Tiltfile 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904
  1. # This Tiltfile contains the deployment and build config for the Wormhole devnet.
  2. #
  3. # We use Buildkit cache mounts and careful layering to avoid unnecessary rebuilds - almost
  4. # all source code changes result in small, incremental rebuilds. Dockerfiles are written such
  5. # that, for example, changing the contract source code won't cause Solana itself to be rebuilt.
  6. #
  7. load("ext://namespace", "namespace_create", "namespace_inject")
  8. load("ext://secret", "secret_yaml_generic")
  9. # set the replica value of a StatefulSet
  10. def set_replicas_in_statefulset(config_yaml, statefulset_name, num_replicas):
  11. for obj in config_yaml:
  12. if obj["kind"] == "StatefulSet" and obj["metadata"]["name"] == statefulset_name:
  13. obj["spec"]["replicas"] = num_replicas
  14. return config_yaml
  15. # set the env value of all containers in all jobs
  16. def set_env_in_jobs(config_yaml, name, value):
  17. for obj in config_yaml:
  18. if obj["kind"] == "Job":
  19. for container in obj["spec"]["template"]["spec"]["containers"]:
  20. if not "env" in container:
  21. container["env"] = []
  22. container["env"].append({"name": name, "value": value})
  23. return config_yaml
  24. allow_k8s_contexts("ci")
  25. # Disable telemetry by default
  26. analytics_settings(False)
  27. # Moar updates (default is 3)
  28. update_settings(max_parallel_updates = 10)
  29. # Runtime configuration
  30. config.define_bool("ci", False, "We are running in CI")
  31. config.define_bool("manual", False, "Set TRIGGER_MODE_MANUAL by default")
  32. config.define_string("num", False, "Number of guardian nodes to run")
  33. # You do not usually need to set this argument - this argument is for debugging only. If you do use a different
  34. # namespace, note that the "wormhole" namespace is hardcoded in tests and don't forget specifying the argument
  35. # when running "tilt down".
  36. #
  37. config.define_string("namespace", False, "Kubernetes namespace to use")
  38. # When running Tilt on a server, this can be used to set the public hostname Tilt runs on
  39. # for service links in the UI to work.
  40. config.define_string("webHost", False, "Public hostname for port forwards")
  41. # When running Tilt on a server, this can be used to set the public hostname Tilt runs on
  42. # for service links in the UI to work.
  43. config.define_string("guardiand_loglevel", False, "Log level for guardiand (debug, info, warn, error, dpanic, panic, fatal)")
  44. # Components
  45. config.define_bool("near", False, "Enable Near component")
  46. config.define_bool("sui", False, "Enable Sui component")
  47. config.define_bool("btc", False, "Enable BTC component")
  48. config.define_bool("aptos", False, "Enable Aptos component")
  49. config.define_bool("algorand", False, "Enable Algorand component")
  50. config.define_bool("evm2", False, "Enable second Eth component")
  51. config.define_bool("solana", False, "Enable Solana component")
  52. config.define_bool("pythnet", False, "Enable PythNet component")
  53. config.define_bool("terra_classic", False, "Enable Terra Classic component")
  54. config.define_bool("terra2", False, "Enable Terra 2 component")
  55. config.define_bool("ci_tests", False, "Enable tests runner component")
  56. config.define_bool("guardiand_debug", False, "Enable dlv endpoint for guardiand")
  57. config.define_bool("node_metrics", False, "Enable Prometheus & Grafana for Guardian metrics")
