wormhole/Tiltfile

224 lines
6.4 KiB
Plaintext

# This Tiltfile contains the deployment and build config for the Wormhole devnet.
#
# We use Buildkit cache mounts and careful layering to avoid unnecessary rebuilds - almost
# all source code changes result in small, incremental rebuilds. Dockerfiles are written such
# that, for example, changing the contract source code won't cause Solana itself to be rebuilt.
#
load("ext://namespace", "namespace_create", "namespace_inject")
load('ext://secret', 'secret_yaml_generic')
# Runtime configuration
config.define_string("num", False, "Number of guardian nodes to run")
# You do not usually need to set this argument - this argument is for debugging only. If you do use a different
# namespace, note that the "wormhole" namespace is hardcoded in tests and don't forget specifying the argument
# when running "tilt down".
#
config.define_string("namespace", False, "Kubernetes namespace to use")
# These arguments will enable writing Guardian events to a BigTable instance.
# Writing to BigTable is optional. These arguments are not required to run the devnet.
config.define_bool("bigTablePersistence", False, "Enable forwarding guardian events to BigTable")
config.define_string("gcpProject", False, "GCP project ID for BigTable persistence")
config.define_string("bigTableKeyPath", False, "Path to BigTable json key file")
cfg = config.parse()
num_guardians = int(cfg.get("num", "5"))
namespace = cfg.get("namespace", "wormhole")
bigTablePersistence = cfg.get("bigTablePersistence", False)
gcpProject = cfg.get("gcpProject", None)
bigTableKeyPath = cfg.get("bigTableKeyPath", "./bigtable-writer.json")
# namespace
namespace_create(namespace)
def k8s_yaml_with_ns(objects):
return k8s_yaml(namespace_inject(objects, namespace))
# protos
proto_deps = ["./proto", "./generate-protos.sh", "buf.yaml", "buf.gen.yaml"]
local_resource(
name = "proto-gen",
deps = proto_deps,
cmd = "./generate-protos.sh",
)
local_resource(
name = "proto-gen-web",
deps = proto_deps,
resource_deps = ["proto-gen"],
cmd = "./generate-protos-web.sh",
)
# bridge
if bigTablePersistence:
k8s_yaml_with_ns(
secret_yaml_generic(
"bridge-bigtable-key",
from_file = "bigtable-key.json=" + bigTableKeyPath
)
)
docker_build(
ref = "guardiand-image",
context = "bridge",
dockerfile = "bridge/Dockerfile",
)
def build_bridge_yaml():
bridge_yaml = read_yaml_stream("devnet/bridge.yaml")
for obj in bridge_yaml:
if obj["kind"] == "StatefulSet" and obj["metadata"]["name"] == "guardian":
obj["spec"]["replicas"] = num_guardians
container = obj["spec"]["template"]["spec"]["containers"][0]
if container["name"] != "guardiand":
fail("container 0 is not guardiand")
container["command"] += ["--devNumGuardians", str(num_guardians)]
if bigTablePersistence:
container["command"] += [
"--bigTablePersistenceEnabled",
"--bigTableGCPProject",
gcpProject
]
return encode_yaml_stream(bridge_yaml)
k8s_yaml_with_ns(build_bridge_yaml())
k8s_resource("guardian", resource_deps = ["proto-gen", "solana-devnet"], port_forwards = [
port_forward(6060, name = "Debug/Status Server [:6060]"),
port_forward(7070, name = "Public gRPC [:7070]"),
port_forward(7071, name = "Public REST [:7071]"),
])
# publicRPC proxy that allows grpc over http1, for local development
k8s_yaml_with_ns("./devnet/envoy-proxy.yaml")
k8s_resource(
"envoy-proxy",
resource_deps = ["guardian"],
objects = ["envoy-proxy:ConfigMap:wormhole"],
port_forwards = [
port_forward(8080, name = "gRPC proxy for guardian's publicRPC data [:8080]"),
port_forward(9901, name = "gRPC proxy admin [:9901]"), # for proxy debugging
],
)
# solana client cli (used for devnet setup)
docker_build(
ref = "solana-client",
context = ".",
only = ["./proto", "./solana"],
dockerfile = "Dockerfile.client",
# Ignore target folders from local (non-container) development.
ignore = ["./solana/target", "./solana/agent/target", "./solana/cli/target"],
)
# solana smart contract
docker_build(
ref = "solana-contract",
context = "solana",
dockerfile = "solana/Dockerfile",
)
# solana local devnet
k8s_yaml_with_ns("devnet/solana-devnet.yaml")
k8s_resource("solana-devnet", port_forwards = [
port_forward(8899, name = "Solana RPC [:8899]"),
port_forward(8900, name = "Solana WS [:8900]"),
port_forward(9000, name = "Solana PubSub [:9000]"),
])
# eth devnet
docker_build(
ref = "eth-node",
context = "./ethereum",
dockerfile = "./ethereum/Dockerfile",
# ignore local node_modules (in case they're present)
ignore = ["./ethereum/node_modules"],
# sync external scripts for incremental development
# (everything else needs to be restarted from scratch for determinism)
#
# This relies on --update-mode=exec to work properly with a non-root user.
# https://github.com/tilt-dev/tilt/issues/3708
live_update = [
sync("./ethereum/src", "/home/node/app/src"),
],
)
k8s_yaml_with_ns("devnet/eth-devnet.yaml")
k8s_resource("eth-devnet", port_forwards = [
port_forward(8545, name = "Ganache RPC [:8545]"),
])
# explorer web app
docker_build(
ref = "explorer",
context = "./explorer",
dockerfile = "./explorer/Dockerfile",
ignore = ["./explorer/node_modules"],
live_update = [
sync("./explorer/src", "/home/node/app/src"),
sync("./explorer/public", "/home/node/app/public"),
],
)
k8s_yaml_with_ns("devnet/explorer.yaml")
k8s_resource(
"explorer",
resource_deps = ["envoy-proxy", "proto-gen-web"],
port_forwards = [
port_forward(8001, name = "Explorer Web UI [:8001]"),
],
)
# terra devnet
docker_build(
ref = "terra-image",
context = "./terra/devnet",
dockerfile = "terra/devnet/Dockerfile",
)
docker_build(
ref = "terra-contracts",
context = "./terra",
dockerfile = "./terra/Dockerfile",
)
k8s_yaml_with_ns("devnet/terra-devnet.yaml")
k8s_resource(
"terra-lcd",
port_forwards = [port_forward(1317, name = "Terra LCD interface [:1317]")],
)
k8s_resource(
"terra-terrad",
port_forwards = [port_forward(26657, name = "Terra RPC [:26657]")],
)
k8s_resource(
"terra-fcd",
port_forwards = [port_forward(3060, name = "Terra FCD [:3060]")],
)