Tiltfile 35 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031
  1. # This Tiltfile contains the deployment and build config for the Wormhole devnet.
  2. #
  3. # We use Buildkit cache mounts and careful layering to avoid unnecessary rebuilds - almost
  4. # all source code changes result in small, incremental rebuilds. Dockerfiles are written such
  5. # that, for example, changing the contract source code won't cause Solana itself to be rebuilt.
  6. #
  7. load("ext://namespace", "namespace_create", "namespace_inject")
  8. load("ext://secret", "secret_yaml_generic")
  9. # set the replica value of a StatefulSet
  10. def set_replicas_in_statefulset(config_yaml, statefulset_name, num_replicas):
  11. for obj in config_yaml:
  12. if obj["kind"] == "StatefulSet" and obj["metadata"]["name"] == statefulset_name:
  13. obj["spec"]["replicas"] = num_replicas
  14. return config_yaml
  15. # set the env value of all containers in all jobs
  16. def set_env_in_jobs(config_yaml, name, value):
  17. for obj in config_yaml:
  18. if obj["kind"] == "Job":
  19. for container in obj["spec"]["template"]["spec"]["containers"]:
  20. if not "env" in container:
  21. container["env"] = []
  22. container["env"].append({"name": name, "value": value})
  23. return config_yaml
  24. allow_k8s_contexts("ci")
  25. # Disable telemetry by default
  26. analytics_settings(False)
  27. # Moar updates (default is 3)
  28. update_settings(max_parallel_updates = 10)
  29. # Runtime configuration
  30. config.define_bool("ci", False, "We are running in CI")
  31. config.define_bool("manual", False, "Set TRIGGER_MODE_MANUAL by default")
  32. config.define_string("num", False, "Number of guardian nodes to run")
  33. config.define_string("maxWorkers", False, "Maximum number of workers for sdk-ci-tests. See https://jestjs.io/docs/cli#--maxworkersnumstring")
  34. # You do not usually need to set this argument - this argument is for debugging only. If you do use a different
  35. # namespace, note that the "wormhole" namespace is hardcoded in tests and don't forget specifying the argument
  36. # when running "tilt down".
  37. #
  38. config.define_string("namespace", False, "Kubernetes namespace to use")
  39. # When running Tilt on a server, this can be used to set the public hostname Tilt runs on
  40. # for service links in the UI to work.
  41. config.define_string("webHost", False, "Public hostname for port forwards")
  42. # When running Tilt on a server, this can be used to set the public hostname Tilt runs on
  43. # for service links in the UI to work.
  44. config.define_string("guardiand_loglevel", False, "Log level for guardiand (debug, info, warn, error, dpanic, panic, fatal)")
  45. # Components
  46. config.define_bool("near", False, "Enable Near component")
  47. config.define_bool("sui", False, "Enable Sui component")
  48. config.define_bool("btc", False, "Enable BTC component")
  49. config.define_bool("aptos", False, "Enable Aptos component")
  50. config.define_bool("algorand", False, "Enable Algorand component")
  51. config.define_bool("evm2", False, "Enable second Eth component")
  52. config.define_bool("solana", False, "Enable Solana component")
  53. config.define_bool("solana_watcher", False, "Enable Solana watcher on guardian")
  54. config.define_bool("pythnet", False, "Enable PythNet component")
  55. config.define_bool("terra_classic", False, "Enable Terra Classic component")
  56. config.define_bool("terra2", False, "Enable Terra 2 component")
  57. config.define_bool("ci_tests", False, "Enable tests runner component")
  58. config.define_bool("guardiand_debug", False, "Enable dlv endpoint for guardiand")
  59. config.define_bool("node_metrics", False, "Enable Prometheus & Grafana for Guardian metrics")
  60. config.define_bool("guardiand_governor", False, "Enable chain governor in guardiand")
  61. config.define_bool("wormchain", False, "Enable a wormchain node")
  62. config.define_bool("ibc_relayer", False, "Enable IBC relayer between cosmos chains")
  63. config.define_bool("redis", False, "Enable a redis instance")
  64. config.define_bool("generic_relayer", False, "Enable the generic relayer off-chain component")
  65. config.define_bool("query_server", False, "Enable cross-chain query server")
  66. cfg = config.parse()
