diff --git a/.github/workflows/goreleaser-actions.yml b/.github/workflows/goreleaser-actions.yml index 2698ea3435..481d45a2f0 100644 --- a/.github/workflows/goreleaser-actions.yml +++ b/.github/workflows/goreleaser-actions.yml @@ -111,7 +111,8 @@ jobs: # TODO: we may want to dry run this on prs run-goreleaser: - runs-on: namespace-profile-default + runs-on: + - namespace-profile-fast-goreleaser needs: [build-goreleaser,changes] if: ${{ needs.changes.outputs.package_count > 0 }} permissions: @@ -128,7 +129,13 @@ jobs: package: ${{ fromJSON(needs.changes.outputs.packages) }} container: image: ${{ needs.build-goreleaser.outputs.goreleaser-image }} - volumes: [ /repo ] + env: + NSC_CACHE_PATH: ${{ env.NSC_CACHE_PATH }} # env.NSC_CACHE_PATH contains the path to Cache Volume directory, that is `/cache`. + volumes: + - /repo + - /cache:/cache + options: --cap-add=SYS_ADMIN # Required to by nscloud-cache-action to call `mount`. + steps: - name: Git Checkout uses: actions/checkout@v4 @@ -137,6 +144,7 @@ jobs: submodules: 'recursive' - name: Set up cache + if: ${{ !contains(runner.name, 'nsc') }} uses: actions/cache@v4 with: path: | @@ -146,6 +154,12 @@ jobs: restore-keys: | ${{ runner.os }}-go-${{matrix.package}} + - name: Setup Go cache + uses: namespacelabs/nscloud-cache-action@v1 + if: ${{ contains(runner.name, 'nsc') }} + with: + cache: go + - name: Get branch name id: branch-name uses: tj-actions/branch-names@v6 diff --git a/docker/goreleaser/Dockerfile b/docker/goreleaser/Dockerfile index d325f2b92a..4f383341be 100644 --- a/docker/goreleaser/Dockerfile +++ b/docker/goreleaser/Dockerfile @@ -113,7 +113,7 @@ ENV NODE_MAJOR=20 RUN echo "deb [signed-by=/etc/apt/keyrings/nodesource.gpg] https://deb.nodesource.com/node_$NODE_MAJOR.x nodistro main" | tee /etc/apt/sources.list.d/nodesource.list -RUN apt-get update && apt-get install -y nodejs +RUN apt-get update && apt-get install -y nodejs sudo # Install syft diff --git a/ethergo/backends/anvil/anvil.go b/ethergo/backends/anvil/anvil.go index 2f631bedec..adbb0a6050 100644 --- a/ethergo/backends/anvil/anvil.go +++ b/ethergo/backends/anvil/anvil.go @@ -308,7 +308,7 @@ func (f *Backend) FundAccount(ctx context.Context, address common.Address, amoun defer unlocker.Unlock() prevBalance, err := f.Backend.BalanceAt(ctx, address, nil) - require.Nil(f.T(), err) + require.NoError(f.T(), err) newBal := new(big.Int).Add(prevBalance, &amount) diff --git a/services/rfq/e2e/setup_test.go b/services/rfq/e2e/setup_test.go index 460047ffc8..55792ccd00 100644 --- a/services/rfq/e2e/setup_test.go +++ b/services/rfq/e2e/setup_test.go @@ -147,26 +147,25 @@ func (i *IntegrationSuite) setupBE(backend backends.SimulatedTestBackend) { backend.FundAccount(i.GetTestContext(), i.guardWallet.Address(), ethAmount) backend.FundAccount(i.GetTestContext(), i.userWallet.Address(), ethAmount) - go func() { - i.manager.BulkDeploy(i.GetTestContext(), core.ToSlice(backend), predeploys...) - }() + var wg sync.WaitGroup // TODO: in the case of relayer this not finishing before the test starts can lead to race conditions since // nonce may be shared between submitter and relayer. Think about how to deal w/ this. for _, user := range []wallet.Wallet{i.relayerWallet, i.guardWallet, i.userWallet} { + wg.Add(1) go func(userWallet wallet.Wallet) { + defer wg.Done() for _, token := range predeployTokens { i.Approve(backend, i.manager.Get(i.GetTestContext(), backend, token), userWallet) } }(user) } - + wg.Wait() } func (i *IntegrationSuite) setupCCTP() { // deploy the contract to all backends testBackends := core.ToSlice(i.originBackend, i.destBackend) - i.cctpDeployManager.BulkDeploy(i.GetTestContext(), testBackends, cctpTest.SynapseCCTPType, cctpTest.MockMintBurnTokenType) // register remote deployments and tokens for _, backend := range testBackends {