def test_create_wait_certificate_with_wrong_wait_timer(self): # Need to create signup information SignupInfo.create_signup_info( validator_address='1660 Pennsylvania Avenue NW', originator_public_key_hash=self._originator_public_key_hash, most_recent_wait_certificate_id=NULL_BLOCK_IDENTIFIER) # Create two timers and try to create the wait certificate with the # first one, which should fail as it is not the current wait timer invalid_wt = \ WaitTimer.create_wait_timer( validator_address='1660 Pennsylvania Avenue NW', certificates=[]) valid_wt = \ WaitTimer.create_wait_timer( validator_address='1660 Pennsylvania Avenue NW', certificates=[]) # Verify that we cannot create a wait certificate with the old wait # timer, but we can with the new one with self.assertRaises(ValueError): WaitCertificate.create_wait_certificate( wait_timer=invalid_wt, block_hash="Reader's Digest") WaitCertificate.create_wait_certificate(wait_timer=valid_wt, block_hash="Reader's Digest")
def test_create_wait_certificate_before_wait_timer_expires(self): # Need to create signup information SignupInfo.create_signup_info( validator_address='1660 Pennsylvania Avenue NW', originator_public_key_hash=self._originator_public_key_hash, most_recent_wait_certificate_id=NULL_BLOCK_IDENTIFIER) # Create a wait certificate for the genesis block so that we can # create another wait certificate that has to play by the rules. wt = \ WaitTimer.create_wait_timer( validator_address='1660 Pennsylvania Avenue NW', certificates=[]) wc = \ WaitCertificate.create_wait_certificate( wait_timer=wt, block_hash="Reader's Digest") wt = \ WaitTimer.create_wait_timer( validator_address='1660 Pennsylvania Avenue NW', certificates=[wc]) with self.assertRaises(ValueError): WaitCertificate.create_wait_certificate( wait_timer=wt, block_hash="Reader's Digest")
def test_create_wait_certificate_after_wait_timer_timed_out(self): # Need to create signup information SignupInfo.create_signup_info( validator_address='1660 Pennsylvania Avenue NW', originator_public_key_hash=self._originator_public_key_hash, most_recent_wait_certificate_id=NULL_BLOCK_IDENTIFIER) # Create a wait certificate for the genesis block so that we can # create another wait certificate that has to play by the rules. wt = \ WaitTimer.create_wait_timer( validator_address='1660 Pennsylvania Avenue NW', certificates=[]) wc = \ WaitCertificate.create_wait_certificate( wait_timer=wt, block_hash="Reader's Digest") wt = \ WaitTimer.create_wait_timer( validator_address='1660 Pennsylvania Avenue NW', certificates=[wc]) while not wt.has_expired(time.time()): time.sleep(1) time.sleep(WaitTimer.poet_enclave.TIMER_TIMEOUT_PERIOD + 1) with self.assertRaises(ValueError): WaitCertificate.create_wait_certificate( wait_timer=wt, block_hash="Reader's Digest")
def initialize_block(self, block_header): """Do initialization necessary for the consensus to claim a block, this may include initiating voting activities, starting proof of work hash generation, or create a PoET wait timer. Args: block_header (BlockHeader): The BlockHeader to initialize. Returns: Boolean: True if the candidate block should be built. False if no candidate should be built. """ # HACER: Once we have PoET consensus state, we should be looking in # there for the sealed signup data. For the time being, signup # information will be tied to the lifetime of the validator. # HACER: Once the genesis utility is creating the validator registry # transaction, we no longer need to do this. But for now, if we are # creating the genesis block, we need to re-establish the state of # the enclave using pre-canned sealed signup data so that we can # create the wait timer and certificate. Note that this is only # used for the genesis block. Going forward after the genesis block, # all validators will use generated signup information. if utils.block_id_is_genesis(block_header.previous_block_id): LOGGER.debug( 'Creating genesis block, so will use sealed signup data') SignupInfo.unseal_signup_data( poet_enclave_module=self._poet_enclave_module, validator_address=block_header.signer_pubkey, sealed_signup_data=PoetBlockPublisher._sealed_signup_data) # HACER: Otherwise, if it is not the first block and we don't already # have a public key, we need to create signup information and create a # transaction to add it to the validator registry. elif