Make state value metadata upgradable at runtime #15837
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Each of these jobs runs the Rust SDK client tests from this commit against a local | |
# testnet built from one of the production release branches. In other words, we run the | |
# tests against a local devnet, testnet, and mainnet. | |
name: "Rust SDK Client Tests" | |
on: | |
pull_request_target: | |
types: [labeled, opened, synchronize, reopened, auto_merge_enabled] | |
push: | |
branches: | |
- main | |
permissions: | |
contents: read | |
id-token: write # Required for GCP Workload Identity federation which we use to login into Google Artifact Registry | |
jobs: | |
# Note on the job-level `if` conditions: | |
# This workflow is designed such that we run subsequent jobs only when a 'push' | |
# triggered the workflow or on 'pull_request's which have set auto_merge=true | |
# or have the label "CICD:run-e2e-tests". | |
permission-check: | |
runs-on: ubuntu-latest | |
steps: | |
- name: Check repository permission for user which triggered workflow | |
uses: sushichop/action-repository-permission@13d208f5ae7a6a3fc0e5a7c2502c214983f0241c | |
with: | |
required-permission: write | |
comment-not-permitted: Sorry, you don't have permission to trigger this workflow. | |
run-tests-devnet: | |
if: contains(github.event.pull_request.labels.*.name, 'CICD:non-required-tests') | |
needs: [permission-check] | |
runs-on: high-perf-docker | |
steps: | |
- uses: actions/checkout@v3 | |
- uses: aptos-labs/aptos-core/.github/actions/docker-setup@main | |
with: | |
GCP_WORKLOAD_IDENTITY_PROVIDER: ${{ secrets.GCP_WORKLOAD_IDENTITY_PROVIDER }} | |
GCP_SERVICE_ACCOUNT_EMAIL: ${{ secrets.GCP_SERVICE_ACCOUNT_EMAIL }} | |
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }} | |
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | |
AWS_DOCKER_ARTIFACT_REPO: ${{ secrets.AWS_DOCKER_ARTIFACT_REPO }} | |
GIT_CREDENTIALS: ${{ secrets.GIT_CREDENTIALS }} | |
- uses: ./.github/actions/run-rust-client-tests | |
with: | |
NETWORK: devnet | |
GCP_DOCKER_ARTIFACT_REPO: ${{ secrets.GCP_DOCKER_ARTIFACT_REPO }} | |
run-tests-testnet: | |
if: contains(github.event.pull_request.labels.*.name, 'CICD:non-required-tests') | |
needs: [permission-check] | |
runs-on: high-perf-docker | |
steps: | |
- uses: actions/checkout@v3 | |
- uses: aptos-labs/aptos-core/.github/actions/docker-setup@main | |
with: | |
GCP_WORKLOAD_IDENTITY_PROVIDER: ${{ secrets.GCP_WORKLOAD_IDENTITY_PROVIDER }} | |
GCP_SERVICE_ACCOUNT_EMAIL: ${{ secrets.GCP_SERVICE_ACCOUNT_EMAIL }} | |
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }} | |
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | |
AWS_DOCKER_ARTIFACT_REPO: ${{ secrets.AWS_DOCKER_ARTIFACT_REPO }} | |
GIT_CREDENTIALS: ${{ secrets.GIT_CREDENTIALS }} | |
- uses: ./.github/actions/run-rust-client-tests | |
with: | |
NETWORK: testnet | |
GCP_DOCKER_ARTIFACT_REPO: ${{ secrets.GCP_DOCKER_ARTIFACT_REPO }} | |
run-tests-mainnet: | |
if: contains(github.event.pull_request.labels.*.name, 'CICD:non-required-tests') | |
needs: [permission-check] | |
runs-on: high-perf-docker | |
steps: | |
- uses: actions/checkout@v3 | |
- uses: aptos-labs/aptos-core/.github/actions/docker-setup@main | |
with: | |
GCP_WORKLOAD_IDENTITY_PROVIDER: ${{ secrets.GCP_WORKLOAD_IDENTITY_PROVIDER }} | |
GCP_SERVICE_ACCOUNT_EMAIL: ${{ secrets.GCP_SERVICE_ACCOUNT_EMAIL }} | |
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }} | |
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | |
AWS_DOCKER_ARTIFACT_REPO: ${{ secrets.AWS_DOCKER_ARTIFACT_REPO }} | |
GIT_CREDENTIALS: ${{ secrets.GIT_CREDENTIALS }} | |
- uses: ./.github/actions/run-rust-client-tests | |
with: | |
NETWORK: mainnet | |
GCP_DOCKER_ARTIFACT_REPO: ${{ secrets.GCP_DOCKER_ARTIFACT_REPO }} |