node/cmd: add admin dump-vaa-by-message-id command
Change-Id: I1cba29582b23b8dfeb77cc4a2fe143ca7113a88f
This commit is contained in:
parent
82b4ed5843
commit
a4653eac36
|
@ -4,10 +4,13 @@ import (
|
|||
"context"
|
||||
"fmt"
|
||||
publicrpcv1 "github.com/certusone/wormhole/node/pkg/proto/publicrpc/v1"
|
||||
"github.com/certusone/wormhole/node/pkg/vaa"
|
||||
"github.com/davecgh/go-spew/spew"
|
||||
"github.com/spf13/pflag"
|
||||
"io/ioutil"
|
||||
"log"
|
||||
"strconv"
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
"github.com/spf13/cobra"
|
||||
|
@ -34,11 +37,13 @@ func init() {
|
|||
AdminClientInjectGuardianSetUpdateCmd.Flags().AddFlagSet(pf)
|
||||
AdminClientFindMissingMessagesCmd.Flags().AddFlagSet(pf)
|
||||
AdminClientListNodes.Flags().AddFlagSet(pf)
|
||||
DumpVAAByMessageID.Flags().AddFlagSet(pf)
|
||||
|
||||
AdminCmd.AddCommand(AdminClientInjectGuardianSetUpdateCmd)
|
||||
AdminCmd.AddCommand(AdminClientFindMissingMessagesCmd)
|
||||
AdminCmd.AddCommand(AdminClientGovernanceVAAVerifyCmd)
|
||||
AdminCmd.AddCommand(AdminClientListNodes)
|
||||
AdminCmd.AddCommand(DumpVAAByMessageID)
|
||||
}
|
||||
|
||||
var AdminCmd = &cobra.Command{
|
||||
|
@ -60,6 +65,13 @@ var AdminClientFindMissingMessagesCmd = &cobra.Command{
|
|||
Args: cobra.ExactArgs(2),
|
||||
}
|
||||
|
||||
var DumpVAAByMessageID = &cobra.Command{
|
||||
Use: "dump-vaa-by-message-id [MESSAGE_ID]",
|
||||
Short: "Retrieve a VAA by message ID (chain/emitter/seq) and decode and dump the VAA",
|
||||
Run: runDumpVAAByMessageID,
|
||||
Args: cobra.ExactArgs(1),
|
||||
}
|
||||
|
||||
func getAdminClient(ctx context.Context, addr string) (*grpc.ClientConn, error, nodev1.NodePrivilegedServiceClient) {
|
||||
conn, err := grpc.DialContext(ctx, fmt.Sprintf("unix:///%s", addr), grpc.WithInsecure())
|
||||
|
||||
|
@ -146,3 +158,50 @@ func runFindMissingMessages(cmd *cobra.Command, args []string) {
|
|||
log.Printf("processed %s sequences %d to %d (%d gaps)",
|
||||
emitterAddress, resp.FirstSequence, resp.LastSequence, len(resp.MissingMessages))
|
||||
}
|
||||
|
||||
// runDumpVAAByMessageID uses GetSignedVAA to request the given message,
|
||||
// then decode and dump the VAA.
|
||||
func runDumpVAAByMessageID(cmd *cobra.Command, args []string) {
|
||||
// Parse the {chain,emitter,seq} string.
|
||||
parts := strings.Split(args[0], "/")
|
||||
if len(parts) != 3 {
|
||||
log.Fatalf("invalid message ID: %s", args[0])
|
||||
}
|
||||
chainID, err := strconv.ParseUint(parts[0], 10, 32)
|
||||
if err != nil {
|
||||
log.Fatalf("invalid chain ID: %v", err)
|
||||
}
|
||||
emitterAddress := parts[1]
|
||||
seq, err := strconv.ParseUint(parts[2], 10, 64)
|
||||
if err != nil {
|
||||
log.Fatalf("invalid sequence number: %v", err)
|
||||
}
|
||||
|
||||
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
|
||||
defer cancel()
|
||||
|
||||
conn, err, c := getPublicRPCServiceClient(ctx, *clientSocketPath)
|
||||
defer conn.Close()
|
||||
if err != nil {
|
||||
log.Fatalf("failed to get public RPC service client: %v", err)
|
||||
}
|
||||
|
||||
msg := publicrpcv1.GetSignedVAARequest{
|
||||
MessageId: &publicrpcv1.MessageID{
|
||||
EmitterChain: publicrpcv1.ChainID(chainID),
|
||||
EmitterAddress: emitterAddress,
|
||||
Sequence: seq,
|
||||
},
|
||||
}
|
||||
resp, err := c.GetSignedVAA(ctx, &msg)
|
||||
if err != nil {
|
||||
log.Fatalf("failed to run GetSignedVAA RPC: %v", err)
|
||||
}
|
||||
|
||||
v, err := vaa.Unmarshal(resp.VaaBytes)
|
||||
if err != nil {
|
||||
log.Fatalf("failed to decode VAA: %v", err)
|
||||
}
|
||||
|
||||
log.Printf("VAA with digest %s: %+v", v.HexDigest(), spew.Sdump(v))
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue