wormhole/devnet
Leopold Schabel 8306a83833
solana/agent: listen on UNIX socket (#122)
This allows us to use UNIX filesystem permissions for access control.

Previously, any process in the network namespace could connect to it,
which is insecure for obvious reasons.

Verified that correct permissions are set:

```
# ls -lisa /run/bridge/
total 8
31996269 4 drwxrwxrwx 2 root root 4096 Nov 23 21:58 .
14676759 4 drwxr-xr-x 1 root root 4096 Nov 23 21:58 ..
31996306 0 srwx------ 1 root root    0 Nov 23 21:58 agent.sock
```

Fixes #119
2020-11-24 09:48:44 +01:00
..
bridge.yaml solana/agent: listen on UNIX socket (#122) 2020-11-24 09:48:44 +01:00
eth-devnet.yaml ethereum: mine ganache blocks in the background 2020-11-18 13:56:56 +01:00
solana-devnet.yaml Run devnet_setup.sh as solana-devnet sidecar 2020-08-22 10:52:51 +02:00
terra-configmaps.yaml Fixes to VAA submission to Terra smart contract (#115) 2020-11-19 20:05:05 +01:00
terra-devnet.yaml terra: split and clean up k8s configs 2020-11-16 17:45:17 +01:00
web.yaml web: integrate with Tilt deployment 2020-11-10 19:39:32 +01:00