  58. config.define_bool("guardiand_governor", False, "Enable chain governor in guardiand")
  59. config.define_bool("wormchain", False, "Enable a wormchain node")
  60. config.define_bool("ibc_relayer", False, "Enable IBC relayer between cosmos chains")
  61. config.define_bool("redis", False, "Enable a redis instance")
  62. config.define_bool("generic_relayer", False, "Enable the generic relayer off-chain component")
  63. config.define_bool("query_server", False, "Enable cross-chain query server")
  64. cfg = config.parse()
  65. num_guardians = int(cfg.get("num", "1"))
  66. namespace = cfg.get("namespace", "wormhole")
  67. webHost = cfg.get("webHost", "localhost")
  68. ci = cfg.get("ci", False)
  69. algorand = cfg.get("algorand", ci)
  70. near = cfg.get("near", ci)
  71. aptos = cfg.get("aptos", ci)
  72. sui = cfg.get("sui", ci)
  73. evm2 = cfg.get("evm2", ci)
  74. solana = cfg.get("solana", ci)
  75. pythnet = cfg.get("pythnet", False)
  76. terra_classic = cfg.get("terra_classic", ci)
  77. terra2 = cfg.get("terra2", ci)
  78. wormchain = cfg.get("wormchain", ci)
  79. ci_tests = cfg.get("ci_tests", ci)
  80. guardiand_debug = cfg.get("guardiand_debug", False)
  81. node_metrics = cfg.get("node_metrics", False)
  82. guardiand_governor = cfg.get("guardiand_governor", False)
  83. ibc_relayer = cfg.get("ibc_relayer", ci)
  84. btc = cfg.get("btc", False)
  85. redis = cfg.get('redis', ci)
  86. generic_relayer = cfg.get("generic_relayer", ci)
  87. query_server = cfg.get("query_server", ci)
  88. if ci:
  89. guardiand_loglevel = cfg.get("guardiand_loglevel", "warn")
  90. else:
  91. guardiand_loglevel = cfg.get("guardiand_loglevel", "info")
  92. if cfg.get("manual", False):
  93. trigger_mode = TRIGGER_MODE_MANUAL
  94. else:
  95. trigger_mode = TRIGGER_MODE_AUTO
  96. # namespace
  97. if not ci:
  98. namespace_create(namespace)
  99. def k8s_yaml_with_ns(objects):
  100. return k8s_yaml(namespace_inject(objects, namespace))
  101. docker_build(
  102. ref = "cli-gen",
  103. context = ".",
  104. dockerfile = "Dockerfile.cli",
  105. )
  106. docker_build(
  107. ref = "const-gen",
  108. context = ".",
  109. dockerfile = "Dockerfile.const",
  110. build_args={"num_guardians": '%s' % (num_guardians)},
  111. )
  112. # node
  113. docker_build(
  114. ref = "guardiand-image",
  115. context = ".",
  116. dockerfile = "node/Dockerfile",
  117. target = "build",
  118. ignore=["./sdk/js", "./relayer"]
  119. )
  120. def command_with_dlv(argv):
  121. return [
  122. "/dlv",
  123. "--listen=0.0.0.0:2345",
  124. "--accept-multiclient",
  125. "--headless=true",
  126. "--api-version=2",
  127. "--continue=true",
  128. "exec",
  129. argv[0],
  130. "--",
  131. ] + argv[1:]
  132. def build_node_yaml():
  133. node_yaml = read_yaml_stream("devnet/node.yaml")
  134. node_yaml_with_replicas = set_replicas_in_statefulset(node_yaml, "guardian", num_guardians)
  135. for obj in node_yaml_with_replicas:
  136. if obj["kind"] == "StatefulSet" and obj["metadata"]["name"] == "guardian":
  137. container = obj["spec"]["template"]["spec"]["containers"][0]
  138. if container["name"] != "guardiand":
  139. fail("container 0 is not guardiand")
  140. container["command"] += ["--logLevel="+guardiand_loglevel]
  141. if guardiand_debug:
  142. container["command"] = command_with_dlv(container["command"])
  143. print(container["command"])
  144. if aptos:
  145. container["command"] += [
  146. "--aptosRPC",
  147. "http://aptos:8080",
  148. "--aptosAccount",
  149. "de0036a9600559e295d5f6802ef6f3f802f510366e0c23912b0655d972166017",
