Tiltfile 30 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958
  1. # This Tiltfile contains the deployment and build config for the Wormhole devnet.
  2. #
  3. # We use Buildkit cache mounts and careful layering to avoid unnecessary rebuilds - almost
  4. # all source code changes result in small, incremental rebuilds. Dockerfiles are written such
  5. # that, for example, changing the contract source code won't cause Solana itself to be rebuilt.
  6. #
  7. load("ext://namespace", "namespace_create", "namespace_inject")
  8. load("ext://secret", "secret_yaml_generic")
  9. # set the replica value of a StatefulSet
  10. def set_replicas_in_statefulset(config_yaml, statefulset_name, num_replicas):
  11. for obj in config_yaml:
  12. if obj["kind"] == "StatefulSet" and obj["metadata"]["name"] == statefulset_name:
  13. obj["spec"]["replicas"] = num_replicas
  14. return config_yaml
  15. # set the env value of all containers in all jobs
  16. def set_env_in_jobs(config_yaml, name, value):
  17. for obj in config_yaml:
  18. if obj["kind"] == "Job":
  19. for container in obj["spec"]["template"]["spec"]["containers"]:
  20. if not "env" in container:
  21. container["env"] = []
  22. container["env"].append({"name": name, "value": value})
  23. return config_yaml
  24. allow_k8s_contexts("ci")
  25. # Disable telemetry by default
  26. analytics_settings(False)
  27. # Moar updates (default is 3)
  28. update_settings(max_parallel_updates = 10)
  29. # Runtime configuration
  30. config.define_bool("ci", False, "We are running in CI")
  31. config.define_bool("manual", False, "Set TRIGGER_MODE_MANUAL by default")
  32. config.define_string("num", False, "Number of guardian nodes to run")
  33. # You do not usually need to set this argument - this argument is for debugging only. If you do use a different
  34. # namespace, note that the "wormhole" namespace is hardcoded in tests and don't forget specifying the argument
  35. # when running "tilt down".
  36. #
  37. config.define_string("namespace", False, "Kubernetes namespace to use")
  38. # These arguments will enable writing Guardian events to a cloud BigTable instance.
  39. # Writing to a cloud BigTable is optional. These arguments are not required to run the devnet.
  40. config.define_string("gcpProject", False, "GCP project ID for BigTable persistence")
  41. config.define_string("bigTableKeyPath", False, "Path to BigTable json key file")
  42. # When running Tilt on a server, this can be used to set the public hostname Tilt runs on
  43. # for service links in the UI to work.
  44. config.define_string("webHost", False, "Public hostname for port forwards")
  45. # When running Tilt on a server, this can be used to set the public hostname Tilt runs on
  46. # for service links in the UI to work.
  47. config.define_string("guardiand_loglevel", False, "Log level for guardiand (debug, info, warn, error, dpanic, panic, fatal)")
  48. # Components
  49. config.define_bool("near", False, "Enable Near component")
  50. config.define_bool("sui", False, "Enable Sui component")
  51. config.define_bool("btc", False, "Enable BTC component")
  52. config.define_bool("aptos", False, "Enable Aptos component")
  53. config.define_bool("algorand", False, "Enable Algorand component")
  54. config.define_bool("evm2", False, "Enable second Eth component")
  55. config.define_bool("solana", False, "Enable Solana component")
  56. config.define_bool("pythnet", False, "Enable PythNet component")
  57. config.define_bool("terra_classic", False, "Enable Terra Classic component")
  58. config.define_bool("terra2", False, "Enable Terra 2 component")
  59. config.define_bool("spy_relayer", False, "Enable spy relayer")
  60. config.define_bool("ci_tests", False, "Enable tests runner component")
  61. config.define_bool("guardiand_debug", False, "Enable dlv endpoint for guardiand")
  62. config.define_bool("node_metrics", False, "Enable Prometheus & Grafana for Guardian metrics")