PoetBlockPublisher._poet_public_key is None: self._register_signup_information(block_header=block_header) # Create a list of certificates for the wait timer. This seems to have # a little too much knowledge of the WaitTimer implementation, but # there is no use getting more than # WaitTimer.certificate_sample_length wait certificates. certificates = \ utils.build_certificate_list( block_header=block_header, block_cache=self._block_cache, poet_enclave_module=self._poet_enclave_module, maximum_number=WaitTimer.certificate_sample_length) # We need to create a wait timer for the block...this is what we # will check when we are asked if it is time to publish the block self._wait_timer = \ WaitTimer.create_wait_timer( poet_enclave_module=self._poet_enclave_module, validator_address=block_header.signer_pubkey, certificates=list(certificates)) LOGGER.debug('Created wait timer: %s', self._wait_timer) return True
def test_has_expired(self): # Need to create signup information first SignupInfo.create_signup_info( poet_enclave_module=self.poet_enclave_module, validator_address='1660 Pennsylvania Avenue NW', originator_public_key_hash=self._originator_public_key_hash, most_recent_wait_certificate_id=NULL_BLOCK_IDENTIFIER) # Verify that a timer doesn't expire before its creation time wt = wait_timer.WaitTimer.create_wait_timer( poet_enclave_module=self.poet_enclave_module, validator_address='1060 W Addison Street', certificates=[]) self.assertFalse(wt.has_expired(wt.request_time - 1)) # Create a timer and when it has expired, verify that the duration is # not greater than actual elapsed time. wt = wait_timer.WaitTimer.create_wait_timer( poet_enclave_module=self.poet_enclave_module, validator_address='1060 W Addison Street', certificates=[]) while not wt.has_expired(time.time()): time.sleep(1) self.assertLessEqual(wt.duration, time.time() - wt.request_time) # Tampering with the duration should not affect wait timer expiration wt = wait_timer.WaitTimer.create_wait_timer( poet_enclave_module=self.poet_enclave_module, validator_address='1060 W Addison Street', certificates=[]) assigned_duration = wt.duration wt.duration = 0 while not wt.has_expired(time.time()): time.sleep(1) self.assertLessEqual(assigned_duration, time.time() - wt.request_time) # Tampering with the request time should not affect wait timer # expiration wt = wait_timer.WaitTimer.create_wait_timer( poet_enclave_module=self.poet_enclave_module, validator_address='1060 W Addison Street', certificates=[]) assigned_request_time = wt.request_time wt.request_time -= wt.duration while not wt.has_expired(time.time()): time.sleep(1) self.assertLessEqual(wt.duration, time.time() - assigned_request_time)
def test_create_wait_certificate_before_create_wait_timer(self): # Need to create signup information SignupInfo.create_signup_info( validator_address='1660 Pennsylvania Avenue NW', originator_public_key_hash=self._originator_public_key_hash, most_recent_wait_certificate_id=NULL_BLOCK_IDENTIFIER) # Make sure that trying to create a wait certificate before creating # a wait timer causes an error with self.assertRaises(ValueError): WaitCertificate.create_wait_certificate( wait_timer=None, block_hash="Reader's Digest")
def test_create_wait_certificate_with_reused_wait_timer(self): # Need to create signup information SignupInfo.create_signup_info( poet_enclave_module=self.poet_enclave_module, validator_address='1660 Pennsylvania Avenue NW', originator_public_key_hash=self._originator_public_key_hash, most_recent_wait_certificate_id=NULL_BLOCK_IDENTIFIER) # Create a wait certificate for the genesis block so that we can # create another wait certificate that has to play by the rules. wt = \ WaitTimer.create_wait_timer( poet_enclave_module=self.poet_enclave_module, validator_address='1660 Pennsylvania Avenue NW', certificates=[]) wc = \ WaitCertificate.create_wait_certificate( poet_enclave_module=self.poet_enclave_module, wait_timer=wt, block_hash="Reader's Digest") consumed_wt = wt # Verify that we cannot use the consumed wait timer to create a wait # certificate either before or after creating a new wait timer with self.assertRaises(ValueError): WaitCertificate.create_wait_certificate( poet_enclave_module=self.poet_enclave_module, wait_timer=consumed_wt, block_hash="Reader's Digest") wt = \ WaitTimer.create_wait_timer( poet_enclave_module=self.poet_enclave_module, validator_address='1660 Pennsylvania Avenue NW', certificates=[wc]) with self.assertRaises(ValueError): WaitCertificate.create_wait_certificate( poet_enclave_module=self.poet_enclave_module, wait_timer=consumed_wt, block_hash="Reader's Digest") # Verify that once the new timer expires, we can create a wait # certificate with it while not wt.has_expired(time.time()): time.sleep(1) WaitCertificate.create_wait_certificate( poet_enclave_module=self.poet_enclave_module, wait_timer=wt, block_hash="Reader's Digest")