  67. num_guardians = int(cfg.get("num", "1"))
  68. max_workers = cfg.get("maxWorkers", "50%")
  69. namespace = cfg.get("namespace", "wormhole")
  70. webHost = cfg.get("webHost", "localhost")
  71. ci = cfg.get("ci", False)
  72. algorand = cfg.get("algorand", ci)
  73. near = cfg.get("near", ci)
  74. aptos = cfg.get("aptos", ci)
  75. sui = cfg.get("sui", ci)
  76. evm2 = cfg.get("evm2", ci)
  77. solana = cfg.get("solana", ci)
  78. pythnet = cfg.get("pythnet", False)
  79. solana_watcher = cfg.get("solana_watcher", solana or pythnet)
  80. terra_classic = cfg.get("terra_classic", ci)
  81. terra2 = cfg.get("terra2", ci)
  82. wormchain = cfg.get("wormchain", ci)
  83. ci_tests = cfg.get("ci_tests", ci)
  84. guardiand_debug = cfg.get("guardiand_debug", False)
  85. node_metrics = cfg.get("node_metrics", False)
  86. guardiand_governor = cfg.get("guardiand_governor", False)
  87. ibc_relayer = cfg.get("ibc_relayer", ci)
  88. btc = cfg.get("btc", False)
  89. redis = cfg.get('redis', ci)
  90. generic_relayer = cfg.get("generic_relayer", ci)
  91. query_server = cfg.get("query_server", ci)
  92. if ci:
  93. guardiand_loglevel = cfg.get("guardiand_loglevel", "warn")
  94. else:
  95. guardiand_loglevel = cfg.get("guardiand_loglevel", "info")
  96. if cfg.get("manual", False):
  97. trigger_mode = TRIGGER_MODE_MANUAL
  98. else:
  99. trigger_mode = TRIGGER_MODE_AUTO
  100. # namespace
  101. if not ci:
  102. namespace_create(namespace)
  103. def k8s_yaml_with_ns(objects):
  104. return k8s_yaml(namespace_inject(objects, namespace))
  105. docker_build(
  106. ref = "cli-gen",
  107. context = ".",
  108. dockerfile = "Dockerfile.cli",
  109. )
  110. docker_build(
  111. ref = "const-gen",
  112. context = ".",
  113. dockerfile = "Dockerfile.const",
  114. build_args={"num_guardians": '%s' % (num_guardians)},
  115. )
  116. # node
  117. docker_build(
  118. ref = "guardiand-image",
  119. context = ".",
  120. dockerfile = "node/Dockerfile",
  121. target = "build",
  122. ignore=["./sdk/js", "./relayer"]
  123. )
  124. def command_with_dlv(argv):
  125. return [
  126. "/dlv",
  127. "--listen=0.0.0.0:2345",
  128. "--accept-multiclient",
  129. "--headless=true",
  130. "--api-version=2",
  131. "--continue=true",
  132. "exec",
  133. argv[0],
  134. "--",
  135. ] + argv[1:]
  136. def generate_bootstrap_peers(num_guardians, port_num):
  137. # Improve the chances of the guardians discovering each other in tilt by making them all bootstrap peers.
  138. # The devnet guardian uses deterministic P2P peer IDs based on the guardian index. The peer IDs here
  139. # were generated using `DeterministicP2PPrivKeyByIndex` in `node/pkg/devnet/deterministic_p2p_key.go`.
  140. peer_ids = [
  141. "12D3KooWL3XJ9EMCyZvmmGXL2LMiVBtrVa2BuESsJiXkSj7333Jw",
  142. "12D3KooWHHzSeKaY8xuZVzkLbKFfvNgPPeKhFBGrMbNzbm5akpqu",
  143. "12D3KooWKRyzVWW6ChFjQjK4miCty85Niy49tpPV95XdKu1BcvMA",
  144. "12D3KooWB1b3qZxWJanuhtseF3DmPggHCtG36KZ9ixkqHtdKH9fh",
  145. "12D3KooWE4qDcRrueTuRYWUdQZgcy7APZqBngVeXRt4Y6ytHizKV",
  146. "12D3KooWPgam4TzSVCRa4AbhxQnM9abCYR4E9hV57SN7eAjEYn1j",
  147. "12D3KooWM4yJB31d4hF2F9Vdwuj9WFo1qonoySyw4bVAQ9a9d21o",
  148. "12D3KooWCv935r3ropYhUe5yMCp9QiUoc9A6cZpYQ5x84DqEPbwb",
  149. "12D3KooWQfG74brcJhzpNwjPCZmcbBv8f6wxKgLSYmEDXXdPXQpH",
  150. "12D3KooWNEWRB7PnuZs164xaA9QWM3iZHekHyEQo5qGP5KCHHuSN",
  151. "12D3KooWB224kvi7vN34xJfsfW7bnv6eodxTkgo9VFA6UiaGMgRD",
  152. "12D3KooWCR2EoapJjoQVR4E3NLjWn818gG3XizQ92Yx6C424HL2g",
  153. "12D3KooWNc5rNmCJ9yvXviXaENnp7vqDQjomZwia4aA7Q3hSYkiW",
  154. "12D3KooWBremnqYWBDK6ctvCuhCqJAps5ZAPADu53gXhQHexrvtP",
  155. "12D3KooWFqdBYPrtwErMosomvD4uRtVhXQdqqZZHC3NCBZYVxr4t",
  156. "12D3KooW9yvKfP5HgVaLnNaxWywo3pLAEypk7wjUcpgKwLznk5gQ",
  157. "12D3KooWRuYVGEsecrJJhZsSoKf1UNdBVYKFCmFLNj9ucZiSQCYj",
  158. "12D3KooWGEcD5sW5osB6LajkHGqiGc3W8eKfYwnJVVqfujkpLWX2",
  159. "12D3KooWQYz2inBsgiBoqNtmEn1qeRBr9B8cdishFuBgiARcfMcY"
  160. ]
  161. bootstrap = ""
  162. for idx in range(num_guardians):
  163. if bootstrap != "":
  164. bootstrap += ","
  165. bootstrap += "/dns4/guardian-{idx}.guardian/udp/{port}/quic/p2p/{peer}".format(idx = idx, port = port_num, peer = peer_ids[idx])
  166. return bootstrap
  167. bootstrapPeers = generate_bootstrap_peers(num_guardians, 8999)
