Testnet4 kathy fixes (#2833)

### Description

- removing `.relayers` from `Values.hyperlane.chains` in external
secrets
- redeploying helloworld on `goerli,sepolia,bsctestnet` and running
kathy on k8s

### Drive-by changes

none

### Related issues

none

### Backward compatibility

yes

### Testing

Manual
pull/2838/head
Kunal Arora 1 year ago committed by GitHub
parent e90ae5a0d3
commit 3efaafb8d4
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
  1. 4
      typescript/infra/config/environments/testnet4/helloworld.ts
  2. 18
      typescript/infra/config/environments/testnet4/helloworld/hyperlane/addresses.json
  3. 18
      typescript/infra/config/environments/testnet4/helloworld/hyperlane/verification.json
  4. 4
      typescript/infra/helm/helloworld-kathy/templates/external-secret.yaml

@ -13,7 +13,7 @@ export const hyperlaneHelloworld: HelloWorldConfig = {
kathy: {
docker: {
repo: 'gcr.io/abacus-labs-dev/hyperlane-monorepo',
tag: '5601743-20231007-124637',
tag: '65ac90a-20231020-192335',
},
chainsToSkip: [],
runEnv: environment,
@ -33,7 +33,7 @@ export const releaseCandidateHelloworld: HelloWorldConfig = {
kathy: {
docker: {
repo: 'gcr.io/abacus-labs-dev/hyperlane-monorepo',
tag: '5601743-20231007-124637',
tag: '65ac90a-20231020-192335',
},
chainsToSkip: [],
runEnv: environment,

@ -17,22 +17,22 @@
"polygonzkevmtestnet": {
"router": "0x783c4a0bB6663359281aD4a637D5af68F83ae213"
},
"sepolia": {
"router": "0xE14FE2a74Ba1E1bD0EE14B780e58fCcc3c95C013"
},
"fuji": {
"router": "0x0B1C1B54f45e02552331D3106e71f5e0b573D5D4"
},
"bsctestnet": {
"router": "0xd0e07a58BC91a686235E542350E63211C7A34c17"
},
"goerli": {
"router": "0x33AA9cFBC7E222B3eC231EcAa58dd846cC393C28"
},
"moonbasealpha": {
"router": "0x3Ce607F6FcE5Dfb9821f33504d86E04A4CD0C75f"
},
"mumbai": {
"router": "0x04980C17e2CE26578C82f81207e706e4505FaE3B"
},
"sepolia": {
"router": "0x37590302D4E60fbCAdF708E8Fc1DCd903a5880F8"
},
"bsctestnet": {
"router": "0xEF6DE81100B9314B45A1bdfA5C9148aFC4DdbDeE"
},
"goerli": {
"router": "0x31b6a75ef30C8612738CC55eA3CB2d5DD3694DC7"
}
}

@ -137,6 +137,12 @@
"address": "0xd0e07a58BC91a686235E542350E63211C7A34c17",
"constructorArguments": "00000000000000000000000089280d0b68a246b276a910a518531e2a861ceb650000000000000000000000000000000000000000000000000000000000000000",
"isProxy": false
},
{
"name": "Router",
"address": "0xEF6DE81100B9314B45A1bdfA5C9148aFC4DdbDeE",
"constructorArguments": "000000000000000000000000f9f6f5646f478d5ab4e20b0f910c92f1ccc9cc6d0000000000000000000000000000000000000000000000000000000000000000",
"isProxy": false
}
],
"goerli": [
@ -169,6 +175,12 @@
"address": "0x33AA9cFBC7E222B3eC231EcAa58dd846cC393C28",
"constructorArguments": "000000000000000000000000c4796aabce2a9d774ce4603f5db5fb1605791dbd0000000000000000000000000000000000000000000000000000000000000000",
"isProxy": false
},
{
"name": "Router",
"address": "0x31b6a75ef30C8612738CC55eA3CB2d5DD3694DC7",
"constructorArguments": "00000000000000000000000049cfd6ef774acab14814d699e3f7ee36fdfba9320000000000000000000000000000000000000000000000000000000000000000",
"isProxy": false
}
],
"moonbasealpha": [
@ -315,6 +327,12 @@
"address": "0xE14FE2a74Ba1E1bD0EE14B780e58fCcc3c95C013",
"constructorArguments": "00000000000000000000000033abaf6708be03bdf0595da0745a7111b01db8c70000000000000000000000000000000000000000000000000000000000000000",
"isProxy": false
},
{
"name": "Router",
"address": "0x37590302D4E60fbCAdF708E8Fc1DCd903a5880F8",
"constructorArguments": "000000000000000000000000ffaef09b3cd11d9b20d1a19becca54eec28847660000000000000000000000000000000000000000000000000000000000000000",
"isProxy": false
}
],
"basegoerli": [

@ -31,7 +31,7 @@ spec:
* The templating of external-secrets will use the data section below to know how
* to replace the correct value in the created secret.
*/}}
{{- range .Values.hyperlane.chains.relayer }}
{{- range .Values.hyperlane.chains }}
{{- if or (eq $.Values.hyperlane.connectionType "httpQuorum") (eq $.Values.hyperlane.connectionType "httpFallback") }}
GCP_SECRET_OVERRIDE_{{ $.Values.hyperlane.runEnv | upper }}_RPC_ENDPOINTS_{{ . | upper }}: {{ printf "'{{ .%s_rpcs | toString }}'" . }}
{{- else }}
@ -50,7 +50,7 @@ spec:
* For each network, load the secret in GCP secret manager with the form: environment-rpc-endpoint-network,
* and associate it with the secret key networkname_rpc.
*/}}
{{- range .Values.hyperlane.chains.relayer }}
{{- range .Values.hyperlane.chains }}
{{- if or (eq $.Values.hyperlane.connectionType "httpQuorum") (eq $.Values.hyperlane.connectionType "httpFallback") }}
- secretKey: {{ printf "%s_rpcs" . }}
remoteRef:

Loading…
Cancel
Save