Skip to content

Bump debian from buster-20210721 to buster-20240612 in /docker/client #19290

Bump debian from buster-20210721 to buster-20240612 in /docker/client

Bump debian from buster-20210721 to buster-20240612 in /docker/client #19290

Workflow file for this run

name: ci-test
on:
push:
branches: [auto, canary]
pull_request:
branches: [latest, release-*, gha-test-*]
defaults:
run:
shell: bash
env:
max_threads: 16
pre_command: cd /opt/git/diem/
jobs:
prepare:
runs-on: ubuntu-20.04
outputs:
changes-target-branch: ${{ steps.changes.outputs.changes-target-branch }}
changes-base-git-rev: ${{ steps.changes.outputs.changes-base-git-rev }}
changes-base-githash: ${{ steps.changes.outputs.changes-base-githash }}
changes-pull-request-number: ${{ steps.changes.outputs.changes-pull-request-number }}
build-images: ${{ steps.need-build-images.outputs.changes-found }}
any-changes-founds: ${{ steps.any-changes-found.outputs.changes-found }}
need-base-images: ${{ steps.need-base-images.outputs.need-extra }}
test-land-blocking: ${{ steps.need-land-blocking-test.outputs.need-lbt }}
test-compatibility: ${{ steps.need-compat-tests.outputs.need-compat }}
test-rust-environment: ${{ steps.environment.outputs.name }}
test-rust: ${{ steps.rust-changes.outputs.changes-found }}
test-helm: ${{ steps.helm-changes.outputs.changes-found }}
test-dev-setup: ${{ steps.dev-setup-sh-changes.outputs.changes-found }}
test-website-build: ${{ steps.website-changes.outputs.changes-found }}
test-non-rust-lint: ${{ steps.non-rust-lint-changes.outputs.changes-found }}
test-docker-compose: ${{ steps.docker-compose-changes.outputs.changes-found }}
test-test-coverage: ${{ steps.test-coverage.outputs.changes-found }}
steps:
- uses: actions/checkout@v2.4.0
with:
# This ensures that the tip of the PR is checked out instead of the merge between the base ref and the tip
# On `push` this value will be empty and will "do-the-right-thing"
ref: ${{ github.event.pull_request.head.sha }}
fetch-depth: 0 #get all the history!!!
- name: Git Hooks and Checks
run: ./scripts/git-checks.sh
- id: changes
name: determine changes
uses: diem/actions/changes@faadd16607b77dfa2231a8f366883e01717b3225
with:
workflow-file: ci-test.yml
github-token: ${{secrets.GITHUB_TOKEN}}
- id: need-build-images
name: find changes need image build.
uses: diem/actions/matches@faadd16607b77dfa2231a8f366883e01717b3225
with:
pattern: '^documentation\|^developers.diem.com'
invert: "true"
- id: need-land-blocking-test
name: check KS if LBT should be run
if: ${{ github.event_name == 'push' }}
run: |
res=true
branches="${{ secrets.BRANCHES_TO_ENABLE_LBT }}"
if ! [[ -z "${branches}" ]] && [[ "${branches}" =~ .*"${{ steps.changes.outputs.changes-target-branch }}".* ]]; then
echo "LBT is enabled for target branch. Will trigger it."
else
echo "LBT is NOT enabled for target branch. Will skip it."
res=false
fi
echo "::set-output name=need-lbt::$(echo $res)";
- id: need-base-images
name: build extra images if it is needed by LBT
if: ${{ github.event_name == 'push' && steps.need-land-blocking-test.outputs.need-lbt == 'true' }}
run: |
res=false
branches="${{ secrets.BRANCHES_TO_ENABLE_LBT_COMPAT_SUITE }}"
if ! [[ -z "${branches}" ]] && [[ "${branches}" =~ .*"${{ steps.changes.outputs.changes-target-branch }}".* ]]; then
echo "LBT compatibility suite is enabled. Will use land_blocking_compat suite."
echo "Will trigger base images build if they not found."
else
echo "LBT compatibility sutie is NOT enabled. Will use land_blocking suite."
res=false
fi
echo "::set-output name=need-extra::$(echo $res)";
- id: need-compat-tests
name: determine if compat tests should run
run: |
res=true
branches="${{ secrets.BRANCHES_TO_DISABLE_COMPAT_TESTS }}"
if ! [[ -z "${branches}" ]] && [[ "${branches}" =~ .*"${{ steps.changes.outputs.changes-target-branch }}".* ]]; then
echo "compatibility suite is NOT enabled."
res=false
else
echo "compatibility suite is enabled."
fi
echo "::set-output name=need-compat::$(echo $res)";
- id: environment
name: Which environment should we use for secrets.
run: |
res=false
branches="${{ secrets.BRANCHES_TO_DISABLE_COMPAT_TESTS }}"
if ! [[ -z "${branches}" ]] && [[ "${branches}" =~ .*"${{ steps.changes.outputs.changes-target-branch }}".* ]]; then
echo "compatibility suite is NOT enabled."
res=false
else
echo "compatibility suite is enabled."
fi
echo "::set-output name=need-compat::$(echo $res)";
- id: any-changes-found
name: determine if there are any files listed in the CHANGES_CHANGED_FILE_OUTPUTFILE.
run: |
res=true
if [[ ! -f "$CHANGES_CHANGED_FILE_OUTPUTFILE" ]] || [[ "$(cat "$CHANGES_CHANGED_FILE_OUTPUTFILE" | wc -l)" == 0 ]]; then
res=false;
fi
echo "::set-output name=changes-found::$(echo $res)";
- id: rust-changes
name: find rust/cargo changes.
uses: diem/actions/matches@faadd16607b77dfa2231a8f366883e01717b3225
with:
pattern: '^documentation\|^docker\|^scripts\|^developers.diem.com'
invert: "true"
- id: non-rust-lint-changes
name: find shell/dockerfile changes
uses: diem/actions/matches@faadd16607b77dfa2231a8f366883e01717b3225
with:
pattern: 'Dockerfile$\|.*.sh$\|^developers.diem.com\|^shuffle'
- id: helm-changes
name: find helm changes
uses: diem/actions/matches@faadd16607b77dfa2231a8f366883e01717b3225
with:
pattern: "^helm"
- id: dev-setup-sh-changes
name: find dev-setup.sh/base docker image changes
uses: diem/actions/matches@faadd16607b77dfa2231a8f366883e01717b3225
with:
pattern: 'docker/ci\|scripts/dev_setup.sh'
- id: docker-compose-changes
name: find changes that should trigger docker compose testing.
