Tiltfile 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907
  1. # This Tiltfile contains the deployment and build config for the Wormhole devnet.
  2. #
  3. # We use Buildkit cache mounts and careful layering to avoid unnecessary rebuilds - almost
  4. # all source code changes result in small, incremental rebuilds. Dockerfiles are written such
  5. # that, for example, changing the contract source code won't cause Solana itself to be rebuilt.
  6. #
  7. load("ext://namespace", "namespace_create", "namespace_inject")
  8. load("ext://secret", "secret_yaml_generic")
  9. # set the replica value of a StatefulSet
  10. def set_replicas_in_statefulset(config_yaml, statefulset_name, num_replicas):
  11. for obj in config_yaml:
  12. if obj["kind"] == "StatefulSet" and obj["metadata"]["name"] == statefulset_name:
  13. obj["spec"]["replicas"] = num_replicas
  14. return config_yaml
  15. allow_k8s_contexts("ci")
  16. # Disable telemetry by default
  17. analytics_settings(False)
  18. # Moar updates (default is 3)
  19. update_settings(max_parallel_updates = 10)
  20. # Runtime configuration
  21. config.define_bool("ci", False, "We are running in CI")
  22. config.define_bool("manual", False, "Set TRIGGER_MODE_MANUAL by default")
  23. config.define_string("num", False, "Number of guardian nodes to run")
  24. # You do not usually need to set this argument - this argument is for debugging only. If you do use a different
  25. # namespace, note that the "wormhole" namespace is hardcoded in tests and don't forget specifying the argument
  26. # when running "tilt down".
  27. #
  28. config.define_string("namespace", False, "Kubernetes namespace to use")
  29. # These arguments will enable writing Guardian events to a cloud BigTable instance.
  30. # Writing to a cloud BigTable is optional. These arguments are not required to run the devnet.
  31. config.define_string("gcpProject", False, "GCP project ID for BigTable persistence")
  32. config.define_string("bigTableKeyPath", False, "Path to BigTable json key file")
  33. # When running Tilt on a server, this can be used to set the public hostname Tilt runs on
  34. # for service links in the UI to work.
  35. config.define_string("webHost", False, "Public hostname for port forwards")
  36. # Components
  37. config.define_bool("near", False, "Enable Near component")
  38. config.define_bool("sui", False, "Enable Sui component")
  39. config.define_bool("btc", False, "Enable BTC component")
  40. config.define_bool("aptos", False, "Enable Aptos component")
  41. config.define_bool("algorand", False, "Enable Algorand component")
  42. config.define_bool("evm2", False, "Enable second Eth component")
  43. config.define_bool("solana", False, "Enable Solana component")
  44. config.define_bool("pythnet", False, "Enable PythNet component")
  45. config.define_bool("terra_classic", False, "Enable Terra Classic component")
  46. config.define_bool("terra2", False, "Enable Terra 2 component")
  47. config.define_bool("spy_relayer", False, "Enable spy relayer")
  48. config.define_bool("ci_tests", False, "Enable tests runner component")
  49. config.define_bool("guardiand_debug", False, "Enable dlv endpoint for guardiand")
  50. config.define_bool("node_metrics", False, "Enable Prometheus & Grafana for Guardian metrics")
  51. config.define_bool("guardiand_governor", False, "Enable chain governor in guardiand")
  52. config.define_bool("wormchain", False, "Enable a wormchain node")
  53. config.define_bool("ibc_relayer", False, "Enable IBC relayer between cosmos chains")
  54. cfg = config.parse()
  55. num_guardians = int(cfg.get("num", "1"))
  56. namespace = cfg.get("namespace", "wormhole")
  57. gcpProject = cfg.get("gcpProject", "")
  58. bigTableKeyPath = cfg.get("bigTableKeyPath", "")
