adminserver.go 3.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123
  1. package guardiand
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "net"
  7. "os"
  8. "time"
  9. ethcommon "github.com/ethereum/go-ethereum/common"
  10. "go.uber.org/zap"
  11. "google.golang.org/grpc"
  12. "google.golang.org/grpc/codes"
  13. "google.golang.org/grpc/status"
  14. "github.com/certusone/wormhole/bridge/pkg/common"
  15. nodev1 "github.com/certusone/wormhole/bridge/pkg/proto/node/v1"
  16. "github.com/certusone/wormhole/bridge/pkg/supervisor"
  17. "github.com/certusone/wormhole/bridge/pkg/vaa"
  18. )
  19. type nodePrivilegedService struct {
  20. nodev1.UnimplementedNodePrivilegedServer
  21. injectC chan<- *vaa.VAA
  22. logger *zap.Logger
  23. }
  24. // adminGuardianSetUpdateToVAA converts a nodev1.GuardianSetUpdate message to its canonical VAA representation.
  25. // Returns an error if the data is invalid.
  26. func adminGuardianSetUpdateToVAA(req *nodev1.GuardianSetUpdate) (*vaa.VAA, error) {
  27. if len(req.Guardians) == 0 {
  28. return nil, errors.New("empty guardian set specified")
  29. }
  30. if len(req.Guardians) > common.MaxGuardianCount {
  31. return nil, fmt.Errorf("too many guardians - %d, maximum is %d", len(req.Guardians), common.MaxGuardianCount)
  32. }
  33. addrs := make([]ethcommon.Address, len(req.Guardians))
  34. for i, g := range req.Guardians {
  35. if !ethcommon.IsHexAddress(g.Pubkey) {
  36. return nil, fmt.Errorf("invalid pubkey format at index %d (%s)", i, g.Name)
  37. }
  38. addrs[i] = ethcommon.HexToAddress(g.Pubkey)
  39. }
  40. v := &vaa.VAA{
  41. Version: vaa.SupportedVAAVersion,
  42. GuardianSetIndex: req.CurrentSetIndex,
  43. Timestamp: time.Unix(int64(req.Timestamp), 0),
  44. Payload: &vaa.BodyGuardianSetUpdate{
  45. Keys: addrs,
  46. NewIndex: req.CurrentSetIndex + 1,
  47. },
  48. }
  49. return v, nil
  50. }
  51. func (s *nodePrivilegedService) SubmitGuardianSetVAA(ctx context.Context, req *nodev1.SubmitGuardianSetVAARequest) (*nodev1.SubmitGuardianSetVAAResponse, error) {
  52. s.logger.Info("guardian set injected via admin socket", zap.String("request", req.String()))
  53. v, err := adminGuardianSetUpdateToVAA(req.GuardianSet)
  54. if err != nil {
  55. return nil, status.Error(codes.InvalidArgument, err.Error())
  56. }
  57. // Generate digest of the unsigned VAA.
  58. digest, err := v.SigningMsg()
  59. if err != nil {
  60. panic(err)
  61. }
  62. s.logger.Info("guardian set VAA constructed",
  63. zap.Any("vaa", v),
  64. zap.String("digest", digest.String()),
  65. )
  66. s.injectC <- v
  67. return &nodev1.SubmitGuardianSetVAAResponse{Digest: digest.Bytes()}, nil
  68. }
  69. func adminServiceRunnable(logger *zap.Logger, socketPath string, injectC chan<- *vaa.VAA) (supervisor.Runnable, error) {
  70. // Delete existing UNIX socket, if present.
  71. fi, err := os.Stat(socketPath)
  72. if err == nil {
  73. fmode := fi.Mode()
  74. if fmode&os.ModeType == os.ModeSocket {
  75. err = os.Remove(socketPath)
  76. if err != nil {
  77. return nil, fmt.Errorf("failed to remove existing socket at %s: %w", socketPath, err)
  78. }
  79. } else {
  80. return nil, fmt.Errorf("%s is not a UNIX socket", socketPath)
  81. }
  82. }
  83. // Create a new UNIX socket and listen to it.
  84. // The socket is created with the default umask. We set a restrictive umask in setRestrictiveUmask
  85. // to ensure that any files we create are only readable by the user - this is much harder to mess up.
  86. // The umask avoids a race condition between file creation and chmod.
  87. laddr, err := net.ResolveUnixAddr("unix", socketPath)
  88. l, err := net.ListenUnix("unix", laddr)
  89. if err != nil {
  90. return nil, fmt.Errorf("failed to listen on %s: %w", socketPath, err)
  91. }
  92. logger.Info("listening on", zap.String("path", socketPath))
  93. nodeService := &nodePrivilegedService{
  94. injectC: injectC,
  95. logger: logger.Named("adminservice"),
  96. }
  97. grpcServer := grpc.NewServer()
  98. nodev1.RegisterNodePrivilegedServer(grpcServer, nodeService)
  99. return supervisor.GRPCServer(grpcServer, l, false), nil
  100. }