uses: diem/actions/matches@faadd16607b77dfa2231a8f366883e01717b3225
with:
pattern: "^documentation"
invert: "true"
- id: website-changes
name: find website changes.
uses: diem/actions/matches@faadd16607b77dfa2231a8f366883e01717b3225
with:
pattern: '^documentation\|^developers.diem.com\|^.github'
- id: test-coverage
name: check if we should see if code coverage still works.
uses: diem/actions/matches@faadd16607b77dfa2231a8f366883e01717b3225
with:
pattern: '^rust.toolchain\|^x.toml\|^devtools\|^.github\|common/logger'
- id: test-api-spec
name: find api changes.
uses: diem/actions/matches@faadd16607b77dfa2231a8f366883e01717b3225
with:
pattern: '^api\|^scripts/dev_setup.sh'
#dev-setup-sh-test:
# runs-on: ubuntu-20.04
# timeout-minutes: 65
# needs: prepare
# if: ${{ needs.prepare.outputs.test-dev-setup == 'true' }}
# strategy:
# fail-fast: false
# matrix:
# target_os: [alpine, arch, github]
# steps:
# - uses: actions/checkout@v2.4.0
# with:
# ref: ${{ github.event.pull_request.head.sha }}
# - name: build image with dev-setup.sh
# run: docker build -f docker/ci/${{ matrix.target_os }}/Dockerfile -t diem/diem_build_environment:latest .
# - name: Early terminate workflow
# if: ${{ failure() }}
# uses: ./.github/actions/early-terminator
# with:
# github-token: ${{secrets.GITHUB_TOKEN}}
build-images:
runs-on: testnet-runner-ubuntu
timeout-minutes: 65
needs: prepare
if: ${{ always() && github.event_name == 'push' && needs.prepare.outputs.build-images == 'true' }}
#outputs:
# head-tag: ${{ steps.push-to-acp-ecr.outputs.head-tag }}
environment:
name: Docker
strategy:
matrix:
target_images:
[client faucet cluster-test forge, init tools validator validator-tcb]
steps:
- name: Chown user
run: |
sudo chown -R $USER:$USER $GITHUB_WORKSPACE
- name: docker prune
run: |
docker system prune -f
- uses: actions/checkout@v2.4.0
with:
fetch-depth: 0 #get all the history!!!
- id: changes
name: determine changes
uses: diem/actions/changes@faadd16607b77dfa2231a8f366883e01717b3225
with:
workflow-file: docker-publish.yml
#- name: setup_aws_ecr_login
# run: |
# echo 'AWS_ECR_ACCOUNT_URL=${{ secrets.ENV_ACP_ECR_AWS_ACCOUNT_NUM }}.dkr.ecr.${{ secrets.ENV_ACP_ECR_AWS_REGION }}.amazonaws.com' >> $GITHUB_ENV
#- name: Configure AWS credentials
# uses: aws-actions/configure-aws-credentials@v1
# with:
# aws-access-key-id: ${{ secrets.ENV_ACP_ECR_AWS_ACCESS_KEY_ID }}
# aws-secret-access-key: ${{ secrets.ENV_ACP_ECR_AWS_SECRET_ACCESS_KEY }}
# aws-region: ${{ secrets.ENV_ACP_ECR_AWS_REGION }}
#- name: Login to Amazon ECR
# id: login-ecr
# uses: aws-actions/amazon-ecr-login@v1.3.3
- name: Sign in to dockerhub, install image signing cert.
uses: ./.github/actions/dockerhub_login
with:
username: ${{ secrets.ENV_DOCKERHUB_USERNAME }}
password: ${{ secrets.ENV_DOCKERHUB_PASSWORD }}
key_material: ${{ secrets.ENV_DOCKERHUB_KEY_MATERIAL }}
key_name: ${{ secrets.ENV_DOCKERHUB_KEY_NAME }}
key_password: ${{ secrets.ENV_DOCKERHUB_KEY_PASSWORD }}
- name: pre-release docker images
run: |
BRANCH="latest"
echo Target Images: ${{ matrix.target_images }}
IFS=' ' read -ra TARGET_IMAGES <<< "${{ matrix.target_images }}"
success=0
tmpfile=$(mktemp)
echo "Failed to push:" > "${tmpfile}"
echo "***************************"
echo $BRANCH
echo $TARGET_IMAGES
echo "***************************"
for image in "${TARGET_IMAGES[@]}"; do
docker/build_push.sh -u -p -b ${BRANCH} -n "$image" || success=$(echo "$image" >> "${tmpfile}"; echo 1)
done
if [[ "$success" == "1" ]]; then
cat "${tmpfile}"
fi
exit $success
env:
DOCKER_CONTENT_TRUST_REPOSITORY_PASSPHRASE: ${{ secrets.ENV_DOCKERHUB_KEY_PASSWORD }}
#- name: push to ACP ecr
# id: push-to-acp-ecr
# run: |
# #push to ACP ecr with standard names
# BRANCH="$CHANGES_TARGET_BRANCH"
# GIT_REV=$(git rev-parse --short=8 HEAD)
# echo "::set-output name=head-tag::land_$GIT_REV";
# aws ecr get-login-password --region ${{ secrets.ENV_ACP_ECR_AWS_REGION }} | docker login --username AWS --password-stdin "${AWS_ECR_ACCOUNT_URL}"
# docker/docker_republish.sh -t pre_${BRANCH}_${GIT_REV} -o land_${GIT_REV} -r ${AWS_ECR_ACCOUNT_URL} -d -i "${{ matrix.target_images }}"
- name: Early terminate workflow
if: ${{ failure() }}
uses: ./.github/actions/early-terminator
with:
github-token: ${{secrets.GITHUB_TOKEN}}
need-base-images:
runs-on: testnet-runner-ubuntu
timeout-minutes: 65
needs: prepare
if: ${{ always() && github.event_name == 'push' && needs.prepare.outputs.build-images == 'true' && needs.prepare.outputs.need-base-images == 'true' }}
outputs:
# The last matrix build to succeed will set the output. Hilarious.
prev-tag: ${{ steps.build-extra-images.outputs.prev-tag }}
steps:
- name: Chown user
run: |
sudo chown -R $USER:$USER $GITHUB_WORKSPACE
- name: docker prune
run: |
docker system prune -f
- uses: actions/checkout@v2.4.0
with:
ref: ${{ github.event.pull_request.head.sha }}
fetch-depth: 0 #get all the history!!!
