Skip to content

Commit 9c598a0

Browse files
Merge pull request #52 from terpnetwork/v1.0.0-rc
V1.0.0- passing test with proto fix
2 parents 8ef7c32 + 6740234 commit 9c598a0

File tree

357 files changed

+29295
-23629
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

357 files changed

+29295
-23629
lines changed

.circleci/config.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ version: 2.1
33
executors:
44
golang:
55
docker:
6-
- image: cimg/go:1.19
6+
- image: cimg/go:1.20.0
77

88
commands:
99
make:
@@ -61,7 +61,7 @@ jobs:
6161

6262
lint:
6363
docker:
64-
- image: golangci/golangci-lint:v1.46.2
64+
- image: golangci/golangci-lint:v1.51.1
6565
steps:
6666
- checkout
6767
- run:
@@ -124,7 +124,7 @@ jobs:
124124
- run:
125125
name: Run simulations
126126
command: |
127-
make test-sim-multi-seed-short
127+
make test-sim-multi-seed-short test-sim-import-export test-sim-deterministic
128128
- store_artifacts:
129129
path: /tmp
130130

@@ -174,7 +174,7 @@ jobs:
174174
fi
175175
- when:
176176
condition:
177-
equal: [main, << pipeline.git.branch >>]
177+
equal: [ main, << pipeline.git.branch >> ]
178178
steps:
179179
- run:
180180
name: Push application Docker image to docker hub

.codecov.yml

Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
#
2+
# This codecov.yml is the default configuration for
3+
# all repositories on Codecov. You may adjust the settings
4+
# below in your own codecov.yml in your repository.
5+
#
6+
coverage:
7+
precision: 2
8+
round: down
9+
range: 70...100
10+
11+
status:
12+
# Learn more at https://docs.codecov.io/docs/commit-status
13+
project:
14+
default:
15+
threshold: 1% # allow this much decrease on project
16+
app:
17+
target: 70%
18+
flags:
19+
- app
20+
modules:
21+
target: 70%
22+
flags:
23+
- modules
24+
client:
25+
flags:
26+
- client
27+
changes: false
28+
29+
comment:
30+
layout: "reach, diff, files"
31+
behavior: default # update if exists else create new
32+
require_changes: true
33+
34+
flags:
35+
app:
36+
paths:
37+
- "app/"
38+
modules:
39+
paths:
40+
- "x/"
41+
- "!x/**/client/" # ignore client package
42+
client:
43+
paths:
44+
- "x/**/client/"
45+
46+
ignore:
47+
- "cmd/"
48+
- "contrib/"
49+
- "docs/"
50+
- "docker/"
51+
- "scripts/"
52+
- "*.md"
53+
- "*.rst"
54+
- "x/**/*.pb.go"
55+
- "x/**/*.pb.gw.go"
56+
- "x/**/test_common.go"
57+
- "x/**/testdata/"

.github/dependabot.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ updates:
1818
- 0.14.0-beta4
1919
- 0.14.0-beta5
2020
- 0.14.0-rc1
21-
- dependency-name: github.com/tendermint/tendermint
21+
- dependency-name: github.com/cometbft/cometbft
2222
versions:
2323
- 0.34.10
2424
- 0.34.4
@@ -40,6 +40,6 @@ updates:
4040
- dependency-name: github.com/spf13/cobra
4141
versions:
4242
- 1.1.2
43-
- dependency-name: github.com/tendermint/tm-db
43+
- dependency-name: github.com/cometbft/cometbft-db
4444
versions:
4545
- 0.6.4

