adminserver.go 8.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271
  1. package guardiand
  2. import (
  3. "context"
  4. "encoding/hex"
  5. "errors"
  6. "fmt"
  7. "github.com/certusone/wormhole/node/pkg/db"
  8. publicrpcv1 "github.com/certusone/wormhole/node/pkg/proto/publicrpc/v1"
  9. "github.com/certusone/wormhole/node/pkg/publicrpc"
  10. ethcommon "github.com/ethereum/go-ethereum/common"
  11. "go.uber.org/zap"
  12. "google.golang.org/grpc/codes"
  13. "google.golang.org/grpc/status"
  14. "math"
  15. "net"
  16. "os"
  17. "github.com/certusone/wormhole/node/pkg/common"
  18. nodev1 "github.com/certusone/wormhole/node/pkg/proto/node/v1"
  19. "github.com/certusone/wormhole/node/pkg/supervisor"
  20. "github.com/certusone/wormhole/node/pkg/vaa"
  21. )
  22. type nodePrivilegedService struct {
  23. nodev1.UnimplementedNodePrivilegedServiceServer
  24. db *db.Database
  25. injectC chan<- *vaa.VAA
  26. logger *zap.Logger
  27. }
  28. // adminGuardianSetUpdateToVAA converts a nodev1.GuardianSetUpdate message to its canonical VAA representation.
  29. // Returns an error if the data is invalid.
  30. func adminGuardianSetUpdateToVAA(req *nodev1.GuardianSetUpdate, guardianSetIndex uint32, nonce uint32, sequence uint64) (*vaa.VAA, error) {
  31. if len(req.Guardians) == 0 {
  32. return nil, errors.New("empty guardian set specified")
  33. }
  34. if len(req.Guardians) > common.MaxGuardianCount {
  35. return nil, fmt.Errorf("too many guardians - %d, maximum is %d", len(req.Guardians), common.MaxGuardianCount)
  36. }
  37. addrs := make([]ethcommon.Address, len(req.Guardians))
  38. for i, g := range req.Guardians {
  39. if !ethcommon.IsHexAddress(g.Pubkey) {
  40. return nil, fmt.Errorf("invalid pubkey format at index %d (%s)", i, g.Name)
  41. }
  42. ethAddr := ethcommon.HexToAddress(g.Pubkey)
  43. for j, pk := range addrs {
  44. if pk == ethAddr {
  45. return nil, fmt.Errorf("duplicate pubkey at index %d (duplicate of %d): %s", i, j, g.Name)
  46. }
  47. }
  48. addrs[i] = ethAddr
  49. }
  50. v := vaa.CreateGovernanceVAA(nonce, sequence, guardianSetIndex,
  51. vaa.BodyGuardianSetUpdate{
  52. Keys: addrs,
  53. NewIndex: guardianSetIndex + 1,
  54. }.Serialize())
  55. return v, nil
  56. }
  57. // adminContractUpgradeToVAA converts a nodev1.ContractUpgrade message to its canonical VAA representation.
  58. // Returns an error if the data is invalid.
  59. func adminContractUpgradeToVAA(req *nodev1.ContractUpgrade, guardianSetIndex uint32, nonce uint32, sequence uint64) (*vaa.VAA, error) {
  60. b, err := hex.DecodeString(req.NewContract)
  61. if err != nil {
  62. return nil, errors.New("invalid new contract address encoding (expected hex)")
  63. }
  64. if len(b) != 32 {
  65. return nil, errors.New("invalid new_contract address")
  66. }
  67. if req.ChainId > math.MaxUint16 {
  68. return nil, errors.New("invalid chain_id")
  69. }
  70. newContractAddress := vaa.Address{}
  71. copy(newContractAddress[:], req.NewContract)
  72. v := vaa.CreateGovernanceVAA(nonce, sequence, guardianSetIndex,
  73. vaa.BodyContractUpgrade{
  74. ChainID: vaa.ChainID(req.ChainId),
  75. NewContract: newContractAddress,
  76. }.Serialize())
  77. return v, nil
  78. }
  79. // tokenBridgeRegisterChain converts a nodev1.TokenBridgeRegisterChain message to its canonical VAA representation.
