Tiltfile 38 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149
  1. # This Tiltfile contains the deployment and build config for the Wormhole devnet.
  2. #
  3. # We use Buildkit cache mounts and careful layering to avoid unnecessary rebuilds - almost
  4. # all source code changes result in small, incremental rebuilds. Dockerfiles are written such
  5. # that, for example, changing the contract source code won't cause Solana itself to be rebuilt.
  6. #
  7. load("ext://namespace", "namespace_create", "namespace_inject")
  8. load("ext://secret", "secret_yaml_generic")
  9. # set the replica value of a StatefulSet
  10. def set_replicas_in_statefulset(config_yaml, statefulset_name, num_replicas):
  11. for obj in config_yaml:
  12. if obj["kind"] == "StatefulSet" and obj["metadata"]["name"] == statefulset_name:
  13. obj["spec"]["replicas"] = num_replicas
  14. return config_yaml
  15. # set the env value of all containers in all jobs
  16. def set_env_in_jobs(config_yaml, name, value):
  17. for obj in config_yaml:
  18. if obj["kind"] == "Job":
  19. for container in obj["spec"]["template"]["spec"]["containers"]:
  20. if not "env" in container:
  21. container["env"] = []
  22. container["env"].append({"name": name, "value": value})
  23. return config_yaml
  24. allow_k8s_contexts("ci")
  25. # Disable telemetry by default
  26. analytics_settings(False)
  27. # Moar updates (default is 3)
  28. update_settings(max_parallel_updates = 10)
  29. # Runtime configuration
  30. config.define_bool("ci", False, "We are running in CI")
  31. config.define_bool("manual", False, "Set TRIGGER_MODE_MANUAL by default")
  32. config.define_string("num", False, "Number of guardian nodes to run")
  33. config.define_string("maxWorkers", False, "Maximum number of workers for sdk-ci-tests. See https://jestjs.io/docs/cli#--maxworkersnumstring")
  34. # You do not usually need to set this argument - this argument is for debugging only. If you do use a different
  35. # namespace, note that the "wormhole" namespace is hardcoded in tests and don't forget specifying the argument
  36. # when running "tilt down".
  37. #
  38. config.define_string("namespace", False, "Kubernetes namespace to use")
  39. # When running Tilt on a server, this can be used to set the public hostname Tilt runs on
  40. # for service links in the UI to work.
  41. config.define_string("webHost", False, "Public hostname for port forwards")
  42. # When running Tilt on a server, this can be used to set the public hostname Tilt runs on
  43. # for service links in the UI to work.
  44. config.define_string("guardiand_loglevel", False, "Log level for guardiand (debug, info, warn, error, dpanic, panic, fatal)")
  45. # Components
  46. config.define_bool("near", False, "Enable Near component")
  47. config.define_bool("sui", False, "Enable Sui component")
  48. config.define_bool("btc", False, "Enable BTC component")
  49. config.define_bool("aptos", False, "Enable Aptos component")
  50. config.define_bool("algorand", False, "Enable Algorand component")
  51. config.define_bool("evm2", False, "Enable second Eth component")
  52. config.define_bool("solana", False, "Enable Solana component")
  53. config.define_bool("solana_watcher", False, "Enable Solana watcher on guardian")
  54. config.define_bool("pythnet", False, "Enable PythNet component")
  55. config.define_bool("terra_classic", False, "Enable Terra Classic component")
  56. config.define_bool("terra2", False, "Enable Terra 2 component")
  57. config.define_bool("ci_tests", False, "Enable tests runner component")
  58. config.define_bool("guardiand_debug", False, "Enable dlv endpoint for guardiand")
  59. config.define_bool("node_metrics", False, "Enable Prometheus & Grafana for Guardian metrics")
  60. config.define_bool("guardiand_governor", False, "Enable chain governor in guardiand")
  61. config.define_bool("wormchain", False, "Enable a wormchain node")
  62. config.define_bool("ibc_relayer", False, "Enable IBC relayer between cosmos chains")
  63. config.define_bool("redis", False, "Enable a redis instance")
  64. config.define_bool("generic_relayer", False, "Enable the generic relayer off-chain component")
  65. config.define_bool("query_server", False, "Enable cross-chain query server")
  66. config.define_bool("stacks", False, "Enable Stacks component")
  67. cfg = config.parse()
  68. num_guardians = int(cfg.get("num", "1"))
  69. max_workers = cfg.get("maxWorkers", "50%")
  70. namespace = cfg.get("namespace", "wormhole")
  71. webHost = cfg.get("webHost", "localhost")
  72. ci = cfg.get("ci", False)
  73. algorand = cfg.get("algorand", ci)
  74. near = cfg.get("near", ci)
  75. aptos = cfg.get("aptos", ci)
  76. sui = cfg.get("sui", ci)
  77. evm2 = cfg.get("evm2", ci)
  78. solana = cfg.get("solana", ci)
  79. pythnet = cfg.get("pythnet", False)
  80. solana_watcher = cfg.get("solana_watcher", solana or pythnet)
  81. terra_classic = cfg.get("terra_classic", ci)
  82. terra2 = cfg.get("terra2", ci)
  83. wormchain = cfg.get("wormchain", ci)
  84. ci_tests = cfg.get("ci_tests", ci)
  85. guardiand_debug = cfg.get("guardiand_debug", False)
  86. node_metrics = cfg.get("node_metrics", False)
  87. guardiand_governor = cfg.get("guardiand_governor", False)
  88. ibc_relayer = cfg.get("ibc_relayer", ci)
  89. btc = cfg.get("btc", False)
  90. redis = cfg.get('redis', ci)
  91. generic_relayer = cfg.get("generic_relayer", ci)
  92. query_server = cfg.get("query_server", ci)
  93. stacks = cfg.get("stacks", ci)
  94. if ci:
  95. guardiand_loglevel = cfg.get("guardiand_loglevel", "warn")
  96. else:
  97. guardiand_loglevel = cfg.get("guardiand_loglevel", "info")
  98. if cfg.get("manual", False):
  99. trigger_mode = TRIGGER_MODE_MANUAL
  100. else:
  101. trigger_mode = TRIGGER_MODE_AUTO
  102. # namespace
  103. if not ci:
  104. namespace_create(namespace)
  105. def k8s_yaml_with_ns(objects):
  106. return k8s_yaml(namespace_inject(objects, namespace))
  107. docker_build(
  108. ref = "cli-gen",
  109. context = ".",
  110. dockerfile = "Dockerfile.cli",
  111. )
  112. docker_build(
  113. ref = "const-gen",
  114. context = ".",
  115. dockerfile = "Dockerfile.const",
  116. build_args={"num_guardians": '%s' % (num_guardians)},
  117. )
  118. # node
  119. docker_build(
  120. ref = "guardiand-image",
  121. context = ".",
  122. dockerfile = "node/Dockerfile",
  123. target = "build",
  124. ignore=["./sdk/js", "./relayer"]
  125. )
  126. def command_with_dlv(argv):
  127. return [
  128. "/dlv",
  129. "--listen=0.0.0.0:2345",
  130. "--accept-multiclient",
  131. "--headless=true",
  132. "--api-version=2",
  133. "--continue=true",
  134. "exec",
  135. argv[0],
  136. "--",
  137. ] + argv[1:]
  138. def generate_bootstrap_peers(num_guardians, port_num):
  139. # Improve the chances of the guardians discovering each other in tilt by making them all bootstrap peers.