.github/workflows/build.yml

Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
---
2+
on: [push, pull_request]
3+
name: Build
4+
5+
concurrency:
6+
group: ${{ github.workflow }}-${{ github.ref }}
7+
cancel-in-progress: true
8+
9+
jobs:
10+
build:
11+
runs-on: ubuntu-latest
12+
name: build
13+
steps:
14+
- uses: actions/checkout@v3
15+
- name: Setup go
16+
uses: actions/setup-go@v3
17+
with:
18+
go-version: "1.20"
19+
- run: go build ./...
20+
21+
tidy:
22+
runs-on: ubuntu-latest
23+
name: tidy
24+
steps:
25+
- uses: actions/checkout@v3
26+
- name: Setup go
27+
uses: actions/setup-go@v3
28+
with:
29+
go-version: "1.20"
30+
- run: |
31+
go mod tidy
32+
CHANGES_IN_REPO=$(git status --porcelain)
33+
if [[ -n "$CHANGES_IN_REPO" ]]; then
34+
echo "Repository is dirty. Showing 'git status' and 'git --no-pager diff' for debugging now:"
35+
git status && git --no-pager diff
36+
exit 1
37+
fi

.github/workflows/codacy.yml

Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
# This workflow uses actions that are not certified by GitHub.
2+
# They are provided by a third-party and are governed by
3+
# separate terms of service, privacy policy, and support
4+
# documentation.
5+
6+
# This workflow checks out code, performs a Codacy security scan
7+
# and integrates the results with the
8+
# GitHub Advanced Security code scanning feature. For more information on
9+
# the Codacy security scan action usage and parameters, see
10+
# https://github.com/codacy/codacy-analysis-cli-action.
11+
# For more information on Codacy Analysis CLI in general, see
12+
# https://github.com/codacy/codacy-analysis-cli.
13+
14+
name: Codacy Security Scan
15+
16+
on:
17+
push:
18+
branches: [ "main", "release/v*" ]
19+
pull_request:
20+
# The branches below must be a subset of the branches above
21+
branches: [ "main", "release/v*" ]
22+
schedule:
23+
- cron: '24 14 * * 5'
24+
25+
permissions:
26+
contents: read
27+
28+
jobs:
29+
codacy-security-scan:
30+
permissions:
31+
contents: read # for actions/checkout to fetch code
32+
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
33+
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
34+
name: Codacy Security Scan
35+
runs-on: ubuntu-latest
36+
steps:
37+
# Checkout the repository to the GitHub Actions runner
38+
- name: Checkout code
39+
uses: actions/checkout@v3
40+
41+
# Execute Codacy Analysis CLI and generate a SARIF output with the security issues identified during the analysis
42+
- name: Run Codacy Analysis CLI
43+
uses: codacy/codacy-analysis-cli-action@d43127fe38d20c527dc1951ae5aea23148bab738
44+
with:
45+
# Check https://github.com/codacy/codacy-analysis-cli#project-token to get your project token from your Codacy repository
46+
# You can also omit the token and run the tools that support default configurations
47+
project-token: ${{ secrets.CODACY_PROJECT_TOKEN }}
48+
verbose: true
49+
output: results.sarif
50+
format: sarif
51+
# Adjust severity of non-security issues
52+
gh-code-scanning-compat: true
53+
# Force 0 exit code to allow SARIF file generation
54+
# This will handover control about PR rejection to the GitHub side
55+
max-allowed-issues: 2147483647
56+
57+
# Upload the SARIF file generated in the previous step
58+
- name: Upload SARIF results file
59+
uses: github/codeql-action/upload-sarif@v2
60+
with:
61+
sarif_file: results.sarif

.github/workflows/codeql-analizer.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ jobs:
1919

2020
steps:
2121
- name: Checkout repository
22-
uses: actions/checkout@v3.1.0
22+
uses: actions/checkout@v3.5.0
2323

2424
# Initializes the CodeQL tools for scanning.
2525
- name: Initialize CodeQL

.github/workflows/codeql-cosmos.yml

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
name: "CodeQL for cosmos"
2+
3+
on:
4+
pull_request:
5+
paths:
6+
- "**.go"
7+
push:
8+
branches:
9+
- main
10+
- release/v*
11+
paths:
12+
- "**.go"
13+
14+
jobs:
15+
analyze:
16+
name: Analyze
17+
runs-on: ubuntu-latest
18+
permissions:
19+
actions: read
20+
contents: read
21+
security-events: write
22+
23+
steps:
24+
- name: Checkout repository
25+
uses: actions/checkout@v3
26+
- uses: actions/setup-go@v3
27+
with:
28+
go-version: "1.20"
29+
# Initializes the CodeQL tools for scanning.
30+
- name: Initialize CodeQL
31+
uses: github/codeql-action/init@v2
32+
with:
33+
languages: "go"
34+
queries: crypto-com/cosmos-sdk-codeql@main,security-and-quality
35+
36+
- name: Build
37+
run: make build
38+
39+
- name: Perform CodeQL Analysis
40+
uses: github/codeql-action/analyze@v2