  168. ccqBootstrapPeers = generate_bootstrap_peers(num_guardians, 8996)
  169. def build_node_yaml():
  170. node_yaml = read_yaml_stream("devnet/node.yaml")
  171. node_yaml_with_replicas = set_replicas_in_statefulset(node_yaml, "guardian", num_guardians)
  172. for obj in node_yaml_with_replicas:
  173. if obj["kind"] == "StatefulSet" and obj["metadata"]["name"] == "guardian":
  174. container = obj["spec"]["template"]["spec"]["containers"][0]
  175. if container["name"] != "guardiand":
  176. fail("container 0 is not guardiand")
  177. container["command"] += ["--logLevel="+guardiand_loglevel]
  178. if guardiand_debug:
  179. container["command"] = command_with_dlv(container["command"])
  180. print(container["command"])
  181. if num_guardians > 1:
  182. container["command"] += [
  183. "--bootstrap",
  184. bootstrapPeers,
  185. "--ccqP2pBootstrap",
  186. ccqBootstrapPeers,
  187. ]
  188. if aptos:
  189. container["command"] += [
  190. "--aptosRPC",
  191. "http://aptos:8080",
  192. "--aptosAccount",
  193. "de0036a9600559e295d5f6802ef6f3f802f510366e0c23912b0655d972166017",
  194. "--aptosHandle",
  195. "0xde0036a9600559e295d5f6802ef6f3f802f510366e0c23912b0655d972166017::state::WormholeMessageHandle",
  196. ]
  197. if sui:
  198. container["command"] += [
  199. "--suiRPC",
  200. "http://sui:9000",
  201. "--suiMoveEventType",
  202. "0x320a40bff834b5ffa12d7f5cc2220dd733dd9e8e91c425800203d06fb2b1fee8::publish_message::WormholeMessage",
  203. ]
  204. if evm2:
  205. container["command"] += [
  206. "--bscRPC",
  207. "ws://eth-devnet2:8545",
  208. ]
  209. else:
  210. container["command"] += [
  211. "--bscRPC",
  212. "ws://eth-devnet:8545",
  213. ]
  214. if solana_watcher:
  215. container["command"] += [
  216. "--solanaRPC",
  217. "http://solana-devnet:8899",
  218. "--solanaContract",
  219. "Bridge1p5gheXUvJ6jGWGeCsgPKgnE3YgdGKRVCMY9o",
  220. "--solanaShimContract",
  221. "EtZMZM22ViKMo4r5y4Anovs3wKQ2owUmDpjygnMMcdEX",
  222. ]
  223. if pythnet:
  224. container["command"] += [
  225. "--pythnetRPC",
  226. # "http://solana-devnet:8899",
  227. "http://pythnet.rpcpool.com",
  228. "--pythnetWS",
  229. # "ws://solana-devnet:8900",
  230. "wss://pythnet.rpcpool.com",
  231. "--pythnetContract",
  232. "H3fxXJ86ADW2PNuDDmZJg6mzTtPxkYCpNuQUTgmJ7AjU",
  233. ]
  234. if terra_classic:
  235. container["command"] += [
  236. "--terraWS",
  237. "ws://terra-terrad:26657/websocket",
  238. "--terraLCD",
  239. "http://terra-terrad:1317",
  240. "--terraContract",
  241. "terra14hj2tavq8fpesdwxxcu44rty3hh90vhujrvcmstl4zr3txmfvw9ssrc8au",
  242. ]
  243. if terra2:
  244. container["command"] += [
  245. "--terra2WS",
  246. "ws://terra2-terrad:26657/websocket",
  247. "--terra2LCD",
  248. "http://terra2-terrad:1317",
  249. "--terra2Contract",
  250. "terra14hj2tavq8fpesdwxxcu44rty3hh90vhujrvcmstl4zr3txmfvw9ssrc8au",
  251. ]
  252. if algorand:
  253. container["command"] += [
  254. "--algorandAppID",
  255. "1004",
  256. "--algorandIndexerRPC",
  257. "http://algorand:8980",
  258. "--algorandIndexerToken",
  259. "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
  260. "--algorandAlgodRPC",
  261. "http://algorand:4001",
  262. "--algorandAlgodToken",
  263. "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
  264. ]
  265. if guardiand_governor:
  266. container["command"] += [
  267. "--chainGovernorEnabled"
  268. ]
  269. if near:
  270. container["command"] += [
  271. "--nearRPC",
  272. "http://near:3030",
  273. "--nearContract",
  274. "wormhole.test.near"
  275. ]
  276. if wormchain:
  277. container["command"] += [
  278. "--wormchainURL",
  279. "wormchain:9090",
  280. "--accountantWS",
  281. "http://wormchain:26657",
  282. "--accountantContract",
  283. "wormhole14hj2tavq8fpesdwxxcu44rty3hh90vhujrvcmstl4zr3txmfvw9srrg465",
  284. "--accountantKeyPath",
  285. "/tmp/mounted-keys/wormchain/accountantKey",
  286. "--accountantKeyPassPhrase",
  287. "test0000",
  288. "--accountantCheckEnabled",
  289. "true",
  290. "--accountantNttContract",
  291. "wormhole17p9rzwnnfxcjp32un9ug7yhhzgtkhvl9jfksztgw5uh69wac2pgshdnj3k",
  292. "--accountantNttKeyPath",
  293. "/tmp/mounted-keys/wormchain/accountantNttKey",
  294. "--accountantNttKeyPassPhrase",
  295. "test0000",
  296. "--ibcContract",