  140. # The devnet guardian uses deterministic P2P peer IDs based on the guardian index. The peer IDs here
  141. # were generated using `DeterministicP2PPrivKeyByIndex` in `node/pkg/devnet/deterministic_p2p_key.go`.
  142. peer_ids = [
  143. "12D3KooWL3XJ9EMCyZvmmGXL2LMiVBtrVa2BuESsJiXkSj7333Jw",
  144. "12D3KooWHHzSeKaY8xuZVzkLbKFfvNgPPeKhFBGrMbNzbm5akpqu",
  145. "12D3KooWKRyzVWW6ChFjQjK4miCty85Niy49tpPV95XdKu1BcvMA",
  146. "12D3KooWB1b3qZxWJanuhtseF3DmPggHCtG36KZ9ixkqHtdKH9fh",
  147. "12D3KooWE4qDcRrueTuRYWUdQZgcy7APZqBngVeXRt4Y6ytHizKV",
  148. "12D3KooWPgam4TzSVCRa4AbhxQnM9abCYR4E9hV57SN7eAjEYn1j",
  149. "12D3KooWM4yJB31d4hF2F9Vdwuj9WFo1qonoySyw4bVAQ9a9d21o",
  150. "12D3KooWCv935r3ropYhUe5yMCp9QiUoc9A6cZpYQ5x84DqEPbwb",
  151. "12D3KooWQfG74brcJhzpNwjPCZmcbBv8f6wxKgLSYmEDXXdPXQpH",
  152. "12D3KooWNEWRB7PnuZs164xaA9QWM3iZHekHyEQo5qGP5KCHHuSN",
  153. "12D3KooWB224kvi7vN34xJfsfW7bnv6eodxTkgo9VFA6UiaGMgRD",
  154. "12D3KooWCR2EoapJjoQVR4E3NLjWn818gG3XizQ92Yx6C424HL2g",
  155. "12D3KooWNc5rNmCJ9yvXviXaENnp7vqDQjomZwia4aA7Q3hSYkiW",
  156. "12D3KooWBremnqYWBDK6ctvCuhCqJAps5ZAPADu53gXhQHexrvtP",
  157. "12D3KooWFqdBYPrtwErMosomvD4uRtVhXQdqqZZHC3NCBZYVxr4t",
  158. "12D3KooW9yvKfP5HgVaLnNaxWywo3pLAEypk7wjUcpgKwLznk5gQ",
  159. "12D3KooWRuYVGEsecrJJhZsSoKf1UNdBVYKFCmFLNj9ucZiSQCYj",
  160. "12D3KooWGEcD5sW5osB6LajkHGqiGc3W8eKfYwnJVVqfujkpLWX2",
  161. "12D3KooWQYz2inBsgiBoqNtmEn1qeRBr9B8cdishFuBgiARcfMcY"
  162. ]
  163. bootstrap = ""
  164. for idx in range(num_guardians):
  165. if bootstrap != "":
  166. bootstrap += ","
  167. bootstrap += "/dns4/guardian-{idx}.guardian/udp/{port}/quic/p2p/{peer}".format(idx = idx, port = port_num, peer = peer_ids[idx])
  168. return bootstrap
  169. bootstrapPeers = generate_bootstrap_peers(num_guardians, 8999)
  170. ccqBootstrapPeers = generate_bootstrap_peers(num_guardians, 8996)
  171. def build_node_yaml():
  172. node_yaml = read_yaml_stream("devnet/node.yaml")
  173. node_yaml_with_replicas = set_replicas_in_statefulset(node_yaml, "guardian", num_guardians)
  174. for obj in node_yaml_with_replicas:
  175. if obj["kind"] == "StatefulSet" and obj["metadata"]["name"] == "guardian":
  176. container = obj["spec"]["template"]["spec"]["containers"][0]
  177. if container["name"] != "guardiand":
  178. fail("container 0 is not guardiand")
  179. container["command"] += ["--logLevel="+guardiand_loglevel]
  180. if guardiand_debug:
  181. container["command"] = command_with_dlv(container["command"])
  182. print(container["command"])
  183. if num_guardians > 1:
  184. container["command"] += [
  185. "--bootstrap",
  186. bootstrapPeers,
  187. "--ccqP2pBootstrap",
  188. ccqBootstrapPeers,
  189. ]
  190. if aptos:
  191. container["command"] += [
  192. "--aptosRPC",
  193. "http://aptos:8080",
  194. "--aptosAccount",
  195. "de0036a9600559e295d5f6802ef6f3f802f510366e0c23912b0655d972166017",
  196. "--aptosHandle",
  197. "0xde0036a9600559e295d5f6802ef6f3f802f510366e0c23912b0655d972166017::state::WormholeMessageHandle",
  198. ]
  199. if sui:
  200. container["command"] += [
  201. "--suiRPC",
  202. "http://sui:9000",
  203. "--suiMoveEventType",
  204. "0x320a40bff834b5ffa12d7f5cc2220dd733dd9e8e91c425800203d06fb2b1fee8::publish_message::WormholeMessage",
  205. ]
  206. if evm2:
  207. container["command"] += [
  208. "--bscRPC",
  209. "ws://eth-devnet2:8545",
  210. ]
  211. else:
  212. container["command"] += [
  213. "--bscRPC",
  214. "ws://eth-devnet:8545",
  215. ]
  216. if solana_watcher:
  217. container["command"] += [
  218. "--solanaRPC",
  219. "http://solana-devnet:8899",
  220. "--solanaContract",
  221. "Bridge1p5gheXUvJ6jGWGeCsgPKgnE3YgdGKRVCMY9o",
  222. "--solanaShimContract",
  223. "EtZMZM22ViKMo4r5y4Anovs3wKQ2owUmDpjygnMMcdEX",
  224. ]
  225. if pythnet:
  226. container["command"] += [
  227. "--pythnetRPC",
  228. # "http://solana-devnet:8899",
  229. "http://pythnet.rpcpool.com",
  230. "--pythnetWS",
  231. # "ws://solana-devnet:8900",
  232. "wss://pythnet.rpcpool.com",
  233. "--pythnetContract",
  234. "H3fxXJ86ADW2PNuDDmZJg6mzTtPxkYCpNuQUTgmJ7AjU",
  235. ]
  236. if terra_classic:
