Tiltfile 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524
  1. # This Tiltfile contains the deployment and build config for the Wormhole devnet.
  2. #
  3. # We use Buildkit cache mounts and careful layering to avoid unnecessary rebuilds - almost
  4. # all source code changes result in small, incremental rebuilds. Dockerfiles are written such
  5. # that, for example, changing the contract source code won't cause Solana itself to be rebuilt.
  6. #
  7. load("ext://namespace", "namespace_create", "namespace_inject")
  8. load("ext://secret", "secret_yaml_generic")
  9. allow_k8s_contexts("ci")
  10. # Disable telemetry by default
  11. analytics_settings(False)
  12. # Moar updates (default is 3)
  13. update_settings(max_parallel_updates=10)
  14. # Runtime configuration
  15. config.define_bool("ci", False, "We are running in CI")
  16. config.define_bool("manual", False, "Set TRIGGER_MODE_MANUAL by default")
  17. config.define_string("num", False, "Number of guardian nodes to run")
  18. # You do not usually need to set this argument - this argument is for debugging only. If you do use a different
  19. # namespace, note that the "wormhole" namespace is hardcoded in tests and don't forget specifying the argument
  20. # when running "tilt down".
  21. #
  22. config.define_string("namespace", False, "Kubernetes namespace to use")
  23. # These arguments will enable writing Guardian events to a cloud BigTable instance.
  24. # Writing to a cloud BigTable is optional. These arguments are not required to run the devnet.
  25. config.define_string("gcpProject", False, "GCP project ID for BigTable persistence")
  26. config.define_string("bigTableKeyPath", False, "Path to BigTable json key file")
  27. # When running Tilt on a server, this can be used to set the public hostname Tilt runs on
  28. # for service links in the UI to work.
  29. config.define_string("webHost", False, "Public hostname for port forwards")
  30. # Components
  31. config.define_bool("pyth", False, "Enable Pyth-to-Wormhole component")
  32. config.define_bool("explorer", False, "Enable explorer component")
  33. config.define_bool("bridge_ui", False, "Enable bridge UI component")
  34. config.define_bool("e2e", False, "Enable E2E testing stack")
  35. config.define_bool("ci_tests", False, "Enable tests runner component")
  36. config.define_bool("bridge_ui_hot", False, "Enable hot loading bridge_ui")
  37. cfg = config.parse()
  38. num_guardians = int(cfg.get("num", "1"))
  39. namespace = cfg.get("namespace", "wormhole")
  40. gcpProject = cfg.get("gcpProject", "local-dev")
  41. bigTableKeyPath = cfg.get("bigTableKeyPath", "./event_database/devnet_key.json")
  42. webHost = cfg.get("webHost", "localhost")
  43. ci = cfg.get("ci", False)
  44. pyth = cfg.get("pyth", ci)
  45. explorer = cfg.get("explorer", ci)
  46. bridge_ui = cfg.get("bridge_ui", ci)
  47. e2e = cfg.get("e2e", ci)
  48. ci_tests = cfg.get("ci_tests", ci)
  49. bridge_ui_hot = not ci
  50. if cfg.get("manual", False):
  51. trigger_mode = TRIGGER_MODE_MANUAL
  52. else:
  53. trigger_mode = TRIGGER_MODE_AUTO
  54. # namespace
  55. if not ci:
  56. namespace_create(namespace)
  57. def k8s_yaml_with_ns(objects):
  58. return k8s_yaml(namespace_inject(objects, namespace))
  59. # protos
  60. proto_deps = ["./proto", "buf.yaml", "buf.gen.yaml"]
  61. local_resource(
  62. name = "proto-gen",
  63. deps = proto_deps,
  64. cmd = "tilt docker build -- --target go-export -f Dockerfile.proto -o type=local,dest=node .",
  65. env = {"DOCKER_BUILDKIT": "1"},
  66. labels = ["protobuf"],
  67. allow_parallel=True,
  68. trigger_mode = trigger_mode,
  69. )
  70. local_resource(
  71. name = "proto-gen-web",
  72. deps = proto_deps + ["buf.gen.web.yaml"],
  73. resource_deps = ["proto-gen"],
  74. cmd = "tilt docker build -- --target node-export -f Dockerfile.proto -o type=local,dest=. .",
  75. env = {"DOCKER_BUILDKIT": "1"},
  76. labels = ["protobuf"],
  77. allow_parallel=True,
  78. trigger_mode = trigger_mode,
  79. )
  80. local_resource(
  81. name = "teal-gen",
  82. deps = ["staging/algorand/teal"],
