFemLPybyipZ9 1AAEdwKBgFRuWL0QE+80c9oDMdGryjFoOdnEb8ZyNuJ4zfE4sO9zG9ijiuuDm6Zb qKSF5Sp76PEG0wpESnDraGbCBkD8icqOnmCICdZ/rl/o5dzqR1FdakY/Tst/Lcxm hcKNbEQjbJ5C+epayOgkdZkE+Dx3TMJvO9awRjXP3rGzzV5ri71B -----END RSA PRIVATE KEY----- """ SSL_TEST_WALLET_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUE3WYHLRte9HfED08IQ/HsX/LM78wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgyM1oYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCtro19tmukTk4ClxM7EsqL4nEG8deswAwgpxvHAqwruOLO fn8VrWOruj+WCLwPiFulAFA79eX6qoUNj+KskOqhseLPQgw/PPXNVmFr4pCIhUJR m1RsSnN8/rbQwGwqaZTNv9ziwPY9N+sRAO+dNK9JWaRQYnUYM7aVO7ze0T5TAGZx Xc1RnRH4z66mvyK2o+RxGrm9bRRJckXHewcpmGKzWlJWBeUpgTMb7i32y83sfR4K hKCee7YQqb4NBO+Xi3+NWxks62qjrInupxE3x7bm/uBRFGxxQEko4Nuy9gIs9as3 nJKwxxb0t1k0DPfZVBMOa6rmsXw2XAT7Gy2Mu+tfAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAy6Rn3XCcZIwdoTlqcXGTq SxOJ2YD8vluqyGdk7oF8sv7hprQy4fiuIKgVM6H0j6o/ITZeAqZfYOJ7XwmbrhBn XBCjWqa5GLIqjG/SH9qjxnqI7zPkVwyGXfUEUu2q934fq5hZ3/KC+9mAqOXyYpgI pEuJlgqP8F1mc/QoSgbEldCJonGFnJo5tXx5p9a7lTz9y9EUFBR74hPfpUKWilGG 9YZ0UFnsV3NsAyngQ5/SeY1/leBWCXy6YPpVZZD8l5vOvRYeRKzZbPhJnbL22ba+ rUZ/b1sBH0+aW7wOGfR/dQgIoGgHjgpztLm4dmdwmJNRI5J94yQSJLswgTbvl8ka -----END CERTIFICATE----- """ SSL_TEST_WALLET_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEAra6NfbZrpE5OApcTOxLKi+JxBvHXrMAMIKcbxwKsK7jizn5/ Fa1jq7o/lgi8D4hbpQBQO/Xl+qqFDY/irJDqobHiz0IMPzz1zVZha+KQiIVCUZtU bEpzfP620MBsKmmUzb/c4sD2PTfrEQDvnTSvSVmkUGJ1GDO2lTu83tE+UwBmcV3N UZ0R+M+upr8itqPkcRq5vW0USXJFx3sHKZhis1pSVgXlKYEzG+4t9svN7H0eCoSg nnu2EKm+DQTvl4t/jVsZLOtqo6yJ7qcRN8e25v7gURRscUBJKODbsvYCLPWrN5yS sMcW9LdZNAz32VQTDmuq5rF8NlwE+xstjLvrXwIDAQABAoIBAQCGdblilsSU6m5o gO9Jb43RaBha6QYw3mlFKjpOAtqp6rPka3gVnyunukQZ8l8to0JX5ns3QHKwci0Z x8gUEwki72WJUTfMCXS+aF55uGhu2MP0C837HFR2c3ey+xWCbETgWOY3wm2gDVd1 zYSz7yK5JaYY+XBvsTFsLVhWJCYc+M7Vmt5BNMlvWJcPiKaI3TGqTrnV171WsZ5o ovZalkyUTrVOFl8q6Aqt/3ocTXbLx8m6cLpweW2GLjJgwumU3x3RA/3KcBro6SVF AeKin7PXPjkajrVkKa3ZAZAaycBOAUL3zau3FujKGYrhXWtQZDLJcZx2eAgZcjBW WkupOC/RAoGBANSpcjOj3QNSIUVW5yCt2HwubxStUyHVB1rC67SvO4G5abNLHvfp Pb7rO28tNxBuj7VWJOYxnMt2WM5zMZnsdmICr39bKsiANw5Mt4cAFQrBsZi+a5w4 gHekXZQUpj9n7P6ajrYwW/3h/Ced5kJqj9aGZgeyKkFip4aGuljhKAVXAoGBANET hTw+T/H4mNBkuBBQ4LUNZt360OVEskH1LczjHeiWTW63cvJZyxZkTdozkQqQCH8U rr0B8xVzxiXph6Nuvkv/ANZuKEivO4xSnh7UM5X8T5VsSIhwLNbY7yZQxBuDbYLi xXqsVRRV1NNZjTzMOBVJytN/GaF/f0OA+Vb9uz05AoGAaACyhETISt54vQOCJ349 2IWQ96jIdkxLu3yGb6gfTxMReYjsjUu5UcyTFY0kV9nqWEHX6+gpiWvIhLbbdC6r usUbdQpuAv6Jbmnge5pzr/4IT+4YjJ8pXNm6ljf/EhVOVznZP4qpAqHpgqp7ONIK pFy4O11LwwxvZ6AuNFdxDiMCgYEAtVPvvvLwFRUdO8fOl1/9syjfaXApkl5FF81T npnvi5QnrfluuN/FsjLmDnOgvH90zvqaHhS9xYI2fRUP7V+TrYeJK3A4gelwhN/2 gRhbcR51y0sxkRtw2BknOJzdqFsRNG4HBcDGvS8/uNm3E96uWVA5l7po+VcBggMu vRKsPIkCgYAkA1YumgHT6vHTfwHSKSncYl8QM9Qh9EyZ4qFrTkEs+S7j3Hcqu7Ln 0Dj/FX3oFpPJj/qjNJeqsosi39vRMeEMvgfSOw4F7hoihT1Po7gBRgTiEFhtbyBS xztRjI+2dhPGEcnCNUUZOKsXDo0VATSVeECOLHKqlNKANIx5c6g4nA== -----END RSA PRIVATE KEY----- """ SSL_TEST_WALLET_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUceygR6j1lNbh5j15q1GRBLaqODwwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgyM1oYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDXxvUiBZjy1HMvZuOEeXSx6ByH7NrLbdQargaCuhpNP1M8 B4Be5t+5UJK40oDpMrVNg5hdqIRGn6kH9j6sA/mNDdHt1d7alAIAAljSe1RXnk/o r2znyAjnA3UpkQl1JT4pyPXfsE8ucIq4XcC66MWtKj5mVH2CWbPqbJbVqtvwO2eV MC3G4x7gj3LCPxiTmGyt2v730lsMeShYN/H2ocZ1ZvFKDBInK7iLwycaM7GGaRkf oXYodbVwZydd0DLMuumqml+6U52tWtB2mFYJeKEAauJr2h0n/QdBFRzVpDjRXU7/ AIGzHl6tpQys2fhFa+wAY4n4oSu4CHTsIiZLKWSrAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBZWLumeHQXOK9mju8KhC05 FvTz0X6osRIIu+B85ZBh4xh52xpaIe52xeNAzZ1CH7IKuLoQdSROWhLOEQu4YUGX KvN+2/8D60M1WXtAXmQwX27ZNEVfCsveLVqV+KD3Eb6y7YsXzS+GneQInlP+b3+H 3YYPfhKwqUjYcSsj9A3u0iSu6NM8Iefwl89NYN0Rk4//dM0blK17gcT2TiGNJB5z uEXtvL3+78oWgY/nNbqcf0yHa7mjMwebnU5RQRs0gYIWnlGmqfctwSFgEw/V8Kq0 Pgau9uqub3bfFJ+bV4wScRnOkjq1h4KkQkHSqLOVPRK86fa57pQw4FOQyykvzD25 -----END CERTIFICATE----- """ SSL_TEST_WALLET_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpgIBAAKCAQEA18b1IgWY8tRzL2bjhHl0segch+zay23UGq4GgroaTT9TPAeA XubfuVCSuNKA6TK1TYOYXaiERp+pB/Y+rAP5jQ3R7dXe2pQCAAJY0ntUV55P6K9s 58gI5wN1KZEJdSU+Kcj137BPLnCKuF3AuujFrSo+ZlR9glmz6myW1arb8DtnlTAt xuMe4I9ywj8Yk5hsrdr+99JbDHkoWDfx9qHGdWbxSgwSJyu4i8MnGjOxhmkZH6F2 KHW1cGcnXdAyzLrpqppfulOdrVrQdphWCXihAGria9odJ/0HQRUc1aQ40V1O/wCB sx5eraUMrNn4RWvsAGOJ+KEruAh07CImSylkqwIDAQABAoIBAQDOxAgCIfr+NjZq Jd2/A+Oe1xz/4yeF6ChnqHr0qgCqJRRNYaLRTcr0eREfqhd9Xun87S0EEocuZbBD wOMtUmG/mI6hqV9zdIC2IYmbqDKaA0nvXqqtMDHXrKiIvEKjzpxSzg9N2lUF2zIS mUQl1wgVd3Vz+WKLlgmhiYzAEonPGFm24kDAckP/2TFKjQA8CqZhd+QQfq/EcTuP khKVAOvp/7e50PCq1TegjEGmTEgr3T82AJPKOzM+9flicYC3KTFkDv4XbyR+7A6h ZRRIpjcj6zSzS6pgkkKBdqD8gPw2cjztb/1aV/eBa+vnqgUpNUib+DCcNImuGFhR 0yp8s/UBAoGBAP6q0rXe4vMNCfaMeQMJd2medfH6+zobCiRD1nAJHHTqNSJLsH9Y TgBNp6Tg+OpginccSj4NYryYz5TXw+xfOjgm4Y8IXK/mNc5B3hrQwVZynk63hP75 tyv5OHDsjHx0zgRndFAkFbAOswenneMULKHbOB/7PjhQ3lo+nBx2MWfJAoGBANjo CJUMxit91HcsMWWpZD82JOn+da8/LOE/TqY6Z4IGayHrFOTw43MEf/FrEX9//FRR vVF/puhuBhdZMga8HwUTiXRg51ts8GI5eT8DhDj3tiudX14Moa2LVJtEEhdRN541 h7blwjvbAHHc5xw5KW666w2NDTlPrQuzSBd2ywrTAoGBAI50l/HMgD9dZ9lWssqU HQwj6+40axwRzBaFLAr3zcdIy/gnRs+1Ycyho8mDXzocTthaJt2XN0gwYs3r9Fjg 2/xVI4+TKeXrbOW3yrpNVBk7fHqkBe1rWp9qhbwFVoC4BhZImLPLu6YEUvlRNey0 eFMCAd9B94ghFIB+zWzOYMyhAoGBAJv1aoZRIwQOe4AcpH/mZhAVTEF7Fv8ku45R yKk5AUe6eblvoBxlIAWJTL03MOOuEK5H/4nj8QzaX0LWfWPeS6eIvqKRMojIMadO j+FBFAcqBTAi/XlQN8fikLj7Hs7pNMZq0uQtG5WSCCXWoc3nQ+U8PNoHe2Sj51as V7+XSLLFAoGBAITi2BRO8OjXXxaOUMK8AATVR6WAH7kC6GXtqUDZFskoqYYwK/bG /orTfIG0f9YFAid4XZMIyW8VA4d3kaZ/v5OOKMV0GVKcNZpH1NT8h9QyftYUH3TZ 7tFetndT0C5nUIM21lXZoyPFLPS0nUcgCnkIrbY4lf9iVWw84p+dGi/z -----END RSA PRIVATE KEY----- """ SSL_TEST_FARMER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUD/plueTF8nkLakTDG0grFBs+OUIwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgyM1oYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDcF8mA8F+FreurCbiCrW0e9t6QrME4w37dwoXxN1YamOO/ 15IVMCd4HJRiCp9FN6Z/MrZeBgVqzzZW4XwdH4EcIAr3yFkRo21mxvlRKPe70NJw ZByFhtkzTo+Sb8drAbl4LsBb7obxWAIhZvMT/1Od0QH+7mhkSi11gxR1AI9EF7cd bK85MnAuH4UXDM4w4fg/n4gFlNiHhH2gaF5xFwEn+Bksy/lxFA9lEXnOI4QSTeCO UtTPN7q2Ns5i1tx1zLmQDFfxkaC9BNq0GFDCRvgvEdFW3VGN44C8TTBbXDucdAFK O8Lmhvj59Re4ulJuEeHS2Z6BTwEWdRXFPQ2j1kiLAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAhakbfc0tiTSdyXNqxXMzZ EdQJOupcHLuBC4rIN5qlV416r8H+sBKMJoKNUjI/pUHdGiIiM5bsfVqBYeVF26WS B4VWaj6KG5t+kmp+DTjur1MmgKt2mgMtbeziCe0N34mX7EdO6JBYriGQcq5B8+S+ WVcM3JBsTi7ou+6+V0AIs80e2BpGiqpkTOi8Weu8f3x1WjSbGjFCck/Om1M67v+O SJo2TXv1boz1yFcjD7Ha8qTzDSDRQQJ9Td4LheooCd3TSQ6bTG7mNDaYh7WT5Ra6 TOlbXp/CnnSsF67XY7w4LjPXhOKpGNriDiyq0/DeKx+3Ie0kSCSoQZe04Zm40+OO -----END CERTIFICATE----- """ SSL_TEST_FARMER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpQIBAAKCAQEA3BfJgPBfha3rqwm4gq1tHvbekKzBOMN+3cKF8TdWGpjjv9eS FTAneByUYgqfRTemfzK2XgYFas82VuF8HR+BHCAK98hZEaNtZsb5USj3u9DScGQc hYbZM06Pkm/HawG5eC7AW+6G8VgCIWbzE/9TndEB/u5oZEotdYMUdQCPRBe3HWyv OTJwLh+FFwzOMOH4P5+IBZTYh4R9oGhecRcBJ/gZLMv5cRQPZRF5ziOEEk3gjlLU zze6tjbOYtbcdcy5kAxX8ZGgvQTatBhQwkb4LxHRVt1RjeOAvE0wW1w7nHQBSjvC 5ob4+fUXuLpSbhHh0tmegU8BFnUVxT0No9ZIiwIDAQABAoIBAQClM5WkmsiYZruG Xn2IWPSXUWYt4f4GxXbsrZ4sOQUAYdJRpVWZYdO+bHVUQfTa17K5ty771Dksuuxm ukmW8pbOrZ6N7mwsuSbdBm0NZlrNNyk+A2cFMvrFcCqEGDLvNxQoCa+JUbkoXo76 03ORhw0UYFXHLNxequ8ETaeFSy4+RMplCEYoYFW7/kL3iZcvdvq4zR55gKI5JbuR co8aBBEW0ddkU7A6RGLq3RAAR+u/wAtYIp74lDka0CdxBTQG7dnB0RIT9PTJS07z oJhz+26Pvgnypkma8Zr9XxVK0un5KGeYys5XrM1yC14YORuYSV/35+Uk2VjBtP/P ngY+BkzBAoGBAPDDAgEqtPFJlhxOYJSPwZdqXU0MaFCE/P0BM6vKKlQuz2KXdmzS Slm9LWp+O2ZuDKHdB8GpD7HWZiXqvJOIE3xF21U4wpFycuGsbbEO34+6vyc/gs96 Noq/7H7G+Ut8yvIlnbFRiUYWhkTTXqBZgtTtBijWFJ6eSfv8u7OmYGDFAoGBAOoF 42X8ozmNNkYoJ5b28PJ3NgklZIIMED3Y4IN1Usjk07VYCOEv5VOn+WcL1magJ7U4 XFC/uR28wPNm7QD3NMKkL9McBlgduzAdm/1PIcjmqgr3liVQBsYHu5BuFU87wAlZ j9WzfdFenr4Pk/aZwgHxEUy4GbcidUhN/cLs3fkPAoGAY2FbdnfWcLLbT5vaqfgd BQ9Wq/MvK+15MEZKueKdTlp0KFI1A/5ZymkYUhkBE+rhM/80sG/ElrfVOlmGta85 u9ZqDud7COahHR47uRZWmdGQDfddW58q3GMUj9A6HzrH2uRED2mErHWnvskxCido pdOg80JLCJ52E5njMOjAZ7ECgYEAzL30EhEy2LIj7sNIx7oqWWdUnjHZujFFsGZj Hn/xupMAaeKoeiNGNqd5+t6PaF/r/Y9erMLf+RVfllPRPIwK29N7h+432rXARDtT cw3dV//+evPbp69ZDb5MKfM1r4lt3IA/585OYHOw3EWSxSgGZV58LSvQS7nY9DZP sk87cJ8CgYEA4d+XJN+cME3366wqPJV3Qxsaox9rKcbnrEj39mMUxUoW1egSw6EP oVQ/kDoAckED+/EL/gExxK9kzrVf903U5+fj88ZlfkwdegbyJmxxadCOYzpXxjvr ZCPSBjX54e87l23A+bnedRP2kUVwLNfulmWlvZAvVvgWmiIE75GtZXo= -----END RSA PRIVATE KEY----- """ SSL_TEST_FARMER_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUGEsNvk3tP0A/OO8kzGApLrkPgqAwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgyNFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDfU/KtYwJBDRNT1ohOQiZyWS21uU249ykMPIUmryL6/2wf V8QGoXSPapX1nDi5scC6/m9WBGeQkvytkqkfDCKXeQkcwDWslstYJrYQUL/aDnLE Kd/EWkoFiQM2ALcPRk/v4W1s7e1UfZCn/LWRZok1mTvLhO7/ReanpQ9p7AcKgE7b I2HCEpe6YT8X1eFWBQnsep3FqipKRTfOL3lAv3vd3ufahcU0rFY+REae5DKSyKzK rlWb1CHUxEIHTHvUdmCRVkEBUfudbsS/9SDi6N4KHyW3k05FZ11E0iM0ugimlVAe h8A968IFxcZj9iMU/WYuuOQz/xsrkie2VC0Un3P9AgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQB3bfnPsdtBRoQhCzF+TbF2 tJjl5Aa22Hdgkp+ew6X1l+BsOtSyKnWhfDE3Vc5ImWbwXCRXqh8R2GrlG1qACRFr EoMr7XwYSMxF9BE/dsBNiVszs+cLoSmVKEzLdHMcdgptaJLbKRP+p3/M9qUgs6cS 7Iuwl8mqH0ebCgSMYrteVYu/XPanmTRfHIWNIVa0S8Wfrcu1FY+UiVSRVmSCPlGS HOsYKko8JKlLG3ZpKOJ9wDLGIbOEelqCB/ysYXbzLTl/qzbrfdun3pk4rL3UPQir FmXo/0MLHgnl1qJpHCXsrTIpxzCR2+7KpkA31JrM01T+6FBGEFQBVPo6zIHlPLDD -----END CERTIFICATE----- """ SSL_TEST_FARMER_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEA31PyrWMCQQ0TU9aITkImclkttblNuPcpDDyFJq8i+v9sH1fE BqF0j2qV9Zw4ubHAuv5vVgRnkJL8rZKpHwwil3kJHMA1rJbLWCa2EFC/2g5yxCnf xFpKBYkDNgC3D0ZP7+FtbO3tVH2Qp/y1kWaJNZk7y4Tu/0Xmp6UPaewHCoBO2yNh whKXumE/F9XhVgUJ7HqdxaoqSkU3zi95QL973d7n2oXFNKxWPkRGnuQyksisyq5V m9Qh1MRCB0x71HZgkVZBAVH7nW7Ev/Ug4ujeCh8lt5NORWddRNIjNLoIppVQHofA PevCBcXGY/YjFP1mLrjkM/8bK5IntlQtFJ9z/QIDAQABAoIBACtJm01OVp6DSU7D 05HPsqIRdRG3REBo7/TmOizgX5hlL/D3UxCx9OTjlQORb1FXCfN04+G5YtWcGAwQ 1GUnNgFEPabr/rtgUzPX9Qw+iqFakZZCQ5RMp/Jgt1WdV95HE7F8cXheudTZrdNR 4WO4iznvZK6zKpwiUW4HSXCPhmHbVjEHWJveXNycMLr8NXj7RKmkNkiqBcBk/pNK kR3qP8GiMKNgTSRJ8qnQFB+QeqGuNh8B5CJXQubJle94cbiJYIlJlAH8uzMtGDXn 9ymQMPAWWvTO/bmBT5Of5/9nEYxHWyaPZoSonLxObj0Da0JcK1tVSl7ujTpQPaVt 2g8rLWECgYEA9ogwLxiZlWV+VaOYciiuwaDkxBG4xoLgeB8g6zttBr9mxRyOF1yc s+sVKMu60yX1y1sTIF3LeiuLnIAIbOkK3xDzIrz0B9rwwjk7DUQmFLu1b3p1LaZr 6R8u6VFZwdqGNOLpf6avxHaR5uu3jgTmpBflm3QcHQSB25BLqaSkyQkCgYEA5+eg PIhScTZfxXUwOZt6FK+bF3QNeWocmkZM1q6JgE5flY+TwF9igMaF9LNJu+xAqA6H xySxoW7PEnPkNUVHaS8Wu8TyVThcC3Qz9XsvKFdGM6+liv9Kl38GfGLM5pS94dwa c7Jlx33EZbKxuruUdNVqrWhs6i8YW/7JLwmUFFUCgYB9z5BvaGlwcWQghiVVFOfi Dp7QZI7cV4wAITqmcSQ5jlH/A4yL5Ype0vhwYk/MU5H1HlxLZzJg/Xn4+unR0rfm kHrT3oPWwmedZqF5Kq8YY5a69k54ZnapeG1zSj25DTDyKl6o80K9yxi4NNDunBer 5DobtAxozpUKnL/QKiKiKQKBgEomYrLYN9whMbA2T0wsLXXNzH5MSj6nMiwWDF2c gzS2WpO8y9Z36UwZrh1W8l2XJflWZA3F6tIeVzGkQrTRyQqV1uQFDiM3mR7EchSs 5aA1f6npILp39IbKQ+2jvbaAmtJMCV0zDp4h1Zla8L8vWUGeN7ToreKXWmeX6QYU PvfdAoGAHXi3zRmkl5reHsfloNgP598rx6S7kk1hxAC0RGPW9wkv/DzCsaRwUoW6 3z7gUoopzsC/T8fGbhMoD5skvm4wPvn40dc6az1PvLowLfErM8W9tgwWuL6uKqIM mFgOD7eTsIslvrikO+sN/SHWW8dOlPxzF9c2A5vKtqztYTr8kP8= -----END RSA PRIVATE KEY----- """ SSL_TEST_HARVESTER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUYuDSVIYA8huPudIdi0WG2abkweswDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgyNFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCpomQtc8V53Akl8GGEiAmySQBqEdpHzezrfzmZULGkPHIi brx5QAUpzLTaRQL8vTKls0wN2qjf3k3oQXB8NDuveUTuosms14KeNhSj2AK/3baH aUCe+F/UnPb3ns/YLZltuGUzsf9mp8P9yluTMhUqLweaRG4rfWkzu8aug6uuKt5o 5FBV8AHLLNe89WHBRDqR29BiQV7rrdfjVEPrlW0ZuVJ2obcp/OvXt6c7XEq/FgOG r7qVxK9VELEZM2auH+wDHFghIdLgsbj3dUNOqxqhE3Mg3bKiTqxmrLsV15ZLQCcE erJPLQsqjQla6+yGPOKou26C3n0ukdyWvPuipjqPAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQCtDYfrHPXlP8OR62xr/Eve dD+2Sl8KLDX+ekaV2p6GLO6+nTeD//8NFG7gh22LGBAyGYSKDcFSVy7fIl4iV98t qXpYfC8PA+pXIhCI0bEHz0Jd/g0oCgtbvGs/1SGWYzVvvfrDunGM2d/IRLFtIwde xNz661oFWR4UzbF16wPlxZ4S2BolgBAq9V3vr8G6r58/wfKLaR+kM11u3MupI/iz z/b67IsYicnYf+r8tLs0NMxI3nt6bkMth4552GGOx0490faxSH2wvS8r9OhvHfh1 yzpmzqgcGJ5vVyzPcj0ADCe7USBsTF5ocL5wLpj5i1OWtGeuevkyJ4CUHOUn2l3T -----END CERTIFICATE----- """ SSL_TEST_HARVESTER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAqaJkLXPFedwJJfBhhIgJskkAahHaR83s6385mVCxpDxyIm68 eUAFKcy02kUC/L0ypbNMDdqo395N6EFwfDQ7r3lE7qLJrNeCnjYUo9gCv922h2lA nvhf1Jz2957P2C2ZbbhlM7H/ZqfD/cpbkzIVKi8HmkRuK31pM7vGroOrrireaORQ VfAByyzXvPVhwUQ6kdvQYkFe663X41RD65VtGblSdqG3Kfzr17enO1xKvxYDhq+6 lcSvVRCxGTNmrh/sAxxYISHS4LG493VDTqsaoRNzIN2yok6sZqy7FdeWS0AnBHqy Ty0LKo0JWuvshjziqLtugt59LpHclrz7oqY6jwIDAQABAoIBAGWXVKmH6R9m8K+g +7YUhsIYSEA9+tz/7cDHy+YO1qSGctA+Q2/WMIFtEG6b4AMfCAMGkyjE6FhSWZQc BNLNsWUQmoDUSzXRR2+a8deCGXtwu8zy8vmBxFqfuqRnnxBXlsiII0vHcS64kH8g vqEz4EsIKWRxUQ2IqQWLkpyXTK0cEyqwSoz43n+DQ3/xdsVA2cYtQSQyc46IPt6/ euHHRvYaJi3tlL0dUCn12Z18VcKYI2fsdiP7RBpVSf631ssHXSGGq+fP7t8Sr8kW DJVfzpZg0HzrbsUaj7HDVolCRfdRPAY4yGTPhm+J3X37xqPf5PdlsLIUCNg9S2Gl F+OFjykCgYEA32xi6dD3PlV1D7e/+XF9H7sD1h5WKFSETF7Q0+BuWjVGJupMLpC9 h3YkLcvus3+eXT9VhJ2a92xpVtc5lTYxPoJ/IlnFrDaOc4WeyNXz4xGUeNYXe0Ua E0z0X4MueaQmtycbqfIeYK837k+lQaBIL2zD2jTeoUCnAlYnvHNbAPMCgYEAwl4/ gKPhAXJhRHEBazdJ0+nw9N/zpFFi5PQhRu5KKpRYypxjL/DZtjDJuXN1lEfZcoDG 6D0EleI9VZnDQSjxv7APTFE06E9SaqF1mJA7rpFv5GKHk5uT3CEx1iibTWrUncRO gdwpNfN7D0P2A2de+mYeEwLw1PR/ZcL1E+x85vUCgYEAvi86J8ScojAGfMGypfiI RTlhs6ORPbVsBMJ1StZxuVI+DCRHgx/sZeIYO++rmppYyRF/j2rFnjZnmOeOechu tMJKzIfUb5rlOcsVdepCOBkf5JiB1onk/2bzYlZ9ekhUOHYO42RZnX2pw6+CgdGZ gN05/oYguO0a/S8vlggwACcCgYB3FbmAfmeINGUFwtrkrq4sCQQZc/DZtweJUU3m IG8OYW95S5G1uLIa3w9o8SWT4OWIMwArH99kWYXMoXWwwX5EPIFS99objyXmsN/U xmHalb7hRcDdHg/cafYXyS9FonN76d9Tzujs5i16b+AVu8rETbaVXVLilp5LYcQ4 Hcd01QKBgE1MUbsJQI+LELrVTOJyZUZ/hI6IWI/uXkG4il+j7azwat+TfhwYlvzZ ZdwzUMnEKH1j4jX3jLeS9Ds08IzpSXvy1gkISg5cPrr6nMybVkfHPmCCdUPP3O+Q fRVO2Q2QWfFKF9U4+FfTfa3GOU3LUP12sxQGLTVXniYsOpyl6zGL -----END RSA PRIVATE KEY----- """ SSL_TEST_TIMELORD_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUN/JXfTKKgYd8tAmAAwPecG1x5qswDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgyNFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDRq9bspUpXBycLMb0rLXGVMD4xnT9+VfLF9GD5EFVOCG9N t2VmZ8Tvlq76G/5MI7nI/wf2E+Z5e46DFdsCwH3uZRja//eQQ3jhiNN92qPaHpZo 15CXLRm0HUEX+YHTBCQ4A2evFhH3CkxVmTwJYEIfQUf1N8XRMTV+LUGdjeYJSMR7 GuDrRft1AJDmGEeECp9o/DxBc/Na6a3hSM6EKfVacXh3XZBuRtfXvArOiZw18U80 qzi905hw0UnsCd34hHc30gYMI1ZGnhafFQRzLQuIAzCQgKGZJ6S6mwY1Ovu8qi6T vjGGzWc58yRv4SgiI+wMEJGcfDGEjedXnH5Sb14VAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQCY5SoXBJC1OtM3oDPvrbD0 ziondPDLGfS3zOXZ224c9s3vV8VOfUtdamrjn3OJnip5U8jlTg16gpSOqNK62CTl kgRtmR3tBLZmSfQIDB3SVN9OLWS+bpb2BtAdrUu/3vdP9EClbPMCO6lCDnjt2LBV