  59. webHost = cfg.get("webHost", "localhost")
  60. ci = cfg.get("ci", False)
  61. algorand = cfg.get("algorand", ci)
  62. near = cfg.get("near", ci)
  63. aptos = cfg.get("aptos", ci)
  64. sui = cfg.get("sui", ci)
  65. evm2 = cfg.get("evm2", ci)
  66. solana = cfg.get("solana", ci)
  67. pythnet = cfg.get("pythnet", False)
  68. terra_classic = cfg.get("terra_classic", ci)
  69. terra2 = cfg.get("terra2", ci)
  70. wormchain = cfg.get("wormchain", ci)
  71. spy_relayer = cfg.get("spy_relayer", ci)
  72. ci_tests = cfg.get("ci_tests", ci)
  73. guardiand_debug = cfg.get("guardiand_debug", False)
  74. node_metrics = cfg.get("node_metrics", False)
  75. guardiand_governor = cfg.get("guardiand_governor", False)
  76. ibc_relayer = cfg.get("ibc_relayer", ci)
  77. btc = cfg.get("btc", False)
  78. if cfg.get("manual", False):
  79. trigger_mode = TRIGGER_MODE_MANUAL
  80. else:
  81. trigger_mode = TRIGGER_MODE_AUTO
  82. # namespace
  83. if not ci:
  84. namespace_create(namespace)
  85. def k8s_yaml_with_ns(objects):
  86. return k8s_yaml(namespace_inject(objects, namespace))
  87. local_resource(
  88. name = "const-gen",
  89. deps = ["scripts", "clients", "ethereum/.env.test"],
  90. cmd = 'tilt docker build -- --target const-export -f Dockerfile.const -o type=local,dest=. --build-arg num_guardians=%s .' % (num_guardians),
  91. env = {"DOCKER_BUILDKIT": "1"},
  92. allow_parallel = True,
  93. trigger_mode = trigger_mode,
  94. )
  95. # node
  96. if bigTableKeyPath != "":
  97. k8s_yaml_with_ns(
  98. secret_yaml_generic(
  99. "node-bigtable-key",
  100. from_file = "bigtable-key.json=" + bigTableKeyPath,
  101. ),
  102. )
  103. docker_build(
  104. ref = "guardiand-image",
  105. context = ".",
  106. dockerfile = "node/Dockerfile",
  107. target = "build",
  108. ignore=["./sdk/js"]
  109. )
  110. def command_with_dlv(argv):
  111. return [
  112. "/dlv",
  113. "--listen=0.0.0.0:2345",
  114. "--accept-multiclient",
  115. "--headless=true",
  116. "--api-version=2",
  117. "--continue=true",
  118. "exec",
  119. argv[0],
  120. "--",
  121. ] + argv[1:]
  122. def build_node_yaml():
  123. node_yaml = read_yaml_stream("devnet/node.yaml")
  124. node_yaml_with_replicas = set_replicas_in_statefulset(node_yaml, "guardian", num_guardians)
  125. for obj in node_yaml_with_replicas:
  126. if obj["kind"] == "StatefulSet" and obj["metadata"]["name"] == "guardian":
  127. container = obj["spec"]["template"]["spec"]["containers"][0]
  128. if container["name"] != "guardiand":
  129. fail("container 0 is not guardiand")
  130. if guardiand_debug:
  131. container["command"] = command_with_dlv(container["command"])
  132. container["command"] += ["--logLevel=debug"]
  133. print(container["command"])
  134. elif ci:
  135. container["command"] += ["--logLevel=warn"]
  136. if gcpProject != "":
  137. container["command"] += [
  138. "--bigTablePersistenceEnabled",
  139. "--bigTableInstanceName",
  140. "wormhole",
  141. "--bigTableTableName",
  142. "v2Events",
  143. "--bigTableTopicName",
  144. "new-vaa-devnet",
  145. "--bigTableKeyPath",
  146. "/tmp/mounted-keys/bigtable-key.json",
  147. "--bigTableGCPProject",
  148. gcpProject,
  149. ]
  150. if aptos:
  151. container["command"] += [
  152. "--aptosRPC",
  153. "http://aptos:8080",
  154. "--aptosAccount",
  155. "de0036a9600559e295d5f6802ef6f3f802f510366e0c23912b0655d972166017",
  156. "--aptosHandle",
  157. "0xde0036a9600559e295d5f6802ef6f3f802f510366e0c23912b0655d972166017::state::WormholeMessageHandle",
  158. ]
  159. if sui:
  160. container["command"] += [
  161. "--suiRPC",
  162. "http://sui:9000",
  163. "--suiMoveEventType",
  164. "0x7f6cebb8a489654d7a759483bd653c4be3e5ccfef17a8b5fd3ba98bd072fabc3::publish_message::WormholeMessage",
  165. "--suiWS",