  83. cmd = "tilt docker build -- --target teal-export -f Dockerfile.teal -o type=local,dest=. .",
  84. env = {"DOCKER_BUILDKIT": "1"},
  85. labels = ["algorand"],
  86. allow_parallel=True,
  87. trigger_mode = trigger_mode,
  88. )
  89. # wasm
  90. local_resource(
  91. name = "wasm-gen",
  92. cmd = "tilt docker build -- -f Dockerfile.wasm -o type=local,dest=. .",
  93. env = {"DOCKER_BUILDKIT": "1"},
  94. labels = ["wasm"],
  95. allow_parallel=True,
  96. trigger_mode = trigger_mode,
  97. )
  98. # node
  99. if explorer:
  100. k8s_yaml_with_ns(
  101. secret_yaml_generic(
  102. "node-bigtable-key",
  103. from_file = "bigtable-key.json=" + bigTableKeyPath,
  104. ),
  105. )
  106. docker_build(
  107. ref = "guardiand-image",
  108. context = "node",
  109. dockerfile = "node/Dockerfile",
  110. )
  111. def build_node_yaml():
  112. node_yaml = read_yaml_stream("devnet/node.yaml")
  113. for obj in node_yaml:
  114. if obj["kind"] == "StatefulSet" and obj["metadata"]["name"] == "guardian":
  115. obj["spec"]["replicas"] = num_guardians
  116. container = obj["spec"]["template"]["spec"]["containers"][0]
  117. if container["name"] != "guardiand":
  118. fail("container 0 is not guardiand")
  119. container["command"] += ["--devNumGuardians", str(num_guardians)]
  120. if explorer:
  121. container["command"] += [
  122. "--bigTablePersistenceEnabled",
  123. "--bigTableInstanceName",
  124. "wormhole",
  125. "--bigTableTableName",
  126. "v2Events",
  127. "--bigTableTopicName",
  128. "new-vaa-devnet",
  129. "--bigTableKeyPath",
  130. "/tmp/mounted-keys/bigtable-key.json",
  131. "--bigTableGCPProject",
  132. gcpProject,
  133. ]
  134. return encode_yaml_stream(node_yaml)
  135. k8s_yaml_with_ns(build_node_yaml())
  136. k8s_resource(
  137. "guardian",
  138. resource_deps = ["proto-gen", "eth-devnet", "eth-devnet2", "terra-terrad", "solana-devnet"],
  139. port_forwards = [
  140. port_forward(6060, name = "Debug/Status Server [:6060]", host = webHost),
  141. port_forward(7070, name = "Public gRPC [:7070]", host = webHost),
  142. port_forward(7071, name = "Public REST [:7071]", host = webHost),
  143. port_forward(2345, name = "Debugger [:2345]", host = webHost),
  144. ],
  145. labels = ["guardian"],
  146. trigger_mode = trigger_mode,
  147. )
  148. # spy
  149. k8s_yaml_with_ns("devnet/spy.yaml")
  150. k8s_resource(
  151. "spy",
  152. resource_deps = ["proto-gen", "guardian"],
  153. port_forwards = [
  154. port_forward(6061, container_port = 6060, name = "Debug/Status Server [:6061]", host = webHost),
  155. port_forward(7072, name = "Spy gRPC [:7072]", host = webHost),
  156. ],
  157. labels = ["guardian"],
  158. trigger_mode = trigger_mode,
  159. )
  160. # solana client cli (used for devnet setup)
  161. docker_build(
  162. ref = "bridge-client",
  163. context = ".",
  164. only = ["./proto", "./solana", "./clients"],
  165. dockerfile = "Dockerfile.client",
  166. # Ignore target folders from local (non-container) development.
  167. ignore = ["./solana/*/target"],
  168. )
  169. # solana smart contract
  170. docker_build(
  171. ref = "solana-contract",
  172. context = ".",
  173. dockerfile = "Dockerfile.solana",
  174. )
  175. # solana local devnet
  176. k8s_yaml_with_ns("devnet/solana-devnet.yaml")
  177. k8s_resource(
  178. "solana-devnet",
  179. port_forwards = [
  180. port_forward(8899, name = "Solana RPC [:8899]", host = webHost),
  181. port_forward(8900, name = "Solana WS [:8900]", host = webHost),
  182. port_forward(9000, name = "Solana PubSub [:9000]", host = webHost),
  183. ],
  184. labels = ["solana"],
  185. trigger_mode = trigger_mode,
  186. )
  187. # eth devnet
  188. docker_build(
  189. ref = "eth-node",
  190. context = "./ethereum",
  191. dockerfile = "./ethereum/Dockerfile",
  192. # ignore local node_modules (in case they're present)
  193. ignore = ["./ethereum/node_modules"],
  194. # sync external scripts for incremental development
  195. # (everything else needs to be restarted from scratch for determinism)
  196. #
  197. # This relies on --update-mode=exec to work properly with a non-root user.