qGmfBl57J9p9j/2z2ln+C9AboGmJGlNWiu56kOYUCM3+WYSSAq56FCGpqMSzBvX8 0q7lAy/dG07fVtnE6FSQ44nEmqY9zq2goy0F/w3h9EPXaIuixz/PnJuFhPHVZLZm GmpR9Aqxnu1EURt0I/reYetoXB4oYP8b+3LtQ00o64fQV7byKNSrji6Nw6VVaCUI -----END CERTIFICATE----- """ SSL_TEST_TIMELORD_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEA0avW7KVKVwcnCzG9Ky1xlTA+MZ0/flXyxfRg+RBVTghvTbdl ZmfE75au+hv+TCO5yP8H9hPmeXuOgxXbAsB97mUY2v/3kEN44YjTfdqj2h6WaNeQ ly0ZtB1BF/mB0wQkOANnrxYR9wpMVZk8CWBCH0FH9TfF0TE1fi1BnY3mCUjEexrg 60X7dQCQ5hhHhAqfaPw8QXPzWumt4UjOhCn1WnF4d12QbkbX17wKzomcNfFPNKs4 vdOYcNFJ7And+IR3N9IGDCNWRp4WnxUEcy0LiAMwkIChmSekupsGNTr7vKouk74x hs1nOfMkb+EoIiPsDBCRnHwxhI3nV5x+Um9eFQIDAQABAoIBAFOh5He+MpnmG3fG njsDxGOKu7QUkgf1hoHZSXjvP+eBS8xHE+Y2DAK5KxBObC+4rFl1CJrqMytP0neN Fy/Q0ipuHuzz3q6niycC6cEwndzaCIrHOUBj1/XVGWrTtioSY9QH36qh9gaBEBOw rJbc02MeKfKxDXG03C55JMwQlqoqqDTychssqj+4g+Z9IFr/qI3lx9NJLYIaKf6D 5XcCGmqxJBCo1EZ2YYmAyrNV7T2T/MjcdblwnL6V06ZYu/vrUTjpaJKqKh+GYl+z kKOBi8Ff3FuSQXlc/P4IOKHN5J59UxOIe65JsjC8CnqImBssdPW78Uh3ieIU7YxI hQNggv0CgYEA9fAO+G+hPVEJ3QR4BLiO8bn8pbAm2XrruqdR3GzT24WJyI4erJJ7 LpdRaJjzi7fplmF3n5XSABEZuJw1aDukwBIpZ6M4+XlDejsZe0YvxwSTAGIYwygZ VMMKeLRoiQIy4e3XaZIbENjJkLr7AKdshIcQa63foDcm0s3slKBJ/WsCgYEA2j/t boEoxLe2svNy+Dg3FSHCgvsYbSH4kB+66hxaxx8hf3UDVtX7WnA2kmHsRtk7BjEJ P1XfoZFQMJ+XK/re5rWtxmTkorpApokKQF+gmnA6YMepMCYTaTufzcZT9QBjj5W8 y9OLIZS9eC67zYXQ8/+32xHtU9DHOOC1Hq/jcn8CgYB7FkpnzHbGWWi2VSY8NqJU GOF5i0/mSL7yDAvMZisiExOCbJ6tgCJmjxUPZH1/z+v4d4+HL1SK9AQLgSK5qCAs gOp4FBjPwwEii7GVIOuIj6GC75W1FryWz4bOInyvFYqhyIenLpidNeKrrOkyyphl O7PcMIlbhj7IAogFWrOtQQKBgQCVqi0aEHxymkExan029uXfGe2XgLV5cUhRHVFC ZftifVitXQLTM55QoI7rxzcORr2RO2NKCYt38nx5O5ehU0I0F/Z5DIs1hF/9VBCx oGI0Ri3iXEkLebDqAzdNF2pPotqjhl2XsRPCDYv4tKOZBuEJ0hy0oBCN36geuwm5 Z4ij5QKBgQC4ZICjQCBa4sHrSVIRhOxQ//WLUFBNqBnOCKXst8x4I827fgcQqzRp QjbcXqkSlvcstWplFCTBabR5ZOnHCGHsXBcDKrQOv387OC279fG0RNeMlaZmSC3a 1pOgGDzhft0Yjog+whVg1ldrDMU8q9vukm8ZLrYigJgHfhkNkHCC5A== -----END RSA PRIVATE KEY----- """ SSL_TEST_TIMELORD_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUH0ogquGB4mndRRHavQuBPNDRMc0wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgyNFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCfuudKm7y0TVi6OOD54Ir9f0LaXBWRy+Xdq+0Jtmbc5TPk 9XMgt4DP+U6KukAwSb7jEudyiHjWIeB8EXkQ6bVRPWUxo9CZtzPjYVi8yZhJnOqE r5oSgiS0L45mEuhrVeero+K6QtMlU07UaZk2OPq+AppeYLexMDvexxx1yVf36mby VG+o1s/Eu1RPLaViaF8Owjl/A3YgccKUSx+/KKYGRnSIaEpoXdnLbD6HfgLWZbw2 qBg+eiy6GGYVFTJ0CcnfxgTJQ5wN9je+VFEPvdJQpuU/aBZ/CLxI/BCqF91xRg/A kND8+WqZI2X5ET+gnRuDA0SzNARyUx6ng93vyCAZAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBWOG1W4dxscVyJPt2hczoN OOuS9uA6cHeqtRyXxwBfCxFMTBJn3nEnNFNt1CgLhyPQY1CFyf+8ZycaIfeeCqE2 +qHdIpwoFOF0usRUi1oH2Pb4F/62x1EERDdl+tDdVE1vgm5Mh/teDBmHZwPnAhyZ rX3FAN/he6JXmZpQCuMazJ0PhcMPbrwtv2RBkFGneQamHYbTcsofQlecgRIcGRbO N5nr1d6LGoBlGRNFJRcH+9VZtw09dOixh9+uzKHIhzkUpJWrfpZXGq/Zxjjhj+7G z1LWzIV/uatBy6TyHsnHicPyc3dYW01OPE3TjsiFMaGFB2A38IcyqP+3PmzD5vwG -----END CERTIFICATE----- """ SSL_TEST_TIMELORD_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEAn7rnSpu8tE1Yujjg+eCK/X9C2lwVkcvl3avtCbZm3OUz5PVz ILeAz/lOirpAMEm+4xLncoh41iHgfBF5EOm1UT1lMaPQmbcz42FYvMmYSZzqhK+a EoIktC+OZhLoa1Xnq6PiukLTJVNO1GmZNjj6vgKaXmC3sTA73sccdclX9+pm8lRv qNbPxLtUTy2lYmhfDsI5fwN2IHHClEsfvyimBkZ0iGhKaF3Zy2w+h34C1mW8NqgY PnosuhhmFRUydAnJ38YEyUOcDfY3vlRRD73SUKblP2gWfwi8SPwQqhfdcUYPwJDQ /PlqmSNl+RE/oJ0bgwNEszQEclMep4Pd78ggGQIDAQABAoIBADMImVtqFMmaqM2e 3KqZhm7l2StBHpcdiUzg4HQo9gZ/qKvvjCAY4SwRoHmMdnO3LCkK4i3i0pC/9CRP xNmVghv5vLo2d7CVKxvr/1kaI/DpFLjeDiD5udZkF2AfjGi24rUhQJB4R1P2oQoW zx/W5q4M0Nt0lVwkaAyOm1Y6xUNs/KKm/greKPRlZCwcHUg3RYE3D03Mgiy6v7KH /QelfUhEzTvbJ38mjd6djs9FYHeiG7XH56HQB2SF0MNaKN2s9Ej+i9ZUf2WoOtWN qM9i5eymaV0LqAyCtU+4RTAhRMpH++nHwxm90Hhb7DbSL5zOd/mR3TDKshS8V8fr KK9uX40CgYEA1M8zuKTqbtT7l9rEJ4S0nnfVDKrqWyAvOcMNvV2s42W/Z1NpBwFE ovxWGnQrTkja7adDHGA9UGzif09yGzpDnOKc8sJNAmPxDyYrkBrgTAcnwLP2L+Fs 9okDNb2fBAI+OHOcNKX8JUZ0SHx4q0sUD+Xl5x1J9gpOx53D1U7acQsCgYEAwCXl OhqmJHwDdhBHGFygKE8UY8YaArFd1HGi6g6b/STDSGvyvVQsCrhN4uBZw0wdKPXg nshrIid3ZICGRXqGcS+kw0f2+4skUQ2FzSIOYDVq3zSdnq0HRxucamQMhA2LGMxR T0LRR3K8XHQkmTAcT2HFj7qFMYObF6SkVZ7l8esCgYBR6oxjOAARt6Q9GPXGrHuG QGRfIu9hMmtbVazVRtjFE6Zw1JeqHZ/ZCT7voeYFlV/IeUkJBDa13aP2E5O9zVi3 bDez7n0MPYJOLYg5SU8rlNmFgQBz/9ccszLsHdi3B1ICEuZ/EaGUi6E5QciFTzoi wIEVzJ1qux8GEcGPO3I0bwKBgGoTgZy2IYp6vB5tlhIo8HHQVl1OfAWIjVg+88Vr E0qJBRXyIivLUBUK8lSRrnxWhLKcKsj9s8dDKnJdUcMBhT7vInJ8RClSA1aLtJYu euk6FCntDicPNrlW0N8bJJ2yLFwgT7MGHCrpeHtB0wKOwNJCE6LpQaa4FOLUjbSG 6ELJAoGANbe5Q6c48hLJcdZe4AmNX4VcPrhRN2PyE8Qbwqq04lBpbHqbijosX9oQ AqMkYLavW85YDru5i+trpuq80msX+Y9EWjXmTkjwg6yxhVwkZHLAVrZMq9F7e3vK zTScXyJGjj0OJkUhbNTH2O3S2E5Pqrfd/m+idRo9sL+gZeaJXHo= -----END RSA PRIVATE KEY----- """ SSL_TEST_CRAWLER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUchZN2ld769tiYoK60GmFQF/Q1z8wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgyNFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCmD4gtULYn91b8jZo0/I0JUA6j3lbV40/ivqH9AqEoHiKY qQMbT1IywATq0/oaawM0sz3JfPPWpRVMVHHXWZdNtSinnXheqraWJX8ZDLmMKhMP srRgX1eDjY+brHB1+E/0BGhFmajopdv2RDlfjljh+J+/nFMqvR5m2Eap0m6peINV m6gYloHwCfa/ieYsF+zpHJNX5t4Z3q6BiTZPwcmxF19gfS35ea4SEqW9Skvm2+o8 VbOiC0y9VtSl925phEn7ptefu2vT+QtgNVllMZ1r51s8T76bs/pVBUTE0ZSycQsU LAgNP7luy+PepQf5JsGPM9M71idQudkjiNKRe1EjAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBAwLNxGGdf9VqeqG3RO5lS a4B7k276NjG9Fl1Ys5BbbUzpSPwLunNGGNI0rhlY+uUZDCg8kAdwfnrMwtoTwH8d ez0cYCW210Gdtg0z4X2L0oHkGMxJwsRvl7cp3v1k5R1iupFzdE4lUsxapfRrQeOt JJGVVDdQKKZ86DuDMpanrBGUWl8e4b4/8bQS/8PgCQEJqkJjVB4qS9km/CV83D83 aeJVOvBlf1TfJgmxKvUksgnKUoN1L1sN6JIcWtVqe4qj39wmCZLIUaupFE0fmUYt JPrsEwbkgm1PN+n0+gyV9uNwW3WFGoildZ/hCN0f9KuH2uz/LmnMpEmBMnnk/DAS -----END CERTIFICATE----- """ SSL_TEST_CRAWLER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEApg+ILVC2J/dW/I2aNPyNCVAOo95W1eNP4r6h/QKhKB4imKkD G09SMsAE6tP6GmsDNLM9yXzz1qUVTFRx11mXTbUop514Xqq2liV/GQy5jCoTD7K0 YF9Xg42Pm6xwdfhP9ARoRZmo6KXb9kQ5X45Y4fifv5xTKr0eZthGqdJuqXiDVZuo GJaB8An2v4nmLBfs6RyTV+beGd6ugYk2T8HJsRdfYH0t+XmuEhKlvUpL5tvqPFWz ogtMvVbUpfduaYRJ+6bXn7tr0/kLYDVZZTGda+dbPE++m7P6VQVExNGUsnELFCwI DT+5bsvj3qUH+SbBjzPTO9YnULnZI4jSkXtRIwIDAQABAoIBAC9jU0sLM1AoZyxf BFiGkYDM1cCxnDohShS8reFTtMWMA/dok7hhZGWTIlQY9dBAJYQOel1bSQJBzdgg aPQ5XtIQFm/uogDx2nTyclilpvV2tEXQi2TNEF48MXUNOnKPz9EkyNTDys3JNwIJ 6g14w6iImJ3HcHxLx7c1lMS1hlrZ0VmU44/YlW0rXIEYAHpY7Zg5adEXGhlEaFnq +t022nDlOYUY91H9IwftRNT/jj1Upxgu6lmQAqVtdgjTi3PcG2dVr88EQ28t7oF6 qOxKDiGkFBkCZV/V22eqdnEq75NVUrBGxkWlS44KDi7qQHoCOk1AtftXqFe1ImqO YwGYcaECgYEA2VjI7ugWHdNuzB8hAAdqEbV17mgWctisGFGpLBrFWu9F64jqlZ+A APR8U+V1oir54A6PukNhndP6L/bocYtV5Vlngg7BzeVHdByrbTnNwZ8jrd2JiAlA alvGC1EjGGDWAhJv2UAF7DxbwI4lDlqfHoeXyvruP7dSKP7VLYa67DkCgYEAw5fT uH63BIP4ToLkBKLd4Dkq0ZTUIDzBcZtyk7C7m/WlndxpYyw49RMSBlyaR2JuT/pj FPyDIkjuwqhNYCTmwhsLy6j0w9tY1vpDOvJg12V4EPOycSC2Jy6UJUfAGyet88SV MNljEbrqnlUQ3HWejANTKnJFZo3N8EOSXE1d4DsCgYEArg0di8QrweLJfYkIIj/N vzSzpiGQqJO+7RKoCPu/Q50NPxs70GoUVa9zyLOeSilkRPskOiMvjvZsCfEOH69X L/0ymMI8jSeo2uECnsuFbCKGrfsU4e2WuhWYOQPWuPUDLFGbZDyTAaUsTL0IC8Ci YA5xjkj4denWT6ITEQwtsHECgYAovbBRJrvSifany+XY/V+/+8hqfViuGlmk4187 Wj3J36IOvsGI8cYvbjh78MAGDH+z0xDeZzadZpmtHEd5tlYGqoGLe3b4cPERXnGw jpoTY8Rdq5VIsSqgALjFBywBvAMk2pbE5RMYt1l1f3ySn0FWIr8pAUJpeTIjUL/k 0Ay0zwKBgFTW+RKHanBZy6BUgfTdOw99599h9l1Crzvk0FOWOEOsRc9ksHEALTlA LaUf9r4cTDC+Oz8Yab3nnj3+o8FWYYxRBjBkTCGpasscvbAzRa9EBw2RMWaKb8um scpS5ptQ4CzueaT+tT+Apw+NPBeLEn/jSn6+af0DZ6t0Qf0teidJ -----END RSA PRIVATE KEY----- """ SSL_TEST_DAEMON_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUa42MrlXu0Vb3u6bdR8DwCfMsPV8wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDcyOTE5MDgyNFoYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC7oQMwbqJoeS3oiLCgTaa5ruJkb9tPKzPKwHSrRcyXsFim wNp6dtw3rxT4i7Fa5gAe7Y4iH72pQYOVMfTLH+5gEciUjnhTZwilMi/PzcEbsjVV UUr23RoZ5iLVZNAcUP8lcf1eSWJk6ohmA738artmaXdcjXO3gL/FVi5E8BG3n5Dj
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
true
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/block_tools.py
flax/simulator/block_tools.py
from __future__ import annotations import asyncio import copy import logging import math import os import random import shutil import ssl import sys import tempfile import time from argparse import Namespace from dataclasses import replace from pathlib import Path from typing import Any, Callable, Dict, List, Optional, Tuple, Union from blspy import AugSchemeMPL, G1Element, G2Element, PrivateKey from chia_rs import compute_merkle_set_root from chiabip158 import PyBIP158 from flax.cmds.init_funcs import create_all_ssl, create_default_flax_config from flax.consensus.block_creation import unfinished_block_to_full_block from flax.consensus.block_record import BlockRecord from flax.consensus.block_rewards import calculate_base_farmer_reward, calculate_pool_reward from flax.consensus.blockchain_interface import BlockchainInterface from flax.consensus.coinbase import create_farmer_coin, create_pool_coin, create_puzzlehash_for_pk from flax.consensus.condition_costs import ConditionCost from flax.consensus.constants import ConsensusConstants from flax.consensus.default_constants import DEFAULT_CONSTANTS from flax.consensus.deficit import calculate_deficit from flax.consensus.full_block_to_block_record import block_to_block_record from flax.consensus.make_sub_epoch_summary import next_sub_epoch_summary from flax.consensus.pot_iterations import ( calculate_ip_iters, calculate_iterations_quality, calculate_sp_interval_iters, calculate_sp_iters, is_overflow_block, ) from flax.consensus.vdf_info_computation import get_signage_point_vdf_info from flax.daemon.keychain_proxy import KeychainProxy, connect_to_keychain_and_validate, wrap_local_keychain from flax.full_node.bundle_tools import ( best_solution_generator_from_template, detect_potential_template_generator, simple_solution_generator, ) from flax.full_node.generator import setup_generator_args from flax.full_node.mempool_check_conditions import GENERATOR_MOD from flax.full_node.signage_point import SignagePoint from flax.plotting.create_plots import PlotKeys, create_plots from flax.plotting.manager import PlotManager from flax.plotting.util import ( PlotRefreshEvents, PlotRefreshResult, PlotsRefreshParameter, add_plot_directory, parse_plot_info, ) from flax.server.server import ssl_context_for_client from flax.simulator.socket import find_available_listen_port from flax.simulator.ssl_certs import ( SSLTestCACertAndPrivateKey, SSLTestCollateralWrapper, SSLTestNodeCertsAndKeys, get_next_nodes_certs_and_keys, get_next_private_ca_cert_and_key, ) from flax.simulator.time_out_assert import time_out_assert_custom_interval from flax.simulator.wallet_tools import WalletTool from flax.types.blockchain_format.classgroup import ClassgroupElement from flax.types.blockchain_format.coin import Coin, hash_coin_ids from flax.types.blockchain_format.foliage import Foliage, FoliageBlockData, FoliageTransactionBlock, TransactionsInfo from flax.types.blockchain_format.pool_target import PoolTarget from flax.types.blockchain_format.program import INFINITE_COST from flax.types.blockchain_format.proof_of_space import ProofOfSpace from flax.types.blockchain_format.reward_chain_block import RewardChainBlockUnfinished from flax.types.blockchain_format.sized_bytes import bytes32 from flax.types.blockchain_format.slots import ( ChallengeChainSubSlot, InfusedChallengeChainSubSlot, RewardChainSubSlot, SubSlotProofs, ) from flax.types.blockchain_format.sub_epoch_summary import SubEpochSummary from flax.types.blockchain_format.vdf import VDFInfo, VDFProof from flax.types.condition_opcodes import ConditionOpcode from flax.types.end_of_slot_bundle import EndOfSubSlotBundle from flax.types.full_block import FullBlock from flax.types.generator_types import BlockGenerator, CompressorArg from flax.types.spend_bundle import SpendBundle from flax.types.unfinished_block import UnfinishedBlock from flax.util.bech32m import encode_puzzle_hash from flax.util.block_cache import BlockCache from flax.util.config import config_path_for_filename, load_config, lock_config, override_config, save_config from flax.util.default_root import DEFAULT_ROOT_PATH from flax.util.errors import Err from flax.util.hash import std_hash from flax.util.ints import uint8, uint16, uint32, uint64, uint128 from flax.util.keychain import Keychain, bytes_to_mnemonic from flax.util.prev_transaction_block import get_prev_transaction_block from flax.util.vdf_prover import get_vdf_info_and_proof from flax.wallet.derive_keys import ( master_sk_to_farmer_sk, master_sk_to_local_sk, master_sk_to_pool_sk, master_sk_to_wallet_sk, ) test_constants = DEFAULT_CONSTANTS.replace( **{ "MIN_PLOT_SIZE": 18, "MIN_BLOCKS_PER_CHALLENGE_BLOCK": 12, "DIFFICULTY_STARTING": 2**10, "DISCRIMINANT_SIZE_BITS": 16, "SUB_EPOCH_BLOCKS": 170, "WEIGHT_PROOF_THRESHOLD": 2, "WEIGHT_PROOF_RECENT_BLOCKS": 380, "DIFFICULTY_CONSTANT_FACTOR": 33554432, "NUM_SPS_SUB_SLOT": 16, # Must be a power of 2 "MAX_SUB_SLOT_BLOCKS": 50, "EPOCH_BLOCKS": 340, "BLOCKS_CACHE_SIZE": 340 + 3 * 50, # Coordinate with the above values "SUB_SLOT_TIME_TARGET": 600, # The target number of seconds per slot, mainnet 600 "SUB_SLOT_ITERS_STARTING": 2**10, # Must be a multiple of 64 "NUMBER_ZERO_BITS_PLOT_FILTER": 1, # H(plot signature of the challenge) must start with these many zeroes "MAX_FUTURE_TIME": 3600 * 24 * 10, # Allows creating blockchains with timestamps up to 10 days in the future, for testing "COST_PER_BYTE": 1337, "MEMPOOL_BLOCK_BUFFER": 6, } ) class BlockTools: """ Tools to generate blocks for testing. """ _block_cache_header: bytes32 _block_cache_height_to_hash: Dict[uint32, bytes32] _block_cache_difficulty: uint64 _block_cache: Dict[bytes32, BlockRecord] def __init__( self, constants: ConsensusConstants = test_constants, root_path: Optional[Path] = None, const_dict=None, keychain: Optional[Keychain] = None, config_overrides: Optional[Dict] = None, automated_testing: bool = True, plot_dir: str = "test-plots", log: logging.Logger = logging.getLogger(__name__), ): self._block_cache_header = bytes32([0] * 32) self._tempdir = None if root_path is None: self._tempdir = tempfile.TemporaryDirectory() root_path = Path(self._tempdir.name) self.root_path = root_path self.log = log self.local_keychain = keychain self._block_time_residual = 0.0 self.local_sk_cache: Dict[bytes32, Tuple[PrivateKey, Any]] = {} self.automated_testing = automated_testing self.plot_dir_name = plot_dir if automated_testing: # Hold onto the wrappers so that they can keep track of whether the certs/keys # are in use by another BlockTools instance. self.ssl_ca_cert_and_key_wrapper: SSLTestCollateralWrapper[ SSLTestCACertAndPrivateKey ] = get_next_private_ca_cert_and_key() self.ssl_nodes_certs_and_keys_wrapper: SSLTestCollateralWrapper[ SSLTestNodeCertsAndKeys ] = get_next_nodes_certs_and_keys() create_default_flax_config(root_path) create_all_ssl( root_path, private_ca_crt_and_key=self.ssl_ca_cert_and_key_wrapper.collateral.cert_and_key, node_certs_and_keys=self.ssl_nodes_certs_and_keys_wrapper.collateral.certs_and_keys, ) with lock_config(root_path=root_path, filename="config.yaml"): path = config_path_for_filename(root_path=root_path, filename="config.yaml") path.write_text(path.read_text().replace("localhost", "127.0.0.1")) self._config = load_config(self.root_path, "config.yaml") if automated_testing: if config_overrides is None: config_overrides = {} config_overrides["logging.log_stdout"] = True config_overrides["selected_network"] = "testnet0" for service in [ "harvester", "farmer", "full_node", "wallet", "introducer", "timelord", "pool", "simulator", ]: config_overrides[service + ".selected_network"] = "testnet0" # some tests start the daemon, make sure it's on a free port config_overrides["daemon_port"] = find_available_listen_port("BlockTools daemon") self._config = override_config(self._config, config_overrides) with lock_config(self.root_path, "config.yaml"): save_config(self.root_path, "config.yaml", self._config) overrides = self._config["network_overrides"]["constants"][self._config["selected_network"]] updated_constants = constants.replace_str_to_bytes(**overrides) if const_dict is not None: updated_constants = updated_constants.replace(**const_dict) self.constants = updated_constants self.plot_dir: Path = get_plot_dir(self.plot_dir_name, self.automated_testing) self.temp_dir: Path = get_plot_tmp_dir(self.plot_dir_name, self.automated_testing) self.plot_dir.mkdir(parents=True, exist_ok=True) self.temp_dir.mkdir(parents=True, exist_ok=True) self.expected_plots: Dict[bytes32, Path] = {} self.created_plots: int = 0 self.total_result = PlotRefreshResult() def test_callback(event: PlotRefreshEvents, update_result: PlotRefreshResult): assert update_result.duration < 15 if event == PlotRefreshEvents.started: self.total_result = PlotRefreshResult() if event == PlotRefreshEvents.batch_processed: self.total_result.loaded += update_result.loaded self.total_result.processed += update_result.processed self.total_result.duration += update_result.duration assert update_result.remaining >= len(self.expected_plots) - self.total_result.processed assert len(update_result.loaded) <= self.plot_manager.refresh_parameter.batch_size if event == PlotRefreshEvents.done: assert self.total_result.loaded == update_result.loaded assert self.total_result.processed == update_result.processed assert self.total_result.duration == update_result.duration assert update_result.remaining == 0 assert len(self.plot_manager.plots) == len(self.expected_plots) self.plot_manager: PlotManager = PlotManager( self.root_path, refresh_parameter=PlotsRefreshParameter(batch_size=uint32(2)), refresh_callback=test_callback, match_str=str(self.plot_dir.relative_to(DEFAULT_ROOT_PATH.parent)) if not automated_testing else None, ) async def setup_keys(self, fingerprint: Optional[int] = None, reward_ph: Optional[bytes32] = None): if self.local_keychain: keychain_proxy: Optional[KeychainProxy] = wrap_local_keychain(self.local_keychain, log=self.log) elif not self.automated_testing and fingerprint is not None: keychain_proxy = await connect_to_keychain_and_validate(self.root_path, self.log) else: # if we are automated testing or if we don't have a fingerprint. keychain_proxy = await connect_to_keychain_and_validate( self.root_path, self.log, user="testing-1.8.0", service="flax-testing-1.8.0" ) assert keychain_proxy is not None if fingerprint is None: # if we are not specifying an existing key await keychain_proxy.delete_all_keys() self.farmer_master_sk_entropy = std_hash(b"block_tools farmer key") # both entropies are only used here self.pool_master_sk_entropy = std_hash(b"block_tools pool key") self.farmer_master_sk = await keychain_proxy.add_private_key( bytes_to_mnemonic(self.farmer_master_sk_entropy) ) self.pool_master_sk = await keychain_proxy.add_private_key(bytes_to_mnemonic(self.pool_master_sk_entropy)) else: self.farmer_master_sk = await keychain_proxy.get_key_for_fingerprint(fingerprint) self.pool_master_sk = await keychain_proxy.get_key_for_fingerprint(fingerprint) self.farmer_pk = master_sk_to_farmer_sk(self.farmer_master_sk).get_g1() self.pool_pk = master_sk_to_pool_sk(self.pool_master_sk).get_g1() if reward_ph is None: self.farmer_ph: bytes32 = create_puzzlehash_for_pk( master_sk_to_wallet_sk(self.farmer_master_sk, uint32(0)).get_g1() ) self.pool_ph: bytes32 = create_puzzlehash_for_pk( master_sk_to_wallet_sk(self.pool_master_sk, uint32(0)).get_g1() ) else: self.farmer_ph = reward_ph self.pool_ph = reward_ph if self.automated_testing: self.all_sks: List[PrivateKey] = [sk for sk, _ in await keychain_proxy.get_all_private_keys()] else: self.all_sks = [self.farmer_master_sk] # we only want to include plots under the same fingerprint self.pool_pubkeys: List[G1Element] = [master_sk_to_pool_sk(sk).get_g1() for sk in self.all_sks] self.farmer_pubkeys: List[G1Element] = [master_sk_to_farmer_sk(sk).get_g1() for sk in self.all_sks] if len(self.pool_pubkeys) == 0 or len(self.farmer_pubkeys) == 0: raise RuntimeError("Keys not generated. Run `flax keys generate`") self.plot_manager.set_public_keys(self.farmer_pubkeys, self.pool_pubkeys) await keychain_proxy.close() # close the keychain proxy def change_config(self, new_config: Dict): self._config = new_config overrides = self._config["network_overrides"]["constants"][self._config["selected_network"]] updated_constants = self.constants.replace_str_to_bytes(**overrides) self.constants = updated_constants with lock_config(self.root_path, "config.yaml"): save_config(self.root_path, "config.yaml", self._config) def add_plot_directory(self, path: Path) -> None: # don't add to config if block_tools is user run and the directory is already in the config. if str(path.resolve()) not in self._config["harvester"]["plot_directories"] or self.automated_testing: self._config = add_plot_directory(self.root_path, str(path)) async def setup_plots( self, num_og_plots: int = 15, num_pool_plots: int = 5, num_non_keychain_plots: int = 3, plot_size: int = 20, bitfield: bool = True, ): self.add_plot_directory(self.plot_dir) assert self.created_plots == 0 # OG Plots for i in range(num_og_plots): await self.new_plot(plot_size=plot_size, bitfield=bitfield) # Pool Plots for i in range(num_pool_plots): await self.new_plot(self.pool_ph, plot_size=plot_size, bitfield=bitfield) # Some plots with keys that are not in the keychain for i in range(num_non_keychain_plots): await self.new_plot( path=self.plot_dir / "not_in_keychain", plot_keys=PlotKeys(G1Element(), G1Element(), None), exclude_plots=True, plot_size=plot_size, bitfield=bitfield, ) await self.refresh_plots() assert len(self.plot_manager.plots) == len(self.expected_plots) async def new_plot( self, pool_contract_puzzle_hash: Optional[bytes32] = None, path: Path = None, tmp_dir: Path = None, plot_keys: Optional[PlotKeys] = None, exclude_plots: bool = False, plot_size: int = 20, bitfield: bool = True, ) -> Optional[bytes32]: final_dir = self.plot_dir if path is not None: final_dir = path final_dir.mkdir(parents=True, exist_ok=True) if tmp_dir is None: tmp_dir = self.temp_dir args = Namespace() # Can't go much lower than 20, since plots start having no solutions and more buggy args.size = plot_size # Uses many plots for testing, in order to guarantee proofs of space at every height args.num = 1 args.buffer = 100 args.tmp_dir = tmp_dir args.tmp2_dir = tmp_dir args.final_dir = final_dir args.plotid = None args.memo = None args.buckets = 0 args.stripe_size = 2000 args.num_threads = 0 args.nobitfield = not bitfield args.exclude_final_dir = False args.list_duplicates = False try: if plot_keys is None: pool_pk: Optional[G1Element] = None pool_address: Optional[str] = None if pool_contract_puzzle_hash is None: pool_pk = self.pool_pk else: pool_address = encode_puzzle_hash(pool_contract_puzzle_hash, "xfx") plot_keys = PlotKeys(self.farmer_pk, pool_pk, pool_address) # No datetime in the filename, to get deterministic filenames and not re-plot created, existed = await create_plots( args, plot_keys, use_datetime=False, test_private_keys=[AugSchemeMPL.key_gen(std_hash(self.created_plots.to_bytes(2, "big")))], ) self.created_plots += 1 plot_id_new: Optional[bytes32] = None path_new: Optional[Path] = None if len(created): assert len(existed) == 0 plot_id_new, path_new = list(created.items())[0] if len(existed): assert len(created) == 0 plot_id_new, path_new = list(existed.items())[0] assert plot_id_new is not None assert path_new is not None if not exclude_plots: self.expected_plots[plot_id_new] = path_new return plot_id_new except KeyboardInterrupt: shutil.rmtree(self.temp_dir, ignore_errors=True) sys.exit(1) async def refresh_plots(self): self.plot_manager.refresh_parameter = replace( self.plot_manager.refresh_parameter, batch_size=uint32(4 if len(self.expected_plots) % 3 == 0 else 3) ) # Make sure we have at least some batches + a remainder self.plot_manager.trigger_refresh() assert self.plot_manager.needs_refresh() self.plot_manager.start_refreshing(sleep_interval_ms=1) await time_out_assert_custom_interval(10, 0.001, self.plot_manager.needs_refresh, value=False) self.plot_manager.stop_refreshing() assert not self.plot_manager.needs_refresh() async def delete_plot(self, plot_id: bytes32): assert plot_id in self.expected_plots self.expected_plots[plot_id].unlink() del self.expected_plots[plot_id] await self.refresh_plots() @property def config(self) -> Dict: return copy.deepcopy(self._config) def get_daemon_ssl_context(self) -> ssl.SSLContext: crt_path = self.root_path / self.config["daemon_ssl"]["private_crt"] key_path = self.root_path / self.config["daemon_ssl"]["private_key"] ca_cert_path = self.root_path / self.config["private_ssl_ca"]["crt"] ca_key_path = self.root_path / self.config["private_ssl_ca"]["key"] return ssl_context_for_client(ca_cert_path, ca_key_path, crt_path, key_path) def get_plot_signature(self, m: bytes32, plot_pk: G1Element) -> G2Element: """ Returns the plot signature of the header data. """ farmer_sk = master_sk_to_farmer_sk(self.all_sks[0]) for plot_info in self.plot_manager.plots.values(): if plot_pk == plot_info.plot_public_key: # Look up local_sk from plot to save locked memory if plot_info.prover.get_id() in self.local_sk_cache: local_master_sk, pool_pk_or_ph = self.local_sk_cache[plot_info.prover.get_id()] else: pool_pk_or_ph, _, local_master_sk = parse_plot_info(plot_info.prover.get_memo()) self.local_sk_cache[plot_info.prover.get_id()] = (local_master_sk, pool_pk_or_ph) if isinstance(pool_pk_or_ph, G1Element): include_taproot = False else: assert isinstance(pool_pk_or_ph, bytes32) include_taproot = True local_sk = master_sk_to_local_sk(local_master_sk) agg_pk = ProofOfSpace.generate_plot_public_key(local_sk.get_g1(), farmer_sk.get_g1(), include_taproot) assert agg_pk == plot_pk harv_share = AugSchemeMPL.sign(local_sk, m, agg_pk) farm_share = AugSchemeMPL.sign(farmer_sk, m, agg_pk) if include_taproot: taproot_sk: PrivateKey = ProofOfSpace.generate_taproot_sk(local_sk.get_g1(), farmer_sk.get_g1()) taproot_share: G2Element = AugSchemeMPL.sign(taproot_sk, m, agg_pk) else: taproot_share = G2Element() return AugSchemeMPL.aggregate([harv_share, farm_share, taproot_share]) raise ValueError(f"Do not have key {plot_pk}") def get_pool_key_signature(self, pool_target: PoolTarget, pool_pk: Optional[G1Element]) -> Optional[G2Element]: # Returns the pool signature for the corresponding pk. If no pk is provided, returns None. if pool_pk is None: return None for sk in self.all_sks: sk_child = master_sk_to_pool_sk(sk) if sk_child.get_g1() == pool_pk: return AugSchemeMPL.sign(sk_child, bytes(pool_target)) raise ValueError(f"Do not have key {pool_pk}") def get_farmer_wallet_tool(self) -> WalletTool: return WalletTool(self.constants, self.farmer_master_sk) def get_pool_wallet_tool(self) -> WalletTool: return WalletTool(self.constants, self.pool_master_sk) def get_consecutive_blocks( self, num_blocks: int, block_list_input: List[FullBlock] = None, *, farmer_reward_puzzle_hash: Optional[bytes32] = None, pool_reward_puzzle_hash: Optional[bytes32] = None, transaction_data: Optional[SpendBundle] = None, seed: bytes = b"", time_per_block: Optional[float] = None, force_overflow: bool = False, skip_slots: int = 0, # Force at least this number of empty slots before the first SB guarantee_transaction_block: bool = False, # Force that this block must be a tx block keep_going_until_tx_block: bool = False, # keep making new blocks until we find a tx block normalized_to_identity_cc_eos: bool = False, normalized_to_identity_icc_eos: bool = False, normalized_to_identity_cc_sp: bool = False, normalized_to_identity_cc_ip: bool = False, current_time: bool = False, previous_generator: Optional[Union[CompressorArg, List[uint32]]] = None, genesis_timestamp: Optional[uint64] = None, force_plot_id: Optional[bytes32] = None, use_timestamp_residual: bool = False, ) -> List[FullBlock]: assert num_blocks > 0 if block_list_input is not None: block_list = block_list_input.copy() else: block_list = [] constants = self.constants transaction_data_included = False if time_per_block is None: time_per_block = float(constants.SUB_SLOT_TIME_TARGET) / float(constants.SLOT_BLOCKS_TARGET) if farmer_reward_puzzle_hash is None: farmer_reward_puzzle_hash = self.farmer_ph if len(block_list) == 0: if force_plot_id is not None: raise ValueError("Cannot specify plot_id for genesis block") initial_block_list_len = 0 genesis = self.create_genesis_block( constants, seed, force_overflow=force_overflow, skip_slots=skip_slots, timestamp=(uint64(int(time.time())) if genesis_timestamp is None else genesis_timestamp), ) self.log.info(f"Created block 0 iters: {genesis.total_iters}") num_empty_slots_added = skip_slots block_list = [genesis] num_blocks -= 1 else: initial_block_list_len = len(block_list) num_empty_slots_added = uint32(0) # Allows forcing empty slots in the beginning, for testing purposes if num_blocks == 0: return block_list blocks: Dict[bytes32, BlockRecord] if block_list[-1].header_hash == self._block_cache_header: height_to_hash = self._block_cache_height_to_hash difficulty = self._block_cache_difficulty blocks = self._block_cache else: height_to_hash, difficulty, blocks = load_block_list(block_list, constants) latest_block: BlockRecord = blocks[block_list[-1].header_hash] curr = latest_block while not curr.is_transaction_block: curr = blocks[curr.prev_hash] start_timestamp = curr.timestamp start_height = curr.height curr = latest_block blocks_added_this_sub_slot = 1 while not curr.first_in_sub_slot: curr = blocks[curr.prev_hash] blocks_added_this_sub_slot += 1 finished_sub_slots_at_sp: List[EndOfSubSlotBundle] = [] # Sub-slots since last block, up to signage point finished_sub_slots_at_ip: List[EndOfSubSlotBundle] = [] # Sub-slots since last block, up to infusion point sub_slot_iters: uint64 = latest_block.sub_slot_iters # The number of iterations in one sub-slot same_slot_as_last = True # Only applies to first slot, to prevent old blocks from being added sub_slot_start_total_iters: uint128 = latest_block.ip_sub_slot_total_iters(constants) sub_slots_finished = 0 pending_ses: bool = False # Start at the last block in block list # Get the challenge for that slot while True: slot_cc_challenge, slot_rc_challenge = get_challenges( constants, blocks, finished_sub_slots_at_sp, latest_block.header_hash, ) prev_num_of_blocks = num_blocks if num_empty_slots_added < skip_slots: # If did not reach the target slots to skip, don't make any proofs for this sub-slot num_empty_slots_added += 1 else: # Loop over every signage point (Except for the last ones, which are used for overflows) for signage_point_index in range(0, constants.NUM_SPS_SUB_SLOT - constants.NUM_SP_INTERVALS_EXTRA): curr = latest_block while curr.total_iters > sub_slot_start_total_iters + calculate_sp_iters( constants, sub_slot_iters, uint8(signage_point_index) ): if curr.height == 0: break curr = blocks[curr.prev_hash] if curr.total_iters > sub_slot_start_total_iters: finished_sub_slots_at_sp = [] if same_slot_as_last: if signage_point_index < latest_block.signage_point_index: # Ignore this signage_point because it's in the past continue signage_point: SignagePoint = get_signage_point( constants, BlockCache(blocks), latest_block, sub_slot_start_total_iters, uint8(signage_point_index), finished_sub_slots_at_sp, sub_slot_iters, normalized_to_identity_cc_sp, ) if signage_point_index == 0: cc_sp_output_hash: bytes32 = slot_cc_challenge else: assert signage_point.cc_vdf is not None cc_sp_output_hash = signage_point.cc_vdf.output.get_hash() qualified_proofs: List[Tuple[uint64, ProofOfSpace]] = self.get_pospaces_for_challenge( constants, slot_cc_challenge, cc_sp_output_hash, seed, difficulty, sub_slot_iters, force_plot_id=force_plot_id, ) for required_iters, proof_of_space in sorted(qualified_proofs, key=lambda t: t[0]): if blocks_added_this_sub_slot == constants.MAX_SUB_SLOT_BLOCKS or force_overflow: break if same_slot_as_last: if signage_point_index == latest_block.signage_point_index: # Ignore this block because it's in the past if required_iters <= latest_block.required_iters: continue assert latest_block.header_hash in blocks additions = None removals = None if transaction_data_included: transaction_data = None previous_generator = None if transaction_data is not None: additions = transaction_data.additions() removals = transaction_data.removals() assert start_timestamp is not None if proof_of_space.pool_contract_puzzle_hash is not None: if pool_reward_puzzle_hash is not None: # The caller wants to be paid to a specific address, but this PoSpace is tied to an # address, so continue until a proof of space tied to a pk is found continue pool_target = PoolTarget(proof_of_space.pool_contract_puzzle_hash, uint32(0)) else: if pool_reward_puzzle_hash is not None: pool_target = PoolTarget(pool_reward_puzzle_hash, uint32(0)) else: pool_target = PoolTarget(self.pool_ph, uint32(0)) block_generator: Optional[BlockGenerator] if transaction_data is not None: if type(previous_generator) is CompressorArg: block_generator = best_solution_generator_from_template( previous_generator, transaction_data ) else: block_generator = simple_solution_generator(transaction_data) if type(previous_generator) is list: block_generator = BlockGenerator(block_generator.program, [], previous_generator) aggregate_signature = transaction_data.aggregated_signature else: block_generator = None aggregate_signature = G2Element() if not use_timestamp_residual: self._block_time_residual = 0.0 full_block, block_record, self._block_time_residual = get_full_block_and_block_record( constants, blocks, sub_slot_start_total_iters, uint8(signage_point_index), proof_of_space, slot_cc_challenge, slot_rc_challenge,
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
true
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/ssl_certs_5.py
flax/simulator/ssl_certs_5.py
from __future__ import annotations from typing import Dict, Tuple SSL_TEST_PRIVATE_CA_CRT = b"""-----BEGIN CERTIFICATE----- MIIDKTCCAhGgAwIBAgIUXU/nGxb+rZck2qIMztmDWKDZCBcwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMB4XDTIyMDMyMzE3MjkyNloXDTMyMDMy MDE3MjkyNlowRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8G A1UECwwYT3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEAm8r7ngBPSkz0U2XxFwI0gT3xt/yqKTI0AZiSicyyMNo0 oSHZHRVzIfzu/c+cI2SPFHA0n9ZaswiztWje38uzRjEqD30EmF1By54A6c5pDJgV MVd6LXafbv7tWxSLdyLPJkoa8gcqAtR1tOFXRHRtKNa6g2thyU87/V/UXJ9+C4eQ mmpq3goVzkA7ZRx0FbdXwijAGLcL5ZWStUPTaWjR+V3ApxUZYy8JV3tWybEm5FDK JJOvdd0bJQgT5WTCYRKNYsXyjcRP2ypi/Ry2M1oQLBbqCIldrvvIyoUodbkV3Yc7 AFhg4gUKc/O6zcIO/3PXKgFOAMLangjIBwWc9yyNXwIDAQABoxMwETAPBgNVHRMB Af8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQCILSP1KclF/iLlNb7w2bE1hZ5/ IJcWsZJSec7vlZkF3AGxrUc2XzdT53gooZqpg5YIdMYqDZqCfPphvUbqGELbImfH D7sWhD8jU0FsKc5ho6+Uwmj2I5H+xnSVSF8qEbSBk8nasAac+bXQ6cakqkG/cbO0 9HBBHTd6V25KCeyvYN0kyuYMyT7GBfzOBmhyx5zf2L3oqoqVKAokbmC/9cvBXMUX +1BWyowMjBVH5C5frOymcTF7b3ZlMuibFdl01lVa76QjVno/QMZ2bqnLaqDJA306 f7vTyuGSYJSoXnEh0UJ4IR2ct0F+6JvuTCL4p/b97C4Au+Lq9jt+2sGV9CAs -----END CERTIFICATE----- """ SSL_TEST_PRIVATE_CA_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEAm8r7ngBPSkz0U2XxFwI0gT3xt/yqKTI0AZiSicyyMNo0oSHZ HRVzIfzu/c+cI2SPFHA0n9ZaswiztWje38uzRjEqD30EmF1By54A6c5pDJgVMVd6 LXafbv7tWxSLdyLPJkoa8gcqAtR1tOFXRHRtKNa6g2thyU87/V/UXJ9+C4eQmmpq 3goVzkA7ZRx0FbdXwijAGLcL5ZWStUPTaWjR+V3ApxUZYy8JV3tWybEm5FDKJJOv dd0bJQgT5WTCYRKNYsXyjcRP2ypi/Ry2M1oQLBbqCIldrvvIyoUodbkV3Yc7AFhg 4gUKc/O6zcIO/3PXKgFOAMLangjIBwWc9yyNXwIDAQABAoIBAHLTHbbrhYU+yMl7 FkGeF3K2ZCT2LbhlTx1qBX9ZBnCpMycb2njsKUqAsOkTDoKriCVJOhAgngLcxA9N 9w69hSmT7OszeqKOAYOAti2dO6HTqbMPRXaiuonFjM2Xi99IIaOX9Noz24vwabzi ZT6IDTiPYzKff5gvNQjfi5ak2vLFVowAQH1Mf3dh86jvhD9PpLvYiUL2tb3w514c LhUQtrk9YMhOMmCMKH8HxvU/8IsGhLNOwuOiQ2O6tXLfld+udt93n0JyshzRNcyl I231KlThxK3BiXku2plE/qw7K3sW01amaVa7trfWxrOv7XQF8u4OOcLO7Wx1O1LY gfbrAhkCgYEAzmZsCeTMTGJxNbkj/Zy5rU/+wyn5sFl6xfzXj64X0Ri6C8AKNBI7 o1T4zSp8aUGHAg1SAW5OGWC5vVgACrIfIWoFpg5Rx9l1EkyZVczX0tbjLabQeA7j 4rHGrKLK38HFtf7lyHXoGVj55nvlxri9t9X02clBqz2WzJREiaYbFzUCgYEAwTs+ th+yhJIwLIqqSeK6tPgK9Ofp4M3Qf8LD7yOZD8qmVdRlz8H2aJhbchyLGnaj0JJS lH93sU81wZ4Lo3Uowb1uq+qdz/nuf2My6zFwG28+ww6KHnkss7XGvGQjLLBtLiol j83Pi5lkKcsypf0psnKV8cKYpXooIod2MyU+YMMCgYBxWh6LcHQinw29i2gQqDnw zLYFSNAv4XRjt3BLIDlERGgoe9cescS+9rONOYAJ7krO/bHDx2hs14oqSmH7fcdK +ocPo12We/6nhhnP3SfKSumI8Mwco1DT9v49YUo5iJmkUdCwPtCw2wSjZ/fRIzRN +dr2oGjIOpLO176sOeU24QKBgE2k3rgT2InIrC7ZsT9rKZbaLJzoK2Q3j1YnDtAi v7hGt7u5Uwe+aqLwxZ3+ti52CbEfeqtM5O2MZI9eUFLoGu5uje/qoGsXhKwPUkCL Zv6/HrsGNp20FzBHFIpSuoeUhOqN6PX1vzXa9xKMIdfs+DpKLNIuXWPwx/vH7sjy aDQ9AoGAUad/5kDcK/FwSklNenqITWn9c/OFecb6Z6u+F7TPirleXPbhNQ0oXUW8 pVVnLpzWWWpu9amxlS/4a4t7/lTEyYaT6rsjJr5ZBvDrIBwFc3zvXWYxbY9hnCRP LQfRJRhurOJYEByEDjyiXRA9WPHcIhpKVGN8DGyjx/gvJjfTQR8= -----END RSA PRIVATE KEY----- """ SSL_TEST_FULLNODE_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUPIoys/kxRUAxhIW+huwsgqplVZ0wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyNloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCpDfVovOj9fLjpheYdKVwV5V3hN/bUxqlYAW3s+zFU9Bpg +SnI+5XuTW6SLpiPjx/5kZJsztqxI/Nr7BuTpHUOfbaCHkoJGBAcAkPdnOma8lH7 bpZ8CpVjONeHqmTvsDP2dgCg8QW6nqVksEHMtkOFadTifIODxdWJtsB4KjzKlV1U aiF0hUIJmbvX08bArrzrsX5EgM3pQV6vgo1wYWM/X9zRjAd0xJDbhVqOsQpK4AJS zAAfqCwxNf04EHhRFD35Uam4NiBOzR3T8rB4XGcpMBYLPC6reLHtOmxneJ081NWh ZgVDhxPg8/30Bs3OhNhT9ZlfBJZvPW8ReT/JzHXtAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQA4hi9UEfJtPMsTjpI08Pdp AMNa1ybci7kDVaMfcvKvMDcOtoCEt5K1t3fGWrYojfgnJnSRJLTSZIa7IdBbyZG7 e5ClNLzw6bCqiQ55mgyAFMFM0VUaYu39zRK5X6fA2qWXFYVbOGAbEgU8sFuOmBid MjkEQKL561tiibAkVJucp0hLf1xzoH4dJZqFWyFiThH8RTUq4Gd4atH0pzk01Ts3 VbQyinIqEU/gwLAawnOGtdMYdFPNtll0F+lP1+h5AZYtsTcfilm18D9Th4/rfQay Ob1SSSdL7MXqy0pR9sF/BiXTeXauOK6Y5DooJ32y68yrNKL+TfbEzcPSfqiaK3Tm -----END CERTIFICATE----- """ SSL_TEST_FULLNODE_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpQIBAAKCAQEAqQ31aLzo/Xy46YXmHSlcFeVd4Tf21MapWAFt7PsxVPQaYPkp yPuV7k1uki6Yj48f+ZGSbM7asSPza+wbk6R1Dn22gh5KCRgQHAJD3ZzpmvJR+26W fAqVYzjXh6pk77Az9nYAoPEFup6lZLBBzLZDhWnU4nyDg8XVibbAeCo8ypVdVGoh dIVCCZm719PGwK6867F+RIDN6UFer4KNcGFjP1/c0YwHdMSQ24VajrEKSuACUswA H6gsMTX9OBB4URQ9+VGpuDYgTs0d0/KweFxnKTAWCzwuq3ix7TpsZ3idPNTVoWYF Q4cT4PP99AbNzoTYU/WZXwSWbz1vEXk/ycx17QIDAQABAoIBACP1aCHjLNveT6a8 aHoDdibiJtnlAYe4ygSCKVOjCpc7ZPEDjrPFb9rEdaR6bND8bJy1LiQey72qG/j0 u9jnvk5axxtePfk5ORP8F1toKPhgWrfUigXQan40dQPSZq3lGOhvqSqSmdlcLWoB Y72bdzlFjZavTXoV9pnYWZA1y8B7NFnaGfaBHfc1iNJ89cwLV2QhADaYb7tKIooZ nlPyI4n/uF08+UmKzKEpwtDsxJxssa/J71YrQS274r13yEyYKGhsoVEhWrfD+d4t BlBWHwFfXQLPVgRQ3du3pvMqAMAMNZEb0k20WeHcaAybRGaEIe6ltqOGH2m6j5uT k7fYr7ECgYEA1fExK3+VrKKCVSkpRpky0bbLgwS+YJU89kPBurdpVBMxYh9XuGNx xPYL6trKE5rfSXFP+sz8Vqi7WOEXCFzFx6ZHiBokaVdSWG1Avk16lB30Uu5y/r2W BmfezbribDM9oQLYLlUd7tAxGU+/SIciREHpfelq+ejLmeWKHdWdVpMCgYEAyknC 2B8w4PwSoDMBB0xD9FM6q/7iaXChpa4n8yl/YLVEZlSrCyWFz0awPHQTOvszE0xf UJ16HYDktMT3tyC9cDd5UHN89zi75edEMPLmPnLD6K7QOVaVR3X6PUqA0SM1spM3 UTXWFxFhYTUTtudK6rMSseDCxGpY+r4hPmR+UX8CgYEAlNevyL6DyE5rdIolgEt3 MrYFEosLVDCf8Akl0BxoeCi+M7Dwm4T8EvbHRcafzlHyRKtD5I4WhMfxR52aI6Q/ qW4C2Cqv6GXrEUA5SeynekL4x3XDpX0K0jwTo3gArRxdJRbQhjOLlqlbb2uu/eue KHTe2E27slCGzfQHSkhipWcCgYEAiUS0a2P/Dyz+lqcFs6YVFt7DmaNEkLhVeNBN W7x1K3LWD3q09sNnodgeD2fVBNkhN59Drrit/QdSKzjdv+7/nf6G3AkCa+Cb4M6m f3DUvNu0BVlbAw22DuAIBz9fWovCDIPJrdoShWTN5+DUl/Er7UfHD92tTQu9hakv dd9LuJECgYEA1L3P0JKDoqkgSBEwsHbyScv2qo23xKZsTqdY09Cz0iG8wMkajRdb QkWj15kmqYjhl/gpgmWfnB4xRmzIhKiI+k2AvVmiS9ttYgdqPwYJdauq4ON/H5hA dXPyLob4mYRF76KcYeJeVyjRPXwtbojJQ/FFGZSKsuO2toathK+vBM4= -----END RSA PRIVATE KEY----- """ SSL_TEST_FULLNODE_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUJ/ehUeJz6rFUOj2Sq6rL4SW0Wf0wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyNloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCyjDKG7d7fU8ZdpnD0Ba5S3/F6FXpTvUBqxSRWOO9yI4tQ hSqOJIP9x8u0aFhgmgMN8Rig3JZ6KfvCeQ1qO1xkcuZ1o3FoOOYkhZoj5OKjFQDk 6g+cOSrvUe4QtIaPxlfNhtV0peVQuKQGSOakEyC7Z5amZL7Ypwjbt6Wr/N5gZ2Be 2+UnoCOxYTVvUmOWl11Bre9eQZXYIM1D2oYht62HvGEMhoZD0NSoRsEiHPiJ5Hhi ci+U/oO2XP9NrKK3LKr9A8NzWB6oHXqw7qidCQqGumY0zhE4MarACVzqJG6kCB4/ cL1I3eSjDT6iEUWwn1OLFc/sdTaB50LNfEI0DeL/AgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQCfYRU1NbezmtNTU1hvOHLn Dcw1qrUujyl6XSE4kNPooKreJLQwtlV5EV1h9APIk11jrieiEkxo9IYVRzadyrrf 3Dh4x2KFn+R/m+ybHWTICcBL2FvvHuvVx/ilFraM3e+Kv/s+pQRs3YvQuCYduBTq SXz12aZO5ttTmG7LK2WcX5OgwC1kmSw9Km2DFb8zu/cNv/VQkRujsG0doVVrqxHa 4/CkSlTBNCBJO2Brhtbpx4F6kKfK6u26i9pW6HHgvctpC5PORTeGofPVM26Hpsap 6mHfYpFu1jIr1MhQcWZss369DEwsSy2nr5/3R4zIDWMlBXEKd8p3ey/wjUk6dD+p -----END CERTIFICATE----- """ SSL_TEST_FULLNODE_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEAsowyhu3e31PGXaZw9AWuUt/xehV6U71AasUkVjjvciOLUIUq jiSD/cfLtGhYYJoDDfEYoNyWein7wnkNajtcZHLmdaNxaDjmJIWaI+TioxUA5OoP nDkq71HuELSGj8ZXzYbVdKXlULikBkjmpBMgu2eWpmS+2KcI27elq/zeYGdgXtvl J6AjsWE1b1JjlpddQa3vXkGV2CDNQ9qGIbeth7xhDIaGQ9DUqEbBIhz4ieR4YnIv lP6Dtlz/Tayityyq/QPDc1geqB16sO6onQkKhrpmNM4RODGqwAlc6iRupAgeP3C9 SN3kow0+ohFFsJ9TixXP7HU2gedCzXxCNA3i/wIDAQABAoIBAAxh3qsu2fMA+1PJ VDIIJtPGhheiX65pBIujCmcUYb63qlS2N4JOE/1Imt7zEZX5eFbCLqQRSDpGqRgO jxib70dkFIl6AUZqE8PapBrzJ6iJr1swxE5gRJL+SpVL/7z+014EiM8jJikX9QAe lCgyz2VPxMnbWMTrqJicPtgTnFRxGR9KQncVKOyrfWNm6e8r10iMfhvx1HIUJGEI V0AGsTpfjRc1ATDXvuKJ9iGQuAvhCOrfn75Q7kK1yxKgYoC8DXieIRRirIhoOSdG nv1FWD7r9D2z7DWq7AVQgPLAuh3ulyE3y+gvDMZcEpYlHtr5h9qbvhSkB3UCfJav KmU8AukCgYEA6bpcB7FZq9jRhCVcDOK2MiBUfs83IQ8z3/jiYTsrXfqrXDZcvrCG JzMXbqB/BaE6bA6NQMLgwIiXkTLj4pyrtARlaU5XBUb3KQ2y+xkWvA2n1IVSJopE dGClmIvDT3usUItcDzSr3uazfQSmjVHkpLW5gTtUK8dwJ34EaXZcnrUCgYEAw4/A CKT9hqtO+JpvQDlT4NCXTfM/YVuQeIUc9xZQwp7guMEXkGKEbTsCVjGzCVleBR+J ibg5jgcSjVd6OaXECXbsUufnpQGULbrnD89KmJUch5DyQwVklX5IbzCa3OGvuamN Uo0ELPi9gxTJkpH2vFgAoHSEOdB942z/IuY5V2MCgYEAhXh/r4DulTz2wIDZJR6e LtfZiKTqdX2KAR/Onvm8FSndi4YbxmVl5qK9gdYzU1Kz2xsgPNhMooYeD7PBARq4 zs8n3k/3T7Mr14zUJaI5ImCl863CsPGKj+7VAdzmRtB4IXLDuoc4ksypuP3b4p3e dNS1v3/S3EFC4bqL6HHICHUCgYB7w4oA7ooUpG4CH5qwxpcy/FAFYSCHeO9hlrzS EylhQjNuOaW0FuVAS8wayLFKBWjfTSo6IoEqRYeUM/yCZ0o9wymk/mc3olwo5NQ+ yS2oixXXJgBsMgmKIrWsyNH5YEtZ8NgjmmM+It2tC4bWX9ILOJaM9bCI9k31lJGT gKhhiQKBgQCJOyZqyxQXD00jxxAzF8b8EPnculpWG0jvT40jYxoRzrx/+oI1KO2Q 6QFtyBjBibf+wDuXfNDjsahoX8EB3yQX+ofG4fCJ9WG3aNcgR8enPfejKoCzwRNf o/6JFcAVoVo7l+lwcFJ4r8d1KXbP9Qt7doZSgmGrUSTvBTEWz+j3Ig== -----END RSA PRIVATE KEY----- """ SSL_TEST_WALLET_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUfnFEiDBphxztIz9efqOLOpYjA6YwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyNloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDkLNTI9jghjYaXRMvt/3oFVDZ8FUraVUU718V8vW5NF4Or I7HYi7EgS4BnRh9CfU8r+mkPxPTYJ7kgjKOcdNGw1ARCiIIl95gw6ymjcXZ7isLC F+79kJNQSKq6lQvrPoKoQpfy8dgjRaGY7gH3DeX/Oi/QFd3N0C5ZGpyzE7+VmONg gzoGk5MyLbBCcKcOsBQUqOR7p2bEYXDDP/xl7+u3R2rhWVsp/E9W0eJJmtiVwYrJ y6sbzcWBxjCM3Rv4NZs9tTH19EHWDJM4whHgnEiB7eXz03+0tELhnwkrrm+a0qC2 uVqzG9HZ2/hVY0VmPyPVprAihsAPLyJlnpArCs4ZAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBUBe8jhAQgvnojPHIVbZTy HyzRwfN8bx6sRGMzRWR1nFuSgeYz9ngzanf6adVCh7K7O8O1dZwdaPPZB9RKPKUH 0oPYPwhSyvmT6so2Xr/YB5Yx/KbrSK7dMlbxQ+9ct9saKkaioVfo7OvgOY3fFg9k Qs0RwtRpE1TjaSJw7ScwlaUR7GYUrcIBuCKROcZJPTQaVSM537SOFQXqUn0M7Wfu QM4545j1aULGnDzbP72fpk/icndS8ArmvAW3JpIe+HFk9IxBuzUh4HKHzO3Dny0l rKOiVmeztN+a8mipfJRTveuZs/QykCugYkafg+nB9GOTjyBwZzTD6IfW1LO3UZLt -----END CERTIFICATE----- """ SSL_TEST_WALLET_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEA5CzUyPY4IY2Gl0TL7f96BVQ2fBVK2lVFO9fFfL1uTReDqyOx 2IuxIEuAZ0YfQn1PK/ppD8T02Ce5IIyjnHTRsNQEQoiCJfeYMOspo3F2e4rCwhfu /ZCTUEiqupUL6z6CqEKX8vHYI0WhmO4B9w3l/zov0BXdzdAuWRqcsxO/lZjjYIM6 BpOTMi2wQnCnDrAUFKjke6dmxGFwwz/8Ze/rt0dq4VlbKfxPVtHiSZrYlcGKycur G83FgcYwjN0b+DWbPbUx9fRB1gyTOMIR4JxIge3l89N/tLRC4Z8JK65vmtKgtrla