  166. "sui:9000",
  167. ]
  168. if evm2:
  169. container["command"] += [
  170. "--bscRPC",
  171. "ws://eth-devnet2:8545",
  172. ]
  173. else:
  174. container["command"] += [
  175. "--bscRPC",
  176. "ws://eth-devnet:8545",
  177. ]
  178. if solana:
  179. container["command"] += [
  180. "--solanaRPC",
  181. "http://solana-devnet:8899",
  182. ]
  183. if pythnet:
  184. container["command"] += [
  185. "--pythnetRPC",
  186. # "http://solana-devnet:8899",
  187. "http://pythnet.rpcpool.com",
  188. "--pythnetWS",
  189. # "ws://solana-devnet:8900",
  190. "wss://pythnet.rpcpool.com",
  191. "--pythnetContract",
  192. "H3fxXJ86ADW2PNuDDmZJg6mzTtPxkYCpNuQUTgmJ7AjU",
  193. ]
  194. if terra_classic:
  195. container["command"] += [
  196. "--terraWS",
  197. "ws://terra-terrad:26657/websocket",
  198. "--terraLCD",
  199. "http://terra-terrad:1317",
  200. "--terraContract",
  201. "terra18vd8fpwxzck93qlwghaj6arh4p7c5n896xzem5",
  202. ]
  203. if terra2:
  204. container["command"] += [
  205. "--terra2WS",
  206. "ws://terra2-terrad:26657/websocket",
  207. "--terra2LCD",
  208. "http://terra2-terrad:1317",
  209. "--terra2Contract",
  210. "terra14hj2tavq8fpesdwxxcu44rty3hh90vhujrvcmstl4zr3txmfvw9ssrc8au",
  211. ]
  212. if algorand:
  213. container["command"] += [
  214. "--algorandAppID",
  215. "4",
  216. "--algorandIndexerRPC",
  217. "http://algorand:8980",
  218. "--algorandIndexerToken",
  219. "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
  220. "--algorandAlgodRPC",
  221. "http://algorand:4001",
  222. "--algorandAlgodToken",
  223. "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
  224. ]
  225. if guardiand_governor:
  226. container["command"] += [
  227. "--chainGovernorEnabled"
  228. ]
  229. if near:
  230. container["command"] += [
  231. "--nearRPC",
  232. "http://near:3030",
  233. "--nearContract",
  234. "wormhole.test.near"
  235. ]
  236. if wormchain:
  237. container["command"] += [
  238. "--wormchainWS",
  239. "ws://wormchain:26657/websocket",
  240. "--wormchainLCD",
  241. "http://wormchain:1317",
  242. "--wormchainURL",
  243. "wormchain:9090",
  244. "--wormchainKeyPath",
  245. "/tmp/mounted-keys/wormchain/wormchainKey",
  246. "--wormchainKeyPassPhrase",
  247. "test0000",
  248. "--accountantWS",
  249. "http://wormchain:26657",
  250. "--accountantContract",
  251. "wormhole14hj2tavq8fpesdwxxcu44rty3hh90vhujrvcmstl4zr3txmfvw9srrg465",
  252. "--accountantCheckEnabled",
  253. "true",
  254. "--ibcWS",
  255. "ws://wormchain:26657/websocket",
  256. "--ibcLCD",
  257. "http://wormchain:1317",
  258. "--ibcContract",
  259. "wormhole1nc5tatafv6eyq7llkr2gv50ff9e22mnf70qgjlv737ktmt4eswrq0kdhcj"
  260. ]
  261. return encode_yaml_stream(node_yaml_with_replicas)
  262. k8s_yaml_with_ns(build_node_yaml())
  263. guardian_resource_deps = ["eth-devnet"]
  264. if evm2:
  265. guardian_resource_deps = guardian_resource_deps + ["eth-devnet2"]
  266. if solana or pythnet:
  267. guardian_resource_deps = guardian_resource_deps + ["solana-devnet"]
  268. if near:
  269. guardian_resource_deps = guardian_resource_deps + ["near"]
  270. if terra_classic:
  271. guardian_resource_deps = guardian_resource_deps + ["terra-terrad"]
  272. if terra2:
  273. guardian_resource_deps = guardian_resource_deps + ["terra2-terrad"]
  274. if algorand:
  275. guardian_resource_deps = guardian_resource_deps + ["algorand"]
  276. if aptos:
  277. guardian_resource_deps = guardian_resource_deps + ["aptos"]
  278. if wormchain:
  279. guardian_resource_deps = guardian_resource_deps + ["wormchain", "wormchain-deploy"]
  280. if sui:
  281. guardian_resource_deps = guardian_resource_deps + ["sui"]
  282. k8s_resource(
  283. "guardian",
  284. resource_deps = guardian_resource_deps,
  285. port_forwards = [