def test_verify_unsealing_data(self): signup_info = \ SignupInfo.create_signup_info( validator_address='1660 Pennsylvania Avenue NW', originator_public_key_hash=self._originator_public_key_hash, most_recent_wait_certificate_id=NULL_BLOCK_IDENTIFIER) poet_public_key = \ SignupInfo.unseal_signup_data( validator_address='1660 Pennsylvania Avenue NW', sealed_signup_data=signup_info.sealed_signup_data) self.assertEqual( signup_info.poet_public_key, poet_public_key, msg="PoET public key in signup info and sealed data don't match")
def test_verify_serialized_signup_info(self): signup_info = \ SignupInfo.create_signup_info( validator_address='1660 Pennsylvania Avenue NW', originator_public_key_hash=self._originator_public_key_hash, most_recent_wait_certificate_id=NULL_BLOCK_IDENTIFIER) serialized = signup_info.serialize() copy_signup_info = SignupInfo.signup_info_from_serialized(serialized) self.assertEqual( signup_info.poet_public_key, copy_signup_info.poet_public_key) self.assertEqual(signup_info.proof_data, copy_signup_info.proof_data) self.assertEqual( signup_info.anti_sybil_id, copy_signup_info.anti_sybil_id) self.assertIsNone(copy_signup_info.sealed_signup_data)
def test_non_matching_originator_public_key(self): signup_info = \ SignupInfo.create_signup_info( validator_address='1660 Pennsylvania Avenue NW', originator_public_key_hash=self._originator_public_key_hash, most_recent_wait_certificate_id=NULL_BLOCK_IDENTIFIER) with self.assertRaises(ValueError): signup_info.check_valid( originator_public_key_hash=self._another_public_key_hash, most_recent_wait_certificate_id=NULL_BLOCK_IDENTIFIER)
def test_basic_create_signup_info(self): signup_info = \ SignupInfo.create_signup_info( validator_address='1660 Pennsylvania Avenue NW', originator_public_key_hash=self._originator_public_key_hash, most_recent_wait_certificate_id=NULL_BLOCK_IDENTIFIER) self.assertIsNotNone(signup_info.poet_public_key) self.assertIsNotNone(signup_info.proof_data) self.assertIsNotNone(signup_info.anti_sybil_id) self.assertIsNotNone(signup_info.sealed_signup_data)
def test_create_wait_certificate(self): # Need to create signup information and wait timer first signup_info = \ SignupInfo.create_signup_info( validator_address='1660 Pennsylvania Avenue NW', originator_public_key_hash=self._originator_public_key_hash, most_recent_wait_certificate_id=NULL_BLOCK_IDENTIFIER) wt = \ WaitTimer.create_wait_timer( validator_address='1660 Pennsylvania Avenue NW', certificates=[]) while not wt.has_expired(time.time()): time.sleep(1) # Now we can create a wait certificate and verify that it correlates # to the wait timer we just created wc = \ WaitCertificate.create_wait_certificate( wait_timer=wt, block_hash="Reader's Digest") self.assertIsNotNone(wc) self.assertEqual(wc.previous_certificate_id, wt.previous_certificate_id) self.assertAlmostEqual(wc.local_mean, wt.local_mean) self.assertAlmostEqual(wc.request_time, wt.request_time) self.assertAlmostEqual(wc.duration, wt.duration) self.assertEqual(wc.validator_address, wt.validator_address) self.assertEqual(wc.block_hash, "Reader's Digest") self.assertIsNotNone(wc.signature) self.assertIsNotNone(wc.identifier) # A newly-created wait certificate should be valid wc.check_valid([], signup_info.poet_public_key) # Create another wait certificate and verify it is valid also wt = \ WaitTimer.create_wait_timer( validator_address='1660 Pennsylvania Avenue NW', certificates=[wc]) while not wt.has_expired(time.time()): time.sleep(1) # Now we can create a wait certificate and verify that it correlates # to the wait timer we just created another_wc = \ WaitCertificate.create_wait_certificate( wait_timer=wt, block_hash="Pepto Bismol") another_wc.check_valid([wc], signup_info.poet_public_key)