  237. container["command"] += [
  238. "--terraWS",
  239. "ws://terra-terrad:26657/websocket",
  240. "--terraLCD",
  241. "http://terra-terrad:1317",
  242. "--terraContract",
  243. "terra14hj2tavq8fpesdwxxcu44rty3hh90vhujrvcmstl4zr3txmfvw9ssrc8au",
  244. ]
  245. if terra2:
  246. container["command"] += [
  247. "--terra2WS",
  248. "ws://terra2-terrad:26657/websocket",
  249. "--terra2LCD",
  250. "http://terra2-terrad:1317",
  251. "--terra2Contract",
  252. "terra14hj2tavq8fpesdwxxcu44rty3hh90vhujrvcmstl4zr3txmfvw9ssrc8au",
  253. ]
  254. if algorand:
  255. container["command"] += [
  256. "--algorandAppID",
  257. "1004",
  258. "--algorandIndexerRPC",
  259. "http://algorand:8980",
  260. "--algorandIndexerToken",
  261. "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
  262. "--algorandAlgodRPC",
  263. "http://algorand:4001",
  264. "--algorandAlgodToken",
  265. "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
  266. ]
  267. if guardiand_governor:
  268. container["command"] += [
  269. "--chainGovernorEnabled"
  270. ]
  271. if near:
  272. container["command"] += [
  273. "--nearRPC",
  274. "http://near:3030",
  275. "--nearContract",
  276. "wormhole.test.near"
  277. ]
  278. if wormchain:
  279. container["command"] += [
  280. "--wormchainURL",
  281. "wormchain:9090",
  282. "--accountantWS",
  283. "http://wormchain:26657",
  284. "--accountantContract",
  285. "wormhole14hj2tavq8fpesdwxxcu44rty3hh90vhujrvcmstl4zr3txmfvw9srrg465",
  286. "--accountantKeyPath",
  287. "/tmp/mounted-keys/wormchain/accountantKey",
  288. "--accountantKeyPassPhrase",
  289. "test0000",
  290. "--accountantCheckEnabled",
  291. "true",
  292. "--accountantNttContract",
  293. "wormhole17p9rzwnnfxcjp32un9ug7yhhzgtkhvl9jfksztgw5uh69wac2pgshdnj3k",
  294. "--accountantNttKeyPath",
  295. "/tmp/mounted-keys/wormchain/accountantNttKey",
  296. "--accountantNttKeyPassPhrase",
  297. "test0000",
  298. "--ibcContract",
  299. "wormhole1nc5tatafv6eyq7llkr2gv50ff9e22mnf70qgjlv737ktmt4eswrq0kdhcj",
  300. "--ibcWS",
  301. "ws://wormchain:26657/websocket",
  302. "--ibcLCD",
  303. "http://wormchain:1317",
  304. "--gatewayRelayerContract",
  305. "wormhole1wn625s4jcmvk0szpl85rj5azkfc6suyvf75q6vrddscjdphtve8sca0pvl",
  306. "--gatewayRelayerKeyPath",
  307. "/tmp/mounted-keys/wormchain/gwrelayerKey",
  308. "--gatewayRelayerKeyPassPhrase",
  309. "test0000",
  310. "--gatewayContract",
  311. "wormhole1ghd753shjuwexxywmgs4xz7x2q732vcnkm6h2pyv9s6ah3hylvrqtm7t3h",
  312. "--gatewayWS",
  313. "ws://wormchain:26657/websocket",
  314. "--gatewayLCD",
  315. "http://wormchain:1317"
  316. ]
  317. if stacks:
  318. container["command"] += [
  319. "--stacksStateContract",
  320. "ST5ZW3BC07M4P27KFJ6JJ6PKTB1NW79SH0BVYB3W.wormhole-core-state",
  321. "--stacksRPC",
  322. "http://stacks-node:20443",
  323. "--stacksRPCAuthToken",
  324. "12345",
  325. "--stacksBitcoinBlockPollInterval",
  326. "2s"
  327. ]
  328. return encode_yaml_stream(node_yaml_with_replicas)
  329. k8s_yaml_with_ns(build_node_yaml())
  330. guardian_resource_deps = ["eth-devnet"]
  331. if evm2:
  332. guardian_resource_deps = guardian_resource_deps + ["eth-devnet2"]
  333. if solana_watcher:
  334. guardian_resource_deps = guardian_resource_deps + ["solana-devnet"]
  335. if near:
  336. guardian_resource_deps = guardian_resource_deps + ["near"]
  337. if terra_classic:
  338. guardian_resource_deps = guardian_resource_deps + ["terra-terrad"]
  339. if terra2:
  340. guardian_resource_deps = guardian_resource_deps + ["terra2-terrad"]
  341. if algorand:
  342. guardian_resource_deps = guardian_resource_deps + ["algorand"]
  343. if aptos:
  344. guardian_resource_deps = guardian_resource_deps + ["aptos"]
  345. if wormchain:
  346. guardian_resource_deps = guardian_resource_deps + ["wormchain", "wormchain-deploy"]
  347. if sui:
  348. guardian_resource_deps = guardian_resource_deps + ["sui"]
  349. if stacks:
  350. guardian_resource_deps = guardian_resource_deps + ["stacks-node"]
  351. k8s_resource(
  352. "guardian",
  353. resource_deps = guardian_resource_deps,
  354. port_forwards = [