  286. port_forward(6060, name = "Debug/Status Server [:6060]", host = webHost),
  287. port_forward(7070, name = "Public gRPC [:7070]", host = webHost),
  288. port_forward(7071, name = "Public REST [:7071]", host = webHost),
  289. port_forward(2345, name = "Debugger [:2345]", host = webHost),
  290. ],
  291. labels = ["guardian"],
  292. trigger_mode = trigger_mode,
  293. )
  294. # guardian set update - triggered by "tilt args" changes
  295. if num_guardians >= 2 and ci == False:
  296. local_resource(
  297. name = "guardian-set-update",
  298. resource_deps = guardian_resource_deps + ["guardian"],
  299. deps = ["scripts/send-vaa.sh", "clients/eth"],
  300. cmd = './scripts/update-guardian-set.sh %s %s %s' % (num_guardians, webHost, namespace),
  301. labels = ["guardian"],
  302. trigger_mode = trigger_mode,
  303. )
  304. # grafana + prometheus for node metrics
  305. if node_metrics:
  306. dashboard = read_json("dashboards/Wormhole.json")
  307. dashboard_yaml = {
  308. "apiVersion": "v1",
  309. "kind": "ConfigMap",
  310. "metadata": {
  311. "name": "grafana-dashboards-json"
  312. },
  313. "data": {
  314. "wormhole.json": encode_json(dashboard)
  315. }
  316. }
  317. k8s_yaml_with_ns(encode_yaml(dashboard_yaml))
  318. k8s_yaml_with_ns("devnet/node-metrics.yaml")
  319. k8s_resource(
  320. "prometheus-server",
  321. resource_deps = ["guardian"],
  322. port_forwards = [
  323. port_forward(9099, name = "Prometheus [:9099]", host = webHost),
  324. ],
  325. labels = ["guardian"],
  326. trigger_mode = trigger_mode,
  327. )
  328. k8s_resource(
  329. "grafana",
  330. resource_deps = ["prometheus-server"],
  331. port_forwards = [
  332. port_forward(3033, name = "Grafana UI [:3033]", host = webHost),
  333. ],
  334. labels = ["guardian"],
  335. trigger_mode = trigger_mode,
  336. )
  337. # spy
  338. k8s_yaml_with_ns("devnet/spy.yaml")
  339. k8s_resource(
  340. "spy",
  341. resource_deps = ["guardian"],
  342. port_forwards = [
  343. port_forward(6061, container_port = 6060, name = "Debug/Status Server [:6061]", host = webHost),
  344. port_forward(7072, name = "Spy gRPC [:7072]", host = webHost),
  345. ],
  346. labels = ["guardian"],
  347. trigger_mode = trigger_mode,
  348. )
  349. if solana or pythnet:
  350. # solana client cli (used for devnet setup)
  351. docker_build(
  352. ref = "bridge-client",
  353. context = ".",
  354. only = ["./proto", "./solana", "./clients"],
  355. dockerfile = "solana/Dockerfile.client",
  356. # Ignore target folders from local (non-container) development.
  357. ignore = ["./solana/*/target"],
  358. )
  359. # solana smart contract
  360. docker_build(
  361. ref = "solana-contract",
  362. context = "solana",
  363. dockerfile = "solana/Dockerfile",
  364. target = "builder",
  365. build_args = {"BRIDGE_ADDRESS": "Bridge1p5gheXUvJ6jGWGeCsgPKgnE3YgdGKRVCMY9o"}
  366. )
  367. # solana local devnet
  368. k8s_yaml_with_ns("devnet/solana-devnet.yaml")
  369. k8s_resource(
  370. "solana-devnet",
  371. port_forwards = [
  372. port_forward(8899, name = "Solana RPC [:8899]", host = webHost),
  373. port_forward(8900, name = "Solana WS [:8900]", host = webHost),
  374. ],
  375. resource_deps = ["const-gen"],
  376. labels = ["solana"],
  377. trigger_mode = trigger_mode,
  378. )
  379. # eth devnet
  380. docker_build(
  381. ref = "eth-node",
  382. context = "./ethereum",
  383. dockerfile = "./ethereum/Dockerfile",
  384. # ignore local node_modules (in case they're present)
  385. ignore = ["./ethereum/node_modules"],
  386. # sync external scripts for incremental development
  387. # (everything else needs to be restarted from scratch for determinism)
  388. #
  389. # This relies on --update-mode=exec to work properly with a non-root user.