  80. // Returns an error if the data is invalid.
  81. func tokenBridgeRegisterChain(req *nodev1.BridgeRegisterChain, guardianSetIndex uint32, nonce uint32, sequence uint64) (*vaa.VAA, error) {
  82. if req.ChainId > math.MaxUint16 {
  83. return nil, errors.New("invalid chain_id")
  84. }
  85. b, err := hex.DecodeString(req.EmitterAddress)
  86. if err != nil {
  87. return nil, errors.New("invalid emitter address encoding (expected hex)")
  88. }
  89. if len(b) != 32 {
  90. return nil, errors.New("invalid emitter address (expected 32 bytes)")
  91. }
  92. emitterAddress := vaa.Address{}
  93. copy(emitterAddress[:], b)
  94. v := vaa.CreateGovernanceVAA(nonce, sequence, guardianSetIndex,
  95. vaa.BodyTokenBridgeRegisterChain{
  96. Module: req.Module,
  97. ChainID: vaa.ChainID(req.ChainId),
  98. EmitterAddress: emitterAddress,
  99. }.Serialize())
  100. return v, nil
  101. }
  102. // tokenBridgeUpgradeContract converts a nodev1.TokenBridgeRegisterChain message to its canonical VAA representation.
  103. // Returns an error if the data is invalid.
  104. func tokenBridgeUpgradeContract(req *nodev1.BridgeUpgradeContract, guardianSetIndex uint32, nonce uint32, sequence uint64) (*vaa.VAA, error) {
  105. if req.TargetChainId > math.MaxUint16 {
  106. return nil, errors.New("invalid target_chain_id")
  107. }
  108. b, err := hex.DecodeString(req.NewContract)
  109. if err != nil {
  110. return nil, errors.New("invalid new contract address (expected hex)")
  111. }
  112. if len(b) != 32 {
  113. return nil, errors.New("invalid new contract address (expected 32 bytes)")
  114. }
  115. newContract := vaa.Address{}
  116. copy(newContract[:], b)
  117. v := vaa.CreateGovernanceVAA(nonce, sequence, guardianSetIndex,
  118. vaa.BodyTokenBridgeUpgradeContract{
  119. Module: req.Module,
  120. TargetChainID: vaa.ChainID(req.TargetChainId),
  121. NewContract: newContract,
  122. }.Serialize())
  123. return v, nil
  124. }
  125. func (s *nodePrivilegedService) InjectGovernanceVAA(ctx context.Context, req *nodev1.InjectGovernanceVAARequest) (*nodev1.InjectGovernanceVAAResponse, error) {
  126. s.logger.Info("governance VAA injected via admin socket", zap.String("request", req.String()))
  127. var (
  128. v *vaa.VAA
  129. err error
  130. )
  131. digests := make([][]byte, len(req.Messages))
  132. for i, message := range req.Messages {
  133. switch payload := message.Payload.(type) {
  134. case *nodev1.GovernanceMessage_GuardianSet:
  135. v, err = adminGuardianSetUpdateToVAA(payload.GuardianSet, req.CurrentSetIndex, message.Nonce, message.Sequence)
  136. case *nodev1.GovernanceMessage_ContractUpgrade:
  137. v, err = adminContractUpgradeToVAA(payload.ContractUpgrade, req.CurrentSetIndex, message.Nonce, message.Sequence)
  138. case *nodev1.GovernanceMessage_BridgeRegisterChain:
  139. v, err = tokenBridgeRegisterChain(payload.BridgeRegisterChain, req.CurrentSetIndex, message.Nonce, message.Sequence)
  140. case *nodev1.GovernanceMessage_BridgeContractUpgrade:
  141. v, err = tokenBridgeUpgradeContract(payload.BridgeContractUpgrade, req.CurrentSetIndex, message.Nonce, message.Sequence)
  142. default:
  143. panic(fmt.Sprintf("unsupported VAA type: %T", payload))
  144. }
  145. if err != nil {
  146. return nil, status.Error(codes.InvalidArgument, err.Error())
  147. }
  148. // Generate digest of the unsigned VAA.