  355. port_forward(6060, name = "Debug/Status Server [:6060]", host = webHost),
  356. port_forward(7070, name = "Public gRPC [:7070]", host = webHost),
  357. port_forward(7071, name = "Public REST [:7071]", host = webHost),
  358. port_forward(2345, name = "Debugger [:2345]", host = webHost),
  359. ],
  360. labels = ["guardian"],
  361. trigger_mode = trigger_mode,
  362. )
  363. # guardian set update - triggered by "tilt args" changes
  364. if num_guardians >= 2 and ci == False:
  365. local_resource(
  366. name = "guardian-set-update",
  367. resource_deps = guardian_resource_deps + ["guardian"],
  368. deps = ["scripts/send-vaa.sh", "clients/eth"],
  369. cmd = './scripts/update-guardian-set.sh %s %s %s' % (num_guardians, webHost, namespace),
  370. labels = ["guardian"],
  371. trigger_mode = trigger_mode,
  372. )
  373. # grafana + prometheus for node metrics
  374. if node_metrics:
  375. dashboard = read_json("dashboards/Wormhole.json")
  376. dashboard_yaml = {
  377. "apiVersion": "v1",
  378. "kind": "ConfigMap",
  379. "metadata": {
  380. "name": "grafana-dashboards-json"
  381. },
  382. "data": {
  383. "wormhole.json": encode_json(dashboard)
  384. }
  385. }
  386. k8s_yaml_with_ns(encode_yaml(dashboard_yaml))
  387. k8s_yaml_with_ns("devnet/node-metrics.yaml")
  388. k8s_resource(
  389. "prometheus-server",
  390. resource_deps = ["guardian"],
  391. port_forwards = [
  392. port_forward(9099, name = "Prometheus [:9099]", host = webHost),
  393. ],
  394. labels = ["guardian"],
  395. trigger_mode = trigger_mode,
  396. )
  397. k8s_resource(
  398. "grafana",
  399. resource_deps = ["prometheus-server"],
  400. port_forwards = [
  401. port_forward(3033, name = "Grafana UI [:3033]", host = webHost),
  402. ],
  403. labels = ["guardian"],
  404. trigger_mode = trigger_mode,
  405. )
  406. # spy
  407. k8s_yaml_with_ns("devnet/spy.yaml")
  408. k8s_resource(
  409. "spy",
  410. resource_deps = ["guardian"],
  411. port_forwards = [
  412. port_forward(6061, container_port = 6060, name = "Debug/Status Server [:6061]", host = webHost),
  413. port_forward(7072, name = "Spy gRPC [:7072]", host = webHost),
  414. ],
  415. labels = ["guardian"],
  416. trigger_mode = trigger_mode,
  417. )
  418. if solana or pythnet:
  419. # solana client cli (used for devnet setup)
  420. docker_build(
  421. ref = "bridge-client",
  422. context = ".",
  423. only = ["./proto", "./solana", "./clients"],
  424. dockerfile = "solana/Dockerfile.client",
  425. # Ignore target folders from local (non-container) development.
  426. ignore = ["./solana/*/target", "./solana/tests"],
  427. )
  428. # solana smart contract
  429. docker_build(
  430. ref = "solana-contract",
  431. context = "solana",
  432. dockerfile = "solana/Dockerfile",
  433. target = "builder",
  434. ignore = ["./solana/*/target", "./solana/tests"],
  435. build_args = {"BRIDGE_ADDRESS": "Bridge1p5gheXUvJ6jGWGeCsgPKgnE3YgdGKRVCMY9o", "CHAIN_ID": "1"},
  436. )
  437. # solana local devnet
  438. docker_build(
  439. ref = "solana-test-validator",
  440. context = "solana",
  441. dockerfile = "solana/Dockerfile.test-validator",
  442. )
  443. k8s_yaml_with_ns("devnet/solana-devnet.yaml")
  444. k8s_resource(
  445. "solana-devnet",
  446. port_forwards = [
  447. port_forward(8899, name = "Solana RPC [:8899]", host = webHost),
  448. port_forward(8900, name = "Solana WS [:8900]", host = webHost),
  449. ],
  450. labels = ["solana"],
  451. trigger_mode = trigger_mode,
  452. )
  453. # eth devnet
  454. docker_build(
  455. ref = "eth-node",
  456. context = ".",
  457. only = ["./ethereum", "./relayer/ethereum"],
  458. dockerfile = "./ethereum/Dockerfile",
  459. # ignore local node_modules (in case they're present)
  460. ignore = ["./ethereum/node_modules","./relayer/ethereum/node_modules"],
  461. build_args = {"num_guardians": str(num_guardians), "dev": str(not ci)},
  462. # sync external scripts for incremental development
  463. # (everything else needs to be restarted from scratch for determinism)
  464. #
  465. # This relies on --update-mode=exec to work properly with a non-root user.