  390. # https://github.com/tilt-dev/tilt/issues/3708
  391. live_update = [
  392. sync("./ethereum/src", "/home/node/app/src"),
  393. ],
  394. )
  395. if spy_relayer:
  396. docker_build(
  397. ref = "redis",
  398. context = ".",
  399. only = ["./third_party"],
  400. dockerfile = "third_party/redis/Dockerfile",
  401. )
  402. k8s_yaml_with_ns("devnet/redis.yaml")
  403. k8s_resource(
  404. "redis",
  405. port_forwards = [
  406. port_forward(6379, name = "Redis Default [:6379]", host = webHost),
  407. ],
  408. labels = ["spy-relayer"],
  409. trigger_mode = trigger_mode,
  410. )
  411. docker_build(
  412. ref = "spy-relay-image",
  413. context = "relayer/spy_relayer",
  414. dockerfile = "relayer/spy_relayer/Dockerfile",
  415. live_update = []
  416. )
  417. k8s_yaml_with_ns("devnet/spy-listener.yaml")
  418. k8s_resource(
  419. "spy-listener",
  420. resource_deps = ["guardian", "redis", "spy"],
  421. port_forwards = [
  422. port_forward(6062, container_port = 6060, name = "Debug/Status Server [:6062]", host = webHost),
  423. port_forward(4201, name = "REST [:4201]", host = webHost),
  424. port_forward(8082, name = "Prometheus [:8082]", host = webHost),
  425. ],
  426. labels = ["spy-relayer"],
  427. trigger_mode = trigger_mode,
  428. )
  429. k8s_yaml_with_ns("devnet/spy-relayer.yaml")
  430. k8s_resource(
  431. "spy-relayer",
  432. resource_deps = ["guardian", "redis"],
  433. port_forwards = [
  434. port_forward(8083, name = "Prometheus [:8083]", host = webHost),
  435. ],
  436. labels = ["spy-relayer"],
  437. trigger_mode = trigger_mode,
  438. )
  439. k8s_yaml_with_ns("devnet/spy-wallet-monitor.yaml")
  440. k8s_resource(
  441. "spy-wallet-monitor",
  442. resource_deps = ["guardian", "redis"],
  443. port_forwards = [
  444. port_forward(8084, name = "Prometheus [:8084]", host = webHost),
  445. ],
  446. labels = ["spy-relayer"],
  447. trigger_mode = trigger_mode,
  448. )
  449. k8s_yaml_with_ns("devnet/eth-devnet.yaml")
  450. k8s_resource(
  451. "eth-devnet",
  452. port_forwards = [
  453. port_forward(8545, name = "Ganache RPC [:8545]", host = webHost),
  454. ],
  455. resource_deps = ["const-gen"],
  456. labels = ["evm"],
  457. trigger_mode = trigger_mode,
  458. )
  459. if evm2:
  460. k8s_yaml_with_ns("devnet/eth-devnet2.yaml")
  461. k8s_resource(
  462. "eth-devnet2",
  463. port_forwards = [
  464. port_forward(8546, name = "Ganache RPC [:8546]", host = webHost),
  465. ],
  466. resource_deps = ["const-gen"],
  467. labels = ["evm"],
  468. trigger_mode = trigger_mode,
  469. )
  470. if ci_tests:
  471. docker_build(
  472. ref = "sdk-test-image",
  473. context = ".",
  474. dockerfile = "testing/Dockerfile.sdk.test",
  475. only = [],
  476. live_update = [
  477. sync("./sdk/js/src", "/app/sdk/js/src"),
  478. sync("./testing", "/app/testing"),
  479. ],
  480. )
  481. docker_build(
  482. ref = "spydk-test-image",
  483. context = ".",
  484. dockerfile = "testing/Dockerfile.spydk.test",
  485. only = [],
  486. live_update = [
  487. sync("./spydk/js/src", "/app/spydk/js/src"),
  488. sync("./testing", "/app/testing"),
  489. ],
  490. )
  491. k8s_yaml_with_ns("devnet/tests.yaml")
  492. # separate resources to parallelize docker builds
  493. k8s_resource(
  494. "sdk-ci-tests",
  495. labels = ["ci"],
  496. trigger_mode = trigger_mode,
