bridge.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553
  1. package guardiand
  2. import (
  3. "context"
  4. "fmt"
  5. "log"
  6. "net/http"
  7. _ "net/http/pprof"
  8. "os"
  9. "path"
  10. "syscall"
  11. "github.com/certusone/wormhole/node/pkg/db"
  12. "github.com/gagliardetto/solana-go/rpc"
  13. solana_types "github.com/gagliardetto/solana-go"
  14. "github.com/gorilla/mux"
  15. "github.com/prometheus/client_golang/prometheus/promhttp"
  16. eth_common "github.com/ethereum/go-ethereum/common"
  17. ethcrypto "github.com/ethereum/go-ethereum/crypto"
  18. "github.com/libp2p/go-libp2p-core/crypto"
  19. "github.com/libp2p/go-libp2p-core/peer"
  20. "github.com/spf13/cobra"
  21. "go.uber.org/zap"
  22. "golang.org/x/sys/unix"
  23. "github.com/certusone/wormhole/node/pkg/common"
  24. "github.com/certusone/wormhole/node/pkg/devnet"
  25. "github.com/certusone/wormhole/node/pkg/ethereum"
  26. "github.com/certusone/wormhole/node/pkg/p2p"
  27. "github.com/certusone/wormhole/node/pkg/processor"
  28. gossipv1 "github.com/certusone/wormhole/node/pkg/proto/gossip/v1"
  29. "github.com/certusone/wormhole/node/pkg/readiness"
  30. "github.com/certusone/wormhole/node/pkg/reporter"
  31. solana "github.com/certusone/wormhole/node/pkg/solana"
  32. "github.com/certusone/wormhole/node/pkg/supervisor"
  33. "github.com/certusone/wormhole/node/pkg/vaa"
  34. "github.com/certusone/wormhole/node/pkg/terra"
  35. ipfslog "github.com/ipfs/go-log/v2"
  36. )
  37. var (
  38. p2pNetworkID *string
  39. p2pPort *uint
  40. p2pBootstrap *string
  41. nodeKeyPath *string
  42. adminSocketPath *string
  43. dataDir *string
  44. statusAddr *string
  45. bridgeKeyPath *string
  46. solanaBridgeAddress *string
  47. ethRPC *string
  48. ethContract *string
  49. bscRPC *string
  50. bscContract *string
  51. terraWS *string
  52. terraLCD *string
  53. terraChainID *string
  54. terraContract *string
  55. solanaWsRPC *string
  56. solanaRPC *string
  57. logLevel *string
  58. unsafeDevMode *bool
  59. devNumGuardians *uint
  60. nodeName *string
  61. publicRPC *string
  62. publicWeb *string
  63. tlsHostname *string
  64. tlsProdEnv *bool
  65. disableHeartbeatVerify *bool
  66. bigTablePersistenceEnabled *bool
  67. bigTableGCPProject *string
  68. bigTableInstanceName *string
  69. bigTableTableName *string
  70. bigTableKeyPath *string
  71. )
  72. func init() {
  73. p2pNetworkID = BridgeCmd.Flags().String("network", "/wormhole/dev", "P2P network identifier")
  74. p2pPort = BridgeCmd.Flags().Uint("port", 8999, "P2P UDP listener port")
  75. p2pBootstrap = BridgeCmd.Flags().String("bootstrap", "", "P2P bootstrap peers (comma-separated)")
  76. statusAddr = BridgeCmd.Flags().String("statusAddr", "[::]:6060", "Listen address for status server (disabled if blank)")
  77. nodeKeyPath = BridgeCmd.Flags().String("nodeKey", "", "Path to node key (will be generated if it doesn't exist)")
  78. adminSocketPath = BridgeCmd.Flags().String("adminSocket", "", "Admin gRPC service UNIX domain socket path")
  79. dataDir = BridgeCmd.Flags().String("dataDir", "", "Data directory")
  80. bridgeKeyPath = BridgeCmd.Flags().String("bridgeKey", "", "Path to guardian key (required)")