  149. digest := v.SigningMsg()
  150. if err != nil {
  151. panic(err)
  152. }
  153. s.logger.Info("governance VAA constructed",
  154. zap.Any("vaa", v),
  155. zap.String("digest", digest.String()),
  156. )
  157. s.injectC <- v
  158. digests[i] = digest.Bytes()
  159. }
  160. return &nodev1.InjectGovernanceVAAResponse{Digests: digests}, nil
  161. }
  162. func (s *nodePrivilegedService) FindMissingMessages(ctx context.Context, req *nodev1.FindMissingMessagesRequest) (*nodev1.FindMissingMessagesResponse, error) {
  163. b, err := hex.DecodeString(req.EmitterAddress)
  164. if err != nil {
  165. return nil, status.Errorf(codes.InvalidArgument, "invalid emitter address encoding: %v", err)
  166. }
  167. emitterAddress := vaa.Address{}
  168. copy(emitterAddress[:], b)
  169. ids, first, last, err := s.db.FindEmitterSequenceGap(db.VAAID{
  170. EmitterChain: vaa.ChainID(req.EmitterChain),
  171. EmitterAddress: emitterAddress,
  172. })
  173. if err != nil {
  174. return nil, status.Errorf(codes.Internal, "database operation failed: %v", err)
  175. }
  176. resp := make([]string, len(ids))
  177. for i, v := range ids {
  178. resp[i] = fmt.Sprintf("%d/%s/%d", req.EmitterChain, emitterAddress, v)
  179. }
  180. return &nodev1.FindMissingMessagesResponse{
  181. MissingMessages: resp,
  182. FirstSequence: first,
  183. LastSequence: last,
  184. }, nil
  185. }
  186. func adminServiceRunnable(logger *zap.Logger, socketPath string, injectC chan<- *vaa.VAA, db *db.Database, gst *common.GuardianSetState) (supervisor.Runnable, error) {
  187. // Delete existing UNIX socket, if present.
  188. fi, err := os.Stat(socketPath)
  189. if err == nil {
  190. fmode := fi.Mode()
  191. if fmode&os.ModeType == os.ModeSocket {
  192. err = os.Remove(socketPath)
  193. if err != nil {
  194. return nil, fmt.Errorf("failed to remove existing socket at %s: %w", socketPath, err)
  195. }
  196. } else {
  197. return nil, fmt.Errorf("%s is not a UNIX socket", socketPath)
  198. }
  199. }
  200. // Create a new UNIX socket and listen to it.
  201. // The socket is created with the default umask. We set a restrictive umask in setRestrictiveUmask
  202. // to ensure that any files we create are only readable by the user - this is much harder to mess up.
  203. // The umask avoids a race condition between file creation and chmod.
  204. laddr, err := net.ResolveUnixAddr("unix", socketPath)
  205. if err != nil {
  206. return nil, fmt.Errorf("invalid listen address: %v", err)
  207. }
  208. l, err := net.ListenUnix("unix", laddr)
  209. if err != nil {
  210. return nil, fmt.Errorf("failed to listen on %s: %w", socketPath, err)
  211. }
  212. logger.Info("admin server listening on", zap.String("path", socketPath))
  213. nodeService := &nodePrivilegedService{
  214. injectC: injectC,
  215. db: db,
  216. logger: logger.Named("adminservice"),
  217. }
  218. publicrpcService := publicrpc.NewPublicrpcServer(logger, db, gst)
  219. grpcServer := common.NewInstrumentedGRPCServer(logger)
  220. nodev1.RegisterNodePrivilegedServiceServer(grpcServer, nodeService)
  221. publicrpcv1.RegisterPublicRPCServiceServer(grpcServer, publicrpcService)
  222. return supervisor.GRPCServer(grpcServer, l, false), nil
  223. }