  497. resource_deps = [], # testing/sdk.sh handles waiting for spy, not having deps gets the build earlier
  498. )
  499. k8s_resource(
  500. "spydk-ci-tests",
  501. labels = ["ci"],
  502. trigger_mode = trigger_mode,
  503. resource_deps = [], # testing/spydk.sh handles waiting for spy, not having deps gets the build earlier
  504. )
  505. k8s_resource(
  506. "accountant-ci-tests",
  507. labels = ["ci"],
  508. trigger_mode = trigger_mode,
  509. resource_deps = ["const-gen"], # uses devnet-consts.json, but wormchain/contracts/tools/test_accountant.sh handles waiting for guardian, not having deps gets the build earlier
  510. )
  511. if terra_classic:
  512. docker_build(
  513. ref = "terra-image",
  514. context = "./terra/devnet",
  515. dockerfile = "terra/devnet/Dockerfile",
  516. )
  517. docker_build(
  518. ref = "terra-contracts",
  519. context = "./terra",
  520. dockerfile = "./terra/Dockerfile",
  521. )
  522. k8s_yaml_with_ns("devnet/terra-devnet.yaml")
  523. k8s_resource(
  524. "terra-terrad",
  525. port_forwards = [
  526. port_forward(26657, name = "Terra RPC [:26657]", host = webHost),
  527. port_forward(1317, name = "Terra LCD [:1317]", host = webHost),
  528. ],
  529. resource_deps = ["const-gen"],
  530. labels = ["terra"],
  531. trigger_mode = trigger_mode,
  532. )
  533. k8s_resource(
  534. "terra-postgres",
  535. labels = ["terra"],
  536. trigger_mode = trigger_mode,
  537. )
  538. k8s_resource(
  539. "terra-fcd",
  540. resource_deps = ["terra-terrad", "terra-postgres"],
  541. port_forwards = [port_forward(3060, name = "Terra FCD [:3060]", host = webHost)],
  542. labels = ["terra"],
  543. trigger_mode = trigger_mode,
  544. )
  545. if terra2 or wormchain:
  546. docker_build(
  547. ref = "cosmwasm_artifacts",
  548. context = ".",
  549. dockerfile = "./cosmwasm/Dockerfile",
  550. target = "artifacts",
  551. )
  552. if terra2:
  553. docker_build(
  554. ref = "terra2-image",
  555. context = "./cosmwasm/deployment/terra2/devnet",
  556. dockerfile = "./cosmwasm/deployment/terra2/devnet/Dockerfile",
  557. )
  558. docker_build(
  559. ref = "terra2-deploy",
  560. context = "./cosmwasm/deployment/terra2",
  561. dockerfile = "./cosmwasm/Dockerfile.deploy",
  562. )
  563. k8s_yaml_with_ns("devnet/terra2-devnet.yaml")
  564. k8s_resource(
  565. "terra2-terrad",
  566. port_forwards = [
  567. port_forward(26658, container_port = 26657, name = "Terra 2 RPC [:26658]", host = webHost),
  568. port_forward(1318, container_port = 1317, name = "Terra 2 LCD [:1318]", host = webHost),
  569. ],
  570. resource_deps = ["const-gen"],
  571. labels = ["terra2"],
  572. trigger_mode = trigger_mode,
  573. )
  574. k8s_resource(
  575. "terra2-postgres",
  576. labels = ["terra2"],
  577. trigger_mode = trigger_mode,
  578. )
  579. k8s_resource(
  580. "terra2-fcd",
  581. resource_deps = ["terra2-terrad", "terra2-postgres"],
  582. port_forwards = [port_forward(3061, container_port = 3060, name = "Terra 2 FCD [:3061]", host = webHost)],
  583. labels = ["terra2"],
  584. trigger_mode = trigger_mode,
  585. )
  586. if algorand:
  587. k8s_yaml_with_ns("devnet/algorand-devnet.yaml")
  588. docker_build(
  589. ref = "algorand-algod",
  590. context = "algorand/sandbox-algorand",
  591. dockerfile = "algorand/sandbox-algorand/images/algod/Dockerfile"
  592. )
  593. docker_build(
  594. ref = "algorand-indexer",
