package guardiand import ( "encoding/hex" "fmt" "io/ioutil" "log" "time" "github.com/certusone/wormhole/node/pkg/vaa" "github.com/davecgh/go-spew/spew" "github.com/spf13/cobra" "google.golang.org/protobuf/encoding/prototext" nodev1 "github.com/certusone/wormhole/node/pkg/proto/node/v1" ) var AdminClientGovernanceVAAVerifyCmd = &cobra.Command{ Use: "governance-vaa-verify [FILENAME]", Short: "Verify governance vaa in prototxt format (offline)", Run: runGovernanceVAAVerify, Args: cobra.ExactArgs(1), } func runGovernanceVAAVerify(cmd *cobra.Command, args []string) { path := args[0] b, err := ioutil.ReadFile(path) if err != nil { log.Fatalf("failed to read file: %v", err) } var req nodev1.InjectGovernanceVAARequest err = prototext.Unmarshal(b, &req) if err != nil { log.Fatalf("failed to deserialize: %v", err) } timestamp := time.Unix(int64(req.Timestamp), 0) for _, message := range req.Messages { var ( v *vaa.VAA ) switch payload := message.Payload.(type) { case *nodev1.GovernanceMessage_GuardianSet: v, err = adminGuardianSetUpdateToVAA(payload.GuardianSet, timestamp, req.CurrentSetIndex, message.Nonce, message.Sequence) case *nodev1.GovernanceMessage_ContractUpgrade: v, err = adminContractUpgradeToVAA(payload.ContractUpgrade, timestamp, req.CurrentSetIndex, message.Nonce, message.Sequence) case *nodev1.GovernanceMessage_BridgeRegisterChain: v, err = tokenBridgeRegisterChain(payload.BridgeRegisterChain, timestamp, req.CurrentSetIndex, message.Nonce, message.Sequence) case *nodev1.GovernanceMessage_BridgeContractUpgrade: v, err = tokenBridgeUpgradeContract(payload.BridgeContractUpgrade, timestamp, req.CurrentSetIndex, message.Nonce, message.Sequence) default: panic(fmt.Sprintf("unsupported VAA type: %T", payload)) } if err != nil { log.Fatalf("invalid update: %v", err) } digest := v.SigningMsg() if err != nil { panic(err) } b, err := v.Marshal() if err != nil { panic(err) } log.Printf("Serialized: %v", hex.EncodeToString(b)) log.Printf("VAA with digest %s: %+v", digest.Hex(), spew.Sdump(v)) } }