def test_wait_certificate_serialization(self): # Need to create signup information and wait timer first signup_info = \ SignupInfo.create_signup_info( validator_address='1660 Pennsylvania Avenue NW', originator_public_key_hash=self._originator_public_key_hash, most_recent_wait_certificate_id=NULL_BLOCK_IDENTIFIER) wt = \ WaitTimer.create_wait_timer( validator_address='1660 Pennsylvania Avenue NW', certificates=[]) while not wt.has_expired(time.time()): time.sleep(1) # Now we can create a wait certificate and serialize wc = \ WaitCertificate.create_wait_certificate( wait_timer=wt, block_hash="Reader's Digest") dumped = wc.dump() self.assertIsNotNone(dumped.get('SerializedCertificate')) self.assertIsNotNone(dumped.get('Signature')) # Deserialize and verify that wait certificates are the same # and that deserialized one is valid wc_copy = \ WaitCertificate.wait_certificate_from_serialized( dumped.get('SerializedCertificate'), dumped.get('Signature')) self.assertEqual(wc.previous_certificate_id, wc_copy.previous_certificate_id) self.assertAlmostEqual(wc.local_mean, wc_copy.local_mean) self.assertAlmostEqual(wc.request_time, wc_copy.request_time) self.assertAlmostEqual(wc.duration, wc_copy.duration) self.assertEqual(wc.validator_address, wc_copy.validator_address) self.assertEqual(wc.block_hash, wc_copy.block_hash) self.assertEqual(wc.signature, wc_copy.signature) self.assertEqual(wc.identifier, wc_copy.identifier) # Serialize the copy and verify that its serialization and # signature are the same dumped_copy = wc_copy.dump() self.assertTrue(dumped.get('SerializedCertificate'), dumped_copy.get('SerializedCertificate')) self.assertTrue(dumped.get('Signature'), dumped_copy.get('Signature')) wc_copy.check_valid([], signup_info.poet_public_key)
def test_verify_signup_info(self): signup_info = \ SignupInfo.create_signup_info( validator_address='1660 Pennsylvania Avenue NW', originator_public_key_hash=self._originator_public_key_hash, most_recent_wait_certificate_id=NULL_BLOCK_IDENTIFIER) try: signup_info.check_valid( originator_public_key_hash=self._originator_public_key_hash, most_recent_wait_certificate_id=NULL_BLOCK_IDENTIFIER) except ValueError as e: self.fail('Error with SignupInfo: {}'.format(e))
def test_create_wait_timer_with_invalid_certificate_list(self): # Need to create signup information first SignupInfo.create_signup_info( poet_enclave_module=self.poet_enclave_module, validator_address='1060 W Addison Street', originator_public_key_hash=self._originator_public_key_hash, most_recent_wait_certificate_id=NULL_BLOCK_IDENTIFIER) # Make sure that invalid certificate lists cause error with self.assertRaises(TypeError): wait_timer.WaitTimer.create_wait_timer( poet_enclave_module=self.poet_enclave_module, validator_address='1060 W Addison Street', certificates=None) with self.assertRaises(TypeError): wait_timer.WaitTimer.create_wait_timer( poet_enclave_module=self.poet_enclave_module, validator_address='1060 W Addison Street', certificates=dict()) with self.assertRaises(TypeError): wait_timer.WaitTimer.create_wait_timer( poet_enclave_module=self.poet_enclave_module, validator_address='1060 W Addison Street', certificates=1) with self.assertRaises(TypeError): wait_timer.WaitTimer.create_wait_timer( poet_enclave_module=self.poet_enclave_module, validator_address='1060 W Addison Street', certificates=1.0) with self.assertRaises(TypeError): wait_timer.WaitTimer.create_wait_timer( poet_enclave_module=self.poet_enclave_module, validator_address='1060 W Addison Street', certificates='Not a valid list')
def test_non_matching_most_recent_wait_certificate_id(self): signup_info = \ SignupInfo.create_signup_info( validator_address='1660 Pennsylvania Avenue NW', originator_public_key_hash=self._originator_public_key_hash, most_recent_wait_certificate_id=NULL_BLOCK_IDENTIFIER) # NOTE - this requires that the signup information check for validity # actually make this check. Currently the check is not done. # Once the check is added back, it should raise a # ValueError exception and this test will fail, alerting # you that you need to wrap the call in self.assertRaises # # with self.assertRaises(ValueError): signup_info.check_valid( originator_public_key_hash=self._originator_public_key_hash, most_recent_wait_certificate_id='SomeFunkyCertificateID')