  63. config.define_bool("guardiand_governor", False, "Enable chain governor in guardiand")
  64. config.define_bool("wormchain", False, "Enable a wormchain node")
  65. config.define_bool("ibc_relayer", False, "Enable IBC relayer between cosmos chains")
  66. config.define_bool("redis", False, "Enable a redis instance")
  67. config.define_bool("generic_relayer", False, "Enable the generic relayer off-chain component")
  68. cfg = config.parse()
  69. num_guardians = int(cfg.get("num", "1"))
  70. namespace = cfg.get("namespace", "wormhole")
  71. gcpProject = cfg.get("gcpProject", "")
  72. bigTableKeyPath = cfg.get("bigTableKeyPath", "")
  73. webHost = cfg.get("webHost", "localhost")
  74. ci = cfg.get("ci", False)
  75. algorand = cfg.get("algorand", ci)
  76. near = cfg.get("near", ci)
  77. aptos = cfg.get("aptos", ci)
  78. sui = cfg.get("sui", ci)
  79. evm2 = cfg.get("evm2", ci)
  80. solana = cfg.get("solana", ci)
  81. pythnet = cfg.get("pythnet", False)
  82. terra_classic = cfg.get("terra_classic", ci)
  83. terra2 = cfg.get("terra2", ci)
  84. wormchain = cfg.get("wormchain", ci)
  85. spy_relayer = cfg.get("spy_relayer", ci)
  86. ci_tests = cfg.get("ci_tests", ci)
  87. guardiand_debug = cfg.get("guardiand_debug", False)
  88. node_metrics = cfg.get("node_metrics", False)
  89. guardiand_governor = cfg.get("guardiand_governor", False)
  90. ibc_relayer = cfg.get("ibc_relayer", ci)
  91. btc = cfg.get("btc", False)
  92. redis = cfg.get('redis', ci)
  93. generic_relayer = cfg.get("generic_relayer", ci)
  94. if ci:
  95. guardiand_loglevel = cfg.get("guardiand_loglevel", "warn")
  96. else:
  97. guardiand_loglevel = cfg.get("guardiand_loglevel", "info")
  98. if cfg.get("manual", False):
  99. trigger_mode = TRIGGER_MODE_MANUAL
  100. else:
  101. trigger_mode = TRIGGER_MODE_AUTO
  102. # namespace
  103. if not ci:
  104. namespace_create(namespace)
  105. def k8s_yaml_with_ns(objects):
  106. return k8s_yaml(namespace_inject(objects, namespace))
  107. docker_build(
  108. ref = "cli-gen",
  109. context = ".",
  110. dockerfile = "Dockerfile.cli",
  111. )
  112. docker_build(
  113. ref = "const-gen",
  114. context = ".",
  115. dockerfile = "Dockerfile.const",
  116. build_args={"num_guardians": '%s' % (num_guardians)},
  117. )
  118. # node
  119. if bigTableKeyPath != "":
  120. k8s_yaml_with_ns(
  121. secret_yaml_generic(
  122. "node-bigtable-key",
  123. from_file = "bigtable-key.json=" + bigTableKeyPath,
  124. ),
  125. )
  126. docker_build(
  127. ref = "guardiand-image",
  128. context = ".",
  129. dockerfile = "node/Dockerfile",
  130. target = "build",
  131. ignore=["./sdk/js", "./relayer"]
  132. )
  133. def command_with_dlv(argv):
  134. return [
  135. "/dlv",
  136. "--listen=0.0.0.0:2345",
  137. "--accept-multiclient",
  138. "--headless=true",
  139. "--api-version=2",
  140. "--continue=true",
  141. "exec",
  142. argv[0],
  143. "--",
  144. ] + argv[1:]
  145. def build_node_yaml():
  146. node_yaml = read_yaml_stream("devnet/node.yaml")
  147. node_yaml_with_replicas = set_replicas_in_statefulset(node_yaml, "guardian", num_guardians)
  148. for obj in node_yaml_with_replicas:
  149. if obj["kind"] == "StatefulSet" and obj["metadata"]["name"] == "guardian":
  150. container = obj["spec"]["template"]["spec"]["containers"][0]
  151. if container["name"] != "guardiand":
  152. fail("container 0 is not guardiand")
  153. container["command"] += ["--logLevel="+guardiand_loglevel]
  154. if guardiand_debug:
  155. container["command"] = command_with_dlv(container["command"])
  156. print(container["command"])
  157. if gcpProject != "":
  158. container["command"] += [
  159. "--bigTablePersistenceEnabled",
  160. "--bigTableInstanceName",
  161. "wormhole",
  162. "--bigTableTableName",
  163. "v2Events",
  164. "--bigTableTopicName",
  165. "new-vaa-devnet",
  166. "--bigTableKeyPath",
  167. "/tmp/mounted-keys/bigtable-key.json",
  168. "--bigTableGCPProject",
  169. gcpProject,
  170. ]
  171. if aptos:
  172. container["command"] += [
  173. "--aptosRPC",
  174. "http://aptos:8080",
  175. "--aptosAccount",
  176. "de0036a9600559e295d5f6802ef6f3f802f510366e0c23912b0655d972166017",
  177. "--aptosHandle",
  178. "0xde0036a9600559e295d5f6802ef6f3f802f510366e0c23912b0655d972166017::state::WormholeMessageHandle",
  179. ]
  180. if sui:
  181. container["command"] += [
  182. "--suiRPC",
  183. "http://sui:9000",
  184. "--suiMoveEventType",
  185. "0x7f6cebb8a489654d7a759483bd653c4be3e5ccfef17a8b5fd3ba98bd072fabc3::publish_message::WormholeMessage",
  186. "--suiWS",
  187. "sui:9000",
  188. ]
  189. if evm2:
  190. container["command"] += [
  191. "--bscRPC",
  192. "ws://eth-devnet2:8545",
  193. ]
  194. else:
  195. container["command"] += [
  196. "--bscRPC",
  197. "ws://eth-devnet:8545",
  198. ]
  199. if solana:
  200. container["command"] += [
  201. "--solanaRPC",
  202. "http://solana-devnet:8899",
  203. ]
  204. if pythnet:
  205. container["command"] += [
  206. "--pythnetRPC",
  207. # "http://solana-devnet:8899",
  208. "http://pythnet.rpcpool.com",
  209. "--pythnetWS",
  210. # "ws://solana-devnet:8900",
  211. "wss://pythnet.rpcpool.com",
  212. "--pythnetContract",
  213. "H3fxXJ86ADW2PNuDDmZJg6mzTtPxkYCpNuQUTgmJ7AjU",
  214. ]
  215. if terra_classic:
  216. container["command"] += [
  217. "--terraWS",
  218. "ws://terra-terrad:26657/websocket",
  219. "--terraLCD",
  220. "http://terra-terrad:1317",
  221. "--terraContract",
  222. "terra18vd8fpwxzck93qlwghaj6arh4p7c5n896xzem5",
  223. ]
  224. if terra2:
  225. container["command"] += [
  226. "--terra2WS",
  227. "ws://terra2-terrad:26657/websocket",
  228. "--terra2LCD",
  229. "http://terra2-terrad:1317",
  230. "--terra2Contract",
  231. "terra14hj2tavq8fpesdwxxcu44rty3hh90vhujrvcmstl4zr3txmfvw9ssrc8au",
  232. ]
  233. if algorand:
  234. container["command"] += [
  235. "--algorandAppID",
  236. "1004",
  237. "--algorandIndexerRPC",
  238. "http://algorand:8980",
  239. "--algorandIndexerToken",
  240. "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
  241. "--algorandAlgodRPC",
  242. "http://algorand:4001",
  243. "--algorandAlgodToken",
  244. "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
  245. ]
  246. if guardiand_governor:
  247. container["command"] += [
  248. "--chainGovernorEnabled"
  249. ]
  250. if near:
  251. container["command"] += [
  252. "--nearRPC",
  253. "http://near:3030",
  254. "--nearContract",
  255. "wormhole.test.near"
  256. ]
  257. if wormchain:
  258. container["command"] += [
  259. "--wormchainURL",
  260. "wormchain:9090",
  261. "--wormchainKeyPath",
  262. "/tmp/mounted-keys/wormchain/wormchainKey",
  263. "--wormchainKeyPassPhrase",
  264. "test0000",
  265. "--accountantWS",
  266. "http://wormchain:26657",
  267. "--accountantContract",
  268. "wormhole14hj2tavq8fpesdwxxcu44rty3hh90vhujrvcmstl4zr3txmfvw9srrg465",
  269. "--accountantCheckEnabled",
  270. "true",
  271. "--ibcWS",
  272. "ws://wormchain:26657/websocket",
  273. "--ibcLCD",
  274. "http://wormchain:1317",
  275. "--ibcContract",
  276. "wormhole1nc5tatafv6eyq7llkr2gv50ff9e22mnf70qgjlv737ktmt4eswrq0kdhcj"
  277. ]
  278. return encode_yaml_stream(node_yaml_with_replicas)
  279. k8s_yaml_with_ns(build_node_yaml())
  280. guardian_resource_deps = ["eth-devnet"]
  281. if evm2:
  282. guardian_resource_deps = guardian_resource_deps + ["eth-devnet2"]
  283. if solana or pythnet:
  284. guardian_resource_deps = guardian_resource_deps + ["solana-devnet"]
  285. if near:
  286. guardian_resource_deps = guardian_resource_deps + ["near"]
  287. if terra_classic:
  288. guardian_resource_deps = guardian_resource_deps + ["terra-terrad"]
  289. if terra2:
  290. guardian_resource_deps = guardian_resource_deps + ["terra2-terrad"]
  291. if algorand:
  292. guardian_resource_deps = guardian_resource_deps + ["algorand"]
  293. if aptos:
  294. guardian_resource_deps = guardian_resource_deps + ["aptos"]
  295. if wormchain:
  296. guardian_resource_deps = guardian_resource_deps + ["wormchain", "wormchain-deploy"]