  198. # https://github.com/tilt-dev/tilt/issues/3708
  199. live_update = [
  200. sync("./ethereum/src", "/home/node/app/src"),
  201. ],
  202. )
  203. if pyth:
  204. # pyth autopublisher
  205. docker_build(
  206. ref = "pyth",
  207. context = ".",
  208. dockerfile = "third_party/pyth/Dockerfile.pyth",
  209. )
  210. k8s_yaml_with_ns("./devnet/pyth.yaml")
  211. k8s_resource(
  212. "pyth",
  213. resource_deps = ["solana-devnet"],
  214. labels = ["pyth"],
  215. trigger_mode = trigger_mode,
  216. )
  217. # pyth2wormhole client autoattester
  218. docker_build(
  219. ref = "p2w-attest",
  220. context = ".",
  221. only = ["./solana", "./third_party"],
  222. dockerfile = "./third_party/pyth/Dockerfile.p2w-attest",
  223. ignore = ["./solana/*/target"],
  224. )
  225. # Automatic pyth2wormhole relay, showcasing p2w-sdk
  226. docker_build(
  227. ref = "p2w-integration-observer",
  228. context = ".",
  229. dockerfile = "./third_party/pyth/p2w-integration-observer/Dockerfile",
  230. )
  231. k8s_yaml_with_ns("devnet/p2w-attest.yaml")
  232. k8s_resource(
  233. "p2w-attest",
  234. resource_deps = ["solana-devnet", "pyth", "guardian"],
  235. port_forwards = [],
  236. labels = ["pyth"],
  237. trigger_mode = trigger_mode,
  238. )
  239. k8s_yaml_with_ns("devnet/p2w-integration-observer.yaml")
  240. k8s_resource(
  241. "p2w-integration-observer",
  242. resource_deps = ["solana-devnet", "eth-devnet", "pyth", "guardian", "p2w-attest", "proto-gen-web", "wasm-gen"],
  243. port_forwards = [],
  244. labels = ["pyth"]
  245. )
  246. # Terra relay
  247. docker_build(
  248. ref = "p2w-terra-relay",
  249. context = ".",
  250. dockerfile = "third_party/pyth/p2w-terra-relay/Dockerfile.pyth_relay",
  251. )
  252. k8s_yaml_with_ns("devnet/p2w-terra-relay.yaml")
  253. k8s_resource(
  254. "p2w-terra-relay",
  255. resource_deps = ["pyth", "p2w-attest", "spy", "terra-terrad"],
  256. port_forwards = [
  257. port_forward(4200, name = "Rest API (Status + Query) [:4200]", host = webHost),
  258. port_forward(8081, name = "Prometheus [:8081]", host = webHost)],
  259. labels = ["pyth"]
  260. )
  261. k8s_yaml_with_ns("devnet/eth-devnet.yaml")
  262. k8s_resource(
  263. "eth-devnet",
  264. port_forwards = [
  265. port_forward(8545, name = "Ganache RPC [:8545]", host = webHost),
  266. ],
  267. labels = ["evm"],
  268. trigger_mode = trigger_mode,
  269. )
  270. k8s_resource(
  271. "eth-devnet2",
  272. port_forwards = [
  273. port_forward(8546, name = "Ganache RPC [:8546]", host = webHost),
  274. ],
  275. labels = ["evm"],
  276. trigger_mode = trigger_mode,
  277. )
  278. if bridge_ui:
  279. entrypoint = "npm run build && /app/node_modules/.bin/serve -s build -n"
  280. live_update = []
  281. if bridge_ui_hot:
  282. entrypoint = "npm start"
  283. live_update = [
  284. sync("./bridge_ui/public", "/app/public"),
  285. sync("./bridge_ui/src", "/app/src"),
  286. ]
  287. docker_build(
  288. ref = "bridge-ui",
  289. context = ".",
  290. only = ["./bridge_ui"],
  291. dockerfile = "bridge_ui/Dockerfile",
  292. entrypoint = entrypoint,
  293. live_update = live_update,
  294. )
  295. k8s_yaml_with_ns("devnet/bridge-ui.yaml")
  296. k8s_resource(
  297. "bridge-ui",
  298. resource_deps = [],
  299. port_forwards = [
  300. port_forward(3000, name = "Bridge UI [:3000]", host = webHost),
  301. ],
  302. labels = ["portal"],
  303. trigger_mode = trigger_mode,
  304. )
  305. if ci_tests:
  306. docker_build(
  307. ref = "tests-image",
  308. context = ".",
  309. dockerfile = "testing/Dockerfile.tests",
  310. only = [],
  311. live_update = [
  312. sync("./spydk/js/src", "/app/spydk/js/src"),
  313. sync("./sdk/js/src", "/app/sdk/js/src"),
  314. sync("./testing", "/app/testing"),
  315. sync("./bridge_ui/src", "/app/bridge_ui/src"),
  316. ],
  317. )
  318. k8s_yaml_with_ns("devnet/tests.yaml")