- name: Setup env
run: |
echo "BASE_GIT_REV=${{ needs.prepare.outputs.changes-base-git-rev }}" >> $GITHUB_ENV
- name: find images
run: |
set +e
echo "Will run land_blocking_compat suite"
echo "Finding a previous image tag to test against"
.github/actions/land-blocking/find-lbt-images.sh > lbt_images_output.txt
if [ $? -ne 0 ]; then
echo "BUILD_PREV=1" >> $GITHUB_ENV
cat lbt_images_output.txt
jq -n \
--arg msg "*${{ github.job }}* job in ${{ github.workflow }} workflow failed. Could not find a recent image tag for Compat Test" \
--arg url "https://github.com/${{ github.repository }}/actions/runs/${{github.run_id}}" \
'{
"attachments": [
{
"text": $msg,
"actions": [
{
"type": "button",
"text": "Visit Job",
"url": $url
}
]
}
]
}' > /tmp/payload
curl -X POST -H 'Content-type: application/json' -d @/tmp/payload ${{ secrets.WEBHOOK_FLAKY_LAND_BLOCKING_CT }}
else
compat_prev_tag=$(tail -1 lbt_images_output.txt)
echo "Using previous image tag $compat_prev_tag"
echo "PREV_TAG=$compat_prev_tag" >> $GITHUB_ENV
echo "BUILD_PREV=0" >> $GITHUB_ENV
fi
- name: Early terminate workflow
if: ${{ failure() }}
uses: ./.github/actions/early-terminator
with:
github-token: ${{secrets.GITHUB_TOKEN}}
script: |
// Find the number of the pull request that trigggers this push
let pr_num = ${{ needs.prepare.outputs.changes-pull-request-number }};
if (!pr_num) {
console.warn("Did not find pull request num in previous step");
console.log("GH event payload\n", context.payload);
return;
}
// Read and check cluster test results
let should_fail = false;
let env_vars = process.env;
let body = '';
const fsp = require('fs').promises;
try {
data = await fsp.readFile('report.json', 'utf-8');
var result = JSON.parse(data);
// TODO - set P/F based on metrics TPS, latency
body = `Cluster Test Result
\`\`\`
${result.text}
${result.links}
\`\`\`
`;
// Check CTI exit code for errors
if (parseInt(env_vars.CTI_EXIT_CODE) != 0) {
body += "\n :exclamation: Cluster Test failed - non-zero exit code for `cti` \n"
should_fail = true;
} else {
let tps = result.metrics.find(m => m.experiment == "all up" && m.metric == "avg_tps").value;
let min_tps = 1100;
if (tps < min_tps) {
body += "\n :exclamation: Performance regression is detected on this PR";
body += "\n TPS with PR: " + tps + ", this is lower then minimum allowed " + min_tps + " TPS.";
console.log(body);
should_fail = true;
}
}
} catch (err) {
if (err.code === 'ENOENT') {
body = "Cluster Test failed - no test report found.\n";
// Check Cluster Test output log for infra error
try {
cti_log = await fsp.readFile(env_vars.CTI_OUTPUT_LOG, 'utf-8');
let re = /.*(^Failed\sto\s.*\"Service\sUnavailable.\sPlease\stry\sagain\slater\.\".*)/;
if (re.test(cti_log)) {
let match = re.exec(cti_log);
body += " There was service infra error:\n";
body += `
${match[1]}
`
+ "\n"
;
body += "To retry, comment your PR with `/land`.";
body += " If that doesn't trigger re-run, amend and push again.";
}
} catch (err) {
console.error("Failed to check infra error in CT output log.\n", err);
}
} else {
body = "Cluster Test runner failed.";
console.error(err);
}
body += " See https://github.com/diem/diem/actions/runs/${{github.run_id}}";
// Post comment on PR then fail this workflow
should_fail = true;
}
// Add repro cmd to message
try {
body += "\nRepro cmd:\n";
body += `
\`\`\`
${env_vars.CTI_REPRO_CMD}
\`\`\`
`
} catch (err) {
if (err.code === 'ReferenceError') {
console.error("One of the following env vars is not set");
} else {
body += "[GHA DEBUG]\nFound error in actions/github-script\n";
body += err;
}
}
// Post test result on original pull request
try {
if (!should_fail) {
body += "\n :tada: Land-blocking cluster test passed! :ok_hand:"
}
await github.issues.createComment(
{
issue_number: pr_num,
owner: context.repo.owner,
repo: context.repo.repo,
body: body,
}
);
} catch (err) {
if (err.status === 401) {
// Fail silently for auth but log to console.
