|
3 | 3 | #[cfg(any(test, feature = "dev"))] |
4 | 4 | pub use dev::{ |
5 | 5 | addresses, albert_address, albert_keypair, bertha_address, bertha_keypair, |
6 | | - christel_address, christel_keypair, daewon_address, daewon_keypair, keys, |
7 | | - validator_address, validator_keypair, validator_keys, |
| 6 | + christel_address, christel_keypair, daewon_address, daewon_keypair, |
| 7 | + ester_address, ester_keypair, keys, validator_address, validator_keypair, |
| 8 | + validator_keys, |
8 | 9 | }; |
9 | 10 | use namada::ledger::wallet::alias::Alias; |
10 | 11 | use namada::ledger::{eth_bridge, governance, pos}; |
@@ -107,6 +108,7 @@ mod dev { |
107 | 108 | ("bertha".into(), bertha_keypair()), |
108 | 109 | ("christel".into(), christel_keypair()), |
109 | 110 | ("daewon".into(), daewon_keypair()), |
| 111 | + ("ester".into(), ester_keypair()), |
110 | 112 | ("validator".into(), validator_keypair()), |
111 | 113 | ] |
112 | 114 | } |
@@ -137,6 +139,7 @@ mod dev { |
137 | 139 | ("bertha".into(), bertha_address()), |
138 | 140 | ("christel".into(), christel_address()), |
139 | 141 | ("daewon".into(), daewon_address()), |
| 142 | + ("ester".into(), ester_address()), |
140 | 143 | ]; |
141 | 144 | let token_addresses = tokens() |
142 | 145 | .into_iter() |
@@ -166,6 +169,11 @@ mod dev { |
166 | 169 | (&daewon_keypair().ref_to()).into() |
167 | 170 | } |
168 | 171 |
|
| 172 | + /// An implicit user address for testing & development |
| 173 | + pub fn ester_address() -> Address { |
| 174 | + (&ester_keypair().ref_to()).into() |
| 175 | + } |
| 176 | + |
169 | 177 | /// An established validator address for testing & development |
170 | 178 | pub fn validator_address() -> Address { |
171 | 179 | Address::decode("atest1v4ehgw36ggcnsdee8qerswph8y6ry3p5xgunvve3xaqngd3kxc6nqwz9gseyydzzg5unys3ht2n48q").expect("The token address decoding shouldn't fail") |
@@ -219,6 +227,18 @@ mod dev { |
219 | 227 | ed_sk.try_to_sk().unwrap() |
220 | 228 | } |
221 | 229 |
|
| 230 | + pub fn ester_keypair() -> common::SecretKey { |
| 231 | + // generated from |
| 232 | + // [`namada::types::key::secp256k1::gen_keypair`] |
| 233 | + let bytes = [ |
| 234 | + 54, 144, 147, 226, 3, 93, 132, 247, 42, 126, 90, 23, 200, 155, 122, |
| 235 | + 147, 139, 93, 8, 204, 135, 178, 40, 152, 5, 227, 175, 204, 102, |
| 236 | + 239, 154, 66, |
| 237 | + ]; |
| 238 | + let sk = secp256k1::SecretKey::try_from_slice(&bytes).unwrap(); |
| 239 | + sk.try_to_sk().unwrap() |
| 240 | + } |
| 241 | + |
222 | 242 | pub fn validator_keypair() -> common::SecretKey { |
223 | 243 | // generated from |
224 | 244 | // [`namada::types::key::ed25519::gen_keypair`] |
|
0 commit comments