  150. "--aptosHandle",
  151. "0xde0036a9600559e295d5f6802ef6f3f802f510366e0c23912b0655d972166017::state::WormholeMessageHandle",
  152. ]
  153. if sui:
  154. container["command"] += [
  155. "--suiRPC",
  156. "http://sui:9000",
  157. "--suiMoveEventType",
  158. "0x7f6cebb8a489654d7a759483bd653c4be3e5ccfef17a8b5fd3ba98bd072fabc3::publish_message::WormholeMessage",
  159. "--suiWS",
  160. "ws://sui:9000",
  161. ]
  162. if evm2:
  163. container["command"] += [
  164. "--bscRPC",
  165. "ws://eth-devnet2:8545",
  166. ]
  167. else:
  168. container["command"] += [
  169. "--bscRPC",
  170. "ws://eth-devnet:8545",
  171. ]
  172. if solana:
  173. container["command"] += [
  174. "--solanaRPC",
  175. "http://solana-devnet:8899",
  176. ]
  177. if pythnet:
  178. container["command"] += [
  179. "--pythnetRPC",
  180. # "http://solana-devnet:8899",
  181. "http://pythnet.rpcpool.com",
  182. "--pythnetWS",
  183. # "ws://solana-devnet:8900",
  184. "wss://pythnet.rpcpool.com",
  185. "--pythnetContract",
  186. "H3fxXJ86ADW2PNuDDmZJg6mzTtPxkYCpNuQUTgmJ7AjU",
  187. ]
  188. if terra_classic:
  189. container["command"] += [
  190. "--terraWS",
  191. "ws://terra-terrad:26657/websocket",
  192. "--terraLCD",
  193. "http://terra-terrad:1317",
  194. "--terraContract",
  195. "terra14hj2tavq8fpesdwxxcu44rty3hh90vhujrvcmstl4zr3txmfvw9ssrc8au",
  196. ]
  197. if terra2:
  198. container["command"] += [
  199. "--terra2WS",
  200. "ws://terra2-terrad:26657/websocket",
  201. "--terra2LCD",
  202. "http://terra2-terrad:1317",
  203. "--terra2Contract",
  204. "terra14hj2tavq8fpesdwxxcu44rty3hh90vhujrvcmstl4zr3txmfvw9ssrc8au",
  205. ]
  206. if algorand:
  207. container["command"] += [
  208. "--algorandAppID",
  209. "1004",
  210. "--algorandIndexerRPC",
  211. "http://algorand:8980",
  212. "--algorandIndexerToken",
  213. "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
  214. "--algorandAlgodRPC",
  215. "http://algorand:4001",
  216. "--algorandAlgodToken",
  217. "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
  218. ]
  219. if guardiand_governor:
  220. container["command"] += [
  221. "--chainGovernorEnabled"
  222. ]
  223. if near:
  224. container["command"] += [
  225. "--nearRPC",
  226. "http://near:3030",
  227. "--nearContract",
  228. "wormhole.test.near"
  229. ]
  230. if wormchain:
  231. container["command"] += [
  232. "--wormchainURL",
  233. "wormchain:9090",
  234. "--accountantContract",
  235. "wormhole14hj2tavq8fpesdwxxcu44rty3hh90vhujrvcmstl4zr3txmfvw9srrg465",
  236. "--accountantKeyPath",
  237. "/tmp/mounted-keys/wormchain/accountantKey",
  238. "--accountantKeyPassPhrase",
  239. "test0000",
  240. "--accountantWS",
  241. "http://wormchain:26657",
  242. "--accountantCheckEnabled",
  243. "true",
  244. "--ibcContract",
  245. "wormhole1nc5tatafv6eyq7llkr2gv50ff9e22mnf70qgjlv737ktmt4eswrq0kdhcj",
  246. "--ibcWS",
  247. "ws://wormchain:26657/websocket",
  248. "--ibcLCD",
  249. "http://wormchain:1317",
  250. "--gatewayRelayerContract",
  251. "wormhole17p9rzwnnfxcjp32un9ug7yhhzgtkhvl9jfksztgw5uh69wac2pgshdnj3k",
  252. "--gatewayRelayerKeyPath",
  253. "/tmp/mounted-keys/wormchain/gwrelayerKey",
  254. "--gatewayRelayerKeyPassPhrase",
  255. "test0000",
  256. "--gatewayContract",
  257. "wormhole17p9rzwnnfxcjp32un9ug7yhhzgtkhvl9jfksztgw5uh69wac2pgshdnj3k",
  258. "--gatewayWS",
  259. "ws://wormchain:26657/websocket",
  260. "--gatewayLCD",
  261. "http://wormchain:1317"
  262. ]
  263. return encode_yaml_stream(node_yaml_with_replicas)
  264. k8s_yaml_with_ns(build_node_yaml())
  265. guardian_resource_deps = ["eth-devnet"]
  266. if evm2:
  267. guardian_resource_deps = guardian_resource_deps + ["eth-devnet2"]
  268. if solana or pythnet:
  269. guardian_resource_deps = guardian_resource_deps + ["solana-devnet"]
  270. if near:
  271. guardian_resource_deps = guardian_resource_deps + ["near"]
  272. if terra_classic:
  273. guardian_resource_deps = guardian_resource_deps + ["terra-terrad"]
  274. if terra2:
  275. guardian_resource_deps = guardian_resource_deps + ["terra2-terrad"]
  276. if algorand:
  277. guardian_resource_deps = guardian_resource_deps + ["algorand"]
  278. if aptos:
  279. guardian_resource_deps = guardian_resource_deps + ["aptos"]
  280. if wormchain:
  281. guardian_resource_deps = guardian_resource_deps + ["wormchain", "wormchain-deploy"]
  282. if sui:
  283. guardian_resource_deps = guardian_resource_deps + ["sui"]
  284. k8s_resource(
  285. "guardian",
  286. resource_deps = guardian_resource_deps,
  287. port_forwards = [
  288. port_forward(6060, name = "Debug/Status Server [:6060]", host = webHost),
  289. port_forward(7070, name = "Public gRPC [:7070]", host = webHost),
  290. port_forward(7071, name = "Public REST [:7071]", host = webHost),
  291. port_forward(2345, name = "Debugger [:2345]", host = webHost),
  292. ],
  293. labels = ["guardian"],
  294. trigger_mode = trigger_mode,
  295. )
  296. # guardian set update - triggered by "tilt args" changes
  297. if num_guardians >= 2 and ci == False:
  298. local_resource(
  299. name = "guardian-set-update",
  300. resource_deps = guardian_resource_deps + ["guardian"],
  301. deps = ["scripts/send-vaa.sh", "clients/eth"],
  302. cmd = './scripts/update-guardian-set.sh %s %s %s' % (num_guardians, webHost, namespace),
  303. labels = ["guardian"],
  304. trigger_mode = trigger_mode,
  305. )
  306. # grafana + prometheus for node metrics
  307. if node_metrics:
  308. dashboard = read_json("dashboards/Wormhole.json")
  309. dashboard_yaml = {
  310. "apiVersion": "v1",
  311. "kind": "ConfigMap",
  312. "metadata": {
  313. "name": "grafana-dashboards-json"
  314. },
  315. "data": {
  316. "wormhole.json": encode_json(dashboard)
  317. }
  318. }
  319. k8s_yaml_with_ns(encode_yaml(dashboard_yaml))
  320. k8s_yaml_with_ns("devnet/node-metrics.yaml")
  321. k8s_resource(
  322. "prometheus-server",
  323. resource_deps = ["guardian"],
  324. port_forwards = [
  325. port_forward(9099, name = "Prometheus [:9099]", host = webHost),
  326. ],
  327. labels = ["guardian"],
  328. trigger_mode = trigger_mode,
  329. )
  330. k8s_resource(
  331. "grafana",
  332. resource_deps = ["prometheus-server"],
  333. port_forwards = [
  334. port_forward(3033, name = "Grafana UI [:3033]", host = webHost),
  335. ],
  336. labels = ["guardian"],
  337. trigger_mode = trigger_mode,
  338. )
  339. # spy
  340. k8s_yaml_with_ns("devnet/spy.yaml")
  341. k8s_resource(
  342. "spy",
  343. resource_deps = ["guardian"],
  344. port_forwards = [
  345. port_forward(6061, container_port = 6060, name = "Debug/Status Server [:6061]", host = webHost),
  346. port_forward(7072, name = "Spy gRPC [:7072]", host = webHost),
  347. ],
  348. labels = ["guardian"],
  349. trigger_mode = trigger_mode,
  350. )
  351. if solana or pythnet:
  352. # solana client cli (used for devnet setup)
  353. docker_build(
  354. ref = "bridge-client",
  355. context = ".",
  356. only = ["./proto", "./solana", "./clients"],
  357. dockerfile = "solana/Dockerfile.client",
  358. # Ignore target folders from local (non-container) development.
  359. ignore = ["./solana/*/target"],
  360. )
  361. # solana smart contract
  362. docker_build(
  363. ref = "solana-contract",
  364. context = "solana",
  365. dockerfile = "solana/Dockerfile",
  366. target = "builder",
  367. build_args = {"BRIDGE_ADDRESS": "Bridge1p5gheXUvJ6jGWGeCsgPKgnE3YgdGKRVCMY9o"}
  368. )
  369. # solana local devnet
  370. k8s_yaml_with_ns("devnet/solana-devnet.yaml")
  371. k8s_resource(
  372. "solana-devnet",
  373. port_forwards = [
  374. port_forward(8899, name = "Solana RPC [:8899]", host = webHost),
  375. port_forward(8900, name = "Solana WS [:8900]", host = webHost),
  376. ],
  377. labels = ["solana"],
  378. trigger_mode = trigger_mode,
  379. )
  380. # eth devnet
  381. docker_build(
  382. ref = "eth-node",
  383. context = "./ethereum",
  384. dockerfile = "./ethereum/Dockerfile",
  385. # ignore local node_modules (in case they're present)
  386. ignore = ["./node_modules"],
  387. build_args = {"num_guardians": str(num_guardians), "dev": str(not ci)},
  388. # sync external scripts for incremental development
  389. # (everything else needs to be restarted from scratch for determinism)
  390. #
  391. # This relies on --update-mode=exec to work properly with a non-root user.
  392. # https://github.com/tilt-dev/tilt/issues/3708
  393. live_update = [
  394. sync("./ethereum/src", "/home/node/app/src"),
  395. ],
  396. )
  397. if redis or generic_relayer:
  398. docker_build(
  399. ref = "redis",
  400. context = ".",
  401. only = ["./third_party"],
  402. dockerfile = "third_party/redis/Dockerfile",
  403. )
  404. if redis:
  405. k8s_resource(
  406. "redis",
  407. port_forwards = [
  408. port_forward(6379, name = "Redis Default [:6379]", host = webHost),
  409. ],
  410. labels = ["redis"],
  411. trigger_mode = trigger_mode,
  412. )
  413. k8s_yaml_with_ns("devnet/redis.yaml")
  414. if generic_relayer:
  415. k8s_resource(
  416. "redis-relayer",
  417. port_forwards = [
  418. port_forward(6378, name = "Generic Relayer Redis [:6378]", host = webHost),
  419. ],
  420. labels = ["redis-relayer"],
  421. trigger_mode = trigger_mode,
  422. )
  423. k8s_yaml_with_ns("devnet/redis-relayer.yaml")
  424. if generic_relayer:
  425. k8s_resource(
  426. "relayer-engine",
  427. resource_deps = ["guardian", "redis-relayer", "spy"],
  428. port_forwards = [
  429. port_forward(3003, container_port=3000, name = "Bullmq UI [:3003]", host = webHost),
  430. ],
  431. labels = ["relayer-engine"],
  432. trigger_mode = trigger_mode,
  433. )
  434. docker_build(
  435. ref = "relayer-engine",
  436. context = ".",
  437. only = ["./relayer/generic_relayer", "./ethereum/ts-scripts/relayer/config"],
  438. dockerfile = "relayer/generic_relayer/relayer-engine-v2/Dockerfile",
  439. build_args = {"dev": str(not ci)}
  440. )
  441. k8s_yaml_with_ns("devnet/relayer-engine.yaml")
  442. k8s_yaml_with_ns("devnet/eth-devnet.yaml")
  443. k8s_resource(
  444. "eth-devnet",
  445. port_forwards = [
  446. port_forward(8545, name = "Ganache RPC [:8545]", host = webHost),
  447. ],
  448. labels = ["evm"],
  449. trigger_mode = trigger_mode,
  450. )
  451. if evm2:
  452. k8s_yaml_with_ns("devnet/eth-devnet2.yaml")
  453. k8s_resource(
  454. "eth-devnet2",
  455. port_forwards = [
  456. port_forward(8546, name = "Ganache RPC [:8546]", host = webHost),
  457. ],
  458. labels = ["evm"],
  459. trigger_mode = trigger_mode,
  460. )
  461. if ci_tests:
  462. docker_build(
  463. ref = "sdk-test-image",
  464. context = ".",
  465. dockerfile = "testing/Dockerfile.sdk.test",
  466. only = [],
  467. live_update = [
  468. sync("./sdk/js/src", "/app/sdk/js/src"),