  297. "wormhole1nc5tatafv6eyq7llkr2gv50ff9e22mnf70qgjlv737ktmt4eswrq0kdhcj",
  298. "--ibcWS",
  299. "ws://wormchain:26657/websocket",
  300. "--ibcLCD",
  301. "http://wormchain:1317",
  302. "--gatewayRelayerContract",
  303. "wormhole1wn625s4jcmvk0szpl85rj5azkfc6suyvf75q6vrddscjdphtve8sca0pvl",
  304. "--gatewayRelayerKeyPath",
  305. "/tmp/mounted-keys/wormchain/gwrelayerKey",
  306. "--gatewayRelayerKeyPassPhrase",
  307. "test0000",
  308. "--gatewayContract",
  309. "wormhole1ghd753shjuwexxywmgs4xz7x2q732vcnkm6h2pyv9s6ah3hylvrqtm7t3h",
  310. "--gatewayWS",
  311. "ws://wormchain:26657/websocket",
  312. "--gatewayLCD",
  313. "http://wormchain:1317"
  314. ]
  315. return encode_yaml_stream(node_yaml_with_replicas)
  316. k8s_yaml_with_ns(build_node_yaml())
  317. guardian_resource_deps = ["eth-devnet"]
  318. if evm2:
  319. guardian_resource_deps = guardian_resource_deps + ["eth-devnet2"]
  320. if solana_watcher:
  321. guardian_resource_deps = guardian_resource_deps + ["solana-devnet"]
  322. if near:
  323. guardian_resource_deps = guardian_resource_deps + ["near"]
  324. if terra_classic:
  325. guardian_resource_deps = guardian_resource_deps + ["terra-terrad"]
  326. if terra2:
  327. guardian_resource_deps = guardian_resource_deps + ["terra2-terrad"]
  328. if algorand:
  329. guardian_resource_deps = guardian_resource_deps + ["algorand"]
  330. if aptos:
  331. guardian_resource_deps = guardian_resource_deps + ["aptos"]
  332. if wormchain:
  333. guardian_resource_deps = guardian_resource_deps + ["wormchain", "wormchain-deploy"]
  334. if sui:
  335. guardian_resource_deps = guardian_resource_deps + ["sui"]
  336. k8s_resource(
  337. "guardian",
  338. resource_deps = guardian_resource_deps,
  339. port_forwards = [
  340. port_forward(6060, name = "Debug/Status Server [:6060]", host = webHost),
  341. port_forward(7070, name = "Public gRPC [:7070]", host = webHost),
  342. port_forward(7071, name = "Public REST [:7071]", host = webHost),
  343. port_forward(2345, name = "Debugger [:2345]", host = webHost),
  344. ],
  345. labels = ["guardian"],
  346. trigger_mode = trigger_mode,
  347. )
  348. # guardian set update - triggered by "tilt args" changes
  349. if num_guardians >= 2 and ci == False:
  350. local_resource(
  351. name = "guardian-set-update",
  352. resource_deps = guardian_resource_deps + ["guardian"],
  353. deps = ["scripts/send-vaa.sh", "clients/eth"],
  354. cmd = './scripts/update-guardian-set.sh %s %s %s' % (num_guardians, webHost, namespace),
  355. labels = ["guardian"],
  356. trigger_mode = trigger_mode,
  357. )
  358. # grafana + prometheus for node metrics
  359. if node_metrics:
  360. dashboard = read_json("dashboards/Wormhole.json")
  361. dashboard_yaml = {
  362. "apiVersion": "v1",
  363. "kind": "ConfigMap",
  364. "metadata": {
  365. "name": "grafana-dashboards-json"
  366. },
  367. "data": {
  368. "wormhole.json": encode_json(dashboard)
  369. }
  370. }
  371. k8s_yaml_with_ns(encode_yaml(dashboard_yaml))
  372. k8s_yaml_with_ns("devnet/node-metrics.yaml")
  373. k8s_resource(
  374. "prometheus-server",
  375. resource_deps = ["guardian"],
  376. port_forwards = [
  377. port_forward(9099, name = "Prometheus [:9099]", host = webHost),
  378. ],
  379. labels = ["guardian"],
  380. trigger_mode = trigger_mode,
  381. )
  382. k8s_resource(
  383. "grafana",
  384. resource_deps = ["prometheus-server"],
  385. port_forwards = [
  386. port_forward(3033, name = "Grafana UI [:3033]", host = webHost),
  387. ],
  388. labels = ["guardian"],
  389. trigger_mode = trigger_mode,
  390. )
  391. # spy
  392. k8s_yaml_with_ns("devnet/spy.yaml")
  393. k8s_resource(
  394. "spy",
  395. resource_deps = ["guardian"],
  396. port_forwards = [
  397. port_forward(6061, container_port = 6060, name = "Debug/Status Server [:6061]", host = webHost),
  398. port_forward(7072, name = "Spy gRPC [:7072]", host = webHost),
  399. ],
  400. labels = ["guardian"],
  401. trigger_mode = trigger_mode,
  402. )
  403. if solana or pythnet:
  404. # solana client cli (used for devnet setup)
  405. docker_build(
  406. ref = "bridge-client",
  407. context = ".",
  408. only = ["./proto", "./solana", "./clients"],
  409. dockerfile = "solana/Dockerfile.client",
  410. # Ignore target folders from local (non-container) development.
  411. ignore = ["./solana/*/target", "./solana/tests"],
  412. )
  413. # solana smart contract
  414. docker_build(
  415. ref = "solana-contract",
  416. context = "solana",
  417. dockerfile = "solana/Dockerfile",
  418. target = "builder",
  419. ignore = ["./solana/*/target", "./solana/tests"],
  420. build_args = {"BRIDGE_ADDRESS": "Bridge1p5gheXUvJ6jGWGeCsgPKgnE3YgdGKRVCMY9o", "CHAIN_ID": "1"},
  421. )
  422. # solana local devnet
  423. docker_build(
  424. ref = "solana-test-validator",
  425. context = "solana",
  426. dockerfile = "solana/Dockerfile.test-validator",
  427. )
  428. k8s_yaml_with_ns("devnet/solana-devnet.yaml")
  429. k8s_resource(
  430. "solana-devnet",
  431. port_forwards = [
  432. port_forward(8899, name = "Solana RPC [:8899]", host = webHost),
  433. port_forward(8900, name = "Solana WS [:8900]", host = webHost),
  434. ],
  435. labels = ["solana"],
  436. trigger_mode = trigger_mode,
  437. )
  438. # eth devnet
  439. docker_build(
  440. ref = "eth-node",
  441. context = ".",
  442. only = ["./ethereum", "./relayer/ethereum"],
  443. dockerfile = "./ethereum/Dockerfile",
  444. # ignore local node_modules (in case they're present)
  445. ignore = ["./ethereum/node_modules","./relayer/ethereum/node_modules"],
  446. build_args = {"num_guardians": str(num_guardians), "dev": str(not ci)},
  447. # sync external scripts for incremental development
  448. # (everything else needs to be restarted from scratch for determinism)
  449. #
  450. # This relies on --update-mode=exec to work properly with a non-root user.
  451. # https://github.com/tilt-dev/tilt/issues/3708
  452. live_update = [
  453. sync("./ethereum/src", "/home/node/app/src"),
  454. ],
  455. )
  456. if redis or generic_relayer:
  457. docker_build(
  458. ref = "redis",
  459. context = ".",
  460. only = ["./third_party"],
  461. dockerfile = "third_party/redis/Dockerfile",
  462. )
  463. if redis:
  464. k8s_resource(
  465. "redis",
  466. port_forwards = [
  467. port_forward(6379, name = "Redis Default [:6379]", host = webHost),
  468. ],
  469. labels = ["redis"],
  470. trigger_mode = trigger_mode,
  471. )
  472. k8s_yaml_with_ns("devnet/redis.yaml")
  473. if generic_relayer:
  474. k8s_resource(
  475. "redis-relayer",
  476. port_forwards = [
  477. port_forward(6378, name = "Generic Relayer Redis [:6378]", host = webHost),
  478. ],
  479. labels = ["redis-relayer"],
  480. trigger_mode = trigger_mode,
  481. )
  482. k8s_yaml_with_ns("devnet/redis-relayer.yaml")
  483. if generic_relayer:
  484. k8s_resource(
  485. "relayer-engine",
  486. resource_deps = ["guardian", "redis-relayer", "spy"],
  487. port_forwards = [
  488. port_forward(3003, container_port=3000, name = "Bullmq UI [:3003]", host = webHost),
  489. ],
  490. labels = ["relayer-engine"],
  491. trigger_mode = trigger_mode,
  492. )
  493. docker_build(
  494. ref = "relayer-engine",
  495. context = ".",
  496. only = ["./relayer/generic_relayer", "./relayer/ethereum/ts-scripts/relayer/config"],
  497. dockerfile = "relayer/generic_relayer/relayer-engine-v2/Dockerfile",
  498. build_args = {"dev": str(not ci)}
  499. )
  500. k8s_yaml_with_ns("devnet/relayer-engine.yaml")
  501. k8s_yaml_with_ns("devnet/eth-devnet.yaml")
  502. k8s_resource(
  503. "eth-devnet",
  504. port_forwards = [
  505. port_forward(8545, name = "Anvil RPC [:8545]", host = webHost),
  506. ],
  507. labels = ["evm"],
  508. trigger_mode = trigger_mode,
  509. )
  510. if evm2:
  511. k8s_yaml_with_ns("devnet/eth-devnet2.yaml")
  512. k8s_resource(
  513. "eth-devnet2",
  514. port_forwards = [
  515. port_forward(8546, 8545, name = "Anvil RPC [:8546]", host = webHost),
  516. ],
  517. labels = ["evm"],
  518. trigger_mode = trigger_mode,
  519. )
  520. # Note that ci_tests requires other resources in order to build properly:
  521. # - eth-devnet -- required by: accountant_tests, ntt_accountant_tests, tx-verifier
  522. # - eth-devnet2 -- required by: accountant_tests, ntt_accountant_tests
  523. # - wormchain -- required by: accountant_tests, ntt_accountant_tests
  524. # - solana -- required by: spydk-ci-tests
  525. if ci_tests:
  526. docker_build(
  527. ref = "sdk-test-image",
  528. context = ".",
  529. dockerfile = "testing/Dockerfile.sdk.test",
  530. only = [],
  531. live_update = [
  532. sync("./sdk/js/src", "/app/sdk/js/src"),
  533. sync("./testing", "/app/testing"),
  534. ],
  535. )
  536. docker_build(
  537. ref = "spydk-test-image",
  538. context = ".",
  539. dockerfile = "testing/Dockerfile.spydk.test",
  540. only = [],
  541. live_update = [
  542. sync("./spydk/js/src", "/app/spydk/js/src"),
  543. sync("./testing", "/app/testing"),
  544. ],
  545. )
  546. docker_build(
  547. ref = "query-sdk-test-image",
  548. context = ".",
  549. dockerfile = "testing/Dockerfile.querysdk.test",
  550. only = [],
  551. live_update = [
  552. sync("./sdk/js/src", "/app/sdk/js-query/src"),
  553. sync("./testing", "/app/testing"),
  554. ],
  555. )
  556. docker_build(
  557. ref = "tx-verifier-evm",
  558. context = "./devnet/tx-verifier/",
  559. dockerfile = "./devnet/tx-verifier/Dockerfile.tx-verifier-evm"
  560. )
  561. k8s_yaml_with_ns("devnet/tx-verifier-evm.yaml")
  562. if sui:
  563. docker_build(
  564. ref = "tx-verifier-sui",
  565. context = "./devnet/tx-verifier/",
  566. dockerfile = "./devnet/tx-verifier/Dockerfile.tx-verifier-sui"
  567. )
  568. k8s_yaml_with_ns("devnet/tx-verifier-sui.yaml")
  569. k8s_yaml_with_ns(
  570. encode_yaml_stream(
  571. set_env_in_jobs(
  572. set_env_in_jobs(
  573. set_env_in_jobs(read_yaml_stream("devnet/tests.yaml"), "NUM_GUARDIANS", str(num_guardians)),
  574. "BOOTSTRAP_PEERS", str(ccqBootstrapPeers)),
  575. "MAX_WORKERS", max_workers))
  576. )
  577. # separate resources to parallelize docker builds
  578. k8s_resource(
  579. "sdk-ci-tests",
  580. labels = ["ci"],
  581. trigger_mode = trigger_mode,
  582. resource_deps = [], # testing/sdk.sh handles waiting for spy, not having deps gets the build earlier
  583. )
  584. k8s_resource(
  585. "spydk-ci-tests",
  586. labels = ["ci"],
  587. trigger_mode = trigger_mode,
  588. resource_deps = [], # testing/spydk.sh handles waiting for spy, not having deps gets the build earlier
  589. )
  590. k8s_resource(
  591. "accountant-ci-tests",
  592. labels = ["ci"],
  593. trigger_mode = trigger_mode,
  594. resource_deps = [], # uses devnet-consts.json, but wormchain/contracts/tools/test_accountant.sh handles waiting for guardian, not having deps gets the build earlier
  595. )
  596. k8s_resource(
  597. "ntt-accountant-ci-tests",
  598. labels = ["ci"],
  599. trigger_mode = trigger_mode,
  600. resource_deps = [], # uses devnet-consts.json, but wormchain/contracts/tools/test_ntt_accountant.sh handles waiting for guardian, not having deps gets the build earlier
  601. )
  602. k8s_resource(
  603. "query-sdk-ci-tests",
  604. labels = ["ci"],
  605. trigger_mode = trigger_mode,
  606. resource_deps = [], # testing/querysdk.sh handles waiting for query-server, not having deps gets the build earlier
  607. )
  608. # launches Transfer Verifier binary and sets up monitoring script
  609. k8s_resource(
  610. "tx-verifier-evm",
  611. labels = ["tx-verifier"],
  612. trigger_mode = trigger_mode,
  613. resource_deps = ["eth-devnet"],
  614. )
  615. k8s_resource(
  616. "custom-consistency-level-ci-tests",
  617. labels = ["ci"],
  618. trigger_mode = trigger_mode,
  619. resource_deps = [], # uses devnet-consts.json, buttesting/contract-integrations/custom_consistency_level/test_custom_consistency_level.sh handles waiting for guardian, not having deps gets the build earlier
  620. )
  621. if sui:
  622. k8s_resource(
  623. "tx-verifier-sui",
  624. labels = ["tx-verifier"],
  625. trigger_mode = trigger_mode,
  626. resource_deps = ["sui"]
  627. )
  628. if terra_classic:
  629. docker_build(
  630. ref = "terra-image",
  631. context = "./terra/devnet",
  632. dockerfile = "terra/devnet/Dockerfile",
  633. platform = "linux/amd64",
  634. )
  635. docker_build(
  636. ref = "terra-contracts",
  637. context = "./terra",
  638. dockerfile = "./terra/Dockerfile",
  639. platform = "linux/amd64",
  640. )
  641. k8s_yaml_with_ns("devnet/terra-devnet.yaml")
  642. k8s_resource(
  643. "terra-terrad",
  644. port_forwards = [
  645. port_forward(26657, name = "Terra RPC [:26657]", host = webHost),
  646. port_forward(1317, name = "Terra LCD [:1317]", host = webHost),
  647. ],
  648. labels = ["terra"],
  649. trigger_mode = trigger_mode,
  650. )
  651. if terra2 or wormchain:
  652. docker_build(
  653. ref = "cosmwasm_artifacts",
  654. context = ".",
  655. dockerfile = "./cosmwasm/Dockerfile",
  656. target = "artifacts",
  657. platform = "linux/amd64",
  658. )
  659. if terra2:
  660. docker_build(
  661. ref = "terra2-image",
  662. context = "./cosmwasm/deployment/terra2/devnet",
  663. dockerfile = "./cosmwasm/deployment/terra2/devnet/Dockerfile",
  664. platform = "linux/amd64",
  665. )
  666. docker_build(
  667. ref = "terra2-deploy",
  668. context = "./cosmwasm/deployment/terra2",
  669. dockerfile = "./cosmwasm/Dockerfile.deploy",
  670. )
  671. k8s_yaml_with_ns("devnet/terra2-devnet.yaml")
  672. k8s_resource(
  673. "terra2-terrad",
  674. port_forwards = [
  675. port_forward(26658, container_port = 26657, name = "Terra 2 RPC [:26658]", host = webHost),
  676. port_forward(1318, container_port = 1317, name = "Terra 2 LCD [:1318]", host = webHost),
  677. ],
  678. labels = ["terra2"],
  679. trigger_mode = trigger_mode,
  680. )
  681. if algorand:
  682. k8s_yaml_with_ns("devnet/algorand-devnet.yaml")
  683. docker_build(
  684. ref = "algorand-algod",
  685. context = "algorand/sandbox-algorand",
  686. dockerfile = "algorand/sandbox-algorand/images/algod/Dockerfile"
  687. )
  688. docker_build(
  689. ref = "algorand-indexer",
  690. context = "algorand/sandbox-algorand",
  691. dockerfile = "algorand/sandbox-algorand/images/indexer/Dockerfile"
  692. )
  693. docker_build(
  694. ref = "algorand-contracts",
  695. context = "algorand",
  696. dockerfile = "algorand/Dockerfile",
  697. ignore = ["algorand/test/*.*"]
  698. )
  699. k8s_resource(
  700. "algorand",
  701. port_forwards = [
  702. port_forward(4001, name = "Algod [:4001]", host = webHost),
  703. port_forward(4002, name = "KMD [:4002]", host = webHost),
  704. port_forward(8980, name = "Indexer [:8980]", host = webHost),
  705. ],
  706. labels = ["algorand"],
  707. trigger_mode = trigger_mode,
  708. )
  709. if sui:
  710. k8s_yaml_with_ns("devnet/sui-devnet.yaml")
  711. docker_build(
  712. ref = "sui-node",
  713. target = "sui",
  714. context = ".",
  715. dockerfile = "sui/Dockerfile",
  716. ignore = ["./sui/sui.log*", "sui/sui.log*", "sui.log.*"],
  717. only = ["./sui"],
  718. )
  719. k8s_resource(
  720. "sui",
  721. port_forwards = [
  722. port_forward(9000, 9000, name = "RPC [:9000]", host = webHost),
  723. port_forward(9184, name = "Prometheus [:9184]", host = webHost),
  724. ],
  725. labels = ["sui"],
  726. trigger_mode = trigger_mode,
  727. )
  728. if near:
  729. k8s_yaml_with_ns("devnet/near-devnet.yaml")
  730. docker_build(
  731. ref = "near-node",
  732. context = "near",
  733. dockerfile = "near/Dockerfile",
  734. only = ["Dockerfile", "node_builder.sh", "start_node.sh", "README.md"],
  735. )
  736. docker_build(
  737. ref = "near-deploy",
  738. context = "near",
  739. dockerfile = "near/Dockerfile.deploy",
  740. ignore = ["./test"]
  741. )
  742. k8s_resource(
  743. "near",
  744. port_forwards = [
  745. port_forward(3030, name = "Node [:3030]", host = webHost),
  746. port_forward(3031, name = "webserver [:3031]", host = webHost),
  747. ],
  748. labels = ["near"],
  749. trigger_mode = trigger_mode,
  750. )
  751. if wormchain:
  752. docker_build(
  753. ref = "wormchaind-image",
  754. context = ".",
  755. dockerfile = "./wormchain/Dockerfile",
  756. platform = "linux/amd64",
  757. build_args = {"num_guardians": str(num_guardians)},
  758. only = [],
  759. ignore = ["./wormchain/testing", "./wormchain/ts-sdk", "./wormchain/design", "./wormchain/vue", "./wormchain/build/wormchaind"],
  760. )
  761. # docker_build(
  762. # ref = "vue-export",
  763. # context = ".",
  764. # dockerfile = "./wormchain/Dockerfile.proto",
  765. # target = "vue-export",
  766. # )
  767. docker_build(
  768. ref = "wormchain-deploy",
  769. context = "./wormchain",
  770. dockerfile = "./wormchain/Dockerfile.deploy",
  771. )
  772. def build_wormchain_yaml(yaml_path, num_instances):
  773. wormchain_yaml = read_yaml_stream(yaml_path)
  774. # set the number of replicas in the StatefulSet to be num_guardians
  775. wormchain_set = set_replicas_in_statefulset(wormchain_yaml, "wormchain", num_instances)
  776. # add a Service for each wormchain instance
  777. services = []
  778. for obj in wormchain_set:
  779. if obj["kind"] == "Service" and obj["metadata"]["name"] == "wormchain-0":
  780. # make a Service for each replica so we can resolve it by name from other pods.
