adminserver.go 5.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169
  1. package guardiand
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "math"
  7. "net"
  8. "os"
  9. "time"
  10. ethcommon "github.com/ethereum/go-ethereum/common"
  11. "go.uber.org/zap"
  12. "google.golang.org/grpc"
  13. "google.golang.org/grpc/codes"
  14. "google.golang.org/grpc/status"
  15. "github.com/certusone/wormhole/node/pkg/common"
  16. nodev1 "github.com/certusone/wormhole/node/pkg/proto/node/v1"
  17. "github.com/certusone/wormhole/node/pkg/supervisor"
  18. "github.com/certusone/wormhole/node/pkg/vaa"
  19. )
  20. type nodePrivilegedService struct {
  21. nodev1.UnimplementedNodePrivilegedServer
  22. injectC chan<- *vaa.VAA
  23. logger *zap.Logger
  24. }
  25. // adminGuardianSetUpdateToVAA converts a nodev1.GuardianSetUpdate message to its canonical VAA representation.
  26. // Returns an error if the data is invalid.
  27. func adminGuardianSetUpdateToVAA(req *nodev1.GuardianSetUpdate, guardianSetIndex uint32, timestamp uint32) (*vaa.VAA, error) {
  28. if len(req.Guardians) == 0 {
  29. return nil, errors.New("empty guardian set specified")
  30. }
  31. if len(req.Guardians) > common.MaxGuardianCount {
  32. return nil, fmt.Errorf("too many guardians - %d, maximum is %d", len(req.Guardians), common.MaxGuardianCount)
  33. }
  34. addrs := make([]ethcommon.Address, len(req.Guardians))
  35. for i, g := range req.Guardians {
  36. if !ethcommon.IsHexAddress(g.Pubkey) {
  37. return nil, fmt.Errorf("invalid pubkey format at index %d (%s)", i, g.Name)
  38. }
  39. ethAddr := ethcommon.HexToAddress(g.Pubkey)
  40. for j, pk := range addrs {
  41. if pk == ethAddr {
  42. return nil, fmt.Errorf("duplicate pubkey at index %d (duplicate of %d): %s", i, j, g.Name)
  43. }
  44. }
  45. addrs[i] = ethAddr
  46. }
  47. v := &vaa.VAA{
  48. Version: vaa.SupportedVAAVersion,
  49. GuardianSetIndex: guardianSetIndex,
  50. Timestamp: time.Unix(int64(timestamp), 0),
  51. Payload: &vaa.BodyGuardianSetUpdate{
  52. Keys: addrs,
  53. NewIndex: guardianSetIndex + 1,
  54. },
  55. }
  56. return v, nil
  57. }
  58. // adminContractUpgradeToVAA converts a nodev1.ContractUpgrade message to its canonical VAA representation.
  59. // Returns an error if the data is invalid.
  60. func adminContractUpgradeToVAA(req *nodev1.ContractUpgrade, guardianSetIndex uint32, timestamp uint32) (*vaa.VAA, error) {
  61. if len(req.NewContract) != 32 {
  62. return nil, errors.New("invalid new_contract address")
  63. }
  64. if req.ChainId > math.MaxUint8 {
  65. return nil, errors.New("invalid chain_id")
  66. }
  67. newContractAddress := vaa.Address{}
  68. copy(newContractAddress[:], req.NewContract)
  69. v := &vaa.VAA{
  70. Version: vaa.SupportedVAAVersion,
  71. GuardianSetIndex: guardianSetIndex,
  72. Timestamp: time.Unix(int64(timestamp), 0),
  73. Payload: &vaa.BodyContractUpgrade{
  74. ChainID: uint8(req.ChainId),
  75. NewContract: newContractAddress,
  76. },
  77. }
  78. return v, nil
  79. }
  80. func (s *nodePrivilegedService) InjectGovernanceVAA(ctx context.Context, req *nodev1.InjectGovernanceVAARequest) (*nodev1.InjectGovernanceVAAResponse, error) {
  81. s.logger.Info("governance VAA injected via admin socket", zap.String("request", req.String()))
  82. var (
  83. v *vaa.VAA
  84. err error
  85. )
  86. switch payload := req.Payload.(type) {
  87. case *nodev1.InjectGovernanceVAARequest_GuardianSet:
  88. v, err = adminGuardianSetUpdateToVAA(payload.GuardianSet, req.CurrentSetIndex, req.Timestamp)
  89. case *nodev1.InjectGovernanceVAARequest_ContractUpgrade:
  90. v, err = adminContractUpgradeToVAA(payload.ContractUpgrade, req.CurrentSetIndex, req.Timestamp)
  91. default:
  92. panic(fmt.Sprintf("unsupported VAA type: %T", payload))
  93. }
  94. if err != nil {
  95. return nil, status.Error(codes.InvalidArgument, err.Error())
  96. }
  97. // Generate digest of the unsigned VAA.
  98. digest, err := v.SigningMsg()
  99. if err != nil {
  100. panic(err)
  101. }
  102. s.logger.Info("governance VAA constructed",
  103. zap.Any("vaa", v),
  104. zap.String("digest", digest.String()),
  105. )
  106. s.injectC <- v
  107. return &nodev1.InjectGovernanceVAAResponse{Digest: digest.Bytes()}, nil
  108. }
  109. func adminServiceRunnable(logger *zap.Logger, socketPath string, injectC chan<- *vaa.VAA) (supervisor.Runnable, error) {
  110. // Delete existing UNIX socket, if present.
  111. fi, err := os.Stat(socketPath)
  112. if err == nil {
  113. fmode := fi.Mode()
  114. if fmode&os.ModeType == os.ModeSocket {
  115. err = os.Remove(socketPath)
  116. if err != nil {
  117. return nil, fmt.Errorf("failed to remove existing socket at %s: %w", socketPath, err)
  118. }
  119. } else {
  120. return nil, fmt.Errorf("%s is not a UNIX socket", socketPath)
  121. }
  122. }
  123. // Create a new UNIX socket and listen to it.
  124. // The socket is created with the default umask. We set a restrictive umask in setRestrictiveUmask
  125. // to ensure that any files we create are only readable by the user - this is much harder to mess up.
  126. // The umask avoids a race condition between file creation and chmod.
  127. laddr, err := net.ResolveUnixAddr("unix", socketPath)
  128. l, err := net.ListenUnix("unix", laddr)
  129. if err != nil {
  130. return nil, fmt.Errorf("failed to listen on %s: %w", socketPath, err)
  131. }
  132. logger.Info("admin server listening on", zap.String("path", socketPath))
  133. nodeService := &nodePrivilegedService{
  134. injectC: injectC,
  135. logger: logger.Named("adminservice"),
  136. }
  137. grpcServer := grpc.NewServer()
  138. nodev1.RegisterNodePrivilegedServer(grpcServer, nodeService)
  139. return supervisor.GRPCServer(grpcServer, l, false), nil
  140. }