2021-07-22 04:26:19 -07:00
|
|
|
package guardiand
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2022-06-21 12:18:16 -07:00
|
|
|
"net"
|
2022-11-18 07:36:22 -08:00
|
|
|
"os"
|
2022-06-21 12:18:16 -07:00
|
|
|
|
2021-08-26 01:35:09 -07:00
|
|
|
"github.com/certusone/wormhole/node/pkg/common"
|
|
|
|
"github.com/certusone/wormhole/node/pkg/db"
|
2022-07-19 11:08:06 -07:00
|
|
|
"github.com/certusone/wormhole/node/pkg/governor"
|
2021-08-26 01:35:09 -07:00
|
|
|
publicrpcv1 "github.com/certusone/wormhole/node/pkg/proto/publicrpc/v1"
|
|
|
|
"github.com/certusone/wormhole/node/pkg/publicrpc"
|
|
|
|
"github.com/certusone/wormhole/node/pkg/supervisor"
|
2021-07-22 04:26:19 -07:00
|
|
|
"go.uber.org/zap"
|
|
|
|
"google.golang.org/grpc"
|
|
|
|
)
|
|
|
|
|
2022-11-18 07:36:22 -08:00
|
|
|
func publicrpcTcpServiceRunnable(logger *zap.Logger, listenAddr string, db *db.Database, gst *common.GuardianSetState, gov *governor.ChainGovernor) (supervisor.Runnable, error) {
|
2021-07-22 04:26:19 -07:00
|
|
|
l, err := net.Listen("tcp", listenAddr)
|
2022-11-18 07:36:22 -08:00
|
|
|
|
2021-07-22 04:26:19 -07:00
|
|
|
if err != nil {
|
2022-11-18 07:36:22 -08:00
|
|
|
return nil, fmt.Errorf("failed to listen: %w", err)
|
2021-07-22 04:26:19 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
logger.Info("publicrpc server listening", zap.String("addr", l.Addr().String()))
|
|
|
|
|
2022-07-19 11:08:06 -07:00
|
|
|
rpcServer := publicrpc.NewPublicrpcServer(logger, db, gst, gov)
|
2021-12-02 16:02:32 -08:00
|
|
|
grpcServer := common.NewInstrumentedGRPCServer(logger)
|
2021-08-21 15:34:58 -07:00
|
|
|
publicrpcv1.RegisterPublicRPCServiceServer(grpcServer, rpcServer)
|
2021-07-22 04:26:19 -07:00
|
|
|
|
2022-11-18 07:36:22 -08:00
|
|
|
return supervisor.GRPCServer(grpcServer, l, false), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func publicrpcUnixServiceRunnable(logger *zap.Logger, socketPath string, db *db.Database, gst *common.GuardianSetState, gov *governor.ChainGovernor) (supervisor.Runnable, *grpc.Server, error) {
|
|
|
|
// Delete existing UNIX socket, if present.
|
|
|
|
fi, err := os.Stat(socketPath)
|
|
|
|
if err == nil {
|
|
|
|
fmode := fi.Mode()
|
|
|
|
if fmode&os.ModeType == os.ModeSocket {
|
|
|
|
err = os.Remove(socketPath)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, fmt.Errorf("failed to remove existing socket at %s: %w", socketPath, err)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
return nil, nil, fmt.Errorf("%s is not a UNIX socket", socketPath)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a new UNIX socket and listen to it.
|
|
|
|
|
|
|
|
// The socket is created with the default umask. We set a restrictive umask in setRestrictiveUmask
|
|
|
|
// to ensure that any files we create are only readable by the user - this is much harder to mess up.
|
|
|
|
// The umask avoids a race condition between file creation and chmod.
|
|
|
|
|
|
|
|
laddr, err := net.ResolveUnixAddr("unix", socketPath)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, fmt.Errorf("invalid listen address: %v", err)
|
|
|
|
}
|
|
|
|
l, err := net.ListenUnix("unix", laddr)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, fmt.Errorf("failed to listen on %s: %w", socketPath, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
logger.Info("publicrpc (unix socket) server listening on", zap.String("path", socketPath))
|
|
|
|
|
|
|
|
publicrpcService := publicrpc.NewPublicrpcServer(logger, db, gst, gov)
|
|
|
|
|
|
|
|
grpcServer := common.NewInstrumentedGRPCServer(logger)
|
|
|
|
publicrpcv1.RegisterPublicRPCServiceServer(grpcServer, publicrpcService)
|
2021-08-20 15:44:37 -07:00
|
|
|
return supervisor.GRPCServer(grpcServer, l, false), grpcServer, nil
|
2021-07-22 04:26:19 -07:00
|
|
|
}
|