  781. # copy wormchain-0's Service then set the name and selector for the instance.
  782. for instance_num in list(range(1, num_instances)):
  783. instance_name = 'wormchain-%s' % (instance_num)
  784. # Copy the Service's properties to a new dict, by value, three levels deep.
  785. # tl;dr - if the value is a dict, use a comprehension to copy it immutably.
  786. service = { k: ({ k2: ({ k3:v3
  787. for (k3,v3) in v2.items()} if type(v2) == "dict" else v2)
  788. for (k2,v2) in v.items()} if type(v) == "dict" else v)
  789. for (k,v) in obj.items()}
  790. # add the name we want to be able to resolve via k8s DNS
  791. service["metadata"]["name"] = instance_name
  792. # add the name of the pod the service should connect to
  793. service["spec"]["selector"] = { "statefulset.kubernetes.io/pod-name": instance_name }
  794. services.append(service)
  795. return encode_yaml_stream(wormchain_set + services)
  796. wormchain_path = "devnet/wormchain.yaml"
  797. if num_guardians >= 2:
  798. # update wormchain's k8s config to spin up multiple instances
  799. k8s_yaml_with_ns(build_wormchain_yaml(wormchain_path, num_guardians))
  800. else:
  801. k8s_yaml_with_ns(wormchain_path)
  802. k8s_resource(
  803. "wormchain",
  804. port_forwards = [
  805. port_forward(1319, container_port = 1317, name = "REST [:1319]", host = webHost),
  806. port_forward(9090, container_port = 9090, name = "GRPC", host = webHost),
  807. port_forward(26659, container_port = 26657, name = "TENDERMINT [:26659]", host = webHost)
  808. ],
  809. labels = ["wormchain"],
  810. trigger_mode = trigger_mode,
  811. )
  812. k8s_resource(
  813. "wormchain-deploy",
  814. resource_deps = ["wormchain"],
  815. labels = ["wormchain"],
  816. trigger_mode = trigger_mode,
  817. )
  818. if ibc_relayer:
  819. docker_build(
  820. ref = "ibc-relayer-image",
  821. context = ".",
  822. dockerfile = "./wormchain/ibc-relayer/Dockerfile",
  823. only = []
  824. )
  825. k8s_yaml_with_ns("devnet/ibc-relayer.yaml")
  826. k8s_resource(
  827. "ibc-relayer",
  828. port_forwards = [
  829. port_forward(7597, name = "HTTPDEBUG [:7597]", host = webHost),
  830. ],
  831. resource_deps = ["wormchain-deploy", "terra2-terrad"],
  832. labels = ["ibc-relayer"],
  833. trigger_mode = trigger_mode,
  834. )
  835. if btc:
  836. k8s_yaml_with_ns("devnet/btc-localnet.yaml")
  837. docker_build(
  838. ref = "btc-node",
  839. context = "bitcoin",
  840. dockerfile = "bitcoin/Dockerfile",
  841. target = "bitcoin-build",
  842. )
  843. k8s_resource(
  844. "btc",
  845. port_forwards = [
  846. port_forward(18556, name = "RPC [:18556]", host = webHost),
  847. ],
  848. labels = ["btc"],
  849. trigger_mode = trigger_mode,
  850. )
  851. if aptos:
  852. k8s_yaml_with_ns("devnet/aptos-localnet.yaml")
  853. docker_build(
  854. ref = "aptos-node",
  855. context = "aptos",
  856. dockerfile = "aptos/Dockerfile",
  857. target = "aptos",
  858. )
  859. k8s_resource(
  860. "aptos",
  861. port_forwards = [
  862. port_forward(8080, name = "RPC [:8080]", host = webHost),
  863. port_forward(6181, name = "FullNode [:6181]", host = webHost),
  864. port_forward(8081, name = "Faucet [:8081]", host = webHost),
  865. ],
  866. labels = ["aptos"],
  867. trigger_mode = trigger_mode,
  868. )
  869. def build_query_server_yaml():
  870. qs_yaml = read_yaml_stream("devnet/query-server.yaml")
  871. for obj in qs_yaml:
  872. if obj["kind"] == "StatefulSet" and obj["metadata"]["name"] == "query-server":
  873. container = obj["spec"]["template"]["spec"]["containers"][0]
  874. container["command"] += ["--bootstrap="+ccqBootstrapPeers]
  875. return encode_yaml_stream(qs_yaml)
  876. if query_server:
  877. k8s_yaml_with_ns(build_query_server_yaml())
  878. k8s_resource(
  879. "query-server",
  880. resource_deps = ["guardian"],
  881. port_forwards = [
  882. port_forward(6069, name = "REST [:6069]", host = webHost),
  883. port_forward(6068, name = "Status [:6068]", host = webHost)
  884. ],
  885. labels = ["query-server"],
  886. trigger_mode = trigger_mode
  887. )