def register_signup_information(self, journal): wait_certificate_id = journal.most_recent_committed_block_id public_key_hash = \ hashlib.sha256( signing.encode_pubkey(journal.local_node.public_key(), 'hex')).hexdigest() signup_info = \ SignupInfo.create_signup_info( validator_address=journal.local_node.signing_address(), originator_public_key_hash=public_key_hash, most_recent_wait_certificate_id=wait_certificate_id) # Save off the sealed signup data and cache the PoET public key journal.local_store.set('sealed_signup_data', signup_info.sealed_signup_data) journal.local_store.sync() self.poet_public_key = signup_info.poet_public_key LOGGER.debug('Register %s (%s)', journal.local_node.Name, journal.local_node.Identifier) # Create a validator register transaction and sign it. Wrap # the transaction in a message. Broadcast it to out. transaction = \ val_reg.ValidatorRegistryTransaction.register_validator( journal.local_node.Name, journal.local_node.Identifier, signup_info) transaction.sign_from_node(journal.local_node) message = \ val_reg.ValidatorRegistryTransactionMessage() message.Transaction = transaction LOGGER.info( 'Advertise PoET 1 validator %s (ID = %s) has PoET public key ' '%s', journal.local_node.Name, journal.local_node.Identifier, signup_info.poet_public_key) journal.gossip.broadcast_message(message)
def _on_journal_initialization_complete(self, journal): """ Callback journal makes after the journal has completed initialization Args: journal (Journal): The journal object that has completed initialization. Returns: True """ # If we have sealed signup data (meaning that we have previously # created signup info), we can request that the enclave unseal it, # in the process restoring the enclave to its previous state. If # we don't have sealed signup data, we need to create and register it. # # Note - this MUST be done AFTER the journal has completed # initialization so that there is at least one peer node to which # we can send the validator registry transaction to. Otherwise, # we will never, ever be able to be added to the validator registry # and, to paraphrase Martha Stewart, that is a bad thing. sealed_signup_data = journal.local_store.get('sealed_signup_data') if sealed_signup_data is not None: self.poet_public_key = \ SignupInfo.unseal_signup_data( validator_address=journal.local_node.signing_address(), sealed_signup_data=sealed_signup_data) LOGGER.info( 'Restore signup info for %s (ID = %s, PoET public key = %s)', journal.local_node.Name, journal.local_node.Identifier, self.poet_public_key) else: self.register_signup_information(journal) return True
def test_create_wait_timer(self): # Need to create signup information first signup_info = \ SignupInfo.create_signup_info( validator_address='1060 W Addison Street', originator_public_key_hash=self._originator_public_key_hash, most_recent_wait_certificate_id=NULL_BLOCK_IDENTIFIER) stake_in_the_sand = time.time() # An empty certificate list should result in a local mean that is # the target wait time wt = wait_timer.WaitTimer.create_wait_timer( validator_address='1060 W Addison Street', certificates=[]) self.assertIsNotNone(wt) self.assertEqual(wt.local_mean, wait_timer.WaitTimer.target_wait_time) self.assertEqual(wt.previous_certificate_id, NULL_BLOCK_IDENTIFIER) self.assertGreaterEqual(wt.request_time, stake_in_the_sand) self.assertLessEqual(wt.request_time, time.time()) self.assertGreaterEqual(wt.duration, wait_timer.WaitTimer.minimum_wait_time) self.assertEqual(wt.validator_address, '1060 W Addison Street') wt = wait_timer.WaitTimer.create_wait_timer( validator_address='1060 W Addison Street', certificates=tuple()) self.assertIsNotNone(wt) self.assertEqual(wt.local_mean, wait_timer.WaitTimer.target_wait_time) self.assertEqual(wt.previous_certificate_id, NULL_BLOCK_IDENTIFIER) self.assertGreaterEqual(wt.request_time, stake_in_the_sand) self.assertLessEqual(wt.request_time, time.time()) self.assertGreaterEqual(wt.duration, wait_timer.WaitTimer.minimum_wait_time) self.assertEqual(wt.validator_address, '1060 W Addison Street') # Ensure that the enclave is set back to initial state SignupInfo.poet_enclave = reload(poet_enclave) wait_timer.WaitTimer.poet_enclave = SignupInfo.poet_enclave # Make sure that trying to create a wait timer before signup # information is provided causes an error with self.assertRaises(ValueError): wait_timer.WaitTimer.create_wait_timer( validator_address='1060 W Addison Street', certificates=[]) with self.assertRaises(ValueError): wait_timer.WaitTimer.create_wait_timer( validator_address='1060 W Addison Street', certificates=tuple()) # Initialize the enclave with sealed signup data SignupInfo.unseal_signup_data( validator_address='1660 Pennsylvania Avenue NW', sealed_signup_data=signup_info.sealed_signup_data) stake_in_the_sand = time.time() # An empty certificate list should result in a local mean that is # the target wait time wt = wait_timer.WaitTimer.create_wait_timer( validator_address='1060 W Addison Street', certificates=[]) self.assertIsNotNone(wt) self.assertEqual(wt.local_mean, wait_timer.WaitTimer.target_wait_time) self.assertEqual(wt.previous_certificate_id, NULL_BLOCK_IDENTIFIER) self.assertGreaterEqual(wt.request_time, stake_in_the_sand) self.assertLessEqual(wt.request_time, time.time()) self.assertGreaterEqual(wt.duration, wait_timer.WaitTimer.minimum_wait_time) self.assertEqual(wt.validator_address, '1060 W Addison Street') wt = wait_timer.WaitTimer.create_wait_timer( validator_address='1600 Pennsylvania Avenue NW', certificates=tuple()) self.assertIsNotNone(wt) self.assertEqual(wt.local_mean, wait_timer.WaitTimer.target_wait_time) self.assertEqual(wt.previous_certificate_id, NULL_BLOCK_IDENTIFIER) self.assertGreaterEqual(wt.request_time, stake_in_the_sand) self.assertLessEqual(wt.request_time, time.time()) self.assertGreaterEqual(wt.duration, wait_timer.WaitTimer.minimum_wait_time) self.assertEqual(wt.validator_address, '1600 Pennsylvania Avenue NW')
def _register_signup_information(self, block_header): # Find the most-recent block in the block cache, if such a block # exists, and get its wait certificate ID wait_certificate_id = NULL_BLOCK_IDENTIFIER most_recent_block = self._block_cache.block_store.chain_head if most_recent_block is not None: wait_certificate_id = \ utils.deserialize_wait_certificate( block=most_recent_block, poet_enclave_module=self._poet_enclave_module).identifier # Create signup information for this validator public_key_hash = \ hashlib.sha256( block_header.signer_pubkey.encode()).hexdigest() signup_info = \ SignupInfo.create_signup_info( poet_enclave_module=self._poet_enclave_module, validator_address=block_header.signer_pubkey, originator_public_key_hash=public_key_hash, most_recent_wait_certificate_id=wait_certificate_id) # Create the validator registry payload payload = \ vr_pb.ValidatorRegistryPayload( verb='register', name='validator-{}'.format(block_header.signer_pubkey[-8:]), id=block_header.signer_pubkey, signup_info=vr_pb.SignUpInfo( poet_public_key=signup_info.poet_public_key, proof_data=signup_info.proof_data, anti_sybil_id=signup_info.anti_sybil_id), block_num=block_header.block_num) serialized = payload.SerializeToString() # Create the address that will be used to look up this validator # registry transaction. Seems like a potential for refactoring.. validator_entry_address = \ PoetBlockPublisher._validator_registry_namespace + \ hashlib.sha256(block_header.signer_pubkey.encode()).hexdigest() # Create a transaction header and transaction for the validator # registry update amd then hand it off to the batch publisher to # send out. addresses = \ [validator_entry_address, PoetBlockPublisher._validator_map_address] header = \ txn_pb.TransactionHeader( signer_pubkey=block_header.signer_pubkey, family_name='sawtooth_validator_registry', family_version='1.0', inputs=addresses, outputs=addresses, dependencies=[], payload_encoding="application/protobuf", payload_sha512=hashlib.sha512(serialized).hexdigest(), batcher_pubkey=block_header.signer_pubkey, nonce=time.time().hex().encode()).SerializeToString() signature = \ signing.sign(header, self._batch_publisher.identity_signing_key) transaction = \ txn_pb.Transaction( header=header, payload=serialized, header_signature=signature) self._batch_publisher.send([transaction]) LOGGER.info( 'Register Validator Name=%s, ID=%s...%s, PoET public key=%s...%s', payload.name, payload.id[:8], payload.id[-8:], payload.signup_info.poet_public_key[:8], payload.signup_info.poet_public_key[-8:]) # HACER: Once we have the consensus state implemented, we can # store this information in there. For now, we will store in the # class so it persists for the lifetime of the validator. PoetBlockPublisher._sealed_signup_data = \ signup_info.sealed_signup_data PoetBlockPublisher._poet_public_key = signup_info.poet_public_key