  297. if sui:
  298. guardian_resource_deps = guardian_resource_deps + ["sui"]
  299. k8s_resource(
  300. "guardian",
  301. resource_deps = guardian_resource_deps,
  302. port_forwards = [
  303. port_forward(6060, name = "Debug/Status Server [:6060]", host = webHost),
  304. port_forward(7070, name = "Public gRPC [:7070]", host = webHost),
  305. port_forward(7071, name = "Public REST [:7071]", host = webHost),
  306. port_forward(2345, name = "Debugger [:2345]", host = webHost),
  307. ],
  308. labels = ["guardian"],
  309. trigger_mode = trigger_mode,
  310. )
  311. # guardian set update - triggered by "tilt args" changes
  312. if num_guardians >= 2 and ci == False:
  313. local_resource(
  314. name = "guardian-set-update",
  315. resource_deps = guardian_resource_deps + ["guardian"],
  316. deps = ["scripts/send-vaa.sh", "clients/eth"],
  317. cmd = './scripts/update-guardian-set.sh %s %s %s' % (num_guardians, webHost, namespace),
  318. labels = ["guardian"],
  319. trigger_mode = trigger_mode,
  320. )
  321. # grafana + prometheus for node metrics
  322. if node_metrics:
  323. dashboard = read_json("dashboards/Wormhole.json")
  324. dashboard_yaml = {
  325. "apiVersion": "v1",
  326. "kind": "ConfigMap",
  327. "metadata": {
  328. "name": "grafana-dashboards-json"
  329. },
  330. "data": {
  331. "wormhole.json": encode_json(dashboard)
  332. }
  333. }
  334. k8s_yaml_with_ns(encode_yaml(dashboard_yaml))
  335. k8s_yaml_with_ns("devnet/node-metrics.yaml")
  336. k8s_resource(
  337. "prometheus-server",
  338. resource_deps = ["guardian"],
  339. port_forwards = [
  340. port_forward(9099, name = "Prometheus [:9099]", host = webHost),
  341. ],
  342. labels = ["guardian"],
  343. trigger_mode = trigger_mode,
  344. )
  345. k8s_resource(
  346. "grafana",
  347. resource_deps = ["prometheus-server"],
  348. port_forwards = [
  349. port_forward(3033, name = "Grafana UI [:3033]", host = webHost),
  350. ],
  351. labels = ["guardian"],
  352. trigger_mode = trigger_mode,
  353. )
  354. # spy
  355. k8s_yaml_with_ns("devnet/spy.yaml")
  356. k8s_resource(
  357. "spy",
  358. resource_deps = ["guardian"],
  359. port_forwards = [
  360. port_forward(6061, container_port = 6060, name = "Debug/Status Server [:6061]", host = webHost),
  361. port_forward(7072, name = "Spy gRPC [:7072]", host = webHost),
  362. ],
  363. labels = ["guardian"],
  364. trigger_mode = trigger_mode,
  365. )
  366. if solana or pythnet:
  367. # solana client cli (used for devnet setup)
  368. docker_build(
  369. ref = "bridge-client",
  370. context = ".",
  371. only = ["./proto", "./solana", "./clients"],
  372. dockerfile = "solana/Dockerfile.client",
  373. # Ignore target folders from local (non-container) development.
  374. ignore = ["./solana/*/target"],
  375. )
  376. # solana smart contract
  377. docker_build(
  378. ref = "solana-contract",
  379. context = "solana",
  380. dockerfile = "solana/Dockerfile",
  381. target = "builder",
  382. build_args = {"BRIDGE_ADDRESS": "Bridge1p5gheXUvJ6jGWGeCsgPKgnE3YgdGKRVCMY9o"}
  383. )
  384. # solana local devnet
  385. k8s_yaml_with_ns("devnet/solana-devnet.yaml")
  386. k8s_resource(
  387. "solana-devnet",
  388. port_forwards = [
  389. port_forward(8899, name = "Solana RPC [:8899]", host = webHost),
  390. port_forward(8900, name = "Solana WS [:8900]", host = webHost),
  391. ],
  392. labels = ["solana"],
  393. trigger_mode = trigger_mode,
  394. )
  395. # eth devnet
  396. docker_build(
  397. ref = "eth-node",
  398. context = "./ethereum",
  399. dockerfile = "./ethereum/Dockerfile",
  400. # ignore local node_modules (in case they're present)
  401. ignore = ["./node_modules"],
  402. build_args = {"num_guardians": str(num_guardians), "dev": str(not ci)},
  403. # sync external scripts for incremental development
  404. # (everything else needs to be restarted from scratch for determinism)
  405. #
  406. # This relies on --update-mode=exec to work properly with a non-root user.