  595. context = "algorand/sandbox-algorand",
  596. dockerfile = "algorand/sandbox-algorand/images/indexer/Dockerfile"
  597. )
  598. docker_build(
  599. ref = "algorand-contracts",
  600. context = "algorand",
  601. dockerfile = "algorand/Dockerfile",
  602. ignore = ["algorand/test/*.*"]
  603. )
  604. k8s_resource(
  605. "algorand",
  606. port_forwards = [
  607. port_forward(4001, name = "Algod [:4001]", host = webHost),
  608. port_forward(4002, name = "KMD [:4002]", host = webHost),
  609. port_forward(8980, name = "Indexer [:8980]", host = webHost),
  610. ],
  611. resource_deps = ["const-gen"],
  612. labels = ["algorand"],
  613. trigger_mode = trigger_mode,
  614. )
  615. if sui:
  616. k8s_yaml_with_ns("devnet/sui-devnet.yaml")
  617. docker_build(
  618. ref = "sui-node",
  619. target = "sui",
  620. context = ".",
  621. dockerfile = "sui/Dockerfile",
  622. ignore = ["./sui/sui.log*", "sui/sui.log*", "sui.log.*"],
  623. only = ["./sui", "./clients/js"],
  624. )
  625. k8s_resource(
  626. "sui",
  627. port_forwards = [
  628. port_forward(9000, 9000, name = "RPC [:9000]", host = webHost),
  629. port_forward(5003, name = "Faucet [:5003]", host = webHost),
  630. port_forward(9184, name = "Prometheus [:9184]", host = webHost),
  631. ],
  632. resource_deps = ["const-gen"],
  633. labels = ["sui"],
  634. trigger_mode = trigger_mode,
  635. )
  636. if near:
  637. k8s_yaml_with_ns("devnet/near-devnet.yaml")
  638. docker_build(
  639. ref = "near-node",
  640. context = "near",
  641. dockerfile = "near/Dockerfile",
  642. only = ["Dockerfile", "node_builder.sh", "start_node.sh", "README.md", "cert.pem"],
  643. )
  644. docker_build(
  645. ref = "near-deploy",
  646. context = "near",
  647. dockerfile = "near/Dockerfile.deploy",
  648. ignore = ["./test"]
  649. )
  650. k8s_resource(
  651. "near",
  652. port_forwards = [
  653. port_forward(3030, name = "Node [:3030]", host = webHost),
  654. port_forward(3031, name = "webserver [:3031]", host = webHost),
  655. ],
  656. resource_deps = ["const-gen"],
  657. labels = ["near"],
  658. trigger_mode = trigger_mode,
  659. )
  660. if wormchain:
  661. docker_build(
  662. ref = "wormchaind-image",
  663. context = ".",
  664. dockerfile = "./wormchain/Dockerfile",
  665. build_args = {"num_guardians": str(num_guardians)},
  666. only = [],
  667. ignore = ["./wormchain/testing", "./wormchain/ts-sdk", "./wormchain/design", "./wormchain/vue", "./wormchain/build/wormchaind"],
  668. )
  669. docker_build(
  670. ref = "vue-export",
  671. context = ".",
  672. dockerfile = "./wormchain/Dockerfile.proto",
  673. target = "vue-export",
  674. )
  675. docker_build(
  676. ref = "wormchain-deploy",
  677. context = "./wormchain",
  678. dockerfile = "./wormchain/Dockerfile.deploy",
  679. )
  680. def build_wormchain_yaml(yaml_path, num_instances):
  681. wormchain_yaml = read_yaml_stream(yaml_path)
  682. # set the number of replicas in the StatefulSet to be num_guardians
  683. wormchain_set = set_replicas_in_statefulset(wormchain_yaml, "wormchain", num_instances)
  684. # add a Service for each wormchain instance
  685. services = []
  686. for obj in wormchain_set:
  687. if obj["kind"] == "Service" and obj["metadata"]["name"] == "wormchain-0":
  688. # make a Service for each replica so we can resolve it by name from other pods.