console.warn("GH token has expired when trying to POST\n", err);
} else {
console.error("HttpError other than 401 is not bypassed");
throw err;
}
}
// Fail the workflow if test fails or perf regresses
if (should_fail) {
throw "Land-blocking test failed";
}
non-rust-lint:
runs-on: [self-hosted, testnet-runner]
timeout-minutes: 65
needs: prepare
if: ${{ always() && needs.prepare.outputs.test-non-rust-lint == 'true' }}
container:
image: ghcr.io/diem/diem_build_environment:${{ needs.prepare.outputs.changes-target-branch }}
steps:
- run: git config --global --add safe.directory '*'
- uses: actions/checkout@v2.4.0
with:
ref: ${{ github.event.pull_request.head.sha }}
- uses: ./.github/actions/build-setup
- name: shell lints
run: |
shellcheck scripts/dev_setup.sh && \
shellcheck scripts/dockerhub_prune.sh && \
shellcheck docker/build_push.sh && \
shellcheck docker/docker_republish.sh && \
shellcheck scripts/weekly-dep-report.sh
- name: docker lints
uses: ./.github/actions/docker-checks
# - name: deno lints
# run: deno lint ./shuffle
# - name: Early terminate workflow
# if: ${{ failure() }}
# uses: ./.github/actions/early-terminator
# with:
# github-token: ${{secrets.GITHUB_TOKEN}}
lint:
runs-on: [self-hosted, testnet-runner]
timeout-minutes: 65
needs: prepare
if: ${{ always() && needs.prepare.outputs.any-changes-founds == 'true' }}
container:
image: ghcr.io/diem/diem_build_environment:${{ needs.prepare.outputs.changes-target-branch }}
volumes:
- "${{github.workspace}}:/opt/git/diem"
steps:
- run: git config --global --add safe.directory '*'
- uses: actions/checkout@v2.4.0
with:
ref: ${{ github.event.pull_request.head.sha }}
- uses: ./.github/actions/build-setup
- uses: Swatinem/rust-cache@c5ed9ba6b7e1bb8aff90d43acd2f0af4990fa57c
with:
key: ${{ needs.prepare.outputs.changes-target-branch }}
- name: cargo lint
run: $pre_command && cargo x lint
- name: cargo clippy
run: $pre_command && cargo xclippy --workspace --all-targets
- name: cargo clippy tcb
run: $pre_command && cargo xclippy --members lec --members lsr --members key-manager
- name: cargo fmt
run: $pre_command && cargo xfmt --check
- uses: ./.github/actions/build-teardown
- name: Early terminate workflow
if: ${{ failure() }}
uses: ./.github/actions/early-terminator
with:
github-token: ${{secrets.GITHUB_TOKEN}}
unit-test:
runs-on: [self-hosted, testnet-runner-r5]
timeout-minutes: 120
needs: prepare
if: ${{ always() && needs.prepare.outputs.test-rust == 'true' }}
container:
image: ghcr.io/diem/diem_build_environment:${{ needs.prepare.outputs.changes-target-branch }}
volumes:
- "${{github.workspace}}:/opt/git/diem"
steps:
- run: git config --global --add safe.directory '*'
- uses: actions/checkout@v2.4.0
with:
ref: ${{ github.event.pull_request.head.sha }}
fetch-depth: 0 #get all the history!!!
- uses: ./.github/actions/build-setup
- uses: Swatinem/rust-cache@c5ed9ba6b7e1bb8aff90d43acd2f0af4990fa57c
with:
key: ${{ needs.prepare.outputs.changes-target-branch }}
- name: run unit tests
run: |
# $pre_command && cargo nextest --nextest-profile ci --jobs ${max_threads} --test-threads ${max_threads} --unit --changed-since "origin/$TARGET_BRANCH"
$pre_command && mkdir -p target/junit-reports && cargo nextest --jobs ${max_threads} --tries ${nextest_tries} --unit --failure-output=immediate-final --changed-since "origin/$TARGET_BRANCH" --junit target/junit-reports/unit-test.xml
env:
TARGET_BRANCH: ${{ needs.prepare.outputs.changes-target-branch }}
- name: run jsonrpc integration tests
run: |
$pre_command && cargo xtest -p jsonrpc-integration-tests --changed-since "origin/$TARGET_BRANCH"
env:
TARGET_BRANCH: ${{ needs.prepare.outputs.changes-target-branch }}
- name: run doctests
run: |
$pre_command && cargo xtest --doc --jobs ${max_threads} --unit --changed-since "origin/$TARGET_BRANCH"
env:
TARGET_BRANCH: ${{ needs.prepare.outputs.changes-target-branch }}
- name: upload unit test results
if: always()
uses: actions/upload-artifact@v2
with:
name: unit-test-results
path: target/junit-reports/unit-test.xml
- uses: ./.github/actions/build-teardown
codegen-unit-test:
runs-on: testnet-runner-ubuntu
timeout-minutes: 65
needs: prepare
if: ${{ always() && needs.prepare.outputs.test-rust == 'true' }}
container:
image: ghcr.io/diem/diem_build_environment:${{ needs.prepare.outputs.changes-target-branch }}
volumes:
- "${{github.workspace}}:/opt/git/diem"
steps:
- run: git config --global --add safe.directory '*'
- uses: actions/checkout@v2.4.0
with:
ref: ${{ github.event.pull_request.head.sha }}
fetch-depth: 0 #get all the history!!!
- uses: ./.github/actions/build-setup
- uses: Swatinem/rust-cache@c5ed9ba6b7e1bb8aff90d43acd2f0af4990fa57c
with:
key: ${{ needs.prepare.outputs.changes-target-branch }}
- name: run codegen unit tests
run: $pre_command && mkdir -p target/junit-reports && cargo nextest --jobs ${max_threads} --tries ${nextest_tries} --failure-output=immediate-final -p transaction-builder-generator --unit --changed-since "origin/$TARGET_BRANCH" --run-ignored=ignored-only --junit target/junit-reports/codegen-unit-test.xml
env:
TARGET_BRANCH: ${{ needs.prepare.outputs.changes-target-branch }}
- name: upload codegen test results
if: always()
uses: actions/upload-artifact@v2
with:
name: codegen-unit-test-results
path: target/junit-reports/codegen-unit-test.xml
- uses: ./.github/actions/build-teardown
e2e-test:
runs-on: testnet-runner-ubuntu
timeout-minutes: 70
needs: prepare
if: ${{ always() && needs.prepare.outputs.test-rust == 'true' }}
container:
image: ghcr.io/diem/diem_build_environment:${{ needs.prepare.outputs.changes-target-branch }}
volumes:
- "${{github.workspace}}:/opt/git/diem"
strategy:
fail-fast: false
matrix:
runner: [0, 1] # set the env runners to the count below.
env:
runners: 2
E2E_RETRIES: 3
FLAKY_TESTS_FILE: /tmp/failures
MESSAGE_PAYLOAD_FILE: /tmp/message
steps:
- run: git config --global --add safe.directory '*'
- uses: actions/checkout@v2.4.0
with:
ref: ${{ github.event.pull_request.head.sha }}
fetch-depth: 0 #get all the history!!!