sxvR2dv4VWNFZj8j1aawIobADy8iZZ6QKwrOGQIDAQABAoIBAAK9cxSyuDvW6j3Y yqYiAkIcH8dfrhVvHrS4Q5va3n84gBFHDXSvQMJFhdY3plpzDMdXa3mQAOyzlWqJ pdFUKcx4z1BJOV7hWUeFG2vmCekz4mDYTrtmyA4XwU0aSxlZF9KTciWtt828oVMn 0Ig594AYH8jc6lv1Wwkg467W1t8iABEthulRcdZq/xXVqT8q9uq2BYqsXaSN4oFG Zg7LnCXFt/XfuIFs++mI7NZQuF5v2EnKWaDCWhpVMWvUiA+17r2mr+Qrbol+TdGX WHZqRld9Fj1XzPLgxlqfn6AMLlgivTp3NrgLAkvNZ/aipq63KIfWys2p9DbavhBg jJHYWl0CgYEA/fo2zXk7IAOvjKxenrDiqY4KWduD+Ww9EpStKuoauOcrbO27p1CY nRDK4SRAUO+AI7OQY0TZHwLuv2/pyHZ8bvvJSHrecS8PUhV3mJhOVupl5JxaHtYv EEf0+L+irdNTXUAvOCKi7KIB5mCaXGhdSw+raxj++Pt2QaAqOclKH3cCgYEA5f4D h+0wY5zRkuOSKzpHC6Xd49plCDTW7jtKfx+PR9UIPIoAd0xhon20QsaDnl5MOf2g ojvNAqdn8uUERr3nN3PgWcBEGd2wYq0ooGUD24yoTASDXgvTMNggYybStFbrymPa vvF+9yuWfKLwKpSKlxEEfnbnxtBm7rg+W3VLgu8CgYB39fZqqQdXQMZrUINEu1Hk OlYDSV8VsZ1LKHR+n6LNkUr+oW+QQM5E6ciZ/RBv6iABPPBHIx7WugDg5VBsQiLW HRFercJhfZPj9oXNyqq9/OrxxzP9+rayHvrDf2isZ/OpSQbEof+Ie6EgGqLuYNEo Ahe6d0z/d27M4oTvVHcxUwKBgF/Q1lm/iARH5cujQVb+/XAt1uZBKwwjL1Oqodua I1ASwU6vU4hf6uEOK5YSK+1DbdBPCKft7/fmFFlN7d0m6nfgr5vUjMqV4BEMALvp uZSy4b5htvTsSjy0HbIRD4EQIUV9GjmoVHPW1efw3ctvfNl4vn2NPfxHAEr9uQTT NfVDAoGBALk5KL5Q6pAbxqaJw2e33I2Y7sVwKYcRynFdgi4oAcspQdt/22h2cBwO l23240xCSSbf39fhrDJCZ3v2lWOGQMvdEq1i+9btj0FwhJPmcLGMOIIls0ycWYIw /mrdq5dl5C17E1WfbzE1SMBsCeLFkaWa4l37KxN1o7Ck3Sl5W2tv -----END RSA PRIVATE KEY----- """ SSL_TEST_WALLET_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUIYvyPYsDrigeLVIkFXsvpHrP/F4wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyNloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCpwUvZ+07XGeclurl24s5mocAP/pmlUQU50unzsPRWarrt 4DIjFX4CUErlCnwGKff6sXkSNzJOCNQ4NQXIJ5imbEvx7d5V80z/5Phus2JsY4uf IZ/LidOk4tSlUpLDuYURCziqy4fljEY4M58zfgCBHz2aBsLE6LJ7/WZSI6LcXcs6 p9UkVY74uSfnFjVN7W7ivNutdv/vo2qsWPHojn35yYV2JEBje5LMtw+7SDJ8ljMc kkVh+67msxiLlmxhZadA1eTf31kyceW3PcXA2rGqTMIcdb7REjOhA4kPgKV9R3lA C0wqWEvufnkh2FuiOjI0mcYguRdvRJQooqMDr8KhAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQC3nE/WNyDiL0+UqIamE2ER Xii4bQkuOfIFQKn13ciD3hxBI25sDS1T7ssAk/XvKxgMij7jx7vtRV2vJg905c53 2+QxDkkCOO1wrYsvJfCNJ5yz2JkO0eXG1RLmIViixLoyipjEDwSwPM7SpK2LngsL teV/CKkQAmdOIXB6e3KMv7DvBHboGmm/cv3JrKdLxcQd80HigqNR29nPAJhBx4T2 VZneCNnrErYn+OsaM1TdlyIoTF15Aq5fJY5hfK3v5xLv7JP6X5XqXTVh8Bua/A9B 7pWnFtxNcMr2NbC5Jfmu2Zgc7xTcB1M0bRVSLO4ytMFnBvm451K3Awhz25CRF5zg -----END CERTIFICATE----- """ SSL_TEST_WALLET_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEAqcFL2ftO1xnnJbq5duLOZqHAD/6ZpVEFOdLp87D0Vmq67eAy IxV+AlBK5Qp8Bin3+rF5EjcyTgjUODUFyCeYpmxL8e3eVfNM/+T4brNibGOLnyGf y4nTpOLUpVKSw7mFEQs4qsuH5YxGODOfM34AgR89mgbCxOiye/1mUiOi3F3LOqfV JFWO+Lkn5xY1Te1u4rzbrXb/76NqrFjx6I59+cmFdiRAY3uSzLcPu0gyfJYzHJJF Yfuu5rMYi5ZsYWWnQNXk399ZMnHltz3FwNqxqkzCHHW+0RIzoQOJD4ClfUd5QAtM KlhL7n55IdhbojoyNJnGILkXb0SUKKKjA6/CoQIDAQABAoIBAGhbdWb3UJt5yBjw to14lwyPCYSLrybrLPxERiDSuxLZIDuWZRweXU3M0I4HqQEdEd6i9dwV5K4GTXiU WA6ZEQXWc8Wxxsot/TsfJv7e9nXNqIrWX+b/vwWRkMplfeYnCb/VlyugXdXnK0/n pEpCfsriSruCxn/I0djZieqbD8bKPaCNkHUqcQsgibxC22qYF5U8ShGfuqc8X/Vs df245Gcrh0QhCf/pTau4qPi+E473LtcM6bKjSR7EJGCCQCQXf63+TP6G8b/PI7oI ZoCVEImrtEFI0rdC6u7F6KWCwc1PNhE549TkzkC7L+NpnP6EGroRcPzXgAzz/5iB +Yju3AUCgYEA3SWRPsO3E4Tzvld5YvIFG9Fte6oIrkpwJJ2NfCVtoe0a7YOQJ5hj N2qNGjMszhQF7ieG5IsBwvU/cAfTp1SNh8C86ScRwZsQ/IK4iKOVY84u+qCLxZG9 4m1ZJi0Zwuo0i2Gs+T/wbF88SQAErVPdDf46hAQVu4mUs/019/RMTPcCgYEAxIJE 9aIhYa0p+RuIQw1kpCMsFr6zM6384aOV+zjvF/FcHvsFajcJWev+qG22OHAYRGjF 6RzJ7KRMel+dYMyrkdHwPA1DFxtXTnge7zg6P0xFVxysBw+GBIXJb6DGNqhkT1tP KaQOOPOwQypJjzVXPknaSStiA6EwiULxltRK/ycCgYAdH9B0GqRmvrC3FaAX5tXD Zx5rFeaUxZrlR5aVjfxVQfu04gm/HTOb3b19gNXawgpR5gS+3ou52ECliXJXbCxD f5+heRK+k6R2DOUuoZSQE1xeh3xA5cPDKTF/dJsa72tCG/gCz2fjbdtrpcP3676G FEAymLMgAquB1Mwhvpu52wKBgBc7X3O6yz+E/WVZ/+4Nc0yEa/30ZbNCapcyg9TD kmC+RCnVe3pnL0/WOrEm51gcyIGt8Vfx811qvy/ohe6fw9jlfQVcfAYLUXMReHbH qvs4xSnbVesvxqRaPMpZs5VaqyFGpkFCB/xrsvb91Nx9becLTCdCXcAYGmjf5Tfz uToZAoGAMYalPv6XvJBf3CvlvEeBGiXDfaV4O+3t1kevtbSgrrV6pW5sy/WwUco8 V7Q7wLdRDi+sghPqhxXqLnIyp8chU5LMOwEU3m2kw3pH9ApZKLmaUbcid5pS+4rd G5puMkmYGwaZRBY2HGOXMA0kdYXiPw2y/jdH+Oz9DvWd2tVL8YI= -----END RSA PRIVATE KEY----- """ SSL_TEST_FARMER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUSORAd4kBPC4fSPqHEQskE72Yt1kwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyNloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDLIIgg1ILQGtE9Rkza0ieGUNn6wDssvm0fkcpIZXhrYbow ClydjwDMQrLHF295ZgfkqDEmD5MUeJTxBNznDlZtkvBIRjPN+M7ZnlGJCUTc9jex U0a/KxrK6ygsaWNzQ8eNaTNOAR/l6j/kuAUC4vKoYKGzLCW45LlKVB9xQDWinpov nXpA6S5UUI6YxqeriHr2IiLtXSZmqb1lqftTGXenvdnHrJEmer4iYjXHAfMhq+5/ yHCZmpy4IAX39zwAWA9FnYieGSE8KyEqZW4HfF1Fe3V9C6nsZ2gVL1k0sgAgJ8oW 3CtM8tljHCmyxxD9EHSjJAkSnY3OqU5P2+XMbNcJAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQAijxQXc6ndCfyUhP7DmFCr OR3jfPd7Bvc5M306CepT4ZGxXrjgy5idkKS8PAdSTMFJ/h3ShkGatgnb/OoOqiMh YV78dx0wr4/sdEauPHODkQXmtPj+u2Al9ZyYflTLeiMV7JOn8H4oEE+r0Ra3o89P F9+GOd/jnF8BpO5GUDN0nN22tNid5kIepMNVG0L3iDMGSDMzcXbGE49a8FPc4CfK 24Fd6BZ2YsUM4NWQ97lfGKtCsnZkChwNVkSkVXP38Zvz5H+sHaMyWQ+hiNBlB7Up OrNw0uq/jvNv5IGwx/JEuYuXXfPd5CvPesk43ycsBvbjyYFSOsdzU55jEcivPQNW -----END CERTIFICATE----- """ SSL_TEST_FARMER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEowIBAAKCAQEAyyCIINSC0BrRPUZM2tInhlDZ+sA7LL5tH5HKSGV4a2G6MApc nY8AzEKyxxdveWYH5KgxJg+TFHiU8QTc5w5WbZLwSEYzzfjO2Z5RiQlE3PY3sVNG vysayusoLGljc0PHjWkzTgEf5eo/5LgFAuLyqGChsywluOS5SlQfcUA1op6aL516 QOkuVFCOmManq4h69iIi7V0mZqm9Zan7Uxl3p73Zx6yRJnq+ImI1xwHzIavuf8hw mZqcuCAF9/c8AFgPRZ2InhkhPCshKmVuB3xdRXt1fQup7GdoFS9ZNLIAICfKFtwr TPLZYxwpsscQ/RB0oyQJEp2NzqlOT9vlzGzXCQIDAQABAoIBAHEcRnFxpP5ZUJa8 ZOOdDuFeeGOHU+xQhdeEiY3S40F4hANoYbZjAWC862yuAicpx89uUSAOoCpQEzA7 Mv9/HmWZ4y972DEkEZtg66pRfQVGHjEiXEzrpdnFJPPGI9j1r1Nxd15Chg6zaKzm Q/QdiF52oNRzCvZwdzWKro+T38oTZLaYF/GvHZ29ikO2v/txEhY0E6Ox8PjUEuaE CH+SoCqAkrpyT5ue+Zq76M1mB5krnLQEfoyHWSKykeQ9svSSrlpa8sJvAufSG5xS xgqh56i3pGsGrwP5QLC6j6sK1hnknvs7U07HFZ00WNON5bYQTqd11n0denPC1xHn l/O4AxkCgYEA9i61oB6TbS2KK7RAKRXiF7uIKZgWBv4yv/ynsf7d65gkfG0XZyuP UB2yCn5fn5dLvweHbK7NnzmfqqiwNQYM5JbPld/eqzVs8s3B1M2rWTLugfZZ8NeE W4P/mYwdpSpdQiSgBwdlolAtIZcbQwfujEXTUK6ZjDaYsHsIuW5CdLcCgYEA0zpE ePAZ6KAC89a6IDvErllaegPhY30jIuEf7JFBAan9o+4cmzp4WXsaLkbjeSjnI1Yu czUorTraK7OCLp+tphSxbpoE8T5OtH8xB4gTFGmm4lz2UFv5ObNpA9+rrb6Jf0p6 x9CyClTKF1vsDTtWQvEg+kDisE+tNdLtHYBM0j8CgYAw6XTinFCUR5EFP+njf9qM 9pCGGxZ9SzIQHQXAgq/a6D6PjikxMWFm/I9sMFGVZr0A9mD8wfpOoWdMw/lGf64+ GIyj7XfTMmk0EJdrTXW24jyrC6QxCtDcUeyNuF4He9RNmPNGkjyqNB3TZ69d8Qx/ SDxE8nvFdO9/WOKR3QtNHwKBgGQhO/JEh1Oh/qROhv7etlab3ur2SfLakDxpkbOY C8PZLHZ4WrEvH3vzgi6rxgtaW2+B3BUa/wRXYLLUroKhiTSwnIe8lVky2yZvIPPc CodjqgumW9EuOE+k/8QpVH3RU+a2jMuJ38xL81ztY1HGbhbfrW1UMuG3c3mPWn3g owoLAoGBAOjm/N882BzVt1wK50hYf6ywdD8RA1UJg0T8XN4meoruG0nxHo0LJG+q ot0B638GSG9ESBbAeYxQZ8zqgH5y1DS/O7xmLnHNck7Eu7DblJeQc496/yKW7Uci cGosIckRRVM0Dekivt3fxdIvct9UonKUJsAxoZsf+fnmMj1QTMai -----END RSA PRIVATE KEY----- """ SSL_TEST_FARMER_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUPNbZirLECcLXWjdq7AF5vdOX4UowDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyNloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCVE9/KTj19nPrT0DaIRmLQBhJCvvMsJnY8Fa8R0hfM+g41 jHKzvriwD0yArxbdj+eKr00ZWM9PCG/TpnUkW33PSya+VQ4iADUTcD36F/5p0sfe psu1+tUf7MdMGERrRnNwG/xTAo47whrJ7QoIYWjhtiOREjImBjWXRgatT4uLuNsj wguPTFQklEH53mxunBago7qJLwJTFVJ+hrxMuHAwYHxhdNKA18oVKVcg1zE3JTwH wcY/n8kvUXK6L8GJ3Cororn53ej4KBUbvrsAs6AXtpwUUQy/H0s1ZkuF7r1nmUH/ zGvzrPTMnFvtRA3yyXxpjG2mJvx0svwqVAVV0HpDAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQCPL//viWfMURAJWiGJZSNH uy1UWUkt/Ga5zIdr+22nHPEXTE6H4+TbDKomVa7xJebZ/Pr0zG4Y41wk/l65Qq4C 5FBNiGoLTO3T+6aSCF7iwUoWRW3leCL29TZrX3AG+R3CnYJnJtGpH+vmqb4lp10c duCxdd/1Foe3V2Hc1QhFRwd3uG9wYJ1VL4ifjghT03Kp8UcPDYY3w4A3/QEjVMsl A0pgj34t7oiT/K54bWtkWphbDu5jX8JP8+A01CXS9njXU1OXEnRKq/x2OhIFEAKS eKywXcUoqfNpX0qmTKSahTslCZu3kUtOgyHQMOJIceot1AZ2hgzDmmEL3+DD2gZ9 -----END CERTIFICATE----- """ SSL_TEST_FARMER_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEAlRPfyk49fZz609A2iEZi0AYSQr7zLCZ2PBWvEdIXzPoONYxy s764sA9MgK8W3Y/niq9NGVjPTwhv06Z1JFt9z0smvlUOIgA1E3A9+hf+adLH3qbL tfrVH+zHTBhEa0ZzcBv8UwKOO8Iaye0KCGFo4bYjkRIyJgY1l0YGrU+Li7jbI8IL j0xUJJRB+d5sbpwWoKO6iS8CUxVSfoa8TLhwMGB8YXTSgNfKFSlXINcxNyU8B8HG P5/JL1Fyui/BidwqK6K5+d3o+CgVG767ALOgF7acFFEMvx9LNWZLhe69Z5lB/8xr 86z0zJxb7UQN8sl8aYxtpib8dLL8KlQFVdB6QwIDAQABAoIBABW+c1rXtKJYvkEc 0odn9MuwxwMTRPbAmWhEJWftA+my41WuKaDMBbYwVRFD+IrSjYwt64nx6TL24RC2 68kkyyHsLTd/wnL1Isi2C2QqEcKvqtVv8LCXaHSinaMcuwYGnZnRiyk0aziOJEgl mdwFET4yyddEFypyp2hsH1cyDgGP+O+8P4JKAVMSrtCCM/+5a0fj/Z2TUIEUDkzT OCIY+GsKDwE88VPErSfzx6gZPWpPkQMI9evhGDKhwvUuBNgKal7oeSRbzxQ5Ihj4 crACs07FTRrrEB3TG22cPk+gdMvM6nEbrXybIjLM8XzOpmw6M5RQdwYeO+O8+4en YrH0KhECgYEAxniu226jcNCbl9D2UHEm31fIs6esyEz3IJKB1ZC2FAjQJdZ0Y2oy KRAIxDBFHY96yL82vKXloT1b0LsBtsTFJLrqLGtiuoxLgUxNtU7s4r0aX0GjpStW Dk0ncrInwxlh3uYcpM2Hj4qjNam0UrttDr1/177tOwaPdER11TkiRDsCgYEAwEn9 HSb3XecbMD9Sap8ER7hIwxU5im/VopDzHqvpOb2a8TIQMV2rk48htZIkt0yVf7hv X7Sx/FpaZOJPfa+ND6KeQKw1noajEeSHxLz13aOnFlUtSHzNTUcqk2oNSx+0lP4n C3W5BJR0fsgtcFAd5lxEajwIxdmPnKm4T2j06ZkCgYEApE7k8+T0ikEpjtYAFTiX 5e7WyWTXNjwBm4Wu1w+mrY9eQvT4BhW00SnlGAaeMYrHK8qhliwBnysdCADJunXM gEv98ig05Buhprl029UrZ8sGOjYtNGBcLhrRvbKgGHS7Ab2fmRBOWhd8ZsDH+HYS I1HetM3ruCIGQUssAgn6xGECgYEAke2UsbMIt7LT52Gm4lObo/IvBh3tdSo6Lw1h 9Dzy2mcSV0lvEIfN1kYhhvJJ+vGb4znNDAzNpn3LbBRzzyaTHvKCtwH6DzyONN4C S0Q8MuAnxcMOgpx0EdmYbhdlz0VYfloCt6e3qcogPrccBMhIaLJNGXJGFiBt5K7I uTsl4sECgYAmsWXL22XeKAwv2JutLK5Hz/xn5BmzFDGBLvu0+FVml0aocYVVyQS2 mzs2kRoJdLEDfcxibawQimTuCs53PkoKVNHB2JzFS8HNHdcFHaCb19ZO0NoSDbst sSu4qj9TPFACKOKsfRpSIWoeHN/ps24ost1vE183ARVTsm8KTHgEJw== -----END RSA PRIVATE KEY----- """ SSL_TEST_HARVESTER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUa0HzW3fH6O0kNO3yGndcTG3+kX0wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyNloYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCtlD5CM6r5C3//rZwWLmMHcIO3lDFfdSwrvONmMhwlkIDU /FgLr20ZS6ny7DPSRVuU3jijL00Q6XZqpmmzsoN+RU6VITNuam/gB30E/WfF2yds ifWtVpE9wM51V1SigEtAIviooNR/CrfXxaljw1wmReWjCAUP4MWJBBFGUymWpBlF vEo+7VWZ5B4bfstRTZaFWRln/otMh8v3SOaJSmNafsDnulq1JXJz/i2hFfPjgfbo rGp8bfCWpNmEzJSn+CY7aAyW9eKKR+unWzM7+PEnI2l+5rrq54BfxpMdfAFHlMK4 NpIrJNmnjMLm1VQpm2/RFxI3LP+IDedCJmWpXbRpAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQBc3mZ5yN9pXLT/0Io6Ql2k SxPSZc68538f/gjpnlXDxApiP0sk2RvAL3C3E3RCH1KeP0wjcRnOwE3J+BTaisGW BbSQjQMnGm/zKtkwBaSIIjkKXSRCACEzneTMxPwEqCUgAWJMJ2/vzgmbZcQ7TxHQ UZpOnDhjknCLmxxEk3cGk6+1SIAO9NQF4z4fL5grfQup6sBeyN+srl0WnUFWfBIi d/pZHcUCKL+FmUrp6eCKGAFGQiM9TyJ62H4Cs/J0bR9e1asLOwSAunTB8+JnQa18 ug0LdcWQLjcoIMaZk5XIn2wlmFIsTqVXS5i2Os7w8tb/XtdxL+2Qi+Hk0oBmGffx -----END CERTIFICATE----- """ SSL_TEST_HARVESTER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEArZQ+QjOq+Qt//62cFi5jB3CDt5QxX3UsK7zjZjIcJZCA1PxY C69tGUup8uwz0kVblN44oy9NEOl2aqZps7KDfkVOlSEzbmpv4Ad9BP1nxdsnbIn1 rVaRPcDOdVdUooBLQCL4qKDUfwq318WpY8NcJkXlowgFD+DFiQQRRlMplqQZRbxK Pu1VmeQeG37LUU2WhVkZZ/6LTIfL90jmiUpjWn7A57patSVyc/4toRXz44H26Kxq fG3wlqTZhMyUp/gmO2gMlvXiikfrp1szO/jxJyNpfua66ueAX8aTHXwBR5TCuDaS KyTZp4zC5tVUKZtv0RcSNyz/iA3nQiZlqV20aQIDAQABAoIBAAhgnjydt8O7TVsu qtjbNkZWpNTIXzWnNxGJVURKaNdbSQx+fVVbCx3sa/BgfAPK+yeNLhiaINMPIXr2 OyXEGNqQR8Gkz5Glq26ZjeweutJuyFFRuzy5b9sWIiDBrUEGhhs7VNr2oCrdfo/4 Zzt8Y0cpmnKq4Wupwn7hZmAJhXlSr9deWrWUfzEbgzuqtMgIIVI9VWqW+wxCs82H WxzD5crc6g9U4eo541wOx3eSn3Ni75Hotnkx1Vgs1Od/ivloYHAISDcbZB89C+c6 FQtEiOphj0xU0V377e5RNNnjj6HXwdRti95YpQf21cGol2JRngR/w+o2AQuSO8E5 TqiC2wECgYEA10jKJkWfGBcEd5s3SpP4j9mFrvVKAOeP1XDqwvs6uD52CkF9k2O9 +Ja7O9QVxKI7Jt6fHISkrMY1srms/VGw/9R2lxBMHRgrsyZZUIjPSU09qwU5IORw 4Zv52zWqG6MQZu1dUsFRBsu5ibVbdzTic8G9v4V/U+fa2uz6cgLiTEkCgYEAzmhA PL7acIhmtGhTxNPrnnoUB8sizfTP0E3xTytmTjbtr+lrNz5RvOIv9owp8hEWqMxG ag9lBdERQnJhrW++ivjkprQZmyVzS9NR/XYXG0W/FSqYLZZX3xa/bmh5eRM0qcyu AQVDfAvUs+7Wc0LTV6t931zIhTcz/jZ98wR85yECgYEAzKDGbKxedVJjj6B8ZKnT aD/U3qEOD2ALClEDBAQyIzBTmJn5V6BF0MTNASgs7LNbUC3oxP2bXRIltlTghgQh Hnp/okT+Y+U2nFlGKdNwW/dMN4OGcqpQVVGho2gV4aEUFRFnVCKl9rSsDaXRY7Rj zq2Hw0SL62AFWXRI9Reiq+kCgYAFqnjw8fA/HI9tLlv2UDbsj79TA3F+I9U8i5cv LCrPxNQ7evXVe2F1BOR6KRjRq0Rq98iLCsckJLwLjeY+g43AdNqZ9OGrD5kdoLxk b8RsnDqFkzjAL5tT5WT12+pRt4Q/kP3Jy2Ix2oVJNyot2czBYFTBN+PNPFmyBb7p V9sx4QKBgQDWEIRplbm9f0NnTBaZ68qMtEt7nXMqEv3vjalTeriB+X9GJKDKz4Ym slr2WOPJSgmZApbz3B8EJmbKYys6gE1z0dN3Pl763YU5EhM6kezEX2C5HfL4iSFW Obkbg7hMBYQk0faEyd6dReIZwVHD7WAf+zCvh9ZG6l4ic1wQs5kYfg== -----END RSA PRIVATE KEY----- """ SSL_TEST_TIMELORD_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUfogbG84aJo97wy3P0ZHAkXShqO0wDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyN1oYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQCxBstxYtPbm7eb1iRbL4SZCF0xIueUH/gZ5nfj3Tbo9DIn QcHVbNkr5XxH5MBtQcT8bgF/tgBkj7uuFTymT2EpBrtTbdLCTsZ2eMQIABOQ4APZ NKDiYb6g95JC7vdmuLfuB6VyvlMCZ/Ffyvow+PCgpT7ElNjMiLf7y6mcvzgNKSLN JYqrJCf7vT0a4W+isck6/fD9J1RUhE0Xkts5wmpwJQGsRYme2hNy/PmCcEY9rqpi YOxWWeyLbdZ4nI4OH652JwXKUTijqCZYc6+BoXfjwZGq05WK5NhBZVnlYMd5ZFab DnXGR1WC9ysv1xkFqpSfPlwSZdZcJzBnXXwhJ4qrAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQCYInnIgvKBvmX65bVLmhNt cEUickmBTKOEG4i1yovVcDPIPLGH+3p4Oxng+N9zJh6n4SyCeOou30tRuNEunHOC PmixRUxM04iNm5lLLdS8dd+kErpX+EYT20amgbnN0HNDRi7+EANXTm2ld9HD7skb M6lABrsQQdmepdNz6609G0HO/I9rdUy1GaXlwd2th21VyzKmmq28nIT7KidBoQNG MhTjsnNrZekjW/k3sJA9nEhyERmdsApb/TlUV6A4ttQZOqPV3ClkumqQn04jLEhg dBNTzK0UEqdVXrPRpJBa/gSkSsCWXjMhwY60pHDsDmnOQH0kLQ5KzPU7IF3x+l3M -----END CERTIFICATE----- """ SSL_TEST_TIMELORD_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpQIBAAKCAQEAsQbLcWLT25u3m9YkWy+EmQhdMSLnlB/4GeZ349026PQyJ0HB 1WzZK+V8R+TAbUHE/G4Bf7YAZI+7rhU8pk9hKQa7U23Swk7GdnjECAATkOAD2TSg 4mG+oPeSQu73Zri37gelcr5TAmfxX8r6MPjwoKU+xJTYzIi3+8upnL84DSkizSWK qyQn+709GuFvorHJOv3w/SdUVIRNF5LbOcJqcCUBrEWJntoTcvz5gnBGPa6qYmDs Vlnsi23WeJyODh+udicFylE4o6gmWHOvgaF348GRqtOViuTYQWVZ5WDHeWRWmw51 xkdVgvcrL9cZBaqUnz5cEmXWXCcwZ118ISeKqwIDAQABAoIBAQCXksvK7+WaWYAi rH5AnTUZmvHASrSiPaU+9/ibYCPN3pi6yDDhPuvMDBgXrqOcaP3zbXVXFkzLzc3S xlhBxiHY8OygCJ62xKBlfA3NE9Os7kIdTlSawTpptNDFArtOdsb1xhJBZvjITJt9 e9ww5lWSFyrhQtlGd6GgtMcrcQbbLHqP1bKKSwPIYI4V6OjxBRK2QPahgrudPdNp C9C9GWCO5bVary0uKfbXvgHhUOrqC2ogtmnOY41KilofbxCRX7Mc7uLzR2SALKEz FpTt/CThsWt4IeUUvxSOWtpUa+qIZ2U9zRZZUxIwXx9I84/K3unbk7REHG4RHspG itgQTD/xAoGBAOCHw1v7K+xNRrDbdce5X6+jJFdVb4NNXkkWPzqD7PuGEdL6LUuG lm75CAXx0YZtXATog93Fz1ZDBH96tLPzI3qxIEdoU2i+iPWFv9q+SMA7IHNqc8V1 AL1XUFWnJlfTUGihvlHGEODLIZ0k9JpMPwDIdrxp/kaqJGkJ46Ue55BvAoGBAMnW k7m7fI2aIfRaiuAUsDfaNAk73N/M3XmA85h+h+o3+hI8OYv7kCnK6ahD6vHygpD7 eLJQgD3XPEpKswgP+uUt5p4cBAkt4gGR1sSVSEMrc7OJMF7CTYC+c9U/SRqG34V1 eYvCorVpbFp7GbY3WbDJwJbtPnukaWlVVPvwTQ+FAoGBAMS7UBp1DnxDDXCDKkTw kP2k9X+sNUQX80gYvRf5ZhjQ1SdF25A0gfUEMNp8kni1s439aSVVYCEWIYfNLS4L GQg00LKgn4zEfd6a7YqtdbMxW3KlUIEvzpEYQyR5i6giWG8FYWvnHvzIH1DAg636 pq15+EeIm6qxA6whZRxV4tHzAoGAJnp/4zK5Bg3SV1FDlICdL6irru74prnZpyZM