  689. # copy wormchain-0's Service then set the name and selector for the instance.
  690. for instance_num in list(range(1, num_instances)):
  691. instance_name = 'wormchain-%s' % (instance_num)
  692. # Copy the Service's properties to a new dict, by value, three levels deep.
  693. # tl;dr - if the value is a dict, use a comprehension to copy it immutably.
  694. service = { k: ({ k2: ({ k3:v3
  695. for (k3,v3) in v2.items()} if type(v2) == "dict" else v2)
  696. for (k2,v2) in v.items()} if type(v) == "dict" else v)
  697. for (k,v) in obj.items()}
  698. # add the name we want to be able to resolve via k8s DNS
  699. service["metadata"]["name"] = instance_name
  700. # add the name of the pod the service should connect to
  701. service["spec"]["selector"] = { "statefulset.kubernetes.io/pod-name": instance_name }
  702. services.append(service)
  703. return encode_yaml_stream(wormchain_set + services)
  704. wormchain_path = "devnet/wormchain.yaml"
  705. if num_guardians >= 2:
  706. # update wormchain's k8s config to spin up multiple instances
  707. k8s_yaml_with_ns(build_wormchain_yaml(wormchain_path, num_guardians))
  708. else:
  709. k8s_yaml_with_ns(wormchain_path)
  710. k8s_resource(
  711. "wormchain",
  712. port_forwards = [
  713. port_forward(1319, container_port = 1317, name = "REST [:1319]", host = webHost),
  714. port_forward(9090, container_port = 9090, name = "GRPC", host = webHost),
  715. port_forward(26659, container_port = 26657, name = "TENDERMINT [:26659]", host = webHost)
  716. ],
  717. resource_deps = ["const-gen"],
  718. labels = ["wormchain"],
  719. trigger_mode = trigger_mode,
  720. )
  721. k8s_resource(
  722. "wormchain-deploy",
  723. resource_deps = ["const-gen", "wormchain"],
  724. labels = ["wormchain"],
  725. trigger_mode = trigger_mode,
  726. )
  727. if ibc_relayer:
  728. docker_build(
  729. ref = "ibc-relayer-image",
  730. context = ".",
  731. dockerfile = "./wormchain/ibc-relayer/Dockerfile",
  732. only = []
  733. )
  734. k8s_yaml_with_ns("devnet/ibc-relayer.yaml")
  735. k8s_resource(
  736. "ibc-relayer",
  737. port_forwards = [
  738. port_forward(7597, name = "HTTPDEBUG [:7597]", host = webHost),
  739. ],
  740. resource_deps = ["wormchain-deploy", "terra2-terrad"],
  741. labels = ["ibc-relayer"],
  742. trigger_mode = trigger_mode,
  743. )
  744. if btc:
  745. k8s_yaml_with_ns("devnet/btc-localnet.yaml")
  746. docker_build(
  747. ref = "btc-node",
  748. context = "bitcoin",
  749. dockerfile = "bitcoin/Dockerfile",
  750. target = "bitcoin-build",
  751. )
  752. k8s_resource(
  753. "btc",
  754. port_forwards = [
  755. port_forward(18556, name = "RPC [:18556]", host = webHost),
  756. ],
  757. labels = ["btc"],
  758. trigger_mode = trigger_mode,
  759. )
  760. if aptos:
  761. k8s_yaml_with_ns("devnet/aptos-localnet.yaml")
  762. docker_build(
  763. ref = "aptos-node",
  764. context = "aptos",
  765. dockerfile = "aptos/Dockerfile",
  766. target = "aptos",
  767. )
  768. k8s_resource(
  769. "aptos",
  770. port_forwards = [
  771. port_forward(8080, name = "RPC [:8080]", host = webHost),
  772. port_forward(6181, name = "FullNode [:6181]", host = webHost),
  773. port_forward(8081, name = "Faucet [:8081]", host = webHost),
  774. ],
  775. resource_deps = ["const-gen"],
  776. labels = ["aptos"],
  777. trigger_mode = trigger_mode,
  778. )