- uses: ./.github/actions/build-setup
- uses: actions/cache@v2.1.6
with:
path: "/opt/cargo/git\n/opt/cargo/registry\n/opt/cargo/.package-cache"
key: crates-${{ runner.os }}-${{ hashFiles('Cargo.lock') }}
restore-keys: "crates-${{ runner.os }}"
- name: split tests
run: |
$pre_command && cargo x test --package smoke-test -- --list | \
grep "::" | sed 's/: .*$//' > e2e_tests
echo -e "Found $(wc -l e2e_tests) tests."
# Splits the e2e test via round robin in to ${runners} number of files with single digit extensions.
split -n r/${runners} -d -a 1 e2e_tests /tmp/tests.
rm e2e_tests
mv /tmp/tests.${{ matrix.runner }} /tmp/tests_to_run
echo -e "This runner will run these tests\n$(cat /tmp/tests_to_run)"
- name: run e2e tests
run: |
set +e
num_fails=0
$pre_command
export RUST_BACKTRACE=full
failed_tests=
for target in $(cat /tmp/tests_to_run) ; do
retry=0
status=1
while [[ $status != 0 && $retry < ${E2E_RETRIES} ]]; do
cargo x test --package smoke-test -- $target --test-threads 1 --exact --nocapture
status=$?
retry=$((retry + 1))
if [[ $status != 0 ]] ; then
echo Failed to execute $target, $retry times
fi
sleep 10
done
if [[ $status != 0 ]] ; then
num_fails=$((num_fails + 1))
echo failed to execute $target
failed_tests="${target}\n${failed_tests}"
elif [[ $retry > 1 ]]; then
echo "$target passed after $retry tries" >> ${FLAKY_TESTS_FILE}
fi
done
if [ -e ${FLAKY_TESTS_FILE} ]; then
msg="Found flaky tests\n$(cat ${FLAKY_TESTS_FILE})"
echo -e $msg
echo -e $msg > ${MESSAGE_PAYLOAD_FILE}
fi
if [[ $num_fails != 0 ]]; then
echo -e "$num_fails test(s) failed:\n${failed_tests}"
else
echo -e "No issues detected in this build". > ${MESSAGE_PAYLOAD_FILE}
fi
exit $num_fails
- name: "Send Message"
uses: ./.github/actions/slack-file
if: ${{ always() }}
with:
payload-file: ${{ env.MESSAGE_PAYLOAD_FILE }}
webhook: ${{ secrets.WEBHOOK_FLAKY_TESTS }}
- name: Early terminate workflow
if: ${{ failure() }}
uses: ./.github/actions/early-terminator
with:
github-token: ${{secrets.GITHUB_TOKEN}}
#forge-test:
# runs-on: [self-hosted, testnet-runner]
# timeout-minutes: 120
# needs: prepare
# if: ${{ needs.prepare.outputs.test-rust == 'true' && needs.prepare.outputs.test-compatibility == 'true' }}
# container:
# image: diem/build_environment:${{ needs.prepare.outputs.changes-target-branch }}
# volumes:
# - "${{github.workspace}}:/opt/git/diem"
# steps:
# - run: git config --global --add safe.directory '*'
# - uses: actions/checkout@v2.3.4
# with:
# ref: ${{ github.event.pull_request.head.sha }}
# fetch-depth: 0 #get all the history!!!
# - uses: ./.github/actions/build-setup
# - name: compatibility tests
# run: |
# cargo test -p testcases --test forge-local-compatibility
docker-compose-test:
runs-on: testnet-runner-ubuntu-2x-1
timeout-minutes: 65
needs: prepare
if: ${{ always() && needs.prepare.outputs.test-docker-compose == 'true' }}
steps:
- name: Chown user
run: |
sudo chown -R $USER:$USER $GITHUB_WORKSPACE
- name: docker stop
run: |
docker stop $(docker ps -a -q) || echo "no containers to stop"
- name: docker prune
run: |
docker system prune -f || echo "docker system already clean"
- name: remove docker volumes
run: |
docker volume prune --all -f || echo "no volumes to remove"
- uses: actions/checkout@v2.4.0
with:
ref: ${{ github.event.pull_request.head.sha }}
- name: install expect
run: |
sudo apt --assume-yes update
sudo apt --assume-yes install expect
sudo apt --assume-yes install build-essential
sudo apt --assume-yes install openssl pkg-config libssl-dev
- name: build validator docker image
run: docker/diem-build.sh docker/validator/Dockerfile diem/validator:test
- name: build faucet image
run: docker/diem-build.sh docker/faucet/Dockerfile diem/faucet:test
- name: build client image
run: docker/diem-build.sh docker/client/Dockerfile diem/client:test
- name: run validator-client test
run: docker/compose/test_docker_compose.sh
env:
# this overrides the default docker tag of "testnet"
IMAGE_TAG: "test"
- name: install cargo
run: |
curl https://sh.rustup.rs -sSf | sh -s -- -y
export PATH="$HOME/.cargo/bin:$PATH"
source "$HOME/.cargo/env"
- name: run sdk-compatibility tests from latest
run: |
export PATH="$HOME/.cargo/bin:$PATH" && source "$HOME/.cargo/env" && cd sdk/compatibility && cargo test -- --include-ignored
env:
JSON_RPC_URL: "http://127.0.0.1:8080"
FAUCET_URL: "http://127.0.0.1:8000"
- uses: ./.github/actions/build-teardown
- name: Early terminate workflow
if: ${{ failure() }}
uses: ./.github/actions/early-terminator
with:
github-token: ${{secrets.GITHUB_TOKEN}}
crypto-unit-test:
runs-on: [self-hosted, testnet-runner]
timeout-minutes: 65
needs: prepare
if: ${{ always() && needs.prepare.outputs.test-rust == 'true' }}
container:
image: ghcr.io/diem/diem_build_environment:${{ needs.prepare.outputs.changes-target-branch }}
volumes:
- "${{github.workspace}}:/opt/git/diem"
steps:
- run: git config --global --add safe.directory '*'
- uses: actions/checkout@v2.4.0
with:
ref: ${{ github.event.pull_request.head.sha }}
- uses: ./.github/actions/build-setup
- uses: Swatinem/rust-cache@c5ed9ba6b7e1bb8aff90d43acd2f0af4990fa57c
with:
key: ${{ needs.prepare.outputs.changes-target-branch }}
- name: run crypto unit tests
run: |
$pre_command && cd crates/diem-crypto && cargo test --features='u64' --no-default-features
$pre_command && cd crates/diem-crypto && cargo test --features='u32' --no-default-features
- uses: ./.github/actions/build-teardown
- name: Early terminate workflow
if: ${{ failure() }}
uses: ./.github/actions/early-terminator
with:
github-token: ${{secrets.GITHUB_TOKEN}}
# Disabling temporarily since code coverage is currently broken with the latest rust release
# coverage-unit-test:
# runs-on: ubuntu-20.04-xl
# timeout-minutes: 30
# needs: prepare
# if: ${{ needs.prepare.outputs.test-test-coverage == 'true' }}
# container:
# image: ghcr.io/diem/diem_build_environment:${{ needs.prepare.outputs.changes-target-branch }}
# volumes:
# - "${{github.workspace}}:/opt/git/diem"
# steps:
# - uses: actions/checkout@v2.4.0
# with:
# ref: ${{ github.event.pull_request.head.sha }}
# - uses: ./.github/actions/build-setup
# - uses: Swatinem/rust-cache@c5ed9ba6b7e1bb8aff90d43acd2f0af4990fa57c
# with:
# key: ${{ needs.prepare.outputs.changes-target-branch }}
# - name: run coverage tests and verify coverage is calculated.
# run: |
# cargo xtest --html-cov-dir=/tmp/results/ -p diem-logger
# export line_coverage=$( cat /tmp/results/index.html | grep '<abbr' | head -1 | sed 's/<[^>]*>//g' | sed 's/\..*//g' | sed 's/[[:blank:]]//g' )
# echo Line Coverage: $line_coverage
# if (( line_coverage < 80 )); then
# echo Coverage appears to be broken, diem/logger should report more than 80% line coverage.
# exit 1;
# fi
# - uses: ./.github/actions/build-teardown
# - name: Early terminate workflow
# if: ${{ failure() }}
# uses: ./.github/actions/early-terminator
# with:
# github-token: ${{secrets.GITHUB_TOKEN}}
helm-test:
runs-on: testnet-runner-ubuntu
timeout-minutes: 65
needs: prepare
if: ${{ always() && needs.prepare.outputs.test-helm == 'true' }}
steps:
- run: git config --global --add safe.directory '*'
- uses: actions/checkout@v2.4.0
with:
ref: ${{ github.event.pull_request.head.sha }}
- name: Check machine details for minikube
run: |
kubectl version --client
helm version
lscpu
- name: Helm lint
working-directory: helm
run: helm lint fullnode
- name: Install minikube v1.24.0
run: |
curl -LO https://storage.googleapis.com/minikube/releases/v1.24.0/minikube-linux-amd64
checksum="3bc218476cf205acf11b078d45210a4882e136d24a3cbb7d8d645408e423b8fe"
filename=minikube-linux-amd64
if [[ $(sha256sum $filename | awk '{print $1}') != "$checksum" ]]; then
echo "$filename checksum mismatch"
exit 1
fi
# TODO(rustielin): add minikube into scripts/dev_setup.sh
sudo install minikube-linux-amd64 /usr/local/bin/minikube
rm minikube-linux-amd64
- name: Start minikube
run: minikube start --driver=docker --cpus=3 --memory=5Gi
- name: Wait for node status
run: kubectl wait --for=condition=ready node/minikube --timeout=5m
- name: Interact with the cluster
run: kubectl get nodes
- name: Install fullnode helm chart
working-directory: helm/fullnode
run: |
helm install fullnode --set storage.class=standard --set storage.size=10Gi .
- name: Wait and check pods
run: |
echo "Sleep 30s while fullnode starts"
sleep 30
kubectl wait -l statefulset.kubernetes.io/pod-name=fullnode-diem-fullnode-0 --for=condition=ready pod --timeout=5m
echo "Sleep 1m while fullnode syncs"
sleep 60
kubectl get pods
- name: Run the fullnode helm chart tests
working-directory: helm/fullnode
run: helm test fullnode --logs
- name: Check resources
if: ${{ always() }}
run: |
echo "===== nodes ====="
kubectl get nodes
kubectl describe nodes
echo "===== pvcs ====="
kubectl get pvc
kubectl describe pvc
echo "===== pods ====="
kubectl get pods
kubectl describe pod fullnode-diem-fullnode-0
kubectl logs fullnode-diem-fullnode-0
kubectl logs fullnode-diem-fullnode-sync-test
- name: Clean up
if: ${{ always() }}
run: minikube delete
- uses: ./.github/actions/build-teardown
- name: Early terminate workflow
if: ${{ failure() }}
uses: ./.github/actions/early-terminator
with:
github-token: ${{secrets.GITHUB_TOKEN}}
api_spec_test:
name: API specification test
runs-on: [self-hosted, testnet-runner]
timeout-minutes: 65
needs: prepare
if: ${{ always() && needs.prepare.outputs.test-api-spec == 'true' }}
container:
image: ghcr.io/diem/diem_build_environment:${{ needs.prepare.outputs.changes-target-branch }}
volumes:
- "${{github.workspace}}:/opt/git/diem"
steps:
- run: git config --global --add safe.directory '*'
- uses: actions/checkout@v2.3.4
- uses: ./.github/actions/build-setup
- name: test
working-directory: api
run: make test
# Compile (but don't run) the benchmarks, to insulate against bit rot
build-benchmarks:
runs-on: testnet-runner-ubuntu-2x-2
timeout-minutes: 30
needs: prepare
if: ${{ always() && needs.prepare.outputs.test-rust == 'true' }}
container:
image: ghcr.io/diem/diem_build_environment:${{ needs.prepare.outputs.changes-target-branch }}
volumes:
- "${{github.workspace}}:/opt/git/diem"
steps:
- run: git config --global --add safe.directory '*'
