adminverify.go 1007 B

12345678910111213141516171819202122232425262728293031323334353637383940414243444546
  1. package guardiand
  2. import (
  3. "io/ioutil"
  4. "log"
  5. "github.com/davecgh/go-spew/spew"
  6. "github.com/spf13/cobra"
  7. "google.golang.org/protobuf/encoding/prototext"
  8. nodev1 "github.com/certusone/wormhole/bridge/pkg/proto/node/v1"
  9. )
  10. var AdminClientGuardianSetVerifyCmd = &cobra.Command{
  11. Use: "guardian-set-update-verify",
  12. Short: "Verify guardian set update in prototxt format (offline)",
  13. Run: runGuardianSetVerify,
  14. Args: cobra.ExactArgs(1),
  15. }
  16. func runGuardianSetVerify(cmd *cobra.Command, args []string) {
  17. path := args[0]
  18. b, err := ioutil.ReadFile(path)
  19. if err != nil {
  20. log.Fatalf("failed to read file: %v", err)
  21. }
  22. var msg nodev1.GuardianSetUpdate
  23. err = prototext.Unmarshal(b, &msg)
  24. if err != nil {
  25. log.Fatalf("failed to deserialize: %v", err)
  26. }
  27. v, err := adminGuardianSetUpdateToVAA(&msg)
  28. if err != nil {
  29. log.Fatalf("invalid update: %v", err)
  30. }
  31. digest, err := v.SigningMsg()
  32. if err != nil {
  33. panic(err)
  34. }
  35. log.Printf("VAA with digest %s: %+v", digest.Hex(), spew.Sdump(v))
  36. }