  81. solanaBridgeAddress = BridgeCmd.Flags().String("solanaBridgeAddress", "", "Address of the Solana Bridge Program (required)")
  82. ethRPC = BridgeCmd.Flags().String("ethRPC", "", "Ethereum RPC URL")
  83. ethContract = BridgeCmd.Flags().String("ethContract", "", "Ethereum bridge contract address")
  84. bscRPC = BridgeCmd.Flags().String("bscRPC", "", "Binance Smart Chain RPC URL")
  85. bscContract = BridgeCmd.Flags().String("bscContract", "", "Binance Smart Chain bridge contract address")
  86. terraWS = BridgeCmd.Flags().String("terraWS", "", "Path to terrad root for websocket connection")
  87. terraLCD = BridgeCmd.Flags().String("terraLCD", "", "Path to LCD service root for http calls")
  88. terraChainID = BridgeCmd.Flags().String("terraChainID", "", "Terra chain ID, used in LCD client initialization")
  89. terraContract = BridgeCmd.Flags().String("terraContract", "", "Wormhole contract address on Terra blockchain")
  90. solanaWsRPC = BridgeCmd.Flags().String("solanaWS", "", "Solana Websocket URL (required")
  91. solanaRPC = BridgeCmd.Flags().String("solanaRPC", "", "Solana RPC URL (required")
  92. logLevel = BridgeCmd.Flags().String("logLevel", "info", "Logging level (debug, info, warn, error, dpanic, panic, fatal)")
  93. unsafeDevMode = BridgeCmd.Flags().Bool("unsafeDevMode", false, "Launch node in unsafe, deterministic devnet mode")
  94. devNumGuardians = BridgeCmd.Flags().Uint("devNumGuardians", 5, "Number of devnet guardians to include in guardian set")
  95. nodeName = BridgeCmd.Flags().String("nodeName", "", "Node name to announce in gossip heartbeats")
  96. publicRPC = BridgeCmd.Flags().String("publicRPC", "", "Listen address for public gRPC interface")
  97. publicWeb = BridgeCmd.Flags().String("publicWeb", "", "Listen address for public REST and gRPC Web interface")
  98. tlsHostname = BridgeCmd.Flags().String("tlsHostname", "", "If set, serve publicWeb as TLS with this hostname using Let's Encrypt")
  99. tlsProdEnv = BridgeCmd.Flags().Bool("tlsProdEnv", false,
  100. "Use the production Let's Encrypt environment instead of staging")
  101. disableHeartbeatVerify = BridgeCmd.Flags().Bool("disableHeartbeatVerify", false,
  102. "Disable heartbeat signature verification (useful during network startup)")
  103. bigTablePersistenceEnabled = BridgeCmd.Flags().Bool("bigTablePersistenceEnabled", false, "Turn on forwarding events to BigTable")
  104. bigTableGCPProject = BridgeCmd.Flags().String("bigTableGCPProject", "", "Google Cloud project ID for storing events")
  105. bigTableInstanceName = BridgeCmd.Flags().String("bigTableInstanceName", "", "BigTable instance name for storing events")
  106. bigTableTableName = BridgeCmd.Flags().String("bigTableTableName", "", "BigTable table name to store events in")
  107. bigTableKeyPath = BridgeCmd.Flags().String("bigTableKeyPath", "", "Path to json Service Account key")
  108. }
  109. var (
  110. rootCtx context.Context
  111. rootCtxCancel context.CancelFunc
  112. )
  113. // "Why would anyone do this?" are famous last words.
  114. //
  115. // We already forcibly override RPC URLs and keys in dev mode to prevent security
  116. // risks from operator error, but an extra warning won't hurt.