SlAk/SP6yqsslWE6FJ2YefmousNu3ND0K5ppOGDmH4uqIelZ/YMIqi/RHSbgJUh2 VzfWdOe9wQZwcEA+okKstoTAHQyFZF4G8/wBJPCaNY2uUyyuLqPn0V4dQVkQt4IL F5SyPDkCgYEApt5A/pc42+/bxjxw85ENMO26eJJ9YObUgZUgi+BwR7BdzpmTfxfm Ubbpg0q5RA4hFofkdqQkPxx9A3Q40e8BNGto2NHKf//jhBCvbZs0uv4akAv7fERy 0SMTECjuLplUvSyzUQ/evpXDRkN5CuH7eo+GuIJPPulPCs5+FUo5TOg= -----END RSA PRIVATE KEY----- """ SSL_TEST_TIMELORD_PUBLIC_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUT43GvhVmx9CzguV2nwdektqBaZwwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyN1oYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDRiTszw1IkIr9n6KjMvgS/9I+p+La/NwfFPsIWkTE6cffr LIi9H+yTMTM3tbNXM4JhvqdeN+c2mDAVjhoi+AAQH3gkpXitxD4ZjYzCCTtwd+q0 gpCKLPOmKxYjqCcNkmEc70g/QOs95HyDdvLL1G1sgMnhldGuc0a1HX0Te9nE7KkW 40Etk6lhEKEa9o9rEjAL84Z6kizKELOtjgd5wM3FaAMB/UIhf+kDxB5vtAhsKewb 2Uy8wMpXJW79cqfLxgjDhd7LEZwSba2Z+XRDD+B+NuC58cv8H8y6b69Rwjmya50X K1gW5/aZA2+mo9NlSAMdlOM5ntgd2Cbh0zg4jDPTAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQC//83StmG2IlGISJqGVwSj B+Jl/eodYO1iYuWtCfobI/WZEz7Noqtuth9U2Pjc/VDImy+w/x6XNPTTa0MgUnqi /GHG1qRIefWrWp00C7fFbrJW1llYv/AFZfgYZB92Vr2X7RupnQOY2a/XwT8dzstU ZPTNK5wV47MmUp+u7p2Q24ywS+GuQTK7IZnhQjP7ttKKBgdBp9evHuT4B3yl7qUK JWb3nAreUSESWkumSXlted0sDQQ7ahilzHPkemRgJZotbQID9sV7WqHYMCRtZENX 53jFAQFtxj7mjjacvwWs45XgEGsr37LjCBHUHujVEccfGXN9+LRrpS6pKiyJeMg1 -----END CERTIFICATE----- """ SSL_TEST_TIMELORD_PUBLIC_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEA0Yk7M8NSJCK/Z+iozL4Ev/SPqfi2vzcHxT7CFpExOnH36yyI vR/skzEzN7WzVzOCYb6nXjfnNpgwFY4aIvgAEB94JKV4rcQ+GY2Mwgk7cHfqtIKQ iizzpisWI6gnDZJhHO9IP0DrPeR8g3byy9RtbIDJ4ZXRrnNGtR19E3vZxOypFuNB LZOpYRChGvaPaxIwC/OGepIsyhCzrY4HecDNxWgDAf1CIX/pA8Qeb7QIbCnsG9lM vMDKVyVu/XKny8YIw4XeyxGcEm2tmfl0Qw/gfjbgufHL/B/Mum+vUcI5smudFytY Fuf2mQNvpqPTZUgDHZTjOZ7YHdgm4dM4OIwz0wIDAQABAoIBAB+9ILmTgXK1zLZp mIAC3GdTHRvK76uBI20uN2oBripDLyFxSnkTR9t33WE35aV0yPATV/i+kQhE/yuU rcLUO/Y1PhaW9fOkQR/PwB14FofPsj6LdGdprbJi3mSiSOAWZx1h5VindbqXTIEB WH+lermvvGSuM+ev0GsIv3RfEzpvtHYynKTQ92PDmrbJS7/x7IQGl20UUyA6T9lg PidOesZrMJQuJvqCWfqp/bTYuwQPneawUsV4vNUxuLcd4ZVNPDJG3/Q/YtwpoKu0 UDGH8DnMkqn7JVKvBonDhlARdtdJ6h7g2NmwPTSyKZmeNjwKy0Vl06bcY71PNRZB 8ET8PtECgYEA6dUyY/CkB5B46eD5Qpm2Kd0gsnCxaSvzvE1LC/2xIqeszKDjsjj6 rS1zz8Fr5qsyYN/b4Liq61AR+kUEHcPfAgRggq8Jy8965xBFDuqTCdtW6jADQ7VG TrwDZMg/byBqQUbE7dScCl549xItUKh3WgyjZVbv6CogaJyrkq1S5ysCgYEA5WZi utnrUfSedb11LQPCFQnJ8gnvnOUsnigeRaMxArIXj2qmADmQfZjIoDOfHoKEbRR5 /j2bHHuZTJ+2FWLI8cSCEAfuxTXCCj/SXU3BnzlawTheUQrvOddGWstUCh50VoHM XPA8bT+9mfs75dXUNguuFHidfS0fr3tCCkzukfkCgYB378mj51dLJfhPBfz0A0Gj YW+W9ySYbFndOMwIf3xu6RBB+TgxPvadAxZG9s/whdkWRVxTfIT2o6BE/UdqOQBW 2YXjIgLlTiuc/wRc7Ua0JJQFFNFn1kAUvG0FMY0P49F8X988mfPbga+MEv+5Ql/N iXP508jEDW+IGOwMFOjT9wKBgHyePDApRe7FpndrroX/rqVjJfN4dlSTIsPgI2HN H0jJmobsdrVUkCvKneJ5aI1YdbwUDZmRufulIUhA0teXTHYaPFWdGZbEd16+APdy 0CZBMA4bIxF/kSmoyq10G3lLxgNgi7ZJQ2pN4CAQHR/kI14gxjaUt2lS5A2eNegG lutxAoGALG1JxRXI1G2QVqNXjveLI4BA9KKZlXymNPRYxHZwr9wkgr1OZUR6hzGf GFzfciXBeiM5DgwCGzOsRmhEVWQY0AWtwNpkvdTo2+FG+wiehzSkMviiwi4wXDZs ZPIOBDSJCDbdO4GS9MJR1HtSQ09uMVK2/DMEOUhmfY2fkd9+rcQ= -----END RSA PRIVATE KEY----- """ SSL_TEST_CRAWLER_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUaD0m6kjEe/kX8KV86Tm3JMOXw5gwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyN1oYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQC6kaAaFDrrIxHCuID22AfMrV7fVrB9F5h0uQP5KSawigxJ BHqs9gIjPi7ur9nFGxGFjh+cyFF7kkWbLOJpABEu6J1DC6+MPe67rnQjq3IEds8d c4ToidqfP1/Pgl4uOfV0MJpYF77Vpc/P2SHApjRIl7wCPxBS50BZkPaXbobb5e9r 3QSFpyLsvs0jeu1xp4w7DBdJsiHY/Qh3ekvUAH3A/tC/kQ97K9ZndgIQflW+OO89 FwWS9pKLXkYbKejhbaQ5D6wP2xcvY4C093B8kpaeMA9DCW8tUATGGTYaN6MUhNt9 d0LQZ0R58uolJW2o2Qv45TokYoHlsuGbDcc11ijDAgMBAAGjFzAVMBMGA1UdEQQM MAqCCGNoaWEubmV0MA0GCSqGSIb3DQEBCwUAA4IBAQCaugeA7XZuF/JeC6T/cDGq c5Y5pEBuhvNHj6aESm2FvuRIgXS6djo1YZF0McTiLVOtnUqDBSl1h/VH1e4n8zj3 MAVMPfXbAByexDGjbEIo0/aLmcUAAy3h/HQYmkX+Ge5Bm0MCszSbM/YqMPV30rSz Gq/KfB8s8QQb7T2sS10VTlIBL54AjEgnyunR3vPjx0rqfnFRHdQoD7MdUwOEq3qE 6FFzpmp/fUaValfF9FS8w4vDq13LUY7OhphmW8mJHJ6e7GcUxFPLKs1oNpsMMPJz wd4te+SB/dQ8CH1o3xvvFirUiPNz1wXRziJSO6AqjNXBMe86qnELwfXohI5oxUl9 -----END CERTIFICATE----- """ SSL_TEST_CRAWLER_PRIVATE_KEY = b"""-----BEGIN RSA PRIVATE KEY----- MIIEpQIBAAKCAQEAupGgGhQ66yMRwriA9tgHzK1e31awfReYdLkD+SkmsIoMSQR6 rPYCIz4u7q/ZxRsRhY4fnMhRe5JFmyziaQARLuidQwuvjD3uu650I6tyBHbPHXOE 6Inanz9fz4JeLjn1dDCaWBe+1aXPz9khwKY0SJe8Aj8QUudAWZD2l26G2+Xva90E haci7L7NI3rtcaeMOwwXSbIh2P0Id3pL1AB9wP7Qv5EPeyvWZ3YCEH5VvjjvPRcF kvaSi15GGyno4W2kOQ+sD9sXL2OAtPdwfJKWnjAPQwlvLVAExhk2GjejFITbfXdC 0GdEefLqJSVtqNkL+OU6JGKB5bLhmw3HNdYowwIDAQABAoIBAQCWTQ07FUMl/Rmo 0jTrJ7yY0q7UpCUIkcK7ffXKe7F0lbIx/M7LmmC8fbMXjUmWNilWe9nR17t1HrC+ w1kfF/O/45wV0Es7YwV546AiwFLZb9GJO3A+WhhrJIYOSUuQWBb65NDi2TZfLfaN zrIXXo5OURcghCelcjFwNo3CD0PL0ECB2vfBJ27QYHlv3mBGCxKTLyCPb+Oyn1fT bDGLiwHv5tPxx8zkcaNXDztjKDJYNMSS5hE3/69dyyIdkjA+PM8Qwghr5V14m2lJ 7RUIWntNzsbxRZ6t24rK1ytQVO2o9kOx+sEtNvu7hnvmkFSLhUhtXzEAabQXyXOn ftCDVhqZAoGBANsha+ofkczMozKrALzEeugh5D57tDmGvcG2puIiiJiYCighovkr cvQ0h5gr18lraEP3768rZlQ0814tA17yoXaHNeNY6IyE7EiLkTtKx4tRfi1FmgK1 YTc0LWQhELN6lg1YqbuRgAn9wPxJY1MEFutuGXJCzcsGhCNCvqmRhl01AoGBANn1 rabHjCBZRzWOeh8fNfAcbNdVLsrD/nmyCDxEN96q/ascb3fcyNx+USqKz1acoJNC vGILzRa9gm/86KA5r7l41+bf0FYz0muTiqpzMNN9LCBG5ChosmsSB8v7i9Q4i7yu pCcv5ATSSeAGUcvrenK5uWM7ht+fjfTdW1RsIsUXAoGAYSYVEMwEOLa0157GienV z5pO9YCkayiYcgxHOlQzGOu2/QnElhE0Op4bS1SMq2ip5hBCu/dSu5xqFOOB7hNF kCXrtypQlxPLKXJu5cmGY/ayKOIFoJPHUNEaGp0qKVf8tFgNj/G2wTc12uOyXDig 7Kl4MJb7Y7o01OkfXE//MM0CgYEAmJ87GNUUXzaE8ZCyHQba2ybcZDCG0n9Ju2eZ 8rGGOcqcVGxV9aXJlPRy24pVw31rx5JsnW9MDkdnhgmfz0p1rTdcX5OLrEEfcCrh Z5e/segttPBPJaiifu0iPokHEfUCjH3x/mq/jUy/ZDqonlVm6dz5Xu449HAilDtI j6Yk9sMCgYEAjE0g9OFzhHJtSwQtTy8S2GYJtFAvy8KneXsR/YAz/C0/CgvT+OsK ACI948k1VXpUK/u2A+bmqxThN7OPDC9sLgThrdtAL+7UKH68fkqFYu0usiTif2z7 /1VI9PPkm9ZKtHx6O97fdBjv7DHhGdYITB+pVXxI6VKXmS4+YgfonJo= -----END RSA PRIVATE KEY----- """ SSL_TEST_DAEMON_PRIVATE_CRT = b"""-----BEGIN CERTIFICATE----- MIIDLDCCAhSgAwIBAgIUTYcm+E1jiGL7UEiopTFGmSwk3eQwDQYJKoZIhvcNAQEL BQAwRDENMAsGA1UECgwEQ2hpYTEQMA4GA1UEAwwHQ2hpYSBDQTEhMB8GA1UECwwY T3JnYW5pYyBGYXJtaW5nIERpdmlzaW9uMCAXDTIyMDMyMjEwMjkyN1oYDzIxMDAw ODAyMDAwMDAwWjBBMQ0wCwYDVQQDDARDaGlhMQ0wCwYDVQQKDARDaGlhMSEwHwYD VQQLDBhPcmdhbmljIEZhcm1pbmcgRGl2aXNpb24wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDD4xmVdRUqCRCDRebD9nds1h1mtyutoeHfruSn4PiEx30Q YSzGRszSTvM+PwzL6jug6CVmlfWzLBC25unegeZhjlhoMkMkVavA1bZQ0sx2t2ll wqFMhk0BvfQ0ftQ0BEgHpbll361gZGb7sLB0kuh1LhRE6uWpkg3WJT36DwzkCJ+R
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
true
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/simulator/start_simulator.py
flax/simulator/start_simulator.py
import logging import sys from multiprocessing import freeze_support from pathlib import Path from typing import Optional, Dict, List, Tuple from flax.full_node.full_node import FullNode from flax.server.outbound_message import NodeType from flax.server.start_service import Service, async_run from flax.simulator.simulator_full_node_rpc_api import SimulatorFullNodeRpcApi from flax.types.blockchain_format.sized_bytes import bytes32 from flax.util.bech32m import decode_puzzle_hash from flax.util.flax_logging import initialize_logging from flax.util.config import load_config_cli, override_config, load_config from flax.util.default_root import DEFAULT_ROOT_PATH from flax.simulator.block_tools import BlockTools, test_constants from flax.util.ints import uint16 from flax.simulator.full_node_simulator import FullNodeSimulator # See: https://bugs.python.org/issue29288 "".encode("idna") SERVICE_NAME = "full_node" log = logging.getLogger(__name__) PLOTS = 3 # 3 plots should be enough PLOT_SIZE = 19 # anything under k19 is a bit buggy def create_full_node_simulator_service( root_path: Path, config: Dict, bt: BlockTools, connect_to_daemon: bool = True, override_capabilities: List[Tuple[uint16, str]] = None, ) -> Service[FullNode]: service_config = config[SERVICE_NAME] constants = bt.constants node = FullNode( config=service_config, root_path=root_path, consensus_constants=constants, ) peer_api = FullNodeSimulator(node, bt, config) network_id = service_config["selected_network"] return Service( root_path=root_path, config=config, node=node, peer_api=peer_api, node_type=NodeType.FULL_NODE, advertised_port=service_config["port"], service_name=SERVICE_NAME, server_listen_ports=[service_config["port"]], on_connect_callback=node.on_connect, network_id=network_id, rpc_info=(SimulatorFullNodeRpcApi, service_config["rpc_port"]), connect_to_daemon=connect_to_daemon, override_capabilities=override_capabilities, ) async def async_main(test_mode: bool = False, automated_testing: bool = False, root_path: Path = DEFAULT_ROOT_PATH): # Same as full node, but the root_path is defined above config = load_config(root_path, "config.yaml") service_config = load_config_cli(root_path, "config.yaml", SERVICE_NAME) config[SERVICE_NAME] = service_config # THIS IS Simulator specific. fingerprint: Optional[int] = None farming_puzzle_hash: Optional[bytes32] = None plot_dir: str = "simulator/plots" if "simulator" in config: overrides = {} plot_dir = config["simulator"].get("plot_directory", "simulator/plots") if config["simulator"]["key_fingerprint"] is not None: fingerprint = int(config["simulator"]["key_fingerprint"]) if config["simulator"]["farming_address"] is not None: farming_puzzle_hash = decode_puzzle_hash(config["simulator"]["farming_address"]) else: # old config format overrides = { "full_node.selected_network": "testnet0", "full_node.database_path": service_config["simulator_database_path"], "full_node.peers_file_path": service_config["simulator_peers_file_path"], "full_node.introducer_peer": {"host": "127.0.0.1", "port": 58555}, } overrides["simulator.use_current_time"] = True # create block tools bt = BlockTools( test_constants, root_path, config_overrides=overrides, automated_testing=automated_testing, plot_dir=plot_dir, ) await bt.setup_keys(fingerprint=fingerprint, reward_ph=farming_puzzle_hash) await bt.setup_plots(num_og_plots=PLOTS, num_pool_plots=0, num_non_keychain_plots=0, plot_size=PLOT_SIZE) # Everything after this is not simulator specific, excluding the if test_mode. initialize_logging( service_name=SERVICE_NAME, logging_config=service_config["logging"], root_path=root_path, ) service = create_full_node_simulator_service(root_path, override_config(config, overrides), bt) if test_mode: return service await service.setup_process_global_state() await service.run() return 0 def main() -> int: freeze_support() return async_run(async_main()) if __name__ == "__main__": sys.exit(main())
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/plotters/bladebit.py
flax/plotters/bladebit.py
import asyncio import json import traceback import os import sys import logging from pathlib import Path from typing import Any, Dict, Optional, Tuple from flax.plotting.create_plots import resolve_plot_keys from flax.plotters.plotters_util import ( run_plotter, run_command, reset_loop_policy_for_windows, get_venv_bin, ) log = logging.getLogger(__name__) BLADEBIT_PLOTTER_DIR = "bladebit" def is_bladebit_supported() -> bool: # bladebit >= 2.0.0 now supports macOS return sys.platform.startswith("linux") or sys.platform in ["win32", "cygwin", "darwin"] def meets_memory_requirement(plotters_root_path: Path) -> Tuple[bool, Optional[str]]: have_enough_memory: bool = False warning_string: Optional[str] = None bladebit_executable_path = get_bladebit_executable_path(plotters_root_path) if bladebit_executable_path.exists(): try: proc = run_command( [os.fspath(bladebit_executable_path), "--memory-json"], "Failed to call bladebit with --memory-json option", capture_output=True, text=True, check=False, ) if proc.returncode != 0: return have_enough_memory, proc.stderr.strip() memory_info: Dict[str, int] = json.loads(proc.stdout) total_bytes: int = memory_info.get("total", -1) required_bytes: int = memory_info.get("required", 0) have_enough_memory = total_bytes >= required_bytes if have_enough_memory is False: warning_string = f"BladeBit requires at least {int(required_bytes / 1024**3)} GiB of RAM to operate" except Exception as e: print(f"Failed to determine bladebit memory requirements: {e}") return have_enough_memory, warning_string def get_bladebit_src_path(plotters_root_path: Path) -> Path: return plotters_root_path / BLADEBIT_PLOTTER_DIR def get_bladebit_package_path() -> Path: return Path(os.path.dirname(sys.executable)) / "bladebit" def get_bladebit_exec_venv_path() -> Optional[Path]: venv_bin_path = get_venv_bin() if not venv_bin_path: return None if sys.platform in ["win32", "cygwin"]: return venv_bin_path / "bladebit.exe" else: return venv_bin_path / "bladebit" def get_bladebit_exec_src_path(plotters_root_path: Path) -> Path: bladebit_src_dir = get_bladebit_src_path(plotters_root_path) build_dir = "build/Release" if sys.platform in ["win32", "cygwin"] else "build" bladebit_exec = "bladebit.exe" if sys.platform in ["win32", "cygwin"] else "bladebit" return bladebit_src_dir / build_dir / bladebit_exec def get_bladebit_exec_package_path() -> Path: bladebit_package_dir = get_bladebit_package_path() bladebit_exec = "bladebit.exe" if sys.platform in ["win32", "cygwin"] else "bladebit" return bladebit_package_dir / bladebit_exec def get_bladebit_executable_path(plotters_root_path: Path) -> Path: bladebit_exec_venv_path = get_bladebit_exec_venv_path() if bladebit_exec_venv_path is not None and bladebit_exec_venv_path.exists(): return bladebit_exec_venv_path bladebit_exec_src_path = get_bladebit_exec_src_path(plotters_root_path) if bladebit_exec_src_path.exists(): return bladebit_exec_src_path return get_bladebit_exec_package_path() def get_bladebit_version(plotters_root_path: Path): bladebit_executable_path = get_bladebit_executable_path(plotters_root_path) if not bladebit_executable_path.exists(): # (NotFound, "") return False, "" try: proc = run_command( [os.fspath(bladebit_executable_path), "--version"], "Failed to call bladebit with --version option", capture_output=True, text=True, check=False, ) if proc.returncode != 0: return None, proc.stderr.strip() # (Found, versionStr) version_str: str = proc.stdout.strip() return True, version_str.split(".") except Exception as e: # (Unknown, Exception) return None, e def get_bladebit_install_info(plotters_root_path: Path) -> Optional[Dict[str, Any]]: info: Dict[str, Any] = {"display_name": "BladeBit Plotter"} installed: bool = False supported: bool = is_bladebit_supported() bladebit_executable_path = get_bladebit_executable_path(plotters_root_path) if bladebit_executable_path.exists(): version: Optional[str] = None found, response = get_bladebit_version(plotters_root_path) if found: version = ".".join(response) elif found is None: print(f"Failed to determine bladebit version: {response}") if version is not None: installed = True info["version"] = version else: installed = False info["installed"] = installed if installed is False: info["can_install"] = supported if supported: _, memory_warning = meets_memory_requirement(plotters_root_path) if memory_warning is not None: info["bladebit_memory_warning"] = memory_warning return info progress_bladebit1 = { "Finished F1 sort": 0.01, "Finished forward propagating table 2": 0.06, "Finished forward propagating table 3": 0.12, "Finished forward propagating table 4": 0.2, "Finished forward propagating table 5": 0.28, "Finished forward propagating table 6": 0.36, "Finished forward propagating table 7": 0.42, "Finished prunning table 6": 0.43, "Finished prunning table 5": 0.48, "Finished prunning table 4": 0.51, "Finished prunning table 3": 0.55, "Finished prunning table 2": 0.58, "Finished compressing tables 1 and 2": 0.66, "Finished compressing tables 2 and 3": 0.73, "Finished compressing tables 3 and 4": 0.79, "Finished compressing tables 4 and 5": 0.85, "Finished compressing tables 5 and 6": 0.92, "Finished compressing tables 6 and 7": 0.98, } progress_bladebit2 = { # "Running Phase 1": 0.01, "Finished f1 generation in ": 0.01, "Completed table 2 in ": 0.06, "Completed table 3 in ": 0.12, "Completed table 4 in ": 0.2, "Completed table 5 in ": 0.28, "Completed table 6 in ": 0.36, "Completed table 7 in ": 0.42, # "Finished Phase 1 ": 0.43, # "Running Phase 2": 0.43, "Finished marking table 6 in ": 0.43, "Finished marking table 5 in ": 0.48, "Finished marking table 4 in ": 0.51, "Finished marking table 3 in ": 0.55, "Finished marking table 2 in ": 0.58, # "Finished Phase 2 ": 0.59, # "Running Phase 3": 0.60, "Finished compressing tables 1 and 2 in ": 0.66, "Finished compressing tables 2 and 3 in ": 0.73, "Finished compressing tables 3 and 4 in ": 0.79, "Finished compressing tables 4 and 5 in ": 0.85, "Finished compressing tables 5 and 6 in ": 0.92, "Finished compressing tables 6 and 7 in ": 0.98, # "Finished Phase 3 ": 0.99, "Finished writing plot ": 0.99, } def plot_bladebit(args, flax_root_path, root_path): (found, version_or_exception) = get_bladebit_version(root_path) if found is None: print(f"Error: {version_or_exception}") return version = None if args.plotter == "bladebit": version = 1 if found and version_or_exception[0] != "1": print( f"You're trying to run bladebit version 1" f" but currently version {'.'.join(version_or_exception)} is installed" ) return elif args.plotter == "bladebit2": version = 2 if found and version_or_exception[0] != "2": print( f"You're trying to run bladebit version 2" f" but currently version {'.'.join(version_or_exception)} is installed" ) return if version is None: print(f"Unknown version of bladebit: {args.plotter}") return bladebit_executable_path = get_bladebit_executable_path(root_path) if not os.path.exists(bladebit_executable_path): print("Bladebit was not found.") return if sys.platform in ["win32", "cygwin"]: reset_loop_policy_for_windows() plot_keys = asyncio.run( resolve_plot_keys( None if args.farmerkey == b"" else args.farmerkey.hex(), None, None if args.pool_key == b"" else args.pool_key.hex(), None if args.contract == "" else args.contract, flax_root_path, log, args.connect_to_daemon, ) ) call_args = [ os.fspath(bladebit_executable_path), "-t", str(args.threads), "-n", str(args.count), "-f", bytes(plot_keys.farmer_public_key).hex(), ] if plot_keys.pool_public_key is not None: call_args.append("-p") call_args.append(bytes(plot_keys.pool_public_key).hex()) if plot_keys.pool_contract_address is not None: call_args.append("-c") call_args.append(plot_keys.pool_contract_address) if args.warmstart: call_args.append("-w") if args.id is not None and args.id != b"": call_args.append("-i") call_args.append(args.id.hex()) if args.verbose: call_args.append("-v") if args.nonuma: call_args.append("-m") if args.memo is not None and args.memo != b"": call_args.append("--memo") call_args.append(args.memo) if version > 1: call_args.append("diskplot") if args.buckets: call_args.append("-b") call_args.append(str(args.buckets)) if args.tmpdir: call_args.append("-t1") call_args.append(str(args.tmpdir)) if args.tmpdir2: call_args.append("-t2") call_args.append(str(args.tmpdir2)) if args.no_cpu_affinity: call_args.append("--no-cpu-affinity") if args.cache is not None: call_args.append("--cache") call_args.append(str(args.cache)) if args.f1_threads: call_args.append("--f1-threads") call_args.append(str(args.f1_threads)) if args.fp_threads: call_args.append("--fp-threads") call_args.append(str(args.fp_threads)) if args.c_threads: call_args.append("--c-threads") call_args.append(str(args.c_threads)) if args.p2_threads: call_args.append("--p2-threads") call_args.append(str(args.p2_threads)) if args.p3_threads: call_args.append("--p3-threads") call_args.append(str(args.p3_threads)) if args.alternate: call_args.append("--alternate") if args.no_t1_direct: call_args.append("--no-t1-direct") if args.no_t2_direct: call_args.append("--no-t2-direct") call_args.append(args.finaldir) try: progress = progress_bladebit1 if version == 1 else progress_bladebit2 asyncio.run(run_plotter(flax_root_path, args.plotter, call_args, progress)) except Exception as e: print(f"Exception while plotting: {e} {type(e)}") print(f"Traceback: {traceback.format_exc()}")
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/plotters/chiapos.py
flax/plotters/chiapos.py
""" NOTE: This contains duplicate code from `flax.cmds.plots`. After `flax plots create` becomes obsolete, consider removing it from there. """ import asyncio import logging import pkg_resources from flax.plotting.create_plots import create_plots, resolve_plot_keys from pathlib import Path from typing import Any, Dict, Optional from flax.plotting.util import add_plot_directory, validate_plot_size log = logging.getLogger(__name__) def get_chiapos_install_info() -> Optional[Dict[str, Any]]: chiapos_version: str = pkg_resources.get_distribution("chiapos").version return {"display_name": "Flax Proof of Space", "version": chiapos_version, "installed": True} class Params: def __init__(self, args): self.size = args.size self.num = args.count self.buffer = args.buffer self.num_threads = args.threads self.buckets = args.buckets self.stripe_size = args.stripes self.tmp_dir = Path(args.tmpdir) self.tmp2_dir = Path(args.tmpdir2) if args.tmpdir2 else None self.final_dir = Path(args.finaldir) self.plotid = args.id self.memo = args.memo self.nobitfield = args.nobitfield def plot_flax(args, root_path): try: validate_plot_size(root_path, args.size, args.override) except ValueError as e: print(e) return plot_keys = asyncio.run( resolve_plot_keys( None if args.farmerkey == b"" else args.farmerkey.hex(), args.alt_fingerprint, None if args.pool_key == b"" else args.pool_key.hex(), None if args.contract == "" else args.contract, root_path, log, args.connect_to_daemon, ) ) asyncio.run(create_plots(Params(args), plot_keys)) if not args.exclude_final_dir: try: add_plot_directory(root_path, args.finaldir) except ValueError as e: print(e)
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/plotters/plotters_util.py
flax/plotters/plotters_util.py
from __future__ import annotations import asyncio import contextlib import json import os import signal import subprocess import sys from datetime import datetime from pathlib import Path from typing import Iterator, Optional, TextIO from flax.cmds.init_funcs import flax_full_version_str from flax.util.config import lock_and_load_config @contextlib.contextmanager def get_optional_beta_plot_log_file(root_path: Path, plotter: str) -> Iterator[Optional[TextIO]]: beta_log_path: Optional[Path] = None with lock_and_load_config(root_path, "config.yaml") as config: if config.get("beta", {}).get("enabled", False): file_name = f"{plotter}_{datetime.now().strftime('%m_%d_%Y__%H_%M_%S')}.log" beta_log_path = Path(config["beta"]["path"]) / flax_full_version_str() / "plotting" / file_name beta_log_path.parent.mkdir(parents=True, exist_ok=True) if beta_log_path is not None: with open(beta_log_path, "w") as file: yield file else: yield None # https://kevinmccarthy.org/2016/07/25/streaming-subprocess-stdin-and-stdout-with-asyncio-in-python/ async def _read_stream(stream, callback): while True: line = await stream.readline() if line: callback(line) else: break def parse_stdout(out, progress): out = out.rstrip() print(out, flush=True) for k, v in progress.items(): if k in out: print(f"Progress update: {v}", flush=True) async def run_plotter(root_path, plotter, args, progress_dict): orig_sigint_handler = signal.getsignal(signal.SIGINT) installed_sigint_handler = False process = await asyncio.create_subprocess_exec( *args, stdout=asyncio.subprocess.PIPE, stderr=asyncio.subprocess.PIPE ) def sigint_handler(signum, frame): process.terminate() # For Windows, we'll install a SIGINT handler to catch Ctrl-C (KeyboardInterrupt isn't raised) if sys.platform in ["win32", "cygwin"]: signal.signal(signal.SIGINT, sigint_handler) installed_sigint_handler = True with get_optional_beta_plot_log_file(root_path, plotter) as log_file: if log_file is not None: log_file.write(json.dumps(args) + "\n") def process_stdout_line(line_bytes: bytes) -> None: line_str = line_bytes.decode("UTF8") parse_stdout(line_str, progress_dict) if log_file is not None: log_file.write(line_str) def process_stderr_line(line_bytes: bytes) -> None: err_str = f"STDERR: {line_bytes.decode('UTF8')}" print(err_str) if log_file is not None: log_file.write(err_str) try: await asyncio.wait( [ _read_stream( process.stdout, process_stdout_line, ), _read_stream( process.stderr, process_stderr_line, ), ] ) await process.wait() except Exception as e: print(f"Caught exception while invoking plotter: {e}") finally: # Restore the original SIGINT handler if installed_sigint_handler: signal.signal(signal.SIGINT, orig_sigint_handler) def run_command(args, exc_description, *, check=True, **kwargs) -> subprocess.CompletedProcess: try: proc = subprocess.run(args, check=check, **kwargs) except Exception as e: raise RuntimeError(f"{exc_description} {e}") return proc def reset_loop_policy_for_windows(): asyncio.set_event_loop_policy(asyncio.WindowsProactorEventLoopPolicy()) def get_venv_bin(): venv_dir = os.environ.get("VIRTUAL_ENV", None) if not venv_dir: return None venv_path = Path(venv_dir) if sys.platform == "win32": return venv_path / "Scripts" else: return venv_path / "bin"
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/plotters/plotters.py
flax/plotters/plotters.py
import argparse import binascii import os from enum import Enum from flax.plotters.bladebit import get_bladebit_install_info, plot_bladebit from flax.plotters.chiapos import get_chiapos_install_info, plot_flax from flax.plotters.madmax import get_madmax_install_info, plot_madmax from pathlib import Path from typing import Any, Dict, Optional class Options(Enum): TMP_DIR = 1 TMP_DIR2 = 2 FINAL_DIR = 3 K = 4 MEMO = 5 ID = 6 BUFF = 7 NUM_BUCKETS = 8 STRIPE_SIZE = 9 NUM_THREADS = 10 NOBITFIELD = 11 PLOT_COUNT = 12 MADMAX_NUM_BUCKETS_PHRASE3 = 13 MADMAX_WAITFORCOPY = 14 POOLKEY = 15 FARMERKEY = 16 MADMAX_TMPTOGGLE = 17 POOLCONTRACT = 18 MADMAX_RMULTI2 = 19 BLADEBIT_WARMSTART = 20 BLADEBIT_NONUMA = 21 VERBOSE = 22 OVERRIDE_K = 23 ALT_FINGERPRINT = 24 EXCLUDE_FINAL_DIR = 25 CONNECT_TO_DAEMON = 26 BLADEBIT_NO_CPU_AFFINITY = 27 BLADEBIT_CACHE = 28 BLADEBIT_F1_THREAD = 29 BLADEBIT_FP_THREAD = 30 BLADEBIT_C_THREAD = 31 BLADEBIT_P2_THREAD = 32 BLADEBIT_P3_THREAD = 33 BLADEBIT_ALTERNATE = 34 BLADEBIT_NO_T1_DIRECT = 35 BLADEBIT_NO_T2_DIRECT = 36 flax_plotter_options = [ Options.TMP_DIR, Options.TMP_DIR2, Options.K, Options.MEMO, Options.ID, Options.BUFF, Options.NUM_BUCKETS, Options.STRIPE_SIZE, Options.NUM_THREADS, Options.NOBITFIELD, Options.OVERRIDE_K, Options.ALT_FINGERPRINT, Options.POOLCONTRACT, Options.FARMERKEY, Options.POOLKEY, Options.PLOT_COUNT, Options.EXCLUDE_FINAL_DIR, Options.CONNECT_TO_DAEMON, Options.FINAL_DIR, ] madmax_plotter_options = [ Options.K, Options.PLOT_COUNT, Options.NUM_THREADS, Options.NUM_BUCKETS, Options.MADMAX_NUM_BUCKETS_PHRASE3, Options.TMP_DIR, Options.TMP_DIR2, Options.MADMAX_WAITFORCOPY, Options.POOLKEY, Options.FARMERKEY, Options.POOLCONTRACT, Options.MADMAX_TMPTOGGLE, Options.MADMAX_RMULTI2, Options.CONNECT_TO_DAEMON, Options.FINAL_DIR, ] bladebit_plotter_options = [ Options.NUM_THREADS, Options.PLOT_COUNT, Options.FARMERKEY, Options.POOLKEY, Options.POOLCONTRACT, Options.ID, Options.BLADEBIT_WARMSTART, Options.BLADEBIT_NONUMA, Options.VERBOSE, Options.CONNECT_TO_DAEMON, Options.FINAL_DIR, ] bladebit2_plotter_options = [ Options.NUM_THREADS, Options.PLOT_COUNT, Options.FARMERKEY, Options.POOLKEY, Options.POOLCONTRACT, Options.ID, Options.BLADEBIT_WARMSTART, Options.BLADEBIT_NONUMA, Options.VERBOSE, Options.CONNECT_TO_DAEMON, Options.FINAL_DIR, Options.BLADEBIT_NO_CPU_AFFINITY, Options.BLADEBIT_CACHE, Options.BLADEBIT_F1_THREAD, Options.BLADEBIT_FP_THREAD, Options.BLADEBIT_C_THREAD, Options.BLADEBIT_P2_THREAD, Options.BLADEBIT_P3_THREAD, Options.BLADEBIT_ALTERNATE, Options.TMP_DIR, Options.TMP_DIR2, Options.NUM_BUCKETS, Options.MEMO, Options.BLADEBIT_NO_T1_DIRECT, Options.BLADEBIT_NO_T2_DIRECT, ] def get_plotters_root_path(root_path: Path) -> Path: return root_path / "plotters" def build_parser(subparsers, root_path, option_list, name, plotter_desc): parser = subparsers.add_parser(name, help=plotter_desc) for option in option_list: if option is Options.K: parser.add_argument( "-k", "--size", type=int, help="K value.", default=32, ) if option is Options.NUM_BUCKETS: u_default = 0 if name == "chiapos" else 256 parser.add_argument( "-u", "--buckets", type=int, help="Number of buckets.", default=u_default, ) if option is Options.STRIPE_SIZE: parser.add_argument( "-s", "--stripes", type=int, help="Stripe size.", default=0, ) if option is Options.TMP_DIR: parser.add_argument( "-t", "--tmp_dir", type=str, dest="tmpdir", help="Temporary directory 1.", required=True, ) if option is Options.TMP_DIR2: parser.add_argument( "-2", "--tmp_dir2", type=str, dest="tmpdir2", help="Temporary directory 2.", default="", ) if option is Options.FINAL_DIR: parser.add_argument( "-d", "--final_dir", type=str, dest="finaldir", help="Final directory.", required=True, ) if option is