adminclient.go 2.0 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980
  1. package guardiand
  2. import (
  3. "context"
  4. "fmt"
  5. "io/ioutil"
  6. "log"
  7. "time"
  8. "github.com/spf13/cobra"
  9. "github.com/status-im/keycard-go/hexutils"
  10. "google.golang.org/grpc"
  11. "google.golang.org/protobuf/encoding/prototext"
  12. nodev1 "github.com/certusone/wormhole/node/pkg/proto/node/v1"
  13. )
  14. var clientSocketPath *string
  15. func init() {
  16. pf := AdminClientInjectGuardianSetUpdateCmd.Flags()
  17. clientSocketPath = pf.String("socket", "", "gRPC admin server socket to connect to")
  18. err := cobra.MarkFlagRequired(pf, "socket")
  19. if err != nil {
  20. panic(err)
  21. }
  22. AdminCmd.AddCommand(AdminClientInjectGuardianSetUpdateCmd)
  23. AdminCmd.AddCommand(AdminClientGovernanceVAAVerifyCmd)
  24. }
  25. var AdminCmd = &cobra.Command{
  26. Use: "admin",
  27. Short: "Guardian node admin commands",
  28. }
  29. var AdminClientInjectGuardianSetUpdateCmd = &cobra.Command{
  30. Use: "governance-vaa-inject [FILENAME]",
  31. Short: "Inject and sign a governance VAA from a prototxt file (see docs!)",
  32. Run: runInjectGovernanceVAA,
  33. Args: cobra.ExactArgs(1),
  34. }
  35. func getAdminClient(ctx context.Context, addr string) (*grpc.ClientConn, error, nodev1.NodePrivilegedClient) {
  36. conn, err := grpc.DialContext(ctx, fmt.Sprintf("unix:///%s", addr), grpc.WithInsecure())
  37. if err != nil {
  38. log.Fatalf("failed to connect to %s: %v", addr, err)
  39. }
  40. c := nodev1.NewNodePrivilegedClient(conn)
  41. return conn, err, c
  42. }
  43. func runInjectGovernanceVAA(cmd *cobra.Command, args []string) {
  44. path := args[0]
  45. ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
  46. defer cancel()
  47. conn, err, c := getAdminClient(ctx, *clientSocketPath)
  48. defer conn.Close()
  49. b, err := ioutil.ReadFile(path)
  50. if err != nil {
  51. log.Fatalf("failed to read file: %v", err)
  52. }
  53. var msg nodev1.InjectGovernanceVAARequest
  54. err = prototext.Unmarshal(b, &msg)
  55. if err != nil {
  56. log.Fatalf("failed to deserialize: %v", err)
  57. }
  58. resp, err := c.InjectGovernanceVAA(ctx, &msg)
  59. if err != nil {
  60. log.Fatalf("failed to submit governance VAA: %v", err)
  61. }
  62. log.Printf("VAA successfully injected with digest %s", hexutils.BytesToHex(resp.Digest))
  63. }