node: remove Solana VAA submitter and agent connection

Change-Id: I6201b00f3cbf9f0fee0cc14ce8fdc8ca8583ce97
This commit is contained in:
Leo 2021-07-20 22:25:35 +02:00
parent 1b01c373c2
commit d509693367
4 changed files with 0 additions and 271 deletions

View File

@ -1,64 +0,0 @@
package debug
import (
"context"
"encoding/hex"
"github.com/certusone/wormhole/bridge/pkg/solana"
"github.com/certusone/wormhole/bridge/pkg/supervisor"
"github.com/certusone/wormhole/bridge/pkg/vaa"
"github.com/spf13/cobra"
"go.uber.org/zap"
"log"
"strings"
)
var (
agentRPC *string
skipPreflight *bool
)
func init() {
agentRPC = postVaaSolanaCmd.Flags().String("agentRPC", "", "Solana agent sidecar gRPC socket path")
skipPreflight = postVaaSolanaCmd.Flags().Bool("skipPreflight", false, "Set skip_preflight flag on submission")
DebugCmd.AddCommand(postVaaSolanaCmd)
}
var postVaaSolanaCmd = &cobra.Command{
Use: "post-vaa-solana [DATA]",
Short: "Submit a hex-encoded VAA to Solana using the specified agent sidecar",
Run: func(cmd *cobra.Command, args []string) {
vaaQueue := make(chan *vaa.VAA)
logger, err := zap.NewDevelopment()
if err != nil {
panic(err)
}
supervisor.New(context.Background(), logger, func(ctx context.Context) error {
if err := supervisor.Run(ctx, "solvaa",
solana.NewSolanaVAASubmitter(*agentRPC, vaaQueue, *skipPreflight).Run); err != nil {
return err
}
select {
case <-ctx.Done():
return nil
}
})
for _, arg := range args {
arg = strings.TrimPrefix(arg, "0x")
b, err := hex.DecodeString(arg)
if err != nil {
log.Fatal(err)
}
v, err := vaa.Unmarshal(b)
if err != nil {
log.Fatal(err)
}
vaaQueue <- v
}
select {}
},
}

View File

@ -63,8 +63,6 @@ var (
solanaWsRPC *string
solanaRPC *string
agentRPC *string
logLevel *string
unsafeDevMode *bool
@ -100,8 +98,6 @@ func init() {
solanaWsRPC = BridgeCmd.Flags().String("solanaWS", "", "Solana Websocket URL (required")
solanaRPC = BridgeCmd.Flags().String("solanaRPC", "", "Solana RPC URL (required")
agentRPC = BridgeCmd.Flags().String("agentRPC", "", "Solana agent sidecar gRPC socket path")
logLevel = BridgeCmd.Flags().String("logLevel", "info", "Logging level (debug, info, warn, error, dpanic, panic, fatal)")
unsafeDevMode = BridgeCmd.Flags().Bool("unsafeDevMode", false, "Launch node in unsafe, deterministic devnet mode")
@ -253,9 +249,6 @@ func runBridge(cmd *cobra.Command, args []string) {
if *adminSocketPath == "" {
logger.Fatal("Please specify --adminSocket")
}
if *agentRPC == "" {
logger.Fatal("Please specify --agentRPC")
}
if *ethRPC == "" {
logger.Fatal("Please specify --ethRPC")
}
@ -397,11 +390,6 @@ func runBridge(cmd *cobra.Command, args []string) {
return err
}
if err := supervisor.Run(ctx, "solvaa",
solana.NewSolanaVAASubmitter(*agentRPC, solanaVaaC, false).Run); err != nil {
return err
}
if err := supervisor.Run(ctx, "solwatch",
solana.NewSolanaWatcher(*solanaWsRPC, *solanaRPC, solBridgeAddress, lockC).Run); err != nil {
return err

