You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
chore(test-suite): applying new config for v0.6.0 relayer (#1338)
* chore(test-suite): upgrating test suite for relayer v0.6.0-rc.1
* chore(test-suite): fix config value for relayer, the time is treated as seconds
* chore(test-suite): removing oracle in fhevm-cli
* ci(test-suite): removing public-decryption oracle flow from ci
* chore(test-suite): moving to v0.6.0 relayer on fhevm-cli
* chore(test-suite): adding next environment variables for relayer versions
---------
Co-authored-by: manoranjith <[email protected]>
The test suite offers a unified CLI for all operations:
31
32
32
33
```sh
@@ -40,7 +41,8 @@ cd test-suite/fhevm
40
41
# Trivial
41
42
./fhevm-cli test user-decryption
42
43
# Trivial
43
-
./fhevm-cli test public-decryption
44
+
./fhevm-cli test public-decrypt-http-mixed
45
+
./fhevm-cli test public-decrypt-http-ebool
44
46
./fhevm-cli test erc20
45
47
46
48
# Upgrade a specific service
@@ -68,14 +70,16 @@ Therefore, for external developers or anyone setting up the stack for the first
68
70
```
69
71
70
72
This command instructs Docker Compose to:
73
+
71
74
1. Build the images locally using the `Dockerfile` and context specified in the respective `docker-compose/*.yml` files for each service. This process uses the source code available in your local checkout (or cloned sub-repositories).
72
75
2. Tag the newly built images with the versions specified in the `fhevm-cli` script.
73
76
3. Then, start the services using these freshly built local images.
74
77
75
78
**Why `--build` is essential for external developers:**
76
-
***Image Access:** Since pre-built images are private, `--build` allows you to construct the necessary images from the publicly available source code.
77
-
***Local Modifications:** If you have made local changes to any of the Dockerfiles or the build context of a service (e.g., you've cloned one of the sub-repositories like `fhevm-contracts` or `fhevm-coprocessor` into the expected relative paths and made changes), `--build` ensures these changes are incorporated.
78
-
***Ensuring Correct Setup:** It guarantees that you are running with images built directly from the provided source, eliminating discrepancies that could arise from attempting to pull non-existent or inaccessible public images.
79
+
80
+
-**Image Access:** Since pre-built images are private, `--build` allows you to construct the necessary images from the publicly available source code.
81
+
-**Local Modifications:** If you have made local changes to any of the Dockerfiles or the build context of a service (e.g., you've cloned one of the sub-repositories like `fhevm-contracts` or `fhevm-coprocessor` into the expected relative paths and made changes), `--build` ensures these changes are incorporated.
82
+
-**Ensuring Correct Setup:** It guarantees that you are running with images built directly from the provided source, eliminating discrepancies that could arise from attempting to pull non-existent or inaccessible public images.
79
83
80
84
🚧 **In summary:** Until public images are made available, external users should always use `./fhevm-cli deploy --build` to ensure a successful deployment.
81
85
@@ -90,6 +94,7 @@ This document outlines security best practices for the FHEVM project, particular
90
94
Our repository contains example environment files `env/staging` that include sensitive values like private keys, mnemonics, and API keys. **These values are for testing purposes only** and should never be used in production environments.
91
95
92
96
For production deployments:
97
+
93
98
-**Do not** use the same keys, passwords, or mnemonics that appear in the example files
94
99
-**Do not** commit actual production secrets to any repository
95
100
-**Do** use a proper secrets management solution:
@@ -99,6 +104,7 @@ For production deployments:
99
104
- Kubernetes Secrets (with proper encryption)
100
105
101
106
Example of replacing sensitive data in production:
107
+
102
108
```bash
103
109
# Replace test mnemonic with environment variable reference
0 commit comments