  117. const devwarning = `
  118. +++++++++++++++++++++++++++++++++++++++++++++++++++
  119. | NODE IS RUNNING IN INSECURE DEVELOPMENT MODE |
  120. | |
  121. | Do not use -unsafeDevMode in prod. |
  122. +++++++++++++++++++++++++++++++++++++++++++++++++++
  123. `
  124. func rootLoggerName() string {
  125. if *unsafeDevMode {
  126. // FIXME: add hostname to root logger for cleaner console output in multi-node development.
  127. // The proper way is to change the output format to include the hostname.
  128. hostname, err := os.Hostname()
  129. if err != nil {
  130. panic(err)
  131. }
  132. return fmt.Sprintf("%s-%s", "wormhole", hostname)
  133. } else {
  134. return "wormhole"
  135. }
  136. }
  137. // lockMemory locks current and future pages in memory to protect secret keys from being swapped out to disk.
  138. // It's possible (and strongly recommended) to deploy Wormhole such that keys are only ever
  139. // stored in memory and never touch the disk. This is a privileged operation and requires CAP_IPC_LOCK.
  140. func lockMemory() {
  141. err := unix.Mlockall(syscall.MCL_CURRENT | syscall.MCL_FUTURE)
  142. if err != nil {
  143. fmt.Printf("Failed to lock memory: %v (CAP_IPC_LOCK missing?)\n", err)
  144. os.Exit(1)
  145. }
  146. }
  147. // setRestrictiveUmask masks the group and world bits. This ensures that key material
  148. // and sockets we create aren't accidentally group- or world-readable.
  149. func setRestrictiveUmask() {
  150. syscall.Umask(0077) // cannot fail
  151. }
  152. // BridgeCmd represents the bridge command
  153. var BridgeCmd = &cobra.Command{
  154. Use: "bridge",
  155. Short: "Run the bridge server",
  156. Run: runBridge,
  157. }
  158. func runBridge(cmd *cobra.Command, args []string) {
  159. if *unsafeDevMode {
  160. fmt.Print(devwarning)
  161. }
  162. lockMemory()
  163. setRestrictiveUmask()
  164. // Refuse to run as root in production mode.
  165. if !*unsafeDevMode && os.Geteuid() == 0 {
  166. fmt.Println("can't run as uid 0")
  167. os.Exit(1)
  168. }
  169. // Set up logging. The go-log zap wrapper that libp2p uses is compatible with our
  170. // usage of zap in supervisor, which is nice.
  171. lvl, err := ipfslog.LevelFromString(*logLevel)
  172. if err != nil {
  173. fmt.Println("Invalid log level")
  174. os.Exit(1)
  175. }
  176. // Our root logger. Convert directly to a regular Zap logger.
  177. logger := ipfslog.Logger(rootLoggerName()).Desugar()
  178. // Override the default go-log config, which uses a magic environment variable.
  179. ipfslog.SetAllLoggers(lvl)
  180. // Register components for readiness checks.
  181. readiness.RegisterComponent(common.ReadinessEthSyncing)
  182. readiness.RegisterComponent(common.ReadinessSolanaSyncing)
  183. readiness.RegisterComponent(common.ReadinessTerraSyncing)
  184. if *statusAddr != "" {
  185. // Use a custom routing instead of using http.DefaultServeMux directly to avoid accidentally exposing packages
  186. // that register themselves with it by default (like pprof).
  187. router := mux.NewRouter()
  188. // pprof server. NOT necessarily safe to expose publicly - only enable it in dev mode to avoid exposing it by
  189. // accident. There's benefit to having pprof enabled on production nodes, but we would likely want to expose it
  190. // via a dedicated port listening on localhost, or via the admin UNIX socket.
  191. if *unsafeDevMode {
  192. // Pass requests to http.DefaultServeMux, which pprof automatically registers with as an import side-effect.