.github/workflows/codeql.yml

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
name: "CodeQL"
2+
3+
on:
4+
pull_request:
5+
paths:
6+
- "**.go"
7+
push:
8+
branches:
9+
- main
10+
- release/v*
11+
paths:
12+
- "**.go"
13+
14+
jobs:
15+
analyze:
16+
name: Analyze
17+
runs-on: ubuntu-latest
18+
permissions:
19+
actions: read
20+
contents: read
21+
security-events: write
22+
23+
steps:
24+
- name: Checkout repository
25+
uses: actions/checkout@v3
26+
- uses: actions/setup-go@v3
27+
with:
28+
go-version: "1.20"
29+
# Initializes the CodeQL tools for scanning.
30+
- name: Initialize CodeQL
31+
uses: github/codeql-action/init@v2
32+
with:
33+
languages: "go"
34+
queries: crypto-com/cosmos-sdk-codeql@main,security-and-quality
35+
36+
- name: Build
37+
run: make build
38+
39+
- name: Perform CodeQL Analysis
40+
uses: github/codeql-action/analyze@v2
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
# Dependency Review Action
2+
#
3+
# This Action will scan dependency manifest files that change as part of a Pull Request, surfacing known-vulnerable versions of the packages declared or updated in the PR. Once installed, if the workflow run is marked as required, PRs introducing known-vulnerable packages will be blocked from merging.
4+
#
5+
# Source repository: https://github.com/actions/dependency-review-action
6+
# Public documentation: https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review#dependency-review-enforcement
7+
name: 'Dependency Review'
8+
on: [pull_request]
9+
10+
permissions:
11+
contents: read
12+
13+
jobs:
14+
dependency-review:
15+
runs-on: ubuntu-latest
16+
steps:
17+
- name: 'Checkout Repository'
18+
uses: actions/checkout@v3
19+
- name: 'Dependency Review'
20+
uses: actions/dependency-review-action@v3

.github/workflows/docker.yml

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
name: Build Docker Image on PR
3+
4+
on:
5+
pull_request:
6+
7+
jobs:
8+
docker:
9+
runs-on: ubuntu-latest
10+
steps:
11+
- name: Checkout
12+
uses: actions/checkout@v3
13+
- name: Set up QEMU
14+
uses: docker/setup-qemu-action@v2
15+
- name: Set up Docker Buildx
16+
uses: docker/setup-buildx-action@v2
17+
- name: Build without push
18+
uses: docker/build-push-action@v4
19+
with:
20+
context: .
21+
platforms: linux/amd64
22+
push: false
23+
build-args: arch=x86_64

.github/workflows/golangci-lint.yml

Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
---
2+
name: golangci-lint
3+
on:
4+
push:
5+
tags:
6+
- v*
7+
branches:
8+
- release/v*
9+
- main
10+
pull_request:
11+
permissions:
12+
contents: read
13+
# Optional: allow read access to pull request. Use with `only-new-issues` option.
14+
# pull-requests: read
15+
16+
concurrency:
17+
group: ${{ github.workflow }}-${{ github.ref }}
18+
cancel-in-progress: true
19+
20+
jobs:
21+
golangci:
22+
name: lint
23+
runs-on: ubuntu-latest
24+
steps:
25+
- uses: actions/setup-go@v3
26+
with:
27+
go-version: "1.20"
28+
- uses: actions/checkout@v3
29+
30+
- name: golangci-lint
31+
uses: golangci/golangci-lint-action@v3
32+
with:
33+
version: latest
34+
args: --timeout 10m

0 commit comments

Comments
 (0)