wormhole/solana
Leopold Schabel 8306a83833
solana/agent: listen on UNIX socket (#122)
This allows us to use UNIX filesystem permissions for access control.

Previously, any process in the network namespace could connect to it,
which is insecure for obvious reasons.

Verified that correct permissions are set:

```
# ls -lisa /run/bridge/
total 8
31996269 4 drwxrwxrwx 2 root root 4096 Nov 23 21:58 .
14676759 4 drwxr-xr-x 1 root root 4096 Nov 23 21:58 ..
31996306 0 srwx------ 1 root root    0 Nov 23 21:58 agent.sock
```

Fixes #119
2020-11-24 09:48:44 +01:00
..
agent solana/agent: listen on UNIX socket (#122) 2020-11-24 09:48:44 +01:00
bridge solana: fix borrow issues 2020-11-20 14:23:05 +01:00
cli Upgrade SDK; add balance rpc call (#80) 2020-11-13 14:14:56 +01:00
.dockerignore Build Solana smart contract 2020-08-20 18:56:26 +02:00
Cargo.lock solana/agent: listen on UNIX socket (#122) 2020-11-24 09:48:44 +01:00
Cargo.toml Upgrade SDK; add balance rpc call (#80) 2020-11-13 14:14:56 +01:00
Dockerfile solana: don't rebuild solana when bridge changes 2020-08-21 16:29:44 +02:00
bpf-sdk-install.sh Implement initial solana program (#3) 2020-08-03 14:55:58 +02:00
devnet_setup.sh devnet: deterministic Solana accounts and lockup generator 2020-11-10 22:53:36 +01:00
do.sh bridge: improve build caching 2020-08-21 14:52:38 +02:00
id.json Solana devnet fixtures and lockup generator 2020-08-21 20:48:58 +02:00
lockups.sh devnet: deterministic Solana accounts and lockup generator 2020-11-10 22:53:36 +01:00
rustfmt.toml bridge: add secp check instruction (#41) 2020-10-01 16:42:45 +02:00