  407. # https://github.com/tilt-dev/tilt/issues/3708
  408. live_update = [
  409. sync("./ethereum/src", "/home/node/app/src"),
  410. ],
  411. )
  412. if spy_relayer or redis or generic_relayer:
  413. docker_build(
  414. ref = "redis",
  415. context = ".",
  416. only = ["./third_party"],
  417. dockerfile = "third_party/redis/Dockerfile",
  418. )
  419. if spy_relayer or redis:
  420. k8s_resource(
  421. "redis",
  422. port_forwards = [
  423. port_forward(6379, name = "Redis Default [:6379]", host = webHost),
  424. ],
  425. labels = ["redis"],
  426. trigger_mode = trigger_mode,
  427. )
  428. k8s_yaml_with_ns("devnet/redis.yaml")
  429. if generic_relayer:
  430. k8s_resource(
  431. "redis-relayer",
  432. port_forwards = [
  433. port_forward(6378, name = "Generic Relayer Redis [:6378]", host = webHost),
  434. ],
  435. labels = ["redis-relayer"],
  436. trigger_mode = trigger_mode,
  437. )
  438. k8s_yaml_with_ns("devnet/redis-relayer.yaml")
  439. if generic_relayer:
  440. k8s_resource(
  441. "relayer-engine",
  442. resource_deps = ["guardian", "redis-relayer", "spy"],
  443. port_forwards = [
  444. port_forward(3003, container_port=3000, name = "Bullmq UI [:3003]", host = webHost),
  445. ],
  446. labels = ["relayer-engine"],
  447. trigger_mode = trigger_mode,
  448. )
  449. docker_build(
  450. ref = "relayer-engine",
  451. context = ".",
  452. only = ["./relayer/generic_relayer", "./ethereum/ts-scripts/relayer/config"],
  453. dockerfile = "relayer/generic_relayer/relayer-engine-v2/Dockerfile",
  454. build_args = {"dev": str(not ci)}
  455. )
  456. k8s_yaml_with_ns("devnet/relayer-engine.yaml")
  457. if spy_relayer:
  458. docker_build(
  459. ref = "spy-relay-image",
  460. context = "relayer/spy_relayer",
  461. dockerfile = "relayer/spy_relayer/Dockerfile",
  462. live_update = []
  463. )
  464. k8s_yaml_with_ns("devnet/spy-listener.yaml")
  465. k8s_resource(
  466. "spy-listener",
  467. resource_deps = ["guardian", "redis", "spy"],
  468. port_forwards = [
  469. port_forward(6062, container_port = 6060, name = "Debug/Status Server [:6062]", host = webHost),
  470. port_forward(4201, name = "REST [:4201]", host = webHost),
  471. port_forward(8082, name = "Prometheus [:8082]", host = webHost),
  472. ],
  473. labels = ["spy-relayer"],
  474. trigger_mode = trigger_mode,
  475. )
  476. k8s_yaml_with_ns("devnet/spy-relayer.yaml")
  477. k8s_resource(
  478. "spy-relayer",
  479. resource_deps = ["guardian", "redis"],
  480. port_forwards = [
  481. port_forward(8083, name = "Prometheus [:8083]", host = webHost),
  482. ],
  483. labels = ["spy-relayer"],
  484. trigger_mode = trigger_mode,
  485. )
  486. k8s_yaml_with_ns("devnet/spy-wallet-monitor.yaml")
  487. k8s_resource(
  488. "spy-wallet-monitor",
  489. resource_deps = ["guardian", "redis"],
  490. port_forwards = [
  491. port_forward(8084, name = "Prometheus [:8084]", host = webHost),
  492. ],
  493. labels = ["spy-relayer"],
  494. trigger_mode = trigger_mode,
  495. )
  496. k8s_yaml_with_ns("devnet/eth-devnet.yaml")
  497. k8s_resource(
  498. "eth-devnet",
  499. port_forwards = [
  500. port_forward(8545, name = "Ganache RPC [:8545]", host = webHost),
  501. ],
  502. labels = ["evm"],
  503. trigger_mode = trigger_mode,
  504. )
  505. if evm2:
  506. k8s_yaml_with_ns("devnet/eth-devnet2.yaml")
  507. k8s_resource(
  508. "eth-devnet2",
  509. port_forwards = [
  510. port_forward(8546, name = "Ganache RPC [:8546]", host = webHost),
  511. ],
  512. labels = ["evm"],
  513. trigger_mode = trigger_mode,
  514. )
  515. if ci_tests:
  516. docker_build(
  517. ref = "sdk-test-image",
  518. context = ".",