  193. router.PathPrefix("/debug/pprof/").Handler(http.DefaultServeMux)
  194. }
  195. // Simple endpoint exposing node readiness (safe to expose to untrusted clients)
  196. router.HandleFunc("/readyz", readiness.Handler)
  197. // Prometheus metrics (safe to expose to untrusted clients)
  198. router.Handle("/metrics", promhttp.Handler())
  199. go func() {
  200. logger.Info("status server listening on [::]:6060")
  201. logger.Error("status server crashed", zap.Error(http.ListenAndServe(*statusAddr, router)))
  202. }()
  203. }
  204. // In devnet mode, we automatically set a number of flags that rely on deterministic keys.
  205. if *unsafeDevMode {
  206. g0key, err := peer.IDFromPrivateKey(devnet.DeterministicP2PPrivKeyByIndex(0))
  207. if err != nil {
  208. panic(err)
  209. }
  210. // Use the first guardian node as bootstrap
  211. *p2pBootstrap = fmt.Sprintf("/dns4/guardian-0.guardian/udp/%d/quic/p2p/%s", *p2pPort, g0key.String())
  212. // Deterministic ganache ETH devnet address.
  213. *ethContract = devnet.GanacheBridgeContractAddress.Hex()
  214. *bscContract = devnet.GanacheBridgeContractAddress.Hex()
  215. // Use the hostname as nodeName. For production, we don't want to do this to
  216. // prevent accidentally leaking sensitive hostnames.
  217. hostname, err := os.Hostname()
  218. if err != nil {
  219. panic(err)
  220. }
  221. *nodeName = hostname
  222. }
  223. // Verify flags
  224. if *nodeKeyPath == "" && !*unsafeDevMode { // In devnet mode, keys are deterministically generated.
  225. logger.Fatal("Please specify --nodeKey")
  226. }
  227. if *bridgeKeyPath == "" {
  228. logger.Fatal("Please specify --bridgeKey")
  229. }
  230. if *adminSocketPath == "" {
  231. logger.Fatal("Please specify --adminSocket")
  232. }
  233. if *dataDir == "" {
  234. logger.Fatal("Please specify --dataDir")
  235. }
  236. if *ethRPC == "" {
  237. logger.Fatal("Please specify --ethRPC")
  238. }
  239. if *ethContract == "" {
  240. logger.Fatal("Please specify --ethContract")
  241. }
  242. if *bscRPC == "" {
  243. logger.Fatal("Please specify --bscRPC")
  244. }
  245. if *bscContract == "" {
  246. logger.Fatal("Please specify --bscContract")
  247. }
  248. if *nodeName == "" {
  249. logger.Fatal("Please specify --nodeName")
  250. }
  251. if *solanaBridgeAddress == "" {
  252. logger.Fatal("Please specify --solanaBridgeAddress")
  253. }
  254. if *solanaWsRPC == "" {
  255. logger.Fatal("Please specify --solanaWsUrl")
  256. }
  257. if *solanaRPC == "" {
  258. logger.Fatal("Please specify --solanaUrl")
  259. }
  260. if *terraWS == "" {
  261. logger.Fatal("Please specify --terraWS")
  262. }
  263. if *terraLCD == "" {
  264. logger.Fatal("Please specify --terraLCD")
  265. }
  266. if *terraChainID == "" {
  267. logger.Fatal("Please specify --terraChainID")
  268. }
  269. if *terraContract == "" {
  270. logger.Fatal("Please specify --terraContract")
  271. }
  272. if *bigTablePersistenceEnabled {
  273. if *bigTableGCPProject == "" {
  274. logger.Fatal("Please specify --bigTableGCPProject")
  275. }
  276. if *bigTableInstanceName == "" {
  277. logger.Fatal("Please specify --bigTableInstanceName")
  278. }
  279. if *bigTableTableName == "" {
  280. logger.Fatal("Please specify --bigTableTableName")
  281. }
  282. if *bigTableKeyPath == "" {
  283. logger.Fatal("Please specify --bigTableKeyPath")
  284. }
  285. }
  286. ethContractAddr := eth_common.HexToAddress(*ethContract)
  287. bscContractAddr := eth_common.HexToAddress(*bscContract)
  288. solBridgeAddress, err := solana_types.PublicKeyFromBase58(*solanaBridgeAddress)
  289. if err != nil {
  290. logger.Fatal("invalid Solana bridge address", zap.Error(err))
  291. }
  292. // In devnet mode, we generate a deterministic guardian key and write it to disk.