- uses: actions/checkout@v2.4.0
with:
ref: ${{ github.event.pull_request.head.sha }}
- uses: ./.github/actions/build-setup
- uses: actions/cache@v2.1.6
with:
path: "/opt/cargo/git\n/opt/cargo/registry\n/opt/cargo/.package-cache"
key: crates-${{ runner.os }}-${{ hashFiles('Cargo.lock') }}
restore-keys: "crates-${{ runner.os }}"
- name: build benchmarks
run: cargo x bench --no-run
- uses: ./.github/actions/build-teardown
- name: Early terminate workflow
if: ${{ failure() }}
uses: ./.github/actions/early-terminator
with:
github-token: ${{secrets.GITHUB_TOKEN}}
build-dev:
runs-on: [self-hosted, testnet-runner]
timeout-minutes: 65
needs: prepare
if: ${{ always() && needs.prepare.outputs.test-rust == 'true' }}
container:
image: ghcr.io/diem/diem_build_environment:${{ needs.prepare.outputs.changes-target-branch }}
volumes:
- "${{github.workspace}}:/opt/git/diem"
steps:
- run: git config --global --add safe.directory '*'
- uses: actions/checkout@v2.4.0
with:
ref: ${{ github.event.pull_request.head.sha }}
- uses: ./.github/actions/build-setup
- uses: Swatinem/rust-cache@c5ed9ba6b7e1bb8aff90d43acd2f0af4990fa57c
with:
key: ${{ needs.prepare.outputs.changes-target-branch }}
- run: $pre_command && cargo xcheck -j ${max_threads} --members production
- run: $pre_command && cargo xcheck -j ${max_threads} --workspace --all-targets
- run: |
$pre_command && rustup target add powerpc-unknown-linux-gnu
# disable the workspace-hack because it contains some code that doesn't build on powerpc
$pre_command && cargo x generate-workspace-hack --mode disable
$pre_command && cargo xcheck -j ${max_threads} -p diem-transaction-builder --target powerpc-unknown-linux-gnu
# we can't just re-enable the workspace-hack at the end, because it can result in a different
# Cargo.lock resolution result in some cases. So use git reset instead.
$pre_command && git reset --hard HEAD
- uses: ./.github/actions/build-teardown
- name: Early terminate workflow
if: ${{ failure() }}
uses: ./.github/actions/early-terminator
with:
github-token: ${{secrets.GITHUB_TOKEN}}
developers-site:
name: run-developer-site-build
runs-on: ubuntu-20.04
needs: prepare
if: ${{ always() && needs.prepare.outputs.test-website-build == 'true' }}
steps:
- run: git config --global --add safe.directory '*'
# Checks-out the Diem website repository under $GITHUB_WORKSPACE, so job can access it
- uses: actions/checkout@v2.4.0
with:
ref: ${{ github.event.pull_request.head.sha }}
- uses: actions/cache@v2.1.6
with:
path: "/opt/cargo/git\n/opt/cargo/registry\n/opt/cargo/.package-cache"
key: crates-${{ runner.os }}-${{ hashFiles('Cargo.lock') }}
restore-keys: "crates-${{ runner.os }}"
# Installs node and yarn
- name: Use Node.js 14
uses: actions/setup-node@v2.4.1
with:
node-version: '14'
# Install git
- name: Install git
run: |
sudo apt --assume-yes update
sudo apt --assume-yes install git
# Install Python 3.8
- name: Set up Python 3.8
uses: actions/setup-python@v2
with:
python-version: '3.8'
# Test that building the site is successful
- name: Build Site
run: |
cd developers.diem.com
# Only build the straight Docusaurus site now. Do not build rust `-r`
# or python docs `-p` on CI checks until we resolve the best way to
# build them for deployment
./scripts/build_docs.sh -b
- name: Early terminate workflow
if: ${{ failure() }}
uses: ./.github/actions/early-terminator
with:
github-token: ${{secrets.GITHUB_TOKEN}}
#land-blocking-test-forge:
# name: Run land blocking test in Forge new
# runs-on: [self-hosted, testnet-runner]
# needs: [prepare, build-images, need-base-images]
# if: ${{ always() && needs.build-images.result=='success' && needs.prepare.outputs.test-land-blocking == 'true' }}
# outputs:
# forge-result: ${{ steps.post-test-result.outputs.forge-result }}
# timeout-minutes: 65
# steps:
# - run: git config --global --add safe.directory '*'
# - uses: actions/checkout@v2.4.0
# with:
# # This ensures that the tip of the PR is checked out instead of the merge between the base ref and the tip
# # On `push` this value will be empty and will "do-the-right-thing"
# ref: ${{ github.event.pull_request.head.sha }}
# - name: Launch forge test
# run: |
# set +e
# date
# export FGI_OUTPUT_LOG=$(mktemp)
# echo "FGI_OUTPUT_LOG=$FGI_OUTPUT_LOG" >> $GITHUB_ENV
# cmd=""
# if ${{ needs.need-base-images.result!='success' }}; then
# cmd="./scripts/fgi/run --tag ${{ needs.build-images.outputs.head-tag }} --suite land_blocking --report forge_report.json"
# else
# cmd="./scripts/fgi/run --tag ${{ needs.build-images.outputs.head-tag }} --base-image-tag ${{ needs.need-base-images.outputs.prev-tag }} --suite land_blocking_compat --report forge_report.json"
