Skip to content

Commit

Permalink
Merge branch 'develop' into TT-1397-Add-test_secrets_override_key-fla…
Browse files Browse the repository at this point in the history
…g-to-existing-workflows-to-allow-running-them-with-custom-test-secrets
  • Loading branch information
lukaszcl committed Jul 18, 2024
2 parents b68c8fa + 81a21bb commit 35fe3d5
Show file tree
Hide file tree
Showing 309 changed files with 41,643 additions and 2,111 deletions.
5 changes: 5 additions & 0 deletions .changeset/angry-wolves-fix.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
"chainlink": patch
---

add chaos and reorg tests #added
5 changes: 5 additions & 0 deletions .changeset/dull-seals-jog.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
"chainlink": patch
---

remove tautological err check within evm txm. #internal
5 changes: 5 additions & 0 deletions .changeset/serious-apples-dance.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
"chainlink": patch
---

#internal Mercury v3: Include telemetry if bid/ask violation is detected
5 changes: 5 additions & 0 deletions .changeset/shiny-ligers-compete.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
"chainlink": patch
---

#internal logging of non determinism in target server
5 changes: 5 additions & 0 deletions .changeset/silver-peas-happen.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
"chainlink": minor
---

#internal cleanup heavyweight test databases automatically
5 changes: 5 additions & 0 deletions .changeset/slow-trees-pay.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
"chainlink": patch
---

Protocol-level support for preventing bid/ask variant violations in mercury #added
5 changes: 5 additions & 0 deletions .changeset/soft-maps-ring.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
"chainlink": patch
---

#changed Rename the `InBackupHealthReport` to `StartUpHealthReport` and enable it for DB migrations as well. This will enable health report to be available during long start-up tasks (db backups and migrations).
5 changes: 5 additions & 0 deletions .changeset/sour-guests-exercise.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
"chainlink": patch
---

#internal additional logging to remote target capability
5 changes: 5 additions & 0 deletions .changeset/twenty-rings-kneel.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
"chainlink": minor
---

#bugfix Set LatestFinalizedBlock for finalized blocks saved by logpoller
5 changes: 5 additions & 0 deletions .changeset/wet-wasps-hide.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
"chainlink": patch
---

Fix TestIntegration_KeeperPluginLogUpkeep_ErrHandler flaky test #internal
39 changes: 34 additions & 5 deletions .github/workflows/ci-core.yml
Original file line number Diff line number Diff line change
Expand Up @@ -340,23 +340,50 @@ jobs:
fetch-depth: 0 # fetches all history for all tags and branches to provide more metadata for sonar reports
- name: Download all workflow run artifacts
uses: actions/download-artifact@c850b930e6ba138125429b7e5c93fc707a7f8427 # v4.1.4

- name: Set SonarQube Report Paths
id: sonarqube_report_paths
shell: bash
run: |
echo "sonarqube_tests_report_paths=$(find go_core_tests_logs -name output.txt | paste -sd "," -)" >> $GITHUB_OUTPUT
echo "sonarqube_coverage_report_paths=$(find go_core_tests_logs -name coverage.txt | paste -sd "," -)" >> $GITHUB_OUTPUT
echo "sonarqube_lint_report_paths=$(find golangci-lint-report -name golangci-lint-report.xml | paste -sd "," -)" >> $GITHUB_OUTPUT
- name: Check SonarQube Report Paths
id: check_sonarqube_paths
run: |
ARGS=""
if [[ -z "${{ steps.sonarqube_report_paths.outputs.sonarqube_tests_report_paths }}" ]]; then
echo "::warning::No test report paths found, will not pass to sonarqube"
else
ARGS="$ARGS -Dsonar.go.tests.reportPaths=${{ steps.sonarqube_report_paths.outputs.sonarqube_tests_report_paths }}"
fi
if [[ -z "${{ steps.sonarqube_report_paths.outputs.sonarqube_coverage_report_paths }}" ]]; then
echo "::warning::No coverage report paths found, will not pass to sonarqube"
else
ARGS="$ARGS -Dsonar.go.coverage.reportPaths=${{ steps.sonarqube_report_paths.outputs.sonarqube_coverage_report_paths }}"
fi
if [[ -z "${{ steps.sonarqube_report_paths.outputs.sonarqube_lint_report_paths }}" ]]; then
echo "::warning::No lint report paths found, will not pass to sonarqube"
else
ARGS="$ARGS -Dsonar.go.golangci-lint.reportPaths=${{ steps.sonarqube_report_paths.outputs.sonarqube_lint_report_paths }}"
fi
echo "SONARQUBE_ARGS=$ARGS" >> $GITHUB_ENV
- name: SonarQube Scan
if: ${{ env.SONARQUBE_ARGS != '' }}
uses: sonarsource/sonarqube-scan-action@aecaf43ae57e412bd97d70ef9ce6076e672fe0a9 # v2.3.0
with:
args: >
-Dsonar.go.tests.reportPaths=${{ steps.sonarqube_report_paths.outputs.sonarqube_tests_report_paths }}
-Dsonar.go.coverage.reportPaths=${{ steps.sonarqube_report_paths.outputs.sonarqube_coverage_report_paths }}
-Dsonar.go.golangci-lint.reportPaths=golangci-lint-report/golangci-lint-report.xml
args: ${{ env.SONARQUBE_ARGS }}
env:
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
SONAR_HOST_URL: ${{ secrets.SONAR_HOST_URL }}
SONAR_SCANNER_OPTS: "-Xms6g -Xmx8g"

- name: Collect Metrics
if: always()
id: collect-gha-metrics
Expand Down Expand Up @@ -393,7 +420,9 @@ jobs:
run: curl https://github.com/smartcontractkit/wsrpc/raw/main/cmd/protoc-gen-go-wsrpc/protoc-gen-go-wsrpc --output $HOME/go/bin/protoc-gen-go-wsrpc && chmod +x $HOME/go/bin/protoc-gen-go-wsrpc
- name: Setup NodeJS
uses: ./.github/actions/setup-nodejs
- run: make generate # generate install go deps
- run: |
make rm-mocked
make generate
- name: Ensure clean after generate
run: git diff --stat --exit-code
- run: make gomodtidy
Expand Down
Loading

0 comments on commit 35fe3d5

Please sign in to comment.