  319. k8s_resource(
  320. "ci-tests",
  321. resource_deps = ["proto-gen-web", "wasm-gen", "eth-devnet", "eth-devnet2", "terra-terrad", "terra-fcd", "solana-devnet", "spy", "guardian"],
  322. labels = ["ci"],
  323. trigger_mode = trigger_mode,
  324. )
  325. # algorand
  326. k8s_yaml_with_ns("devnet/algorand.yaml")
  327. docker_build(
  328. ref = "algorand",
  329. context = "third_party/algorand",
  330. dockerfile = "third_party/algorand/Dockerfile",
  331. )
  332. k8s_resource(
  333. "algorand",
  334. resource_deps = ["teal-gen"],
  335. port_forwards = [
  336. port_forward(4001, name = "Algorand RPC [:4001]", host = webHost),
  337. port_forward(4002, name = "Algorand KMD [:4002]", host = webHost),
  338. ],
  339. labels = ["algorand"],
  340. trigger_mode = trigger_mode,
  341. )
  342. # e2e
  343. if e2e:
  344. k8s_yaml_with_ns("devnet/e2e.yaml")
  345. docker_build(
  346. ref = "e2e",
  347. context = "e2e",
  348. dockerfile = "e2e/Dockerfile",
  349. network = "host",
  350. )
  351. k8s_resource(
  352. "e2e",
  353. port_forwards = [
  354. port_forward(6080, name = "VNC [:6080]", host = webHost, link_path = "/vnc_auto.html"),
  355. ],
  356. labels = ["ci"],
  357. trigger_mode = trigger_mode,
  358. )
  359. # bigtable
  360. if explorer:
  361. k8s_yaml_with_ns("devnet/bigtable.yaml")
  362. k8s_resource(
  363. "bigtable-emulator",
  364. port_forwards = [port_forward(8086, name = "BigTable clients [:8086]", host = webHost)],
  365. labels = ["explorer"],
  366. trigger_mode = trigger_mode,
  367. )
  368. k8s_resource("pubsub-emulator",
  369. port_forwards = [port_forward(8085, name = "PubSub listeners [:8085]")],
  370. labels = ["explorer"],
  371. )
  372. docker_build(
  373. ref = "cloud-functions",
  374. context = "./event_database/cloud_functions",
  375. dockerfile = "./event_database/cloud_functions/Dockerfile",
  376. live_update = [
  377. sync("./event_database/cloud_functions", "/app"),
  378. ],
  379. )
  380. k8s_resource(
  381. "cloud-functions",
  382. resource_deps = ["proto-gen", "bigtable-emulator", "pubsub-emulator"],
  383. port_forwards = [port_forward(8090, name = "Cloud Functions [:8090]")],
  384. labels = ["explorer"],
  385. trigger_mode = trigger_mode,
  386. )
  387. # explorer web app
  388. docker_build(
  389. ref = "explorer",
  390. context = "./explorer",
  391. dockerfile = "./explorer/Dockerfile",
  392. ignore = ["./explorer/node_modules"],
  393. live_update = [
  394. sync("./explorer/src", "/home/node/app/src"),
  395. sync("./explorer/public", "/home/node/app/public"),
  396. ],
  397. )
  398. k8s_yaml_with_ns("devnet/explorer.yaml")
  399. k8s_resource(
  400. "explorer",
  401. port_forwards = [
  402. port_forward(8001, name = "Explorer Web UI [:8001]", host = webHost),
  403. ],
  404. labels = ["explorer"],
  405. trigger_mode = trigger_mode,
  406. )
  407. # terra devnet
  408. docker_build(
  409. ref = "terra-image",
  410. context = "./terra/devnet",
  411. dockerfile = "terra/devnet/Dockerfile",
  412. )
  413. docker_build(
  414. ref = "terra-contracts",
  415. context = ".",
  416. dockerfile = "Dockerfile.terra",
  417. )
  418. k8s_yaml_with_ns("devnet/terra-devnet.yaml")
  419. k8s_resource(
  420. "terra-terrad",
  421. port_forwards = [
  422. port_forward(26657, name = "Terra RPC [:26657]", host = webHost),
  423. port_forward(1317, name = "Terra LCD [:1317]", host = webHost),
  424. ],
  425. labels = ["terra"],
  426. trigger_mode = trigger_mode,
  427. )
  428. k8s_resource(
  429. "terra-postgres",
  430. labels = ["terra"],
  431. trigger_mode = trigger_mode,
  432. )
  433. k8s_resource(
  434. "terra-fcd",
  435. resource_deps = ["terra-terrad", "terra-postgres"],
  436. port_forwards = [port_forward(3060, name = "Terra FCD [:3060]", host = webHost)],
  437. labels = ["terra"],
  438. trigger_mode = trigger_mode,
  439. )