  519. dockerfile = "testing/Dockerfile.sdk.test",
  520. only = [],
  521. live_update = [
  522. sync("./sdk/js/src", "/app/sdk/js/src"),
  523. sync("./testing", "/app/testing"),
  524. ],
  525. )
  526. docker_build(
  527. ref = "spydk-test-image",
  528. context = ".",
  529. dockerfile = "testing/Dockerfile.spydk.test",
  530. only = [],
  531. live_update = [
  532. sync("./spydk/js/src", "/app/spydk/js/src"),
  533. sync("./testing", "/app/testing"),
  534. ],
  535. )
  536. k8s_yaml_with_ns(encode_yaml_stream(set_env_in_jobs(read_yaml_stream("devnet/tests.yaml"), "NUM_GUARDIANS", str(num_guardians))))
  537. # separate resources to parallelize docker builds
  538. k8s_resource(
  539. "sdk-ci-tests",
  540. labels = ["ci"],
  541. trigger_mode = trigger_mode,
  542. resource_deps = [], # testing/sdk.sh handles waiting for spy, not having deps gets the build earlier
  543. )
  544. k8s_resource(
  545. "spydk-ci-tests",
  546. labels = ["ci"],
  547. trigger_mode = trigger_mode,
  548. resource_deps = [], # testing/spydk.sh handles waiting for spy, not having deps gets the build earlier
  549. )
  550. k8s_resource(
  551. "accountant-ci-tests",
  552. labels = ["ci"],
  553. trigger_mode = trigger_mode,
  554. resource_deps = [], # uses devnet-consts.json, but wormchain/contracts/tools/test_accountant.sh handles waiting for guardian, not having deps gets the build earlier
  555. )
  556. if terra_classic:
  557. docker_build(
  558. ref = "terra-image",
  559. context = "./terra/devnet",
  560. dockerfile = "terra/devnet/Dockerfile",
  561. )
  562. docker_build(
  563. ref = "terra-contracts",
  564. context = "./terra",
  565. dockerfile = "./terra/Dockerfile",
  566. )
  567. k8s_yaml_with_ns("devnet/terra-devnet.yaml")
  568. k8s_resource(
  569. "terra-terrad",
  570. port_forwards = [
  571. port_forward(26657, name = "Terra RPC [:26657]", host = webHost),
  572. port_forward(1317, name = "Terra LCD [:1317]", host = webHost),
  573. ],
  574. labels = ["terra"],
  575. trigger_mode = trigger_mode,
  576. )
  577. k8s_resource(
  578. "terra-postgres",
  579. labels = ["terra"],
  580. trigger_mode = trigger_mode,
  581. )
  582. k8s_resource(
  583. "terra-fcd",
  584. resource_deps = ["terra-terrad", "terra-postgres"],
  585. port_forwards = [port_forward(3060, name = "Terra FCD [:3060]", host = webHost)],
  586. labels = ["terra"],
  587. trigger_mode = trigger_mode,
  588. )
  589. if terra2 or wormchain:
  590. docker_build(
  591. ref = "cosmwasm_artifacts",
  592. context = ".",
  593. dockerfile = "./cosmwasm/Dockerfile",
  594. target = "artifacts",
  595. )
  596. if terra2:
  597. docker_build(
  598. ref = "terra2-image",
  599. context = "./cosmwasm/deployment/terra2/devnet",
  600. dockerfile = "./cosmwasm/deployment/terra2/devnet/Dockerfile",
  601. )
  602. docker_build(
  603. ref = "terra2-deploy",
  604. context = "./cosmwasm/deployment/terra2",
  605. dockerfile = "./cosmwasm/Dockerfile.deploy",
  606. )
  607. k8s_yaml_with_ns("devnet/terra2-devnet.yaml")
  608. k8s_resource(
  609. "terra2-terrad",
  610. port_forwards = [
  611. port_forward(26658, container_port = 26657, name = "Terra 2 RPC [:26658]", host = webHost),
  612. port_forward(1318, container_port = 1317, name = "Terra 2 LCD [:1318]", host = webHost),
  613. ],
  614. labels = ["terra2"],
  615. trigger_mode = trigger_mode,
  616. )
  617. k8s_resource(
  618. "terra2-postgres",
  619. labels = ["terra2"],
  620. trigger_mode = trigger_mode,
  621. )
  622. k8s_resource(
  623. "terra2-fcd",
  624. resource_deps = ["terra2-terrad", "terra2-postgres"],