  466. # https://github.com/tilt-dev/tilt/issues/3708
  467. live_update = [
  468. sync("./ethereum/src", "/home/node/app/src"),
  469. ],
  470. )
  471. if redis or generic_relayer:
  472. docker_build(
  473. ref = "redis",
  474. context = ".",
  475. only = ["./third_party"],
  476. dockerfile = "third_party/redis/Dockerfile",
  477. )
  478. if redis:
  479. k8s_resource(
  480. "redis",
  481. port_forwards = [
  482. port_forward(6379, name = "Redis Default [:6379]", host = webHost),
  483. ],
  484. labels = ["redis"],
  485. trigger_mode = trigger_mode,
  486. )
  487. k8s_yaml_with_ns("devnet/redis.yaml")
  488. if generic_relayer:
  489. k8s_resource(
  490. "redis-relayer",
  491. port_forwards = [
  492. port_forward(6378, name = "Generic Relayer Redis [:6378]", host = webHost),
  493. ],
  494. labels = ["redis-relayer"],
  495. trigger_mode = trigger_mode,
  496. )
  497. k8s_yaml_with_ns("devnet/redis-relayer.yaml")
  498. if generic_relayer:
  499. k8s_resource(
  500. "relayer-engine",
  501. resource_deps = ["guardian", "redis-relayer", "spy"],
  502. port_forwards = [
  503. port_forward(3003, container_port=3000, name = "Bullmq UI [:3003]", host = webHost),
  504. ],
  505. labels = ["relayer-engine"],
  506. trigger_mode = trigger_mode,
  507. )
  508. docker_build(
  509. ref = "relayer-engine",
  510. context = ".",
  511. only = ["./relayer/generic_relayer", "./relayer/ethereum/ts-scripts/relayer/config"],
  512. dockerfile = "relayer/generic_relayer/relayer-engine-v2/Dockerfile",
  513. build_args = {"dev": str(not ci)}
  514. )
  515. k8s_yaml_with_ns("devnet/relayer-engine.yaml")
  516. k8s_yaml_with_ns("devnet/eth-devnet.yaml")
  517. k8s_resource(
  518. "eth-devnet",
  519. port_forwards = [
  520. port_forward(8545, name = "Anvil RPC [:8545]", host = webHost),
  521. ],
  522. labels = ["evm"],
  523. trigger_mode = trigger_mode,
  524. )
  525. if evm2:
  526. k8s_yaml_with_ns("devnet/eth-devnet2.yaml")
  527. k8s_resource(
  528. "eth-devnet2",
  529. port_forwards = [
  530. port_forward(8546, 8545, name = "Anvil RPC [:8546]", host = webHost),
  531. ],
  532. labels = ["evm"],
  533. trigger_mode = trigger_mode,
  534. )
  535. # Note that ci_tests requires other resources in order to build properly:
  536. # - eth-devnet -- required by: accountant_tests, ntt_accountant_tests, tx-verifier
  537. # - eth-devnet2 -- required by: accountant_tests, ntt_accountant_tests
  538. # - wormchain -- required by: accountant_tests, ntt_accountant_tests
  539. # - solana -- required by: spydk-ci-tests
  540. if ci_tests:
  541. docker_build(
  542. ref = "sdk-test-image",
  543. context = ".",
  544. dockerfile = "testing/Dockerfile.sdk.test",
  545. only = [],
  546. live_update = [
  547. sync("./sdk/js/src", "/app/sdk/js/src"),
  548. sync("./testing", "/app/testing"),
  549. ],
  550. )
  551. docker_build(
  552. ref = "spydk-test-image",
  553. context = ".",
  554. dockerfile = "testing/Dockerfile.spydk.test",
  555. only = [],
  556. live_update = [
  557. sync("./spydk/js/src", "/app/spydk/js/src"),
  558. sync("./testing", "/app/testing"),
  559. ],
  560. )
  561. docker_build(
  562. ref = "query-sdk-test-image",
  563. context = ".",
  564. dockerfile = "testing/Dockerfile.querysdk.test",
  565. only = [],
  566. live_update = [
  567. sync("./sdk/js/src", "/app/sdk/js-query/src"),
  568. sync("./testing", "/app/testing"),
  569. ],
  570. )
  571. docker_build(
  572. ref = "tx-verifier-evm",
  573. context = "./devnet/tx-verifier/",
  574. dockerfile = "./devnet/tx-verifier/Dockerfile.tx-verifier-evm"
  575. )
  576. k8s_yaml_with_ns("devnet/tx-verifier-evm.yaml")
  577. if sui:
  578. docker_build(
  579. ref = "tx-verifier-sui",
  580. context = "./devnet/tx-verifier/",
  581. dockerfile = "./devnet/tx-verifier/Dockerfile.tx-verifier-sui"
  582. )
  583. k8s_yaml_with_ns("devnet/tx-verifier-sui.yaml")
  584. k8s_yaml_with_ns(
  585. encode_yaml_stream(
  586. set_env_in_jobs(
  587. set_env_in_jobs(
  588. set_env_in_jobs(read_yaml_stream("devnet/tests.yaml"), "NUM_GUARDIANS", str(num_guardians)),
  589. "BOOTSTRAP_PEERS", str(ccqBootstrapPeers)),
  590. "MAX_WORKERS", max_workers))
  591. )
  592. # separate resources to parallelize docker builds
  593. k8s_resource(
  594. "sdk-ci-tests",
  595. labels = ["ci"],
  596. trigger_mode = trigger_mode,
  597. resource_deps = [], # testing/sdk.sh handles waiting for spy, not having deps gets the build earlier
  598. )
  599. k8s_resource(
  600. "spydk-ci-tests",
  601. labels = ["ci"],
  602. trigger_mode = trigger_mode,
  603. resource_deps = [], # testing/spydk.sh handles waiting for spy, not having deps gets the build earlier
  604. )
  605. k8s_resource(
  606. "accountant-ci-tests",
  607. labels = ["ci"],
  608. trigger_mode = trigger_mode,
  609. resource_deps = [], # uses devnet-consts.json, but wormchain/contracts/tools/test_accountant.sh handles waiting for guardian, not having deps gets the build earlier
  610. )
  611. k8s_resource(
  612. "ntt-accountant-ci-tests",
  613. labels = ["ci"],
  614. trigger_mode = trigger_mode,
  615. resource_deps = [], # uses devnet-consts.json, but wormchain/contracts/tools/test_ntt_accountant.sh handles waiting for guardian, not having deps gets the build earlier
  616. )
  617. k8s_resource(
  618. "query-sdk-ci-tests",
  619. labels = ["ci"],
  620. trigger_mode = trigger_mode,
  621. resource_deps = [], # testing/querysdk.sh handles waiting for query-server, not having deps gets the build earlier
  622. )
  623. # launches Transfer Verifier binary and sets up monitoring script
  624. k8s_resource(
  625. "tx-verifier-evm",
  626. labels = ["tx-verifier"],
  627. trigger_mode = trigger_mode,
  628. resource_deps = ["eth-devnet"],
  629. )
  630. k8s_resource(
  631. "custom-consistency-level-ci-tests",
  632. labels = ["ci"],
  633. trigger_mode = trigger_mode,
  634. resource_deps = [], # uses devnet-consts.json, buttesting/contract-integrations/custom_consistency_level/test_custom_consistency_level.sh handles waiting for guardian, not having deps gets the build earlier
  635. )
  636. if sui:
  637. k8s_resource(
  638. "tx-verifier-sui",
  639. labels = ["tx-verifier"],
  640. trigger_mode = trigger_mode,
  641. resource_deps = ["sui"]
  642. )
  643. if terra_classic:
  644. docker_build(
  645. ref = "terra-image",
  646. context = "./terra/devnet",
  647. dockerfile = "terra/devnet/Dockerfile",
  648. platform = "linux/amd64",
  649. )
  650. docker_build(
  651. ref = "terra-contracts",
  652. context = "./terra",
  653. dockerfile = "./terra/Dockerfile",
  654. platform = "linux/amd64",
  655. )
  656. k8s_yaml_with_ns("devnet/terra-devnet.yaml")
  657. k8s_resource(
  658. "terra-terrad",
  659. port_forwards = [
  660. port_forward(26657, name = "Terra RPC [:26657]", host = webHost),
  661. port_forward(1317, name = "Terra LCD [:1317]", host = webHost),
  662. ],
  663. labels = ["terra"],
  664. trigger_mode = trigger_mode,
  665. )
  666. if terra2 or wormchain:
  667. docker_build(
  668. ref = "cosmwasm_artifacts",
  669. context = ".",
  670. dockerfile = "./cosmwasm/Dockerfile",
  671. target = "artifacts",
  672. platform = "linux/amd64",
  673. )
  674. if terra2:
  675. docker_build(
  676. ref = "terra2-image",
  677. context = "./cosmwasm/deployment/terra2/devnet",
  678. dockerfile = "./cosmwasm/deployment/terra2/devnet/Dockerfile",
  679. platform = "linux/amd64",
  680. )
  681. docker_build(
  682. ref = "terra2-deploy",
  683. context = "./cosmwasm/deployment/terra2",
  684. dockerfile = "./cosmwasm/Dockerfile.deploy",
  685. )
  686. k8s_yaml_with_ns("devnet/terra2-devnet.yaml")
  687. k8s_resource(
  688. "terra2-terrad",
  689. port_forwards = [
  690. port_forward(26658, container_port = 26657, name = "Terra 2 RPC [:26658]", host = webHost),
  691. port_forward(1318, container_port = 1317, name = "Terra 2 LCD [:1318]", host = webHost),
  692. ],
  693. labels = ["terra2"],
  694. trigger_mode = trigger_mode,
  695. )
  696. if algorand:
  697. k8s_yaml_with_ns("devnet/algorand-devnet.yaml")
  698. docker_build(
  699. ref = "algorand-algod",
  700. context = "algorand/sandbox-algorand",
  701. dockerfile = "algorand/sandbox-algorand/images/algod/Dockerfile"
  702. )
  703. docker_build(
  704. ref = "algorand-indexer",
  705. context = "algorand/sandbox-algorand",
  706. dockerfile = "algorand/sandbox-algorand/images/indexer/Dockerfile"
  707. )
  708. docker_build(
  709. ref = "algorand-contracts",
  710. context = "algorand",
  711. dockerfile = "algorand/Dockerfile",
  712. ignore = ["algorand/test/*.*"]
  713. )
  714. k8s_resource(
  715. "algorand",
  716. port_forwards = [
  717. port_forward(4001, name = "Algod [:4001]", host = webHost),
  718. port_forward(4002, name = "KMD [:4002]", host = webHost),
  719. port_forward(8980, name = "Indexer [:8980]", host = webHost),
  720. ],
  721. labels = ["algorand"],
  722. trigger_mode = trigger_mode,
  723. )
  724. if sui:
  725. k8s_yaml_with_ns("devnet/sui-devnet.yaml")
  726. docker_build(
  727. ref = "sui-node",
  728. target = "sui",
  729. context = ".",
  730. dockerfile = "sui/Dockerfile",
  731. ignore = ["./sui/sui.log*", "sui/sui.log*", "sui.log.*"],
  732. only = ["./sui"],
  733. )
  734. k8s_resource(
  735. "sui",
  736. port_forwards = [
  737. port_forward(9000, 9000, name = "RPC [:9000]", host = webHost),
  738. port_forward(9184, name = "Prometheus [:9184]", host = webHost),
  739. ],
  740. labels = ["sui"],
  741. trigger_mode = trigger_mode,
  742. )
  743. if near:
  744. k8s_yaml_with_ns("devnet/near-devnet.yaml")
  745. docker_build(
  746. ref = "near-node",
  747. context = "near",
  748. dockerfile = "near/Dockerfile",
  749. only = ["Dockerfile", "node_builder.sh", "start_node.sh", "README.md"],
  750. )
  751. docker_build(
  752. ref = "near-deploy",
  753. context = "near",
  754. dockerfile = "near/Dockerfile.deploy",
  755. ignore = ["./test"]
  756. )
  757. k8s_resource(
  758. "near",
  759. port_forwards = [
  760. port_forward(3030, name = "Node [:3030]", host = webHost),
  761. port_forward(3031, name = "webserver [:3031]", host = webHost),
  762. ],
  763. labels = ["near"],
  764. trigger_mode = trigger_mode,
  765. )
  766. if wormchain:
  767. docker_build(
  768. ref = "wormchaind-image",
  769. context = ".",
  770. dockerfile = "./wormchain/Dockerfile",
  771. platform = "linux/amd64",
  772. build_args = {"num_guardians": str(num_guardians)},
  773. only = [],
  774. ignore = ["./wormchain/testing", "./wormchain/ts-sdk", "./wormchain/design", "./wormchain/vue", "./wormchain/build/wormchaind"],
  775. )
  776. # docker_build(
  777. # ref = "vue-export",
  778. # context = ".",
  779. # dockerfile = "./wormchain/Dockerfile.proto",
  780. # target = "vue-export",
  781. # )
  782. docker_build(
  783. ref = "wormchain-deploy",
  784. context = "./wormchain",
  785. dockerfile = "./wormchain/Dockerfile.deploy",
  786. )
  787. def build_wormchain_yaml(yaml_path, num_instances):
  788. wormchain_yaml = read_yaml_stream(yaml_path)
  789. # set the number of replicas in the StatefulSet to be num_guardians
  790. wormchain_set = set_replicas_in_statefulset(wormchain_yaml, "wormchain", num_instances)
  791. # add a Service for each wormchain instance
  792. services = []
  793. for obj in wormchain_set:
  794. if obj["kind"] == "Service" and obj["metadata"]["name"] == "wormchain-0":
  795. # make a Service for each replica so we can resolve it by name from other pods.
  796. # copy wormchain-0's Service then set the name and selector for the instance.
  797. for instance_num in list(range(1, num_instances)):
  798. instance_name = 'wormchain-%s' % (instance_num)
  799. # Copy the Service's properties to a new dict, by value, three levels deep.
  800. # tl;dr - if the value is a dict, use a comprehension to copy it immutably.
  801. service = { k: ({ k2: ({ k3:v3
  802. for (k3,v3) in v2.items()} if type(v2) == "dict" else v2)
  803. for (k2,v2) in v.items()} if type(v) == "dict" else v)
  804. for (k,v) in obj.items()}
  805. # add the name we want to be able to resolve via k8s DNS
  806. service["metadata"]["name"] = instance_name
  807. # add the name of the pod the service should connect to
  808. service["spec"]["selector"] = { "statefulset.kubernetes.io/pod-name": instance_name }
  809. services.append(service)
  810. return encode_yaml_stream(wormchain_set + services)
  811. wormchain_path = "devnet/wormchain.yaml"
  812. if num_guardians >= 2:
  813. # update wormchain's k8s config to spin up multiple instances
  814. k8s_yaml_with_ns(build_wormchain_yaml(wormchain_path, num_guardians))
  815. else:
  816. k8s_yaml_with_ns(wormchain_path)
  817. k8s_resource(
  818. "wormchain",
  819. port_forwards = [
  820. port_forward(1319, container_port = 1317, name = "REST [:1319]", host = webHost),
  821. port_forward(9090, container_port = 9090, name = "GRPC", host = webHost),
  822. port_forward(26659, container_port = 26657, name = "TENDERMINT [:26659]", host = webHost)
  823. ],
  824. labels = ["wormchain"],
  825. trigger_mode = trigger_mode,
  826. )
  827. k8s_resource(
  828. "wormchain-deploy",
  829. resource_deps = ["wormchain"],
  830. labels = ["wormchain"],
  831. trigger_mode = trigger_mode,
  832. )
  833. if ibc_relayer:
  834. docker_build(
  835. ref = "ibc-relayer-image",
  836. context = ".",
  837. dockerfile = "./wormchain/ibc-relayer/Dockerfile",
  838. only = []
  839. )
  840. k8s_yaml_with_ns("devnet/ibc-relayer.yaml")
  841. k8s_resource(
  842. "ibc-relayer",
  843. port_forwards = [
  844. port_forward(7597, name = "HTTPDEBUG [:7597]", host = webHost),
  845. ],
  846. resource_deps = ["wormchain-deploy", "terra2-terrad"],
  847. labels = ["ibc-relayer"],
  848. trigger_mode = trigger_mode,
  849. )
  850. if btc:
  851. k8s_yaml_with_ns("devnet/btc-localnet.yaml")
  852. docker_build(
  853. ref = "btc-node",
  854. context = "bitcoin",
  855. dockerfile = "bitcoin/Dockerfile",
  856. target = "bitcoin-build",
  857. )
  858. k8s_resource(
  859. "btc",
  860. port_forwards = [
  861. port_forward(18556, name = "RPC [:18556]", host = webHost),
  862. ],
  863. labels = ["btc"],
  864. trigger_mode = trigger_mode,
  865. )
  866. if aptos:
  867. k8s_yaml_with_ns("devnet/aptos-localnet.yaml")
  868. docker_build(
  869. ref = "aptos-node",
  870. context = "aptos",
  871. dockerfile = "aptos/Dockerfile",
  872. target = "aptos",
  873. )
  874. k8s_resource(
  875. "aptos",
  876. port_forwards = [
  877. port_forward(8080, name = "RPC [:8080]", host = webHost),
  878. port_forward(6181, name = "FullNode [:6181]", host = webHost),
  879. port_forward(8081, name = "Faucet [:8081]", host = webHost),
  880. ],
  881. labels = ["aptos"],
  882. trigger_mode = trigger_mode,
  883. )
  884. def build_query_server_yaml():
  885. qs_yaml = read_yaml_stream("devnet/query-server.yaml")
  886. for obj in qs_yaml:
  887. if obj["kind"] == "StatefulSet" and obj["metadata"]["name"] == "query-server":
  888. container = obj["spec"]["template"]["spec"]["containers"][0]
  889. container["command"] += ["--bootstrap="+ccqBootstrapPeers]
  890. return encode_yaml_stream(qs_yaml)
  891. if query_server:
  892. k8s_yaml_with_ns(build_query_server_yaml())
  893. k8s_resource(
  894. "query-server",
  895. resource_deps = ["guardian"],
  896. port_forwards = [
  897. port_forward(6069, name = "REST [:6069]", host = webHost),
  898. port_forward(6068, name = "Status [:6068]", host = webHost)
  899. ],
  900. labels = ["query-server"],
  901. trigger_mode = trigger_mode
  902. )
  903. if stacks:
  904. # Build Stacks node image
  905. docker_build(
  906. ref = "stacks-node",
  907. context = "./stacks",
  908. dockerfile = "stacks/Dockerfile",
  909. target = "stacks-node",
  910. )
  911. # Build Stacks signer image
  912. docker_build(
  913. ref = "stacks-signer",
  914. context = "./stacks",
  915. dockerfile = "stacks/Dockerfile",
  916. target = "stacks-signer",
  917. )
  918. # Build stacker image
  919. docker_build(
  920. ref = "stacks-stacker",
  921. context = "./stacks/stacker",
  922. dockerfile = "stacks/stacker/Dockerfile"
  923. )
  924. # Build broadcaster image
  925. docker_build(
  926. ref = "stacks-broadcaster",
  927. context = "./stacks/broadcaster",
  928. dockerfile = "stacks/broadcaster/Dockerfile"
  929. )
  930. # Build Stacks integration test suite
  931. docker_build(
  932. ref = "stacks-test",
  933. context = "./stacks",
  934. dockerfile = "stacks/test/Dockerfile",
  935. )
  936. # Deploy Bitcoin services
  937. k8s_yaml_with_ns("devnet/stacks-bitcoin.yaml")
  938. k8s_resource(
  939. "bitcoin-node",
  940. port_forwards = [
  941. port_forward(18443, name = "Bitcoin RPC [:18443]", host = webHost),
  942. port_forward(18444, name = "Bitcoin P2P [:18444]", host = webHost)
  943. ],
  944. labels = ["stacks"],
  945. trigger_mode = trigger_mode,
  946. )
  947. k8s_resource(
  948. "bitcoin-miner",
  949. resource_deps = ["bitcoin-node"],
  950. labels = ["stacks"],
  951. trigger_mode = trigger_mode,
  952. )
  953. # Deploy Stacks node
  954. k8s_yaml_with_ns("devnet/stacks-node.yaml")
  955. k8s_resource(
  956. "stacks-node",
  957. resource_deps = ["bitcoin-miner"],
  958. port_forwards = [
  959. port_forward(20443, name = "Stacks Node RPC [:20443]", host = webHost)
  960. ],
  961. labels = ["stacks"],
  962. trigger_mode = trigger_mode,
  963. )
  964. # Deploy Stacks signer
  965. k8s_yaml_with_ns("devnet/stacks-signer.yaml")
  966. k8s_resource(
  967. "stacks-signer",
  968. labels = ["stacks"],
  969. trigger_mode = trigger_mode,
  970. )
  971. # Deploy Stacker (establishes PoX anchor blocks)
  972. k8s_yaml_with_ns("devnet/stacks-stacker.yaml")
  973. k8s_resource(
  974. "stacks-stacker",
  975. resource_deps = ["stacks-node"],
  976. labels = ["stacks"],
  977. trigger_mode = trigger_mode,
  978. )
  979. # Deploy TX broadcaster
  980. k8s_yaml_with_ns("devnet/stacks-broadcaster.yaml")
  981. k8s_resource(
  982. "stacks-broadcaster",
  983. resource_deps = ["stacks-node", "stacks-signer"],
  984. labels = ["stacks"],
  985. trigger_mode = trigger_mode,
  986. )
  987. # Deploy Stacks integration test suite
  988. k8s_yaml_with_ns("stacks/stacks-test.yaml")
  989. k8s_resource(
  990. "stacks-test",
  991. resource_deps = ["stacks-broadcaster"], # After Nakamoto
  992. labels = ["stacks"],
  993. trigger_mode = trigger_mode,
  994. )