/
adminverify.go
60 lines (48 loc) · 1.36 KB
/
adminverify.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
package guardiand
import (
"encoding/hex"
"log"
"os"
"time"
"github.com/davecgh/go-spew/spew"
"github.com/spf13/cobra"
"github.com/status-im/keycard-go/hexutils"
"google.golang.org/protobuf/encoding/prototext"
"github.com/certusone/wormhole/node/pkg/adminrpc"
nodev1 "github.com/certusone/wormhole/node/pkg/proto/node/v1"
)
var AdminClientGovernanceVAAVerifyCmd = &cobra.Command{
Use: "governance-vaa-verify [FILENAME]",
Short: "Verify governance vaa in prototxt format (offline)",
Run: runGovernanceVAAVerify,
Args: cobra.ExactArgs(1),
}
func runGovernanceVAAVerify(cmd *cobra.Command, args []string) {
path := args[0]
b, err := os.ReadFile(path)
if err != nil {
log.Fatalf("failed to read file: %v", err)
}
var req nodev1.InjectGovernanceVAARequest
err = prototext.Unmarshal(b, &req)
if err != nil {
log.Fatalf("failed to deserialize: %v", err)
}
timestamp := time.Unix(int64(req.Timestamp), 0)
for _, message := range req.Messages {
v, err := adminrpc.GovMsgToVaa(message, req.CurrentSetIndex, timestamp)
if err != nil {
log.Fatalf("invalid update: %v", err)
}
digest := v.SigningDigest().Bytes()
if err != nil {
panic(err)
}
b, err := v.Marshal()
if err != nil {
panic(err)
}
log.Printf("Serialized: %v", hex.EncodeToString(b))
log.Printf("VAA with digest %s: %+v", hexutils.BytesToHex(digest), spew.Sdump(v))
}
}