Options.BUFF: parser.add_argument( "-b", "--buffer", type=int, help="Size of the buffer, in MB.", default=0, ) if option is Options.NUM_THREADS: r_default = 4 if name == "madmax" else 0 parser.add_argument( "-r", "--threads", type=int, help="Num threads.", default=r_default, ) if option is Options.NOBITFIELD: parser.add_argument( "-e", "--nobitfield", action="store_true", help="Disable bitfield.", default=False, ) if option is Options.MEMO: parser.add_argument( "-m", "--memo", type=binascii.unhexlify, help="Memo variable.", ) if option is Options.ID: parser.add_argument( "-i", "--id", type=binascii.unhexlify, help="Plot id", ) if option is Options.PLOT_COUNT: parser.add_argument( "-n", "--count", type=int, help="Number of plots to create (default = 1)", default=1, ) if option is Options.MADMAX_NUM_BUCKETS_PHRASE3: parser.add_argument( "-v", "--buckets3", type=int, help="Number of buckets for phase 3+4 (default = 256)", default=256, ) if option is Options.MADMAX_WAITFORCOPY: parser.add_argument( "-w", "--waitforcopy", action="store_true", help="Wait for copy to start next plot", default=False, ) if option is Options.MADMAX_TMPTOGGLE: parser.add_argument( "-G", "--tmptoggle", action="store_true", help="Alternate tmpdir/tmpdir2 (default = false)", default=False, ) if option is Options.POOLCONTRACT: parser.add_argument( "-c", "--contract", type=str, help="Pool Contract Address (64 chars)", default="", ) if option is Options.MADMAX_RMULTI2: parser.add_argument( "-K", "--rmulti2", type=int, help="Thread multiplier for P2 (default = 1)", default=1, ) if option is Options.POOLKEY: parser.add_argument( "-p", "--pool-key", type=binascii.unhexlify, help="Pool Public Key (48 bytes)", default="", ) if option is Options.FARMERKEY: parser.add_argument( "-f", "--farmerkey", type=binascii.unhexlify, help="Farmer Public Key (48 bytes)", default="", ) if option is Options.BLADEBIT_WARMSTART: parser.add_argument( "-w", "--warmstart", action="store_true", help="Warm start", default=False, ) if option is Options.BLADEBIT_NONUMA: parser.add_argument( "--nonuma", action="store_true", help="Disable numa", default=False, ) if option is Options.VERBOSE: parser.add_argument( "-v", "--verbose", action="store_true", help="Set verbose", default=False, ) if option is Options.OVERRIDE_K: parser.add_argument( "--override-k", dest="override", action="store_true", help="Force size smaller than 32", default=False, ) if option is Options.ALT_FINGERPRINT: parser.add_argument( "-a", "--alt_fingerprint", type=int, default=None, help="Enter the alternative fingerprint of the key you want to use", ) if option is Options.EXCLUDE_FINAL_DIR: parser.add_argument( "-x", "--exclude_final_dir", action="store_true", help="Skips adding [final dir] to harvester for farming", default=False, ) if option is Options.CONNECT_TO_DAEMON: parser.add_argument( "-D", "--connect-to-daemon", action="store_true", help=argparse.SUPPRESS, default=False, ) if option is Options.BLADEBIT_NO_CPU_AFFINITY: parser.add_argument( "--no-cpu-affinity", action="store_true", help="Disable assigning automatic thread affinity", default=False, ) if option is Options.BLADEBIT_CACHE: parser.add_argument( "--cache", type=str, help="Size of cache to reserve for I/O", ) if option is Options.BLADEBIT_F1_THREAD: parser.add_argument( "--f1-threads", type=int, help="Override the thread count for F1 generation", ) if option is Options.BLADEBIT_FP_THREAD: parser.add_argument( "--fp-threads", type=int, help="Override the thread count for forward propagation", ) if option is Options.BLADEBIT_C_THREAD: parser.add_argument( "--c-threads", type=int, help="Override the thread count for C table processing", ) if option is Options.BLADEBIT_P2_THREAD: parser.add_argument( "--p2-threads", type=int, help="Override the thread count for Phase 2", ) if option is Options.BLADEBIT_P3_THREAD: parser.add_argument( "--p3-threads", type=int, help="Override the thread count for Phase 3", ) if option is Options.BLADEBIT_ALTERNATE: parser.add_argument( "--alternate", action="store_true", help="Halves the temp2 cache size requirements by alternating bucket writing methods between tables", default=False, ) if option is Options.BLADEBIT_NO_T1_DIRECT: parser.add_argument( "--no-t1-direct", action="store_true", help="Disable direct I/O on the temp 1 directory", default=False, ) if option is Options.BLADEBIT_NO_T2_DIRECT: parser.add_argument( "--no-t2-direct", action="store_true", help="Disable direct I/O on the temp 2 directory", default=False, ) def call_plotters(root_path: Path, args): # Add `plotters` section in FLAX_ROOT. flax_root_path = root_path root_path = get_plotters_root_path(root_path) if not root_path.is_dir(): if os.path.exists(root_path): try: os.remove(root_path) except Exception as e: print(f"Exception deleting old root path: {type(e)} {e}.") if not os.path.exists(root_path): print(f"Creating plotters folder within FLAX_ROOT: {root_path}") try: os.mkdir(root_path) except Exception as e: print(f"Cannot create plotters root path {root_path} {type(e)} {e}.") plotters = argparse.ArgumentParser("flax plotters", description="Available options.") subparsers = plotters.add_subparsers(help="Available options", dest="plotter") build_parser(subparsers, root_path, flax_plotter_options, "chiapos", "Create a plot with the default flax plotter") build_parser(subparsers, root_path, madmax_plotter_options, "madmax", "Create a plot with madMAx") build_parser(subparsers, root_path, bladebit_plotter_options, "bladebit", "Create a plot with bladebit") build_parser(subparsers, root_path, bladebit2_plotter_options, "bladebit2", "Create a plot with bladebit2") deprecation_warning = ( "[DEPRECATED] 'flax plotters install' is no longer available. Use install-plotter.sh/ps1 instead." ) install_parser = subparsers.add_parser("install", help=deprecation_warning) install_parser.add_argument("install_plotter", type=str, nargs="*") subparsers.add_parser("version", help="Show plotter versions") args = plotters.parse_args(args) if args.plotter is None: plotters.print_help() elif args.plotter == "chiapos": plot_flax(args, flax_root_path) elif args.plotter == "madmax": plot_madmax(args, flax_root_path, root_path) elif args.plotter.startswith("bladebit"): plot_bladebit(args, flax_root_path, root_path) elif args.plotter == "version": show_plotters_version(flax_root_path) elif args.plotter == "install": print(deprecation_warning) def get_available_plotters(root_path) -> Dict[str, Any]: plotters_root_path: Path = get_plotters_root_path(root_path) plotters: Dict[str, Any] = {} chiapos: Optional[Dict[str, Any]] = get_chiapos_install_info() bladebit: Optional[Dict[str, Any]] = get_bladebit_install_info(plotters_root_path) madmax: Optional[Dict[str, Any]] = get_madmax_install_info(plotters_root_path) if chiapos is not None: plotters["chiapos"] = chiapos if bladebit and bladebit.get("version") is not None: bladebit_major_version = bladebit["version"].split(".")[0] if bladebit_major_version == "2": plotters["bladebit2"] = bladebit else: plotters["bladebit"] = bladebit if madmax is not None: plotters["madmax"] = madmax return plotters def show_plotters_version(root_path: Path): info = get_available_plotters(root_path) if "chiapos" in info and "version" in info["chiapos"]: print(f"chiapos: {info['chiapos']['version']}") if "bladebit" in info and "version" in info["bladebit"]: print(f"bladebit: {info['bladebit']['version']}") if "bladebit2" in info and "version" in info["bladebit2"]: print(f"bladebit: {info['bladebit2']['version']}") if "madmax" in info and "version" in info["madmax"]: print(f"madmax: {info['madmax']['version']}")
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/plotters/__init__.py
flax/plotters/__init__.py
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false
Flax-Network/flax-blockchain
https://github.com/Flax-Network/flax-blockchain/blob/bb8715f3155bb8011a04cc8c05b3fa8133e4c64b/flax/plotters/madmax.py
flax/plotters/madmax.py
import asyncio import traceback import os import logging import sys from pathlib import Path from typing import Any, Dict, Optional from flax.plotting.create_plots import resolve_plot_keys from flax.plotters.plotters_util import ( run_plotter, run_command, reset_loop_policy_for_windows, get_venv_bin, ) log = logging.getLogger(__name__) MADMAX_PLOTTER_DIR = "madmax-plotter" def is_madmax_supported() -> bool: return sys.platform.startswith("linux") or sys.platform in ["darwin", "win32", "cygwin"] def get_madmax_src_path(plotters_root_path: Path) -> Path: return plotters_root_path / MADMAX_PLOTTER_DIR def get_madmax_package_path() -> Path: return Path(os.path.dirname(sys.executable)) / "madmax" def get_madmax_exec_venv_path(ksize: int = 32) -> Optional[Path]: venv_bin_path = get_venv_bin() if not venv_bin_path: return None madmax_exec = "flax_plot" if ksize > 32: madmax_exec += "_k34" # Use the flax_plot_k34 executable for k-sizes > 32 if sys.platform in ["win32", "cygwin"]: madmax_exec += ".exe" return venv_bin_path / madmax_exec def get_madmax_exec_src_path(plotters_root_path: Path, ksize: int = 32) -> Path: madmax_src_dir = get_madmax_src_path(plotters_root_path) / "build" madmax_exec = "flax_plot" if ksize > 32: madmax_exec += "_k34" # Use the flax_plot_k34 executable for k-sizes > 32 if sys.platform in ["win32", "cygwin"]: madmax_exec += ".exe" return madmax_src_dir / madmax_exec def get_madmax_exec_package_path(ksize: int = 32) -> Path: madmax_dir: Path = get_madmax_package_path() madmax_exec: str = "flax_plot" if ksize > 32: madmax_exec += "_k34" # Use the flax_plot_k34 executable for k-sizes > 32 if sys.platform in ["win32", "cygwin"]: madmax_exec += ".exe" return madmax_dir / madmax_exec def get_madmax_executable_path_for_ksize(plotters_root_path: Path, ksize: int = 32) -> Path: madmax_exec_venv_path = get_madmax_exec_venv_path(ksize) if madmax_exec_venv_path is not None and madmax_exec_venv_path.exists(): return madmax_exec_venv_path madmax_exec_src_path = get_madmax_exec_src_path(plotters_root_path, ksize) if madmax_exec_src_path.exists(): return madmax_exec_src_path return get_madmax_exec_package_path(ksize) def get_madmax_version(plotters_root_path: Path): madmax_executable_path = get_madmax_executable_path_for_ksize(plotters_root_path) if not madmax_executable_path.exists(): # (NotFound, "") return False, "" try: proc = run_command( [os.fspath(madmax_executable_path), "--version"], "Failed to call madmax with --version option", capture_output=True, text=True, check=False, ) if proc.returncode != 0: return None, proc.stderr.strip() # (Found, versionStr) version_str = proc.stdout.strip() return True, version_str.split(".") except Exception as e: tb = traceback.format_exc() # (Unknown, ErrMsg) return None, f"Failed to determine madmax version: {e} {tb}" def get_madmax_install_info(plotters_root_path: Path) -> Optional[Dict[str, Any]]: info: Dict[str, Any] = {"display_name": "madMAx Plotter"} installed: bool = False supported: bool = is_madmax_supported() madmax_executable_path = get_madmax_executable_path_for_ksize(plotters_root_path) if madmax_executable_path.exists(): version: Optional[str] = None found, result_msg = get_madmax_version(plotters_root_path) if found: version = ".".join(result_msg) elif found is None: print(f"Failed to determine madMAx version: {result_msg}") if version is not None: installed = True info["version"] = version else: installed = False info["installed"] = installed if installed is False: info["can_install"] = supported return info progress = { "[P1] Table 1 took": 0.01, "[P1] Table 2 took": 0.06, "[P1] Table 3 took": 0.12, "[P1] Table 4 took": 0.2, "[P1] Table 5 took": 0.28, "[P1] Table 6 took": 0.36, "[P1] Table 7 took": 0.42, "[P2] Table 7 rewrite took": 0.43, "[P2] Table 6 rewrite took": 0.48, "[P2] Table 5 rewrite took": 0.51, "[P2] Table 4 rewrite took": 0.55, "[P2] Table 3 rewrite took": 0.58, "[P2] Table 2 rewrite took": 0.61, "[P3-2] Table 2 took": 0.66, "[P3-2] Table 3 took": 0.73, "[P3-2] Table 4 took": 0.79, "[P3-2] Table 5 took": 0.85, "[P3-2] Table 6 took": 0.92, "[P3-2] Table 7 took": 0.98, } def dir_with_trailing_slash(dir: str) -> str: return dir if dir[-1] == os.path.sep else dir + os.path.sep def plot_madmax(args, flax_root_path: Path, plotters_root_path: Path): if sys.platform != "win32" and sys.platform != "cygwin": import resource # madMAx has a ulimit -n requirement > 296: # "Cannot open at least 296 files, please raise maximum open file limit in OS." resource.setrlimit(resource.RLIMIT_NOFILE, (512, 512)) else: reset_loop_policy_for_windows() madmax_executable_path_for_ksize = get_madmax_executable_path_for_ksize(plotters_root_path, args.size) if not os.path.exists(madmax_executable_path_for_ksize): print("madmax plotter was not found.") return plot_keys = asyncio.run( resolve_plot_keys( None if args.farmerkey == b"" else args.farmerkey.hex(), None, None if args.pool_key == b"" else args.pool_key.hex(), None if args.contract == "" else args.contract, flax_root_path, log, args.connect_to_daemon, ) ) call_args = [] call_args.append(os.fspath(madmax_executable_path_for_ksize)) call_args.append("-f") call_args.append(bytes(plot_keys.farmer_public_key).hex()) if plot_keys.pool_public_key is not None: call_args.append("-p") call_args.append(bytes(plot_keys.pool_public_key).hex()) call_args.append("-t") # s if s[-1] == os.path.sep else s + os.path.sep call_args.append(dir_with_trailing_slash(args.tmpdir)) if len(args.tmpdir2) > 0: call_args.append("-2") call_args.append(dir_with_trailing_slash(args.tmpdir2)) call_args.append("-d") call_args.append(dir_with_trailing_slash(args.finaldir)) if plot_keys.pool_contract_address is not None: call_args.append("-c") call_args.append(plot_keys.pool_contract_address) call_args.append("-n") call_args.append(str(args.count)) call_args.append("-r") call_args.append(str(args.threads)) call_args.append("-u") call_args.append(str(args.buckets)) call_args.append("-v") call_args.append(str(args.buckets3)) if args.waitforcopy: call_args.append("-w") if args.tmptoggle: call_args.append("-G") call_args.append("-K") call_args.append(str(args.rmulti2)) if args.size != 32: call_args.append("-k") call_args.append(str(args.size)) try: asyncio.run(run_plotter(flax_root_path, args.plotter, call_args, progress)) except Exception as e: print(f"Exception while plotting: {type(e)} {e}") print(f"Traceback: {traceback.format_exc()}")
python
Apache-2.0
bb8715f3155bb8011a04cc8c05b3fa8133e4c64b
2026-01-05T07:13:52.951017Z
false