  469. sync("./testing", "/app/testing"),
  470. ],
  471. )
  472. docker_build(
  473. ref = "spydk-test-image",
  474. context = ".",
  475. dockerfile = "testing/Dockerfile.spydk.test",
  476. only = [],
  477. live_update = [
  478. sync("./spydk/js/src", "/app/spydk/js/src"),
  479. sync("./testing", "/app/testing"),
  480. ],
  481. )
  482. docker_build(
  483. ref = "query-sdk-test-image",
  484. context = ".",
  485. dockerfile = "testing/Dockerfile.querysdk.test",
  486. only = [],
  487. live_update = [
  488. sync("./sdk/js/src", "/app/sdk/js-query/src"),
  489. sync("./testing", "/app/testing"),
  490. ],
  491. )
  492. k8s_yaml_with_ns(encode_yaml_stream(set_env_in_jobs(read_yaml_stream("devnet/tests.yaml"), "NUM_GUARDIANS", str(num_guardians))))
  493. # separate resources to parallelize docker builds
  494. k8s_resource(
  495. "sdk-ci-tests",
  496. labels = ["ci"],
  497. trigger_mode = trigger_mode,
  498. resource_deps = [], # testing/sdk.sh handles waiting for spy, not having deps gets the build earlier
  499. )
  500. k8s_resource(
  501. "spydk-ci-tests",
  502. labels = ["ci"],
  503. trigger_mode = trigger_mode,
  504. resource_deps = [], # testing/spydk.sh handles waiting for spy, not having deps gets the build earlier
  505. )
  506. k8s_resource(
  507. "accountant-ci-tests",
  508. labels = ["ci"],
  509. trigger_mode = trigger_mode,
  510. resource_deps = [], # uses devnet-consts.json, but wormchain/contracts/tools/test_accountant.sh handles waiting for guardian, not having deps gets the build earlier
  511. )
  512. k8s_resource(
  513. "query-ci-tests",
  514. labels = ["ci"],
  515. trigger_mode = trigger_mode,
  516. resource_deps = [], # node/hack/query/test/test_query.sh handles waiting for guardian, not having deps gets the build earlier
  517. )
  518. k8s_resource(
  519. "query-sdk-ci-tests",
  520. labels = ["ci"],
  521. trigger_mode = trigger_mode,
  522. resource_deps = [], # testing/querysdk.sh handles waiting for query-server, not having deps gets the build earlier
  523. )
  524. if terra_classic:
  525. docker_build(
  526. ref = "terra-image",
  527. context = "./terra/devnet",
  528. dockerfile = "terra/devnet/Dockerfile",
  529. )
  530. docker_build(
  531. ref = "terra-contracts",
  532. context = "./terra",
  533. dockerfile = "./terra/Dockerfile",
  534. )
  535. k8s_yaml_with_ns("devnet/terra-devnet.yaml")
  536. k8s_resource(
  537. "terra-terrad",
  538. port_forwards = [
  539. port_forward(26657, name = "Terra RPC [:26657]", host = webHost),
  540. port_forward(1317, name = "Terra LCD [:1317]", host = webHost),
  541. ],
  542. labels = ["terra"],
  543. trigger_mode = trigger_mode,
  544. )
  545. if terra2 or wormchain:
  546. docker_build(
  547. ref = "cosmwasm_artifacts",
  548. context = ".",
  549. dockerfile = "./cosmwasm/Dockerfile",
  550. target = "artifacts",
  551. )
  552. if terra2:
  553. docker_build(
  554. ref = "terra2-image",
  555. context = "./cosmwasm/deployment/terra2/devnet",
  556. dockerfile = "./cosmwasm/deployment/terra2/devnet/Dockerfile",
  557. )
  558. docker_build(
  559. ref = "terra2-deploy",
  560. context = "./cosmwasm/deployment/terra2",
  561. dockerfile = "./cosmwasm/Dockerfile.deploy",
  562. )
  563. k8s_yaml_with_ns("devnet/terra2-devnet.yaml")
  564. k8s_resource(
  565. "terra2-terrad",
  566. port_forwards = [
  567. port_forward(26658, container_port = 26657, name = "Terra 2 RPC [:26658]", host = webHost),
  568. port_forward(1318, container_port = 1317, name = "Terra 2 LCD [:1318]", host = webHost),
  569. ],
  570. labels = ["terra2"],