  625. port_forwards = [port_forward(3061, container_port = 3060, name = "Terra 2 FCD [:3061]", host = webHost)],
  626. labels = ["terra2"],
  627. trigger_mode = trigger_mode,
  628. )
  629. if algorand:
  630. k8s_yaml_with_ns("devnet/algorand-devnet.yaml")
  631. docker_build(
  632. ref = "algorand-algod",
  633. context = "algorand/sandbox-algorand",
  634. dockerfile = "algorand/sandbox-algorand/images/algod/Dockerfile"
  635. )
  636. docker_build(
  637. ref = "algorand-indexer",
  638. context = "algorand/sandbox-algorand",
  639. dockerfile = "algorand/sandbox-algorand/images/indexer/Dockerfile"
  640. )
  641. docker_build(
  642. ref = "algorand-contracts",
  643. context = "algorand",
  644. dockerfile = "algorand/Dockerfile",
  645. ignore = ["algorand/test/*.*"]
  646. )
  647. k8s_resource(
  648. "algorand",
  649. port_forwards = [
  650. port_forward(4001, name = "Algod [:4001]", host = webHost),
  651. port_forward(4002, name = "KMD [:4002]", host = webHost),
  652. port_forward(8980, name = "Indexer [:8980]", host = webHost),
  653. ],
  654. labels = ["algorand"],
  655. trigger_mode = trigger_mode,
  656. )
  657. if sui:
  658. k8s_yaml_with_ns("devnet/sui-devnet.yaml")
  659. docker_build(
  660. ref = "sui-node",
  661. target = "sui",
  662. context = ".",
  663. dockerfile = "sui/Dockerfile",
  664. ignore = ["./sui/sui.log*", "sui/sui.log*", "sui.log.*"],
  665. only = ["./sui"],
  666. )
  667. k8s_resource(
  668. "sui",
  669. port_forwards = [
  670. port_forward(9000, 9000, name = "RPC [:9000]", host = webHost),
  671. port_forward(5003, name = "Faucet [:5003]", host = webHost),
  672. port_forward(9184, name = "Prometheus [:9184]", host = webHost),
  673. ],
  674. labels = ["sui"],
  675. trigger_mode = trigger_mode,
  676. )
  677. if near:
  678. k8s_yaml_with_ns("devnet/near-devnet.yaml")
  679. docker_build(
  680. ref = "near-node",
  681. context = "near",
  682. dockerfile = "near/Dockerfile",
  683. only = ["Dockerfile", "node_builder.sh", "start_node.sh", "README.md", "cert.pem"],
  684. )
  685. docker_build(
  686. ref = "near-deploy",
  687. context = "near",
  688. dockerfile = "near/Dockerfile.deploy",
  689. ignore = ["./test"]
  690. )
  691. k8s_resource(
  692. "near",
  693. port_forwards = [
  694. port_forward(3030, name = "Node [:3030]", host = webHost),
  695. port_forward(3031, name = "webserver [:3031]", host = webHost),
  696. ],
  697. labels = ["near"],
  698. trigger_mode = trigger_mode,
  699. )
  700. if wormchain:
  701. docker_build(
  702. ref = "wormchaind-image",
  703. context = ".",
  704. dockerfile = "./wormchain/Dockerfile",
  705. build_args = {"num_guardians": str(num_guardians)},
  706. only = [],
  707. ignore = ["./wormchain/testing", "./wormchain/ts-sdk", "./wormchain/design", "./wormchain/vue", "./wormchain/build/wormchaind"],
  708. )
  709. docker_build(
  710. ref = "vue-export",
  711. context = ".",
  712. dockerfile = "./wormchain/Dockerfile.proto",
  713. target = "vue-export",
  714. )
  715. docker_build(
  716. ref = "wormchain-deploy",
  717. context = "./wormchain",
  718. dockerfile = "./wormchain/Dockerfile.deploy",
  719. )
  720. def build_wormchain_yaml(yaml_path, num_instances):
  721. wormchain_yaml = read_yaml_stream(yaml_path)
  722. # set the number of replicas in the StatefulSet to be num_guardians
  723. wormchain_set = set_replicas_in_statefulset(wormchain_yaml, "wormchain", num_instances)
  724. # add a Service for each wormchain instance
  725. services = []
  726. for obj in wormchain_set:
  727. if obj["kind"] == "Service" and obj["metadata"]["name"] == "wormchain-0":
  728. # make a Service for each replica so we can resolve it by name from other pods.