  293. if *unsafeDevMode {
  294. gk, err := generateDevnetGuardianKey()
  295. if err != nil {
  296. logger.Fatal("failed to generate devnet guardian key", zap.Error(err))
  297. }
  298. err = writeGuardianKey(gk, "auto-generated deterministic devnet key", *bridgeKeyPath, true)
  299. if err != nil {
  300. logger.Fatal("failed to write devnet guardian key", zap.Error(err))
  301. }
  302. }
  303. // Database
  304. dbPath := path.Join(*dataDir, "db")
  305. if err := os.MkdirAll(dbPath, 0700); err != nil {
  306. logger.Fatal("failed to create database directory", zap.Error(err))
  307. }
  308. db, err := db.Open(dbPath)
  309. if err != nil {
  310. logger.Fatal("failed to open database", zap.Error(err))
  311. }
  312. defer db.Close()
  313. // Guardian key
  314. gk, err := loadGuardianKey(*bridgeKeyPath)
  315. if err != nil {
  316. logger.Fatal("failed to load guardian key", zap.Error(err))
  317. }
  318. guardianAddr := ethcrypto.PubkeyToAddress(gk.PublicKey).String()
  319. logger.Info("Loaded guardian key", zap.String(
  320. "address", guardianAddr))
  321. p2p.DefaultRegistry.SetGuardianAddress(guardianAddr)
  322. // Node's main lifecycle context.
  323. rootCtx, rootCtxCancel = context.WithCancel(context.Background())
  324. defer rootCtxCancel()
  325. // Ethereum lock event channel
  326. lockC := make(chan *common.MessagePublication)
  327. // Ethereum incoming guardian set updates
  328. setC := make(chan *common.GuardianSet)
  329. // Outbound gossip message queue
  330. sendC := make(chan []byte)
  331. // Inbound observations
  332. obsvC := make(chan *gossipv1.SignedObservation, 50)
  333. // Injected VAAs (manually generated rather than created via observation)
  334. injectC := make(chan *vaa.VAA)
  335. // Guardian set state managed by processor
  336. gst := common.NewGuardianSetState()
  337. // Load p2p private key
  338. var priv crypto.PrivKey
  339. if *unsafeDevMode {
  340. idx, err := devnet.GetDevnetIndex()
  341. if err != nil {
  342. logger.Fatal("Failed to parse hostname - are we running in devnet?")
  343. }
  344. priv = devnet.DeterministicP2PPrivKeyByIndex(int64(idx))
  345. } else {
  346. priv, err = getOrCreateNodeKey(logger, *nodeKeyPath)
  347. if err != nil {
  348. logger.Fatal("Failed to load node key", zap.Error(err))
  349. }
  350. }
  351. // provides methods for reporting progress toward message attestation, and channels for receiving attestation lifecyclye events.
  352. attestationEvents := reporter.EventListener(logger)
  353. publicrpcService, publicrpcServer, err := publicrpcServiceRunnable(logger, *publicRPC, db, gst)
  354. if err != nil {
  355. log.Fatal("failed to create publicrpc service socket", zap.Error(err))
  356. }
  357. // local admin service socket
  358. adminService, err := adminServiceRunnable(logger, *adminSocketPath, injectC, db, gst)
  359. if err != nil {
  360. logger.Fatal("failed to create admin service socket", zap.Error(err))
  361. }
  362. publicwebService, err := publicwebServiceRunnable(logger, *publicWeb, *adminSocketPath, publicrpcServer,
  363. *tlsHostname, *tlsProdEnv, path.Join(*dataDir, "autocert"))
  364. if err != nil {
  365. log.Fatal("failed to create publicrpc service socket", zap.Error(err))
  366. }
  367. // Run supervisor.