  571. trigger_mode = trigger_mode,
  572. )
  573. if algorand:
  574. k8s_yaml_with_ns("devnet/algorand-devnet.yaml")
  575. docker_build(
  576. ref = "algorand-algod",
  577. context = "algorand/sandbox-algorand",
  578. dockerfile = "algorand/sandbox-algorand/images/algod/Dockerfile"
  579. )
  580. docker_build(
  581. ref = "algorand-indexer",
  582. context = "algorand/sandbox-algorand",
  583. dockerfile = "algorand/sandbox-algorand/images/indexer/Dockerfile"
  584. )
  585. docker_build(
  586. ref = "algorand-contracts",
  587. context = "algorand",
  588. dockerfile = "algorand/Dockerfile",
  589. ignore = ["algorand/test/*.*"]
  590. )
  591. k8s_resource(
  592. "algorand",
  593. port_forwards = [
  594. port_forward(4001, name = "Algod [:4001]", host = webHost),
  595. port_forward(4002, name = "KMD [:4002]", host = webHost),
  596. port_forward(8980, name = "Indexer [:8980]", host = webHost),
  597. ],
  598. labels = ["algorand"],
  599. trigger_mode = trigger_mode,
  600. )
  601. if sui:
  602. k8s_yaml_with_ns("devnet/sui-devnet.yaml")
  603. docker_build(
  604. ref = "sui-node",
  605. target = "sui",
  606. context = ".",
  607. dockerfile = "sui/Dockerfile",
  608. ignore = ["./sui/sui.log*", "sui/sui.log*", "sui.log.*"],
  609. only = ["./sui"],
  610. )
  611. k8s_resource(
  612. "sui",
  613. port_forwards = [
  614. port_forward(9000, 9000, name = "RPC [:9000]", host = webHost),
  615. port_forward(5003, name = "Faucet [:5003]", host = webHost),
  616. port_forward(9184, name = "Prometheus [:9184]", host = webHost),
  617. ],
  618. labels = ["sui"],
  619. trigger_mode = trigger_mode,
  620. )
  621. if near:
  622. k8s_yaml_with_ns("devnet/near-devnet.yaml")
  623. docker_build(
  624. ref = "near-node",
  625. context = "near",
  626. dockerfile = "near/Dockerfile",
  627. only = ["Dockerfile", "node_builder.sh", "start_node.sh", "README.md"],
  628. )
  629. docker_build(
  630. ref = "near-deploy",
  631. context = "near",
  632. dockerfile = "near/Dockerfile.deploy",
  633. ignore = ["./test"]
  634. )
  635. k8s_resource(
  636. "near",
  637. port_forwards = [
  638. port_forward(3030, name = "Node [:3030]", host = webHost),
  639. port_forward(3031, name = "webserver [:3031]", host = webHost),
  640. ],
  641. labels = ["near"],
  642. trigger_mode = trigger_mode,
  643. )
  644. if wormchain:
  645. docker_build(
  646. ref = "wormchaind-image",
  647. context = ".",
  648. dockerfile = "./wormchain/Dockerfile",
  649. build_args = {"num_guardians": str(num_guardians)},
  650. only = [],
  651. ignore = ["./wormchain/testing", "./wormchain/ts-sdk", "./wormchain/design", "./wormchain/vue", "./wormchain/build/wormchaind"],
  652. )
  653. docker_build(
  654. ref = "vue-export",
  655. context = ".",
  656. dockerfile = "./wormchain/Dockerfile.proto",
  657. target = "vue-export",
  658. )
  659. docker_build(
  660. ref = "wormchain-deploy",
  661. context = "./wormchain",
  662. dockerfile = "./wormchain/Dockerfile.deploy",
  663. )
  664. def build_wormchain_yaml(yaml_path, num_instances):
  665. wormchain_yaml = read_yaml_stream(yaml_path)
  666. # set the number of replicas in the StatefulSet to be num_guardians
  667. wormchain_set = set_replicas_in_statefulset(wormchain_yaml, "wormchain", num_instances)
  668. # add a Service for each wormchain instance
  669. services = []
  670. for obj in wormchain_set:
  671. if obj["kind"] == "Service" and obj["metadata"]["name"] == "wormchain-0":
  672. # make a Service for each replica so we can resolve it by name from other pods.
  673. # copy wormchain-0's Service then set the name and selector for the instance.