View File

@ -1,193 +0,0 @@
package solana
import (
"context"
"encoding/hex"
"fmt"
"github.com/golang/protobuf/ptypes"
"github.com/prometheus/client_golang/prometheus"
"strings"
"time"
"google.golang.org/grpc"
"google.golang.org/grpc/codes"
"google.golang.org/grpc/status"
"go.uber.org/zap"
agentv1 "github.com/certusone/wormhole/bridge/pkg/proto/agent/v1"
"github.com/certusone/wormhole/bridge/pkg/readiness"
"github.com/certusone/wormhole/bridge/pkg/common"
"github.com/certusone/wormhole/bridge/pkg/supervisor"
"github.com/certusone/wormhole/bridge/pkg/vaa"
)
var (
solanaVAASubmitted = prometheus.NewCounter(
prometheus.CounterOpts{
Name: "wormhole_solana_vaa_submitted_total",
Help: "Total number of VAAs successfully submitted to the chain",
})
solanaFeePayerBalance = prometheus.NewGauge(
prometheus.GaugeOpts{
Name: "wormhole_solana_fee_account_balance_lamports",
Help: "Current fee payer account balance in lamports",
})
)
func init() {
prometheus.MustRegister(solanaVAASubmitted)
prometheus.MustRegister(solanaFeePayerBalance)
}
type (
SolanaVAASubmitter struct {
url string
vaaChan chan *vaa.VAA
skipPreflight bool
}
)
func NewSolanaVAASubmitter(url string, vaaQueue chan *vaa.VAA, skipPreflight bool) *SolanaVAASubmitter {
return &SolanaVAASubmitter{url: url, vaaChan: vaaQueue, skipPreflight: skipPreflight}
}
func (e *SolanaVAASubmitter) Run(ctx context.Context) error {
// We only support UNIX sockets since we rely on Unix filesystem permissions for access control.
path := fmt.Sprintf("unix://%s", e.url)
timeout, cancel := context.WithTimeout(ctx, 15*time.Second)
defer cancel()
conn, err := grpc.DialContext(timeout, path, grpc.WithBlock(), grpc.WithInsecure())
if err != nil {
return fmt.Errorf("failed to dial agent at %s: %w", path, err)
}
defer conn.Close()
c := agentv1.NewAgentClient(conn)
errC := make(chan error)
logger := supervisor.Logger(ctx)
// Check whether agent is up by doing a GetBalance call.
balance, err := c.GetBalance(timeout, &agentv1.GetBalanceRequest{})
if err != nil {
solanaConnectionErrors.WithLabelValues("get_balance_error").Inc()
return fmt.Errorf("failed to get balance: %v", err)
}
readiness.SetReady(common.ReadinessSolanaSyncing)
logger.Info("account balance", zap.Uint64("lamports", balance.Balance))
// Periodically request the balance for monitoring
btick := time.NewTicker(1 * time.Minute)
go func() {
for {
select {
case <-ctx.Done():
return
case <-btick.C:
timeout, cancel := context.WithTimeout(ctx, 5*time.Second)
balance, err = c.GetBalance(timeout, &agentv1.GetBalanceRequest{})
if err != nil {
solanaConnectionErrors.WithLabelValues("get_balance_error").Inc()
// With PostVAA, it's hard to tell, but if this one fails we know
// that something went wrong and we should restart the service.
errC <- fmt.Errorf("failed to get balance: %v", err)
cancel()
break
}
cancel()
solanaFeePayerBalance.Set(float64(balance.Balance))
case v := <-e.vaaChan:
// Calculate digest so we can log it (TODO: refactor to vaa method? we do this in different places)
m, err := v.SigningMsg()
if err != nil {
panic(err)
}
h := hex.EncodeToString(m.Bytes())
timeout, cancel := context.WithTimeout(ctx, 120*time.Second)
ts, err := ptypes.TimestampProto(v.Timestamp)
if err != nil {
panic(err)
}
signatures := make([]*agentv1.Signature, len(v.Signatures))
for i := 0; i < len(v.Signatures); i++ {
signatures[i] = &agentv1.Signature{
GuardianIndex: uint32(v.Signatures[i].Index),
Signature: v.Signatures[i].Signature[:],
}
}
res, err := c.SubmitVAA(timeout, &agentv1.SubmitVAARequest{Vaa: &agentv1.VAA{
Version: uint32(v.Version),
Timestamp: ts,
Nonce: v.Nonce,
EmitterChain: uint32(v.EmitterChain),
EmitterAddress: v.EmitterAddress[:],
Sequence: v.Sequence,
Payload: v.Payload,
GuardianSetIndex: v.GuardianSetIndex,
Signatures: signatures,
ConsistencyLevel: uint32(v.ConsistencyLevel),
}, SkipPreflight: e.skipPreflight})
cancel()
if err != nil {
st, ok := status.FromError(err)
if !ok {
panic("err not a status")
}
// For transient errors, we can put the VAA back into the queue such that it can
// be retried after the runnable has been rescheduled.
switch st.Code() {
case
// Our context was cancelled, likely because the watcher stream died.
codes.Canceled,
// The agent encountered a transient error, likely node unavailability.
codes.Unavailable,
codes.Aborted:
solanaConnectionErrors.WithLabelValues("postvaa_transient_error").Inc()
logger.Error("transient error, requeuing VAA", zap.Error(err), zap.String("digest", h))
// Tombstone goroutine
go func(v *vaa.VAA) {
time.Sleep(10 * time.Second)
e.vaaChan <- v
}(v)
case codes.Internal:
// This VAA has already been executed on chain, successfully or not.
// TODO: dissect InstructionError in agent and convert this to the proper gRPC code
if strings.Contains(st.Message(), "custom program error: 0xb") { // AlreadyExists
logger.Info("VAA already submitted on-chain, ignoring", zap.Error(err), zap.String("digest", h))
break
}
fallthrough
default:
solanaConnectionErrors.WithLabelValues("postvaa_internal_error").Inc()
logger.Error("error submitting VAA", zap.Error(err), zap.String("digest", h))
}
break
}
solanaVAASubmitted.Inc()
logger.Info("submitted VAA",
zap.String("tx_sig", res.Signature), zap.String("digest", h))
}
}
}()
select {
case <-ctx.Done():
return ctx.Err()
case err := <-errC:
return err
}
}

View File

@ -74,8 +74,6 @@ spec:
- terra18eezxhys9jwku67cm4w84xhnzt4xjj77w2qt62
- --terraKey
- /tmp/terra.key
- --agentRPC
- /run/bridge/agent.sock
- --solanaBridgeAddress
- Bridge1p5gheXUvJ6jGWGeCsgPKgnE3YgdGKRVCMY9o
- --solanaWS