  368. supervisor.New(rootCtx, logger, func(ctx context.Context) error {
  369. if err := supervisor.Run(ctx, "p2p", p2p.Run(
  370. obsvC, sendC, priv, gk, gst, *p2pPort, *p2pNetworkID, *p2pBootstrap, *nodeName, *disableHeartbeatVerify, rootCtxCancel)); err != nil {
  371. return err
  372. }
  373. if err := supervisor.Run(ctx, "ethwatch",
  374. ethereum.NewEthBridgeWatcher(*ethRPC, ethContractAddr, "eth", common.ReadinessEthSyncing, vaa.ChainIDEthereum, lockC, setC).Run); err != nil {
  375. return err
  376. }
  377. if err := supervisor.Run(ctx, "bscwatch",
  378. ethereum.NewEthBridgeWatcher(*bscRPC, bscContractAddr, "bsc", common.ReadinessBSCSyncing, vaa.ChainIDBSC, lockC, nil).Run); err != nil {
  379. return err
  380. }
  381. // Start Terra watcher only if configured
  382. logger.Info("Starting Terra watcher")
  383. if err := supervisor.Run(ctx, "terrawatch",
  384. terra.NewTerraBridgeWatcher(*terraWS, *terraLCD, *terraContract, lockC, setC).Run); err != nil {
  385. return err
  386. }
  387. if err := supervisor.Run(ctx, "solwatch-confirmed",
  388. solana.NewSolanaWatcher(*solanaWsRPC, *solanaRPC, solBridgeAddress, lockC, rpc.CommitmentConfirmed).Run); err != nil {
  389. return err
  390. }
  391. if err := supervisor.Run(ctx, "solwatch-finalized",
  392. solana.NewSolanaWatcher(*solanaWsRPC, *solanaRPC, solBridgeAddress, lockC, rpc.CommitmentFinalized).Run); err != nil {
  393. return err
  394. }
  395. p := processor.NewProcessor(ctx,
  396. db,
  397. lockC,
  398. setC,
  399. sendC,
  400. obsvC,
  401. injectC,
  402. gk,
  403. gst,
  404. *unsafeDevMode,
  405. *devNumGuardians,
  406. *ethRPC,
  407. *terraLCD,
  408. *terraChainID,
  409. *terraContract,
  410. attestationEvents,
  411. )
  412. if err := supervisor.Run(ctx, "processor", p.Run); err != nil {
  413. return err
  414. }
  415. if err := supervisor.Run(ctx, "admin", adminService); err != nil {
  416. return err
  417. }
  418. if *publicRPC != "" {
  419. if err := supervisor.Run(ctx, "publicrpc", publicrpcService); err != nil {
  420. return err
  421. }
  422. }
  423. if *publicWeb != "" {
  424. if err := supervisor.Run(ctx, "publicweb", publicwebService); err != nil {
  425. return err
  426. }
  427. }
  428. if *bigTablePersistenceEnabled {
  429. bigTableConnection := &reporter.BigTableConnectionConfig{
  430. GcpProjectID: *bigTableGCPProject,
  431. GcpInstanceName: *bigTableInstanceName,
  432. TableName: *bigTableTableName,
  433. GcpKeyFilePath: *bigTableKeyPath,
  434. }
  435. if err := supervisor.Run(ctx, "bigtable", reporter.BigTableWriter(attestationEvents, bigTableConnection)); err != nil {
  436. return err
  437. }
  438. }
  439. logger.Info("Started internal services")
  440. select {
  441. case <-ctx.Done():
  442. return nil
  443. }
  444. },
  445. // It's safer to crash and restart the process in case we encounter a panic,
  446. // rather than attempting to reschedule the runnable.
  447. supervisor.WithPropagatePanic)
  448. select {
  449. case <-rootCtx.Done():
  450. logger.Info("root context cancelled, exiting...")
  451. // TODO: wait for things to shut down gracefully
  452. }
  453. }