  674. for instance_num in list(range(1, num_instances)):
  675. instance_name = 'wormchain-%s' % (instance_num)
  676. # Copy the Service's properties to a new dict, by value, three levels deep.
  677. # tl;dr - if the value is a dict, use a comprehension to copy it immutably.
  678. service = { k: ({ k2: ({ k3:v3
  679. for (k3,v3) in v2.items()} if type(v2) == "dict" else v2)
  680. for (k2,v2) in v.items()} if type(v) == "dict" else v)
  681. for (k,v) in obj.items()}
  682. # add the name we want to be able to resolve via k8s DNS
  683. service["metadata"]["name"] = instance_name
  684. # add the name of the pod the service should connect to
  685. service["spec"]["selector"] = { "statefulset.kubernetes.io/pod-name": instance_name }
  686. services.append(service)
  687. return encode_yaml_stream(wormchain_set + services)
  688. wormchain_path = "devnet/wormchain.yaml"
  689. if num_guardians >= 2:
  690. # update wormchain's k8s config to spin up multiple instances
  691. k8s_yaml_with_ns(build_wormchain_yaml(wormchain_path, num_guardians))
  692. else:
  693. k8s_yaml_with_ns(wormchain_path)
  694. k8s_resource(
  695. "wormchain",
  696. port_forwards = [
  697. port_forward(1319, container_port = 1317, name = "REST [:1319]", host = webHost),
  698. port_forward(9090, container_port = 9090, name = "GRPC", host = webHost),
  699. port_forward(26659, container_port = 26657, name = "TENDERMINT [:26659]", host = webHost)
  700. ],
  701. labels = ["wormchain"],
  702. trigger_mode = trigger_mode,
  703. )
  704. k8s_resource(
  705. "wormchain-deploy",
  706. resource_deps = ["wormchain"],
  707. labels = ["wormchain"],
  708. trigger_mode = trigger_mode,
  709. )
  710. if ibc_relayer:
  711. docker_build(
  712. ref = "ibc-relayer-image",
  713. context = ".",
  714. dockerfile = "./wormchain/ibc-relayer/Dockerfile",
  715. only = []
  716. )
  717. k8s_yaml_with_ns("devnet/ibc-relayer.yaml")
  718. k8s_resource(
  719. "ibc-relayer",
  720. port_forwards = [
  721. port_forward(7597, name = "HTTPDEBUG [:7597]", host = webHost),
  722. ],
  723. resource_deps = ["wormchain-deploy", "terra2-terrad"],
  724. labels = ["ibc-relayer"],
  725. trigger_mode = trigger_mode,
  726. )
  727. if btc:
  728. k8s_yaml_with_ns("devnet/btc-localnet.yaml")
  729. docker_build(
  730. ref = "btc-node",
  731. context = "bitcoin",
  732. dockerfile = "bitcoin/Dockerfile",
  733. target = "bitcoin-build",
  734. )
  735. k8s_resource(
  736. "btc",
  737. port_forwards = [
  738. port_forward(18556, name = "RPC [:18556]", host = webHost),
  739. ],
  740. labels = ["btc"],
  741. trigger_mode = trigger_mode,
  742. )
  743. if aptos:
  744. k8s_yaml_with_ns("devnet/aptos-localnet.yaml")
  745. docker_build(
  746. ref = "aptos-node",
  747. context = "aptos",
  748. dockerfile = "aptos/Dockerfile",
  749. target = "aptos",
  750. )
  751. k8s_resource(
  752. "aptos",
  753. port_forwards = [
  754. port_forward(8080, name = "RPC [:8080]", host = webHost),
  755. port_forward(6181, name = "FullNode [:6181]", host = webHost),
  756. port_forward(8081, name = "Faucet [:8081]", host = webHost),
  757. ],
  758. labels = ["aptos"],
  759. trigger_mode = trigger_mode,
  760. )
  761. if query_server:
  762. k8s_yaml_with_ns("devnet/query-server.yaml")
  763. k8s_resource(
  764. "query-server",
  765. resource_deps = ["guardian"],
  766. port_forwards = [
  767. port_forward(6069, name = "REST [:6069]", host = webHost),
  768. port_forward(6068, name = "Status [:6068]", host = webHost)
  769. ],
  770. labels = ["query-server"],
  771. trigger_mode = trigger_mode
  772. )