  729. # copy wormchain-0's Service then set the name and selector for the instance.
  730. for instance_num in list(range(1, num_instances)):
  731. instance_name = 'wormchain-%s' % (instance_num)
  732. # Copy the Service's properties to a new dict, by value, three levels deep.
  733. # tl;dr - if the value is a dict, use a comprehension to copy it immutably.
  734. service = { k: ({ k2: ({ k3:v3
  735. for (k3,v3) in v2.items()} if type(v2) == "dict" else v2)
  736. for (k2,v2) in v.items()} if type(v) == "dict" else v)
  737. for (k,v) in obj.items()}
  738. # add the name we want to be able to resolve via k8s DNS
  739. service["metadata"]["name"] = instance_name
  740. # add the name of the pod the service should connect to
  741. service["spec"]["selector"] = { "statefulset.kubernetes.io/pod-name": instance_name }
  742. services.append(service)
  743. return encode_yaml_stream(wormchain_set + services)
  744. wormchain_path = "devnet/wormchain.yaml"
  745. if num_guardians >= 2:
  746. # update wormchain's k8s config to spin up multiple instances
  747. k8s_yaml_with_ns(build_wormchain_yaml(wormchain_path, num_guardians))
  748. else:
  749. k8s_yaml_with_ns(wormchain_path)
  750. k8s_resource(
  751. "wormchain",
  752. port_forwards = [
  753. port_forward(1319, container_port = 1317, name = "REST [:1319]", host = webHost),
  754. port_forward(9090, container_port = 9090, name = "GRPC", host = webHost),
  755. port_forward(26659, container_port = 26657, name = "TENDERMINT [:26659]", host = webHost)
  756. ],
  757. labels = ["wormchain"],
  758. trigger_mode = trigger_mode,
  759. )
  760. k8s_resource(
  761. "wormchain-deploy",
  762. resource_deps = ["wormchain"],
  763. labels = ["wormchain"],
  764. trigger_mode = trigger_mode,
  765. )
  766. if ibc_relayer:
  767. docker_build(
  768. ref = "ibc-relayer-image",
  769. context = ".",
  770. dockerfile = "./wormchain/ibc-relayer/Dockerfile",
  771. only = []
  772. )
  773. k8s_yaml_with_ns("devnet/ibc-relayer.yaml")
  774. k8s_resource(
  775. "ibc-relayer",
  776. port_forwards = [
  777. port_forward(7597, name = "HTTPDEBUG [:7597]", host = webHost),
  778. ],
  779. resource_deps = ["wormchain-deploy", "terra2-terrad"],
  780. labels = ["ibc-relayer"],
  781. trigger_mode = trigger_mode,
  782. )
  783. if btc:
  784. k8s_yaml_with_ns("devnet/btc-localnet.yaml")
  785. docker_build(
  786. ref = "btc-node",
  787. context = "bitcoin",
  788. dockerfile = "bitcoin/Dockerfile",
  789. target = "bitcoin-build",
  790. )
  791. k8s_resource(
  792. "btc",
  793. port_forwards = [
  794. port_forward(18556, name = "RPC [:18556]", host = webHost),
  795. ],
  796. labels = ["btc"],
  797. trigger_mode = trigger_mode,
  798. )
  799. if aptos:
  800. k8s_yaml_with_ns("devnet/aptos-localnet.yaml")
  801. docker_build(
  802. ref = "aptos-node",
  803. context = "aptos",
  804. dockerfile = "aptos/Dockerfile",
  805. target = "aptos",
  806. )
  807. k8s_resource(
  808. "aptos",
  809. port_forwards = [
  810. port_forward(8080, name = "RPC [:8080]", host = webHost),
  811. port_forward(6181, name = "FullNode [:6181]", host = webHost),
  812. port_forward(8081, name = "Faucet [:8081]", host = webHost),
  813. ],
  814. labels = ["aptos"],
  815. trigger_mode = trigger_mode,
  816. )