# fi
# eval $cmd
# ret=$?
# echo "fgi exit code: $ret"
# echo "FGI_REPRO_CMD=$cmd" >> $GITHUB_ENV
# echo "FGI_EXIT_CODE=$ret" >> $GITHUB_ENV
# - name: Post test results on PR
# uses: actions/github-script@v4.0.2
# with:
# github-token: ${{secrets.GITHUB_TOKEN}}
# script: |
# // Find the number of the pull request that trigggers this push
# let pr_num = ${{ needs.prepare.outputs.changes-pull-request-number }};
# if (!pr_num) {
# console.warn("Did not find pull request num in previous step");
# console.log("GH event payload\n", context.payload);
# return;
# }
# // Read and check forge test results
# let should_fail = false;
# let env_vars = process.env;
# let body = '';
# const fsp = require('fs').promises;
# try {
# data = await fsp.readFile('forge_report.json', 'utf-8');
# var result = JSON.parse(data);
# // TODO - set P/F based on metrics TPS, latency
# body = `Forge Test Result
# \`\`\`
# ${result.text}
# ${result.logs}
# ${result.dashboard}
# \`\`\`
# `;
# // Check FGI exit code for errors
# if (parseInt(env_vars.FGI_EXIT_CODE) != 0) {
# body += "\n :exclamation: Forge Test failed - non-zero exit code for `fgi` \n"
# should_fail = true;
# }
# } catch (err) {
# if (err.code === 'ENOENT') {
# body = "Forge Test failed - no test report found.\n";
# } else {
# body = "Forge Test runner failed.";
# console.error(err);
# }
# body += " See https://github.com/diem/diem/actions/runs/${{github.run_id}}";
# // Post comment on PR then fail this workflow
# should_fail = true;
# }
# // Add repro cmd to message
# try {
# body += "\nRepro cmd:\n";
# body += `
# \`\`\`
# ${env_vars.FGI_REPRO_CMD}
# \`\`\`
# `
# } catch (err) {
# if (err.code === 'ReferenceError') {
# console.error("One of the following env vars is not set");
# } else {
#
#body += "[GHA DEBUG]\nFound error in actions/github-script\n";
# body += err;
# }
# }
# // Post test result on original pull request
# try {
# if (!should_fail) {
# body += "\n :tada: Land-blocking forge test passed! :ok_hand:"
# }
# await github.issues.createComment(
# {
# issue_number: pr_num,
# owner: context.repo.owner,
# repo: context.repo.repo,
# body: body,
# }
# );
# } catch (err) {
# if (err.status === 401) {
# // Fail silently for auth but log to console.
# console.warn("GH token has expired when trying to POST\n", err);
# } else {
# console.error("HttpError other than 401 is not bypassed");
# throw err;
# }
# }
# // Fail the workflow if test fails
# if (should_fail) {
# throw "Land-blocking test failed";
# }
# - name: Early terminate workflow
# if: ${{ failure() }}
# uses: ./.github/actions/early-terminator
# with:
# github-token: ${{secrets.GITHUB_TOKEN}}
#land-blocking-test-forge-new:
# name: Run land blocking test in Forge
# runs-on: [self-hosted, testnet-runner]
# needs: [prepare, build-images, need-base-images]
# if: ${{ always() && needs.build-images.result=='success' && needs.prepare.outputs.test-land-blocking == 'true' }}
# outputs:
# forge-result: ${{ steps.post-test-result.outputs.forge-result }}
# timeout-minutes: 65
# steps:
# - run: git config --global --add safe.directory '*'
# - uses: actions/checkout@v2.3.4
# with:
# This ensures that the tip of the PR is checked out instead of the merge between the base ref and the tip
# On `push` this value will be empty and will "do-the-right-thing"
# ref: ${{ github.event.pull_request.head.sha }}
# - name: Launch forge test
# # NOTE Remember to update PR comment payload if cti cmd is updated.
# run: |
# set +e
# date
# export FGI_OUTPUT_LOG=$(mktemp)
# echo "FGI_OUTPUT_LOG=$FGI_OUTPUT_LOG" >> $GITHUB_ENV
# cmd=""
# if ${{ needs.need-base-images.result!='success' }}; then
# cmd="./scripts/fgi/run --tag ${{ needs.build-images.outputs.head-tag }} --suite land_blocking"
# else
# cmd="./scripts/fgi/run -E SLACK_URL=${{ secrets.WEBHOOK_FORGE }} --tag ${{ needs.build-images.outputs.head-tag }} --base-image-tag ${{ needs.need-base-images.outputs.prev-tag }} --suite land_blocking_compat"
# fi
# eval $cmd
# ret=$?
# echo "fgi exit code: $ret"
# echo "FGI_REPRO_CMD=$cmd" >> $GITHUB_ENV
# echo "FGI_EXIT_CODE=$ret" >> $GITHUB_ENV
# - name: Post test results on PR
# id: post-test-result
# if: always()
# # set result to do comparison instead of fail workflow
# # once we turn off CT and turn on forge, will post forge testing result instead
# run: |
# if [ $FGI_EXIT_CODE -eq 1 ]; then
# echo "::set-output name=forge-result::failed";
# else
# echo "::set-output name=forge-result::success";
# fi
#this is a temp job here to compare lbt signals between Forge and Cluster Test
#it will be removed once Forge LBT is turned on
#compare_lbt_signals:
# name: compare-lbt_signals
# runs-on: ubuntu-latest
# timeout-minutes: 10
#always run this job even if needed jobs failed or are skipped.
# if: ${{ always() && needs.land-blocking-test.result!='skipped' && needs.land-blocking-test-forge.result!='skipped'}}
# needs:
# - prepare
# - land-blocking-test-forge
# steps:
# - run: |
# success="${{
# needs.land-blocking-test.result==needs.land-blocking-test-forge.outputs.forge-result
# }}"
# if [[ "$success" != "true" ]]; then
# jq -n \
# --arg msg "Alert: Two LBT tests results are mismatch." \
# --arg url "https://github.com/${{ github.repository }}/actions/runs/${{github.run_id}}" \
# --arg pr_url "https://github.com/${{ github.repository }}/pull/${{ needs.prepare.outputs.changes-pull-request-number }}" \
# '{
# "attachments": [
# {
# "text": $msg,
# "actions": [
# {
# "type": "button",
# "text": "Visit Job",
# "url": $url
# },
# {
# "type": "button",
# "text": "Visit PR",
# "url": $pr_url
# }
# ]
# }
# ]
# }' > /tmp/payload
# curl -X POST -H 'Content-type: application/json' -d @/tmp/payload ${{ secrets.WEBHOOK_FORGE }}
# fi
# - name: Clean up
# # always step here to avoid break workflow
# if: ${